Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
2HCwqwLg1G.exe

Overview

General Information

Sample name:2HCwqwLg1G.exe
renamed because original name is a hash value
Original sample name:523c3e9f716ca9f2a75109f674135b55e9b25259d5d078175fb5580965426f8a.exe
Analysis ID:1587601
MD5:aa3e95c2cd9e5118dfe41280d0e05a49
SHA1:5261a60d04c74f986cdd6f129a171874b446d8b2
SHA256:523c3e9f716ca9f2a75109f674135b55e9b25259d5d078175fb5580965426f8a
Tags:exeuser-adrian__luca
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
Yara detected AntiVM3
AI detected suspicious sample
Check if machine is in data center or colocation facility
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Machine Learning detection for sample
Maps a DLL or memory area into another process
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Yara detected Generic Downloader
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
May check the online IP address of the machine
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • 2HCwqwLg1G.exe (PID: 7664 cmdline: "C:\Users\user\Desktop\2HCwqwLg1G.exe" MD5: AA3E95C2CD9E5118DFE41280D0E05A49)
    • RegSvcs.exe (PID: 7804 cmdline: "C:\Users\user\Desktop\2HCwqwLg1G.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "FTP", "Host": "ftp://ftp.elquijotebanquetes.com", "Username": "urchman@elquijotebanquetes.com", "Password": "-GN,s*KH{VEhPmo)+f"}
SourceRuleDescriptionAuthorStrings
00000002.00000002.2538606278.0000000000342000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000002.00000002.2538606278.0000000000342000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000000.00000002.1348146872.0000000002F40000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000000.00000002.1348146872.0000000002F40000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
          00000000.00000002.1348146872.0000000002F40000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 8 entries
            SourceRuleDescriptionAuthorStrings
            2.2.RegSvcs.exe.340000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              2.2.RegSvcs.exe.340000.0.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                2.2.RegSvcs.exe.340000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                  2.2.RegSvcs.exe.340000.0.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
                  • 0x3455f:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                  • 0x345d1:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
                  • 0x3465b:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
                  • 0x346ed:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                  • 0x34757:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                  • 0x347c9:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                  • 0x3485f:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                  • 0x348ef:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                  2.2.RegSvcs.exe.340000.0.unpackMALWARE_Win_AgentTeslaV2AgenetTesla Type 2 Keylogger payloadditekSHen
                  • 0x31697:$s2: GetPrivateProfileString
                  • 0x30d0c:$s3: get_OSFullName
                  • 0x323df:$s5: remove_Key
                  • 0x32567:$s5: remove_Key
                  • 0x33504:$s6: FtpWebRequest
                  • 0x34541:$s7: logins
                  • 0x34ab3:$s7: logins
                  • 0x377b8:$s7: logins
                  • 0x37876:$s7: logins
                  • 0x391c9:$s7: logins
                  • 0x38410:$s9: 1.85 (Hash, version 2, native byte-order)
                  Click to see the 9 entries
                  No Sigma rule has matched
                  No Suricata rule has matched

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: 2HCwqwLg1G.exeAvira: detected
                  Source: 2.2.RegSvcs.exe.340000.0.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "FTP", "Host": "ftp://ftp.elquijotebanquetes.com", "Username": "urchman@elquijotebanquetes.com", "Password": "-GN,s*KH{VEhPmo)+f"}
                  Source: 2HCwqwLg1G.exeVirustotal: Detection: 64%Perma Link
                  Source: 2HCwqwLg1G.exeReversingLabs: Detection: 83%
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                  Source: 2HCwqwLg1G.exeJoe Sandbox ML: detected
                  Source: 2HCwqwLg1G.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                  Source: Binary string: wntdll.pdbUGP source: 2HCwqwLg1G.exe, 00000000.00000003.1344016097.00000000047D0000.00000004.00001000.00020000.00000000.sdmp, 2HCwqwLg1G.exe, 00000000.00000003.1347033757.0000000004630000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: wntdll.pdb source: 2HCwqwLg1G.exe, 00000000.00000003.1344016097.00000000047D0000.00000004.00001000.00020000.00000000.sdmp, 2HCwqwLg1G.exe, 00000000.00000003.1347033757.0000000004630000.00000004.00001000.00020000.00000000.sdmp
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_00452492 FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00452492
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_00442886 FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00442886
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_004788BD FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_004788BD
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_004339B6 GetFileAttributesW,FindFirstFileW,FindClose,0_2_004339B6
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_0045CAFA FindFirstFileW,FindNextFileW,FindClose,0_2_0045CAFA
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_00431A86 FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00431A86
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_0044BD27 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,0_2_0044BD27
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_0045DE8F FindFirstFileW,FindClose,0_2_0045DE8F
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_0044BF8B _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0044BF8B

                  Networking

                  barindex
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.340000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.2HCwqwLg1G.exe.2f40000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.1348146872.0000000002F40000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                  Source: Joe Sandbox ViewIP Address: 208.95.112.1 208.95.112.1
                  Source: unknownDNS query: name: ip-api.com
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_004422FE InternetQueryDataAvailable,InternetReadFile,0_2_004422FE
                  Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                  Source: global trafficDNS traffic detected: DNS query: ip-api.com
                  Source: RegSvcs.exe, 00000002.00000002.2539572214.0000000002581000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2539572214.0000000002666000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2539572214.000000000264C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com
                  Source: 2HCwqwLg1G.exe, 00000000.00000002.1348146872.0000000002F40000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2538606278.0000000000342000.00000040.80000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2539572214.0000000002581000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2539572214.000000000264C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com/line/?fields=hosting
                  Source: RegSvcs.exe, 00000002.00000002.2539572214.0000000002581000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2539572214.000000000264C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                  Source: 2HCwqwLg1G.exe, 00000000.00000002.1348146872.0000000002F40000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2538606278.0000000000342000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://account.dyn.com/
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_0045A10F OpenClipboard,EmptyClipboard,CloseClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_0045A10F
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_0045A10F OpenClipboard,EmptyClipboard,CloseClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_0045A10F
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_0046DC80 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,0_2_0046DC80
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_0044C37A GetKeyboardState,SetKeyboardState,PostMessageW,PostMessageW,SendInput,0_2_0044C37A
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_0047C81C SendMessageW,NtdllDialogWndProc_W,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,73A345F0,SendMessageW,SendMessageW,SendMessageW,_wcsncpy,SendMessageW,SendMessageW,SendMessageW,InvalidateRect,SendMessageW,6F13CB00,6F13C2F0,SetCapture,ClientToScreen,6F13C530,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,73A345F0,0_2_0047C81C

                  System Summary

                  barindex
                  Source: 2.2.RegSvcs.exe.340000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 2.2.RegSvcs.exe.340000.0.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 0.2.2HCwqwLg1G.exe.2f40000.1.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 0.2.2HCwqwLg1G.exe.2f40000.1.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 0.2.2HCwqwLg1G.exe.2f40000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 0.2.2HCwqwLg1G.exe.2f40000.1.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 00000000.00000002.1348146872.0000000002F40000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 00000000.00000002.1348146872.0000000002F40000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_0046A07E PostMessageW,GetFocus,GetDlgCtrlID,PostMessageW,NtdllDialogWndProc_W,GetMenuItemInfoW,GetMenuItemCount,GetMenuItemID,GetMenuItemInfoW,GetMenuItemInfoW,CheckMenuRadioItem,NtdllDialogWndProc_W,0_2_0046A07E
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_004710F1 NtdllDialogWndProc_W,6F13C580,6F13C6F0,ReleaseCapture,SetWindowTextW,SendMessageW,NtdllDialogWndProc_W,0_2_004710F1
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_0045034C GetParent,NtdllDialogWndProc_W,0_2_0045034C
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_0044036A NtdllDialogWndProc_W,0_2_0044036A
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_00440306 NtdllDialogWndProc_W,0_2_00440306
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_0047132F NtdllDialogWndProc_W,0_2_0047132F
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_00440338 NtdllDialogWndProc_W,0_2_00440338
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_0046A38E NtdllDialogWndProc_W,NtdllDialogWndProc_W,0_2_0046A38E
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_0045039B GetParent,NtdllDialogWndProc_W,NtdllDialogWndProc_W,NtdllDialogWndProc_W,0_2_0045039B
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_004404E8 GetSystemMetrics,MoveWindow,SendMessageW,InvalidateRect,SendMessageW,ShowWindow,NtdllDialogWndProc_W,0_2_004404E8
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_0044048E NtdllDialogWndProc_W,0_2_0044048E
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_0044786A NtdllDialogWndProc_W,0_2_0044786A
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_0047C81C SendMessageW,NtdllDialogWndProc_W,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,73A345F0,SendMessageW,SendMessageW,SendMessageW,_wcsncpy,SendMessageW,SendMessageW,SendMessageW,InvalidateRect,SendMessageW,6F13CB00,6F13C2F0,SetCapture,ClientToScreen,6F13C530,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,73A345F0,0_2_0047C81C
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_004478AC GetCursorPos,TrackPopupMenuEx,NtdllDialogWndProc_W,GetCursorPos,TrackPopupMenuEx,0_2_004478AC
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_004479A0 GetClientRect,GetCursorPos,ScreenToClient,WindowFromPoint,NtdllDialogWndProc_W,0_2_004479A0
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_004629B7 NtdllDialogWndProc_W,NtdllDialogWndProc_W,0_2_004629B7
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_0047EA6F NtdllDialogWndProc_W,0_2_0047EA6F
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_00447ABC SendMessageW,NtdllDialogWndProc_W,0_2_00447ABC
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_00447B4E NtdllDialogWndProc_W,0_2_00447B4E
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_00454CFC NtdllDialogWndProc_W,0_2_00454CFC
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_00454D4A NtdllDialogWndProc_W,0_2_00454D4A
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_0042FDA6 ClientToScreen,6F13C5D0,NtdllDialogWndProc_W,0_2_0042FDA6
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_0042FE05 73A345F0,NtdllDialogWndProc_W,0_2_0042FE05
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_00470E96 DragQueryPoint,SendMessageW,SendMessageW,DragQueryFileW,DragQueryFileW,_wcscat,SendMessageW,SendMessageW,SendMessageW,SendMessageW,DragFinish,NtdllDialogWndProc_W,0_2_00470E96
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_00431BE8: GetFullPathNameW,__swprintf,_wcslen,CreateDirectoryW,CreateFileW,_wcsncpy,DeviceIoControl,CloseHandle,RemoveDirectoryW,CloseHandle,0_2_00431BE8
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_00446313 DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,_wcsncpy,746E5590,746E7ED0,CreateProcessAsUserW,746E5030,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,746E7F30,0_2_00446313
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_004333BE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,0_2_004333BE
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_004096A00_2_004096A0
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_0042200C0_2_0042200C
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_0041A2170_2_0041A217
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_004122160_2_00412216
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_0042435D0_2_0042435D
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_004033C00_2_004033C0
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_0044F4300_2_0044F430
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_004125E80_2_004125E8
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_0044663B0_2_0044663B
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_004138010_2_00413801
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_0042096F0_2_0042096F
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_004129D00_2_004129D0
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_004119E30_2_004119E3
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_0041C9AE0_2_0041C9AE
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_0047EA6F0_2_0047EA6F
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_0040FA100_2_0040FA10
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_0044EB5F0_2_0044EB5F
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_00423C810_2_00423C81
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_00411E780_2_00411E78
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_00442E0C0_2_00442E0C
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_00420EC00_2_00420EC0
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_0044CF170_2_0044CF17
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_00444FD20_2_00444FD2
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_03F869F00_2_03F869F0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00AFA6E82_2_00AFA6E8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00AFD9602_2_00AFD960
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00AF4A882_2_00AF4A88
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00AF3E702_2_00AF3E70
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00AF41B82_2_00AF41B8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_05E625882_2_05E62588
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_05E613D82_2_05E613D8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_05E63D282_2_05E63D28
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_05E636402_2_05E63640
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: String function: 004115D7 appears 36 times
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: String function: 00416C70 appears 39 times
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: String function: 00445AE0 appears 65 times
                  Source: 2HCwqwLg1G.exe, 00000000.00000003.1345290584.0000000004753000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs 2HCwqwLg1G.exe
                  Source: 2HCwqwLg1G.exe, 00000000.00000003.1344016097.00000000048FD000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs 2HCwqwLg1G.exe
                  Source: 2HCwqwLg1G.exe, 00000000.00000002.1348146872.0000000002F40000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilename07823960-0dbd-43bb-aade-b6626acc7f4a.exe0 vs 2HCwqwLg1G.exe
                  Source: 2HCwqwLg1G.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                  Source: 2.2.RegSvcs.exe.340000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 2.2.RegSvcs.exe.340000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 0.2.2HCwqwLg1G.exe.2f40000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 0.2.2HCwqwLg1G.exe.2f40000.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 0.2.2HCwqwLg1G.exe.2f40000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 0.2.2HCwqwLg1G.exe.2f40000.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 00000000.00000002.1348146872.0000000002F40000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 00000000.00000002.1348146872.0000000002F40000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/1@1/1
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_0044AF6C GetLastError,FormatMessageW,0_2_0044AF6C
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_004333BE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,0_2_004333BE
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_00464EAE OpenProcess,GetLastError,GetLastError,GetCurrentThread,OpenThreadToken,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,AdjustTokenPrivileges,GetLastError,OpenProcess,AdjustTokenPrivileges,CloseHandle,TerminateProcess,GetLastError,CloseHandle,0_2_00464EAE
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_0045D619 SetErrorMode,GetDiskFreeSpaceW,GetLastError,SetErrorMode,0_2_0045D619
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_004755C4 CreateToolhelp32Snapshot,Process32FirstW,__wsplitpath,_wcscat,__wcsicoll,Process32NextW,CloseHandle,0_2_004755C4
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_0047839D CoInitialize,CoCreateInstance,CoUninitialize,0_2_0047839D
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_0043305F __swprintf,__swprintf,__wcsicoll,FindResourceW,LoadResource,LockResource,FindResourceW,LoadResource,SizeofResource,LockResource,CreateIconFromResourceEx,0_2_0043305F
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeFile created: C:\Users\user\AppData\Local\Temp\GehmanJump to behavior
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCommand line argument: ou0_2_0040D6B0
                  Source: 2HCwqwLg1G.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeFile read: C:\Users\desktop.iniJump to behavior
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: RegSvcs.exe, 00000002.00000002.2539572214.0000000002696000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2539572214.0000000002683000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                  Source: 2HCwqwLg1G.exeVirustotal: Detection: 64%
                  Source: 2HCwqwLg1G.exeReversingLabs: Detection: 83%
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeFile read: C:\Users\user\Desktop\2HCwqwLg1G.exeJump to behavior
                  Source: unknownProcess created: C:\Users\user\Desktop\2HCwqwLg1G.exe "C:\Users\user\Desktop\2HCwqwLg1G.exe"
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\2HCwqwLg1G.exe"
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\2HCwqwLg1G.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeSection loaded: wsock32.dllJump to behavior
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                  Source: 2HCwqwLg1G.exeStatic file information: File size 1150543 > 1048576
                  Source: Binary string: wntdll.pdbUGP source: 2HCwqwLg1G.exe, 00000000.00000003.1344016097.00000000047D0000.00000004.00001000.00020000.00000000.sdmp, 2HCwqwLg1G.exe, 00000000.00000003.1347033757.0000000004630000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: wntdll.pdb source: 2HCwqwLg1G.exe, 00000000.00000003.1344016097.00000000047D0000.00000004.00001000.00020000.00000000.sdmp, 2HCwqwLg1G.exe, 00000000.00000003.1347033757.0000000004630000.00000004.00001000.00020000.00000000.sdmp
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_0040EBD0 LoadLibraryA,GetProcAddress,0_2_0040EBD0
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_00416CB5 push ecx; ret 0_2_00416CC8
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_0047A330 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_0047A330
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_00434418 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00434418
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: Yara matchFile source: Process Memory Space: 2HCwqwLg1G.exe PID: 7664, type: MEMORYSTR
                  Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeAPI/Special instruction interceptor: Address: 3F86614
                  Source: 2HCwqwLg1G.exe, 00000000.00000002.1348146872.0000000002F40000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2538606278.0000000000342000.00000040.80000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2539572214.0000000002666000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2539572214.00000000025B5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-87596
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeAPI coverage: 3.7 %
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_00452492 FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00452492
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_00442886 FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00442886
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_004788BD FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_004788BD
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_004339B6 GetFileAttributesW,FindFirstFileW,FindClose,0_2_004339B6
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_0045CAFA FindFirstFileW,FindNextFileW,FindClose,0_2_0045CAFA
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_00431A86 FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00431A86
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_0044BD27 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,0_2_0044BD27
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_0045DE8F FindFirstFileW,FindClose,0_2_0045DE8F
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_0044BF8B _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0044BF8B
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_0040E500 GetVersionExW,GetCurrentProcess,GetNativeSystemInfo,FreeLibrary,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,FreeLibrary,0_2_0040E500
                  Source: RegSvcs.exe, 00000002.00000002.2539572214.00000000025B5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware
                  Source: RegSvcs.exe, 00000002.00000002.2541056049.00000000058DA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllV
                  Source: RegSvcs.exe, 00000002.00000002.2539572214.00000000025B5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
                  Source: RegSvcs.exe, 00000002.00000002.2538606278.0000000000342000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: VMwareVBox
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeAPI call chain: ExitProcess graph end nodegraph_0-86721

                  Anti Debugging

                  barindex
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00AF7078 CheckRemoteDebuggerPresent,2_2_00AF7078
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess queried: DebugPortJump to behavior
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_0045A370 BlockInput,0_2_0045A370
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_0040D590 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetModuleFileNameW,GetForegroundWindow,ShellExecuteW,GetForegroundWindow,ShellExecuteW,0_2_0040D590
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_0040EBD0 LoadLibraryA,GetProcAddress,0_2_0040EBD0
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_03F85280 mov eax, dword ptr fs:[00000030h]0_2_03F85280
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_03F868E0 mov eax, dword ptr fs:[00000030h]0_2_03F868E0
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_03F86880 mov eax, dword ptr fs:[00000030h]0_2_03F86880
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_004238DA __lseeki64_nolock,__lseeki64_nolock,GetProcessHeap,RtlAllocateHeap,__setmode_nolock,__write_nolock,__setmode_nolock,GetProcessHeap,HeapFree,__lseeki64_nolock,SetEndOfFile,GetLastError,__lseeki64_nolock,0_2_004238DA
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_0041F250 SetUnhandledExceptionFilter,0_2_0041F250
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_0041A208 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0041A208
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_00417DAA IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00417DAA
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 403008Jump to behavior
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_00436CD7 LogonUserW,0_2_00436CD7
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_0040D590 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetModuleFileNameW,GetForegroundWindow,ShellExecuteW,GetForegroundWindow,ShellExecuteW,0_2_0040D590
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_00434418 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00434418
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_0043333C __wcsicoll,mouse_event,__wcsicoll,mouse_event,0_2_0043333C
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\2HCwqwLg1G.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_00446124 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00446124
                  Source: 2HCwqwLg1G.exeBinary or memory string: Shell_TrayWnd
                  Source: 2HCwqwLg1G.exeBinary or memory string: JDASCRWINUPRWINDOWNLWINUPLWINDOWNSHIFTUPSHIFTDOWNALTUPALTDOWNCTRLUPCTRLDOWNMOUSE_XBUTTON2MOUSE_XBUTTON1MOUSE_MBUTTONMOUSE_RBUTTONMOUSE_LBUTTONLAUNCH_APP2LAUNCH_APP1LAUNCH_MEDIALAUNCH_MAILMEDIA_PLAY_PAUSEMEDIA_STOPMEDIA_PREVMEDIA_NEXTVOLUME_UPVOLUME_DOWNVOLUME_MUTEBROWSER_HOMEBROWSER_FAVORTIESBROWSER_SEARCHBROWSER_STOPBROWSER_REFRESHBROWSER_FORWARDBROWSER_BACKNUMPADENTERSLEEPRSHIFTLSHIFTRALTLALTRCTRLLCTRLAPPSKEYNUMPADDIVNUMPADDOTNUMPADSUBNUMPADADDNUMPADMULTNUMPAD9NUMPAD8NUMPAD7NUMPAD6NUMPAD5NUMPAD4NUMPAD3NUMPAD2NUMPAD1NUMPAD0CAPSLOCKPAUSEBREAKNUMLOCKSCROLLLOCKRWINLWINPRINTSCREENUPTABSPACERIGHTPGUPPGDNLEFTINSERTINSHOMEF12F11F10F9F8F7F6F5F4F3F2F1ESCAPEESCENTERENDDOWNDELETEDELBSBACKSPACEALTONOFF0%d%dShell_TrayWndExitScript Pausedblankinfoquestionstopwarning
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_004720DB GetLocalTime,__swprintf,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,0_2_004720DB
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_00472C3F GetUserNameW,0_2_00472C3F
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_0041E364 __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,_strcpy_s,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte,0_2_0041E364
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_0040E500 GetVersionExW,GetCurrentProcess,GetNativeSystemInfo,FreeLibrary,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,FreeLibrary,0_2_0040E500
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.340000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.2HCwqwLg1G.exe.2f40000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.2HCwqwLg1G.exe.2f40000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000002.00000002.2538606278.0000000000342000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1348146872.0000000002F40000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: 2HCwqwLg1G.exe PID: 7664, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7804, type: MEMORYSTR
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                  Source: 2HCwqwLg1G.exeBinary or memory string: WIN_XP
                  Source: 2HCwqwLg1G.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPWIN_2000InstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 8, 1USERPROFILEUSERDOMAINUSERDNSDOMAINDefaultGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYadvapi32.dllRegDeleteKeyExW+.-.+-\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]ISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXISTSEXPANDmsctls_statusbar321tooltips_class32AutoIt v3 GUI%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----&
                  Source: 2HCwqwLg1G.exeBinary or memory string: WIN_XPe
                  Source: 2HCwqwLg1G.exeBinary or memory string: WIN_VISTA
                  Source: 2HCwqwLg1G.exeBinary or memory string: WIN_7
                  Source: 2HCwqwLg1G.exeBinary or memory string: WIN_8
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.340000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.2HCwqwLg1G.exe.2f40000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.2HCwqwLg1G.exe.2f40000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000002.00000002.2538606278.0000000000342000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1348146872.0000000002F40000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.2539572214.00000000025B5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: 2HCwqwLg1G.exe PID: 7664, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7804, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.340000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.2HCwqwLg1G.exe.2f40000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.2HCwqwLg1G.exe.2f40000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000002.00000002.2538606278.0000000000342000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1348146872.0000000002F40000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: 2HCwqwLg1G.exe PID: 7664, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7804, type: MEMORYSTR
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_004652BE socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,0_2_004652BE
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_00476619 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00476619
                  Source: C:\Users\user\Desktop\2HCwqwLg1G.exeCode function: 0_2_0046CEF3 OleInitialize,_wcslen,CreateBindCtx,MkParseDisplayName,CLSIDFromProgID,GetActiveObject,0_2_0046CEF3
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire Infrastructure2
                  Valid Accounts
                  221
                  Windows Management Instrumentation
                  1
                  DLL Side-Loading
                  1
                  Exploitation for Privilege Escalation
                  11
                  Disable or Modify Tools
                  1
                  OS Credential Dumping
                  2
                  System Time Discovery
                  Remote Services1
                  Archive Collected Data
                  2
                  Ingress Tool Transfer
                  Exfiltration Over Other Network Medium1
                  System Shutdown/Reboot
                  CredentialsDomainsDefault Accounts2
                  Native API
                  2
                  Valid Accounts
                  1
                  DLL Side-Loading
                  1
                  Deobfuscate/Decode Files or Information
                  21
                  Input Capture
                  1
                  Account Discovery
                  Remote Desktop Protocol1
                  Data from Local System
                  1
                  Encrypted Channel
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain Accounts2
                  Command and Scripting Interpreter
                  Logon Script (Windows)2
                  Valid Accounts
                  2
                  Obfuscated Files or Information
                  Security Account Manager2
                  File and Directory Discovery
                  SMB/Windows Admin Shares1
                  Email Collection
                  2
                  Non-Application Layer Protocol
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
                  Access Token Manipulation
                  1
                  DLL Side-Loading
                  NTDS128
                  System Information Discovery
                  Distributed Component Object Model21
                  Input Capture
                  2
                  Application Layer Protocol
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
                  Process Injection
                  2
                  Valid Accounts
                  LSA Secrets641
                  Security Software Discovery
                  SSH3
                  Clipboard Data
                  Fallback ChannelsScheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts22
                  Virtualization/Sandbox Evasion
                  Cached Domain Credentials22
                  Virtualization/Sandbox Evasion
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items21
                  Access Token Manipulation
                  DCSync2
                  Process Discovery
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job212
                  Process Injection
                  Proc Filesystem1
                  Application Window Discovery
                  Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                  Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
                  System Owner/User Discovery
                  Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                  IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
                  System Network Configuration Discovery
                  Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  2HCwqwLg1G.exe64%VirustotalBrowse
                  2HCwqwLg1G.exe83%ReversingLabsWin32.Trojan.AutoitInject
                  2HCwqwLg1G.exe100%AviraHEUR/AGEN.1321886
                  2HCwqwLg1G.exe100%Joe Sandbox ML
                  No Antivirus matches
                  No Antivirus matches
                  No Antivirus matches
                  No Antivirus matches
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  ip-api.com
                  208.95.112.1
                  truefalse
                    high
                    NameMaliciousAntivirus DetectionReputation
                    http://ip-api.com/line/?fields=hostingfalse
                      high
                      NameSourceMaliciousAntivirus DetectionReputation
                      https://account.dyn.com/2HCwqwLg1G.exe, 00000000.00000002.1348146872.0000000002F40000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2538606278.0000000000342000.00000040.80000000.00040000.00000000.sdmpfalse
                        high
                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegSvcs.exe, 00000002.00000002.2539572214.0000000002581000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2539572214.000000000264C000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://ip-api.comRegSvcs.exe, 00000002.00000002.2539572214.0000000002581000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2539572214.0000000002666000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2539572214.000000000264C000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs
                            IPDomainCountryFlagASNASN NameMalicious
                            208.95.112.1
                            ip-api.comUnited States
                            53334TUT-ASUSfalse
                            Joe Sandbox version:42.0.0 Malachite
                            Analysis ID:1587601
                            Start date and time:2025-01-10 15:25:27 +01:00
                            Joe Sandbox product:CloudBasic
                            Overall analysis duration:0h 5m 43s
                            Hypervisor based Inspection enabled:false
                            Report type:full
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                            Number of analysed new started processes analysed:7
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Sample name:2HCwqwLg1G.exe
                            renamed because original name is a hash value
                            Original Sample Name:523c3e9f716ca9f2a75109f674135b55e9b25259d5d078175fb5580965426f8a.exe
                            Detection:MAL
                            Classification:mal100.troj.spyw.evad.winEXE@3/1@1/1
                            EGA Information:
                            • Successful, ratio: 100%
                            HCA Information:
                            • Successful, ratio: 100%
                            • Number of executed functions: 53
                            • Number of non-executed functions: 310
                            Cookbook Comments:
                            • Found application associated with file extension: .exe
                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                            • Excluded IPs from analysis (whitelisted): 13.107.246.45, 20.12.23.50
                            • Excluded domains from analysis (whitelisted): ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                            • Not all processes where analyzed, report is missing behavior information
                            • Report size exceeded maximum capacity and may have missing disassembly code.
                            • Report size getting too big, too many NtQueryValueKey calls found.
                            No simulations
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            208.95.112.1H9YFiQB7o3.exeGet hashmaliciousAgentTeslaBrowse
                            • ip-api.com/line/?fields=hosting
                            lFlw40OH6u.exeGet hashmaliciousAgentTeslaBrowse
                            • ip-api.com/line/?fields=hosting
                            Pago devuelto #.Documentos#9787565789678675645767856843.exeGet hashmaliciousAgentTeslaBrowse
                            • ip-api.com/line/?fields=hosting
                            driver.exeGet hashmaliciousBlank GrabberBrowse
                            • ip-api.com/json/?fields=225545
                            XClient.exeGet hashmaliciousXWormBrowse
                            • ip-api.com/line/?fields=hosting
                            Comprobante.de.pago.pdf.exeGet hashmaliciousAgentTeslaBrowse
                            • ip-api.com/line/?fields=hosting
                            p.exeGet hashmaliciousUnknownBrowse
                            • ip-api.com/csv/?fields=query
                            rNuevaorden_pdf.exeGet hashmaliciousAgentTeslaBrowse
                            • ip-api.com/line/?fields=hosting
                            I334hDwRjj.exeGet hashmaliciousBlank Grabber, NjratBrowse
                            • ip-api.com/json/?fields=225545
                            startup_str_466.batGet hashmaliciousXWormBrowse
                            • ip-api.com/line/?fields=hosting
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            ip-api.comH9YFiQB7o3.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            lFlw40OH6u.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            Pago devuelto #.Documentos#9787565789678675645767856843.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            driver.exeGet hashmaliciousBlank GrabberBrowse
                            • 208.95.112.1
                            XClient.exeGet hashmaliciousXWormBrowse
                            • 208.95.112.1
                            Comprobante.de.pago.pdf.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            p.exeGet hashmaliciousUnknownBrowse
                            • 208.95.112.1
                            rNuevaorden_pdf.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            I334hDwRjj.exeGet hashmaliciousBlank Grabber, NjratBrowse
                            • 208.95.112.1
                            startup_str_466.batGet hashmaliciousXWormBrowse
                            • 208.95.112.1
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            TUT-ASUSH9YFiQB7o3.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            lFlw40OH6u.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            Pago devuelto #.Documentos#9787565789678675645767856843.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            driver.exeGet hashmaliciousBlank GrabberBrowse
                            • 208.95.112.1
                            XClient.exeGet hashmaliciousXWormBrowse
                            • 208.95.112.1
                            Comprobante.de.pago.pdf.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            p.exeGet hashmaliciousUnknownBrowse
                            • 208.95.112.1
                            rNuevaorden_pdf.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            I334hDwRjj.exeGet hashmaliciousBlank Grabber, NjratBrowse
                            • 208.95.112.1
                            startup_str_466.batGet hashmaliciousXWormBrowse
                            • 208.95.112.1
                            No context
                            No context
                            Process:C:\Users\user\Desktop\2HCwqwLg1G.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):244736
                            Entropy (8bit):6.574735781338069
                            Encrypted:false
                            SSDEEP:6144:PluPcFl+rxKn1FrODrb6vt1U709ZOsabGwgfo0EQvV665WDjsbSvJj/:PlHn1Fq3bUU709ZOsabGdfvEf65WHs0/
                            MD5:0F6A5CE7EBE21F319BA3D652BCBF71D5
                            SHA1:8DC028EBE6EBD930D5C0578F97CEC4BC77026949
                            SHA-256:A5C7D83789E05319ADA630E8B87F9A0D0F640B23FDDD320EF131D8F8FBAC885C
                            SHA-512:4CF04C12724FAEBBAEA99F8016495AD7ED7C7DE3EED37C640194AE384A5DDFB75CE35112DC8D8F97D33081A02105544A9C6A15523A579482DCB72BBC26584078
                            Malicious:false
                            Reputation:low
                            Preview:xh.23W4M]79R..45.U20W4MYw9RK3452U20W4MY79RK3452U20W4MY79RK34.2U2>H.CY.0.j.5y.tfX>Gm)EV59RY.Q4\^8@m;R. >].\\uv... 6S\|F>>.2U20W4M.r9R.275.|.UW4MY79RK.473^3;W4.Z79ZK3452U..T4My79R.0452.20w4MY59RO3452U20S4MY79RK3.12U00W4MY7;R..45"U2 W4MY'9R[3452U2 W4MY79RK345R.10.4MY7.QK.152U20W4MY79RK3452U20S4AY79RK3452U20W4MY79RK3452U20W4MY79RK3452U20W4MY79RK34.2U:0W4MY79RK34=.U2xW4MY79RK345.!WH#4MY..QK3.52U.3W4OY79RK3452U20W4mY7Y|9@FV2U2.R4MY.:RK5452.10W4MY79RK3452.20..?<[V1K3852U20S4M[79R.0452U20W4MY79R.34w2U20W4MY79RK3452..3W4MY7qRK3657Uf.U4An69QK3442U40W4MY79RK3452U20W4MY79RK3452U20W4MY79RK3452U20W4P.....{.}Ok8RP.k.P.Q..'..,..XuX.L-.xr8.....8_.pR.<....;....,.1W22.....7?<W_j%d<U./.l..l-wr.M].O..Ne.#_..{.......;9.o..?.V]8.Q'D!<.j3-RF\.W.1W4MY.......<J{..NV).@3e...."/b....,K34Q2U2BW4M879R.345]U2094MYI9RKM452.20WtMY7.RK3.52U_0W4iY79,K34.OZ=...$*..RK345.....Y...f.|....$.N.Vu...6.x.o7..??.:.{~..=..Y..'._KzyaUJ5000R63[.C....j1017W54T8pW|...........<....1.H52U20W.MY.9RK..5.U20.4.Y..RK3..2.2.W...7
                            File type:PE32 executable (GUI) Intel 80386, for MS Windows
                            Entropy (8bit):7.393474676620359
                            TrID:
                            • Win32 Executable (generic) a (10002005/4) 99.96%
                            • Generic Win/DOS Executable (2004/3) 0.02%
                            • DOS Executable Generic (2002/1) 0.02%
                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                            File name:2HCwqwLg1G.exe
                            File size:1'150'543 bytes
                            MD5:aa3e95c2cd9e5118dfe41280d0e05a49
                            SHA1:5261a60d04c74f986cdd6f129a171874b446d8b2
                            SHA256:523c3e9f716ca9f2a75109f674135b55e9b25259d5d078175fb5580965426f8a
                            SHA512:11564a40439aef33bcf205690bb18d4a29f995b4b063c6aea1e717a0e5334695c9d20875b686cfc29b03a8d545ffd370450c19acdbc174a008162e28e0d7e670
                            SSDEEP:24576:LRmJkcoQricOIQxiZY1WNy0NiyOPxaosPXuBDytC:IJZoQrbTFZY1WNyeQPxarPXI9
                            TLSH:7135E122B5C68036C2B323B19E7EF76A9A3D79360336D2D727C42D315EA05416B29773
                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........................1b.......P.).....Q.......y.......i..........}....N.......d.......`.......m.......g.....Rich............PE..L..
                            Icon Hash:1733312925935517
                            Entrypoint:0x4165c1
                            Entrypoint Section:.text
                            Digitally signed:false
                            Imagebase:0x400000
                            Subsystem:windows gui
                            Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                            DLL Characteristics:TERMINAL_SERVER_AWARE
                            Time Stamp:0x4F25BAEC [Sun Jan 29 21:32:28 2012 UTC]
                            TLS Callbacks:
                            CLR (.Net) Version:
                            OS Version Major:5
                            OS Version Minor:0
                            File Version Major:5
                            File Version Minor:0
                            Subsystem Version Major:5
                            Subsystem Version Minor:0
                            Import Hash:369fe35b86c83b3130c02698158a4d4d
                            Instruction
                            call 00007FAF187E649Bh
                            jmp 00007FAF187DD30Eh
                            int3
                            int3
                            int3
                            int3
                            int3
                            push ebp
                            mov ebp, esp
                            push edi
                            push esi
                            mov esi, dword ptr [ebp+0Ch]
                            mov ecx, dword ptr [ebp+10h]
                            mov edi, dword ptr [ebp+08h]
                            mov eax, ecx
                            mov edx, ecx
                            add eax, esi
                            cmp edi, esi
                            jbe 00007FAF187DD48Ah
                            cmp edi, eax
                            jc 00007FAF187DD626h
                            cmp ecx, 00000080h
                            jc 00007FAF187DD49Eh
                            cmp dword ptr [004A9724h], 00000000h
                            je 00007FAF187DD495h
                            push edi
                            push esi
                            and edi, 0Fh
                            and esi, 0Fh
                            cmp edi, esi
                            pop esi
                            pop edi
                            jne 00007FAF187DD487h
                            jmp 00007FAF187DD862h
                            test edi, 00000003h
                            jne 00007FAF187DD496h
                            shr ecx, 02h
                            and edx, 03h
                            cmp ecx, 08h
                            jc 00007FAF187DD4ABh
                            rep movsd
                            jmp dword ptr [00416740h+edx*4]
                            mov eax, edi
                            mov edx, 00000003h
                            sub ecx, 04h
                            jc 00007FAF187DD48Eh
                            and eax, 03h
                            add ecx, eax
                            jmp dword ptr [00416654h+eax*4]
                            jmp dword ptr [00416750h+ecx*4]
                            nop
                            jmp dword ptr [004166D4h+ecx*4]
                            nop
                            inc cx
                            add byte ptr [eax-4BFFBE9Ah], dl
                            inc cx
                            add byte ptr [ebx], ah
                            ror dword ptr [edx-75F877FAh], 1
                            inc esi
                            add dword ptr [eax+468A0147h], ecx
                            add al, cl
                            jmp 00007FAF1AC55C87h
                            add esi, 03h
                            add edi, 03h
                            cmp ecx, 08h
                            jc 00007FAF187DD44Eh
                            rep movsd
                            jmp dword ptr [00000000h+edx*4]
                            Programming Language:
                            • [ C ] VS2010 SP1 build 40219
                            • [C++] VS2010 SP1 build 40219
                            • [ C ] VS2008 SP1 build 30729
                            • [IMP] VS2008 SP1 build 30729
                            • [ASM] VS2010 SP1 build 40219
                            • [RES] VS2010 SP1 build 40219
                            • [LNK] VS2010 SP1 build 40219
                            NameVirtual AddressVirtual Size Is in Section
                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IMPORT0x8d41c0x154.rdata
                            IMAGE_DIRECTORY_ENTRY_RESOURCE0xab0000x9328.rsrc
                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                            .text0x10000x8061c0x8080061ffce4768976fa0dd2a8f6a97b1417aFalse0.5583182605787937data6.684690148171278IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                            .rdata0x820000xdfc00xe000f0991b788ac34ea4b210673093655317False0.3256312779017857data4.484090180677536IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .data0x900000x1a7580x68008033f5a38941b4685bc2299e78f31221False0.15324519230769232data2.1500715391677487IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            .rsrc0xab0000x93280x94002c856ae1256931ca4a68d9d8ffe94661False0.4900760135135135data5.5412345511514465IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            NameRVASizeTypeLanguageCountryZLIB Complexity
                            RT_ICON0xab5c80x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                            RT_ICON0xab6f00x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                            RT_ICON0xab8180x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                            RT_ICON0xab9400x668Device independent bitmap graphic, 48 x 96 x 4, image size 1152EnglishGreat Britain0.48109756097560974
                            RT_ICON0xabfa80x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512EnglishGreat Britain0.5672043010752689
                            RT_ICON0xac2900x128Device independent bitmap graphic, 16 x 32 x 4, image size 128EnglishGreat Britain0.6418918918918919
                            RT_ICON0xac3b80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsEnglishGreat Britain0.7044243070362474
                            RT_ICON0xad2600x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishGreat Britain0.8077617328519856
                            RT_ICON0xadb080x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsEnglishGreat Britain0.5903179190751445
                            RT_ICON0xae0700x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishGreat Britain0.5503112033195021
                            RT_ICON0xb06180x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishGreat Britain0.6050656660412758
                            RT_ICON0xb16c00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishGreat Britain0.7553191489361702
                            RT_MENU0xb1b280x50dataEnglishGreat Britain0.9
                            RT_DIALOG0xb1b780xfcdataEnglishGreat Britain0.6507936507936508
                            RT_STRING0xb1c780x530dataEnglishGreat Britain0.33960843373493976
                            RT_STRING0xb21a80x690dataEnglishGreat Britain0.26964285714285713
                            RT_STRING0xb28380x4d0dataEnglishGreat Britain0.36363636363636365
                            RT_STRING0xb2d080x5fcdataEnglishGreat Britain0.3087467362924282
                            RT_STRING0xb33080x65cdataEnglishGreat Britain0.34336609336609336
                            RT_STRING0xb39680x388dataEnglishGreat Britain0.377212389380531
                            RT_STRING0xb3cf00x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishUnited States0.502906976744186
                            RT_GROUP_ICON0xb3e480x84dataEnglishGreat Britain0.6439393939393939
                            RT_GROUP_ICON0xb3ed00x14dataEnglishGreat Britain1.15
                            RT_GROUP_ICON0xb3ee80x14dataEnglishGreat Britain1.25
                            RT_GROUP_ICON0xb3f000x14dataEnglishGreat Britain1.25
                            RT_VERSION0xb3f180x19cdataEnglishGreat Britain0.5339805825242718
                            RT_MANIFEST0xb40b80x26cASCII text, with CRLF line terminatorsEnglishUnited States0.5145161290322581
                            DLLImport
                            KERNEL32.DLLHeapAlloc, Sleep, GetCurrentThreadId, RaiseException, MulDiv, GetVersionExW, GetSystemInfo, InterlockedIncrement, InterlockedDecrement, WideCharToMultiByte, lstrcpyW, MultiByteToWideChar, lstrlenW, lstrcmpiW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, DeleteFileW, FindNextFileW, MoveFileW, CopyFileW, CreateDirectoryW, RemoveDirectoryW, GetProcessHeap, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetLocalTime, CompareStringW, DeleteCriticalSection, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionAndSpinCount, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, GetTempPathW, GetTempFileNameW, VirtualFree, FormatMessageW, GetExitCodeProcess, SetErrorMode, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, DeviceIoControl, SetFileAttributesW, GetShortPathNameW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetCurrentThread, GetProcessIoCounters, CreateProcessW, SetPriorityClass, LoadLibraryW, VirtualAlloc, LoadLibraryExW, HeapFree, WaitForSingleObject, CreateThread, DuplicateHandle, GetLastError, CloseHandle, GetCurrentProcess, GetProcAddress, LoadLibraryA, FreeLibrary, GetModuleFileNameW, GetFullPathNameW, SetCurrentDirectoryW, IsDebuggerPresent, GetCurrentDirectoryW, ExitProcess, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetTimeFormatW, GetDateFormatW, GetCommandLineW, GetStartupInfoW, IsProcessorFeaturePresent, HeapSize, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetStringTypeW, HeapCreate, SetHandleCount, GetFileType, SetStdHandle, GetConsoleCP, GetConsoleMode, LCMapStringW, RtlUnwind, SetFilePointer, GetTimeZoneInformation, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetTickCount, HeapReAlloc, WriteConsoleW, SetEndOfFile, SetSystemPowerState, SetEnvironmentVariableA
                            ADVAPI32.dllRegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegCreateKeyExW, GetUserNameW, RegConnectRegistryW, CloseServiceHandle, UnlockServiceDatabase, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, InitializeSecurityDescriptor, InitializeAcl, GetLengthSid, CopySid, LogonUserW, LockServiceDatabase, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, GetAce, AddAce, SetSecurityDescriptorDacl, RegOpenKeyExW, RegQueryValueExW, AdjustTokenPrivileges, InitiateSystemShutdownExW, OpenSCManagerW, RegCloseKey
                            COMCTL32.dllImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, ImageList_ReplaceIcon, ImageList_Create, InitCommonControlsEx, ImageList_Destroy
                            COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                            GDI32.dllDeleteObject, AngleArc, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, StrokePath, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, GetDeviceCaps, MoveToEx, DeleteDC, GetPixel, CreateDCW, Ellipse, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, LineTo
                            MPR.dllWNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W, WNetUseConnectionW
                            ole32.dllOleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CLSIDFromString, StringFromGUID2, CoInitialize, CoUninitialize, CoCreateInstance, CreateStreamOnHGlobal, CoTaskMemAlloc, CoTaskMemFree, ProgIDFromCLSID, OleInitialize, CreateBindCtx, CLSIDFromProgID, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket, OleUninitialize, IIDFromString
                            OLEAUT32.dllVariantChangeType, VariantCopyInd, DispCallFunc, CreateStdDispatch, CreateDispTypeInfo, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SysStringLen, SafeArrayAllocData, GetActiveObject, QueryPathOfRegTypeLib, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, SysAllocString, VariantCopy, VariantClear, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, OleLoadPicture, SafeArrayAccessData, VariantInit
                            PSAPI.DLLEnumProcesses, GetModuleBaseNameW, GetProcessMemoryInfo, EnumProcessModules
                            SHELL32.dllDragQueryPoint, ShellExecuteExW, SHGetFolderPathW, DragQueryFileW, SHEmptyRecycleBinW, SHBrowseForFolderW, SHFileOperationW, SHGetPathFromIDListW, SHGetDesktopFolder, SHGetMalloc, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                            USER32.dllGetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, ReleaseCapture, SetCapture, WindowFromPoint, LoadImageW, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, CheckMenuRadioItem, SetWindowPos, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, TranslateMessage, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, GetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, MessageBoxW, DefWindowProcW, CopyImage, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, GetMenuItemID, DispatchMessageW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, PeekMessageW, UnregisterHotKey, CharLowerBuffW, keybd_event, MonitorFromRect, GetWindowThreadProcessId
                            USERENV.dllCreateEnvironmentBlock, DestroyEnvironmentBlock, UnloadUserProfile, LoadUserProfileW
                            VERSION.dllVerQueryValueW, GetFileVersionInfoW, GetFileVersionInfoSizeW
                            WININET.dllInternetReadFile, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetConnectW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetQueryOptionW, InternetQueryDataAvailable
                            WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                            WSOCK32.dll__WSAFDIsSet, setsockopt, ntohs, recvfrom, sendto, htons, select, listen, WSAStartup, bind, closesocket, connect, socket, send, WSACleanup, ioctlsocket, accept, WSAGetLastError, inet_addr, gethostbyname, gethostname, recv
                            Language of compilation systemCountry where language is spokenMap
                            EnglishGreat Britain
                            EnglishUnited States
                            TimestampSource PortDest PortSource IPDest IP
                            Jan 10, 2025 15:26:28.292574883 CET4972380192.168.2.11208.95.112.1
                            Jan 10, 2025 15:26:28.297481060 CET8049723208.95.112.1192.168.2.11
                            Jan 10, 2025 15:26:28.297573090 CET4972380192.168.2.11208.95.112.1
                            Jan 10, 2025 15:26:28.298352957 CET4972380192.168.2.11208.95.112.1
                            Jan 10, 2025 15:26:28.303248882 CET8049723208.95.112.1192.168.2.11
                            Jan 10, 2025 15:26:28.753295898 CET8049723208.95.112.1192.168.2.11
                            Jan 10, 2025 15:26:28.801208019 CET4972380192.168.2.11208.95.112.1
                            Jan 10, 2025 15:27:45.140228033 CET8049723208.95.112.1192.168.2.11
                            Jan 10, 2025 15:27:45.140321970 CET4972380192.168.2.11208.95.112.1
                            Jan 10, 2025 15:28:08.756314993 CET4972380192.168.2.11208.95.112.1
                            Jan 10, 2025 15:28:08.761342049 CET8049723208.95.112.1192.168.2.11
                            TimestampSource PortDest PortSource IPDest IP
                            Jan 10, 2025 15:26:28.279762030 CET6005853192.168.2.111.1.1.1
                            Jan 10, 2025 15:26:28.287770033 CET53600581.1.1.1192.168.2.11
                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                            Jan 10, 2025 15:26:28.279762030 CET192.168.2.111.1.1.10x69fStandard query (0)ip-api.comA (IP address)IN (0x0001)false
                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                            Jan 10, 2025 15:26:28.287770033 CET1.1.1.1192.168.2.110x69fNo error (0)ip-api.com208.95.112.1A (IP address)IN (0x0001)false
                            • ip-api.com
                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            0192.168.2.1149723208.95.112.1807804C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                            TimestampBytes transferredDirectionData
                            Jan 10, 2025 15:26:28.298352957 CET80OUTGET /line/?fields=hosting HTTP/1.1
                            Host: ip-api.com
                            Connection: Keep-Alive
                            Jan 10, 2025 15:26:28.753295898 CET175INHTTP/1.1 200 OK
                            Date: Fri, 10 Jan 2025 14:26:27 GMT
                            Content-Type: text/plain; charset=utf-8
                            Content-Length: 6
                            Access-Control-Allow-Origin: *
                            X-Ttl: 60
                            X-Rl: 44
                            Data Raw: 66 61 6c 73 65 0a
                            Data Ascii: false


                            Click to jump to process

                            Click to jump to process

                            Click to dive into process behavior distribution

                            Click to jump to process

                            Target ID:0
                            Start time:09:26:22
                            Start date:10/01/2025
                            Path:C:\Users\user\Desktop\2HCwqwLg1G.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\Desktop\2HCwqwLg1G.exe"
                            Imagebase:0x400000
                            File size:1'150'543 bytes
                            MD5 hash:AA3E95C2CD9E5118DFE41280D0E05A49
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1348146872.0000000002F40000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: 00000000.00000002.1348146872.0000000002F40000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.1348146872.0000000002F40000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID, Description: Detects executables referencing Windows vault credential objects. Observed in infostealers, Source: 00000000.00000002.1348146872.0000000002F40000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                            • Rule: MALWARE_Win_AgentTeslaV2, Description: AgenetTesla Type 2 Keylogger payload, Source: 00000000.00000002.1348146872.0000000002F40000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                            Reputation:low
                            Has exited:true

                            Target ID:2
                            Start time:09:26:26
                            Start date:10/01/2025
                            Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\Desktop\2HCwqwLg1G.exe"
                            Imagebase:0x270000
                            File size:45'984 bytes
                            MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.2538606278.0000000000342000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.2538606278.0000000000342000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.2539572214.00000000025B5000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            Reputation:high
                            Has exited:false

                            Reset < >

                              Execution Graph

                              Execution Coverage:3.5%
                              Dynamic/Decrypted Code Coverage:0.4%
                              Signature Coverage:9.6%
                              Total number of Nodes:2000
                              Total number of Limit Nodes:36
                              execution_graph 86128 4010e0 86131 401100 86128->86131 86130 4010f8 86132 401113 86131->86132 86133 401184 86132->86133 86134 40114c 86132->86134 86136 401120 86132->86136 86163 401182 86132->86163 86169 401250 86133->86169 86137 401151 86134->86137 86138 40119d 86134->86138 86135 40112c 73A346C0 86135->86130 86136->86135 86190 401000 Shell_NotifyIconW __wctomb_s_l 86136->86190 86140 401219 86137->86140 86141 40115d 86137->86141 86142 42afb4 86138->86142 86147 4011a3 86138->86147 86140->86136 86144 401225 86140->86144 86143 401163 86141->86143 86148 42b01d 86141->86148 86185 40f190 10 API calls 86142->86185 86149 42afe9 86143->86149 86150 40116c 86143->86150 86201 468b0e 74 API calls __wctomb_s_l 86144->86201 86147->86136 86153 4011b6 KillTimer 86147->86153 86154 4011db SetTimer RegisterClipboardFormatW 86147->86154 86148->86135 86189 4370f4 52 API calls 86148->86189 86187 40f190 10 API calls 86149->86187 86150->86136 86158 401174 86150->86158 86151 401193 86151->86130 86152 42b04f 86191 40e0c0 86152->86191 86184 401000 Shell_NotifyIconW __wctomb_s_l 86153->86184 86154->86151 86156 401204 CreatePopupMenu 86154->86156 86156->86130 86186 45fd57 65 API calls __wctomb_s_l 86158->86186 86162 4011c9 PostQuitMessage 86162->86130 86163->86135 86164 42afe4 86164->86151 86165 42b00e 86188 401a50 329 API calls 86165->86188 86168 42afdc 86168->86135 86168->86164 86170 401262 __wctomb_s_l 86169->86170 86171 4012e8 86169->86171 86202 401b80 86170->86202 86171->86151 86173 40128c 86174 4012d1 KillTimer SetTimer 86173->86174 86175 4012bb 86173->86175 86176 4272ec 86173->86176 86174->86171 86177 4012c5 86175->86177 86178 42733f 86175->86178 86179 4272f4 Shell_NotifyIconW 86176->86179 86180 42731a Shell_NotifyIconW 86176->86180 86177->86174 86181 427393 Shell_NotifyIconW 86177->86181 86182 427348 Shell_NotifyIconW 86178->86182 86183 42736e Shell_NotifyIconW 86178->86183 86179->86174 86180->86174 86181->86174 86182->86174 86183->86174 86184->86162 86185->86151 86186->86168 86187->86165 86188->86163 86189->86163 86190->86152 86193 40e0e7 __wctomb_s_l 86191->86193 86192 40e142 86198 40e184 86192->86198 86300 4341e6 63 API calls __wcsicoll 86192->86300 86193->86192 86194 42729f DestroyCursor 86193->86194 86194->86192 86196 40e1a0 Shell_NotifyIconW 86199 401b80 54 API calls 86196->86199 86197 4272db Shell_NotifyIconW 86198->86196 86198->86197 86200 40e1ba 86199->86200 86200->86163 86201->86164 86203 401b9c 86202->86203 86223 401c7e 86202->86223 86224 4013c0 86203->86224 86206 42722b LoadStringW 86209 427246 86206->86209 86207 401bb9 86229 402160 86207->86229 86243 40e0a0 86209->86243 86210 401bcd 86212 427258 86210->86212 86213 401bda 86210->86213 86247 40d200 52 API calls 2 library calls 86212->86247 86213->86209 86214 401be4 86213->86214 86242 40d200 52 API calls 2 library calls 86214->86242 86217 427267 86218 42727b 86217->86218 86220 401bf3 _wcscpy __wctomb_s_l _wcsncpy 86217->86220 86248 40d200 52 API calls 2 library calls 86218->86248 86222 401c62 Shell_NotifyIconW 86220->86222 86221 427289 86222->86223 86223->86173 86249 4115d7 86224->86249 86230 426daa 86229->86230 86231 40216b _wcslen 86229->86231 86287 40c600 86230->86287 86234 402180 86231->86234 86235 40219e 86231->86235 86233 426db5 86233->86210 86286 403bd0 52 API calls ctype 86234->86286 86237 4013a0 52 API calls 86235->86237 86239 4021a5 86237->86239 86238 402187 _memmove 86238->86210 86240 426db7 86239->86240 86241 4115d7 52 API calls 86239->86241 86241->86238 86242->86220 86244 40e0b2 86243->86244 86245 40e0a8 86243->86245 86244->86220 86299 403c30 52 API calls _memmove 86245->86299 86247->86217 86248->86221 86251 4115e1 _malloc 86249->86251 86252 4013e4 86251->86252 86256 4115fd std::exception::exception 86251->86256 86263 4135bb 86251->86263 86260 4013a0 86252->86260 86253 41163b 86278 4180af 46 API calls std::exception::operator= 86253->86278 86255 411645 86279 418105 RaiseException 86255->86279 86256->86253 86277 41130a 51 API calls __cinit 86256->86277 86259 411656 86261 4115d7 52 API calls 86260->86261 86262 4013a7 86261->86262 86262->86206 86262->86207 86264 413638 _malloc 86263->86264 86272 4135c9 _malloc 86263->86272 86285 417f77 46 API calls __getptd_noexit 86264->86285 86267 4135f7 RtlAllocateHeap 86268 413630 86267->86268 86267->86272 86268->86251 86270 4135d4 86270->86272 86280 418901 46 API calls __NMSG_WRITE 86270->86280 86281 418752 46 API calls 6 library calls 86270->86281 86282 411682 GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 86270->86282 86271 413624 86283 417f77 46 API calls __getptd_noexit 86271->86283 86272->86267 86272->86270 86272->86271 86275 413622 86272->86275 86284 417f77 46 API calls __getptd_noexit 86275->86284 86277->86253 86278->86255 86279->86259 86280->86270 86281->86270 86283->86275 86284->86268 86285->86268 86286->86238 86288 40c619 86287->86288 86289 40c60a 86287->86289 86288->86233 86289->86288 86292 4026f0 86289->86292 86291 426d7a _memmove 86291->86233 86293 426873 86292->86293 86294 4026ff 86292->86294 86295 4013a0 52 API calls 86293->86295 86294->86291 86296 42687b 86295->86296 86297 4115d7 52 API calls 86296->86297 86298 42689e _memmove 86297->86298 86298->86291 86299->86244 86300->86198 86301 40bd20 86302 428194 86301->86302 86303 40bd2d 86301->86303 86305 40bd43 86302->86305 86307 4281bc 86302->86307 86309 4281b2 86302->86309 86304 40bd37 86303->86304 86324 4531b1 85 API calls 5 library calls 86303->86324 86313 40bd50 86304->86313 86323 45e987 86 API calls ctype 86307->86323 86322 40b510 VariantClear 86309->86322 86312 4281ba 86314 426cf1 86313->86314 86315 40bd63 86313->86315 86334 44cde9 52 API calls _memmove 86314->86334 86325 40bd80 86315->86325 86318 40bd73 86318->86305 86319 426cfc 86320 40e0a0 52 API calls 86319->86320 86321 426d02 86320->86321 86322->86312 86323->86303 86324->86304 86326 40bd8e 86325->86326 86329 40bdb7 _memmove 86325->86329 86327 40bded 86326->86327 86328 40bdad 86326->86328 86326->86329 86330 4115d7 52 API calls 86327->86330 86335 402f00 86328->86335 86329->86318 86332 40bdf6 86330->86332 86332->86329 86333 4115d7 52 API calls 86332->86333 86333->86329 86334->86319 86336 402f10 86335->86336 86337 402f0c 86335->86337 86338 4115d7 52 API calls 86336->86338 86339 4268c3 86336->86339 86337->86329 86340 402f51 ctype _memmove 86338->86340 86340->86329 86341 425ba2 86346 40e360 86341->86346 86343 425bb4 86362 41130a 51 API calls __cinit 86343->86362 86345 425bbe 86347 4115d7 52 API calls 86346->86347 86348 40e3ec GetModuleFileNameW 86347->86348 86363 413a0e 86348->86363 86350 40e421 _wcsncat 86366 413a9e 86350->86366 86353 4115d7 52 API calls 86354 40e45e _wcscpy 86353->86354 86369 40bc70 86354->86369 86358 40e4a9 86358->86343 86359 401c90 52 API calls 86360 40e4a1 _wcscat _wcslen _wcsncpy 86359->86360 86360->86358 86360->86359 86361 4115d7 52 API calls 86360->86361 86361->86360 86362->86345 86388 413801 86363->86388 86418 419efd 86366->86418 86370 4115d7 52 API calls 86369->86370 86371 40bc98 86370->86371 86372 4115d7 52 API calls 86371->86372 86373 40bca6 86372->86373 86374 40e4c0 86373->86374 86430 403350 86374->86430 86376 40e4cb RegOpenKeyExW 86377 427190 RegQueryValueExW 86376->86377 86378 40e4eb 86376->86378 86379 4271b0 86377->86379 86380 42721a RegCloseKey 86377->86380 86378->86360 86381 4115d7 52 API calls 86379->86381 86380->86360 86382 4271cb 86381->86382 86437 43652f 52 API calls 86382->86437 86384 4271d8 RegQueryValueExW 86385 42720e 86384->86385 86386 4271f7 86384->86386 86385->86380 86387 402160 52 API calls 86386->86387 86387->86385 86389 41389e 86388->86389 86395 41381a 86388->86395 86390 4139e8 86389->86390 86392 413a00 86389->86392 86415 417f77 46 API calls __getptd_noexit 86390->86415 86417 417f77 46 API calls __getptd_noexit 86392->86417 86393 4139ed 86416 417f25 10 API calls __cftog_l 86393->86416 86395->86389 86398 41388a 86395->86398 86410 419e30 46 API calls __cftog_l 86395->86410 86397 413967 86397->86350 86398->86389 86405 413909 86398->86405 86411 419e30 46 API calls __cftog_l 86398->86411 86400 41396c 86400->86389 86400->86397 86401 41397a 86400->86401 86414 419e30 46 API calls __cftog_l 86401->86414 86403 413929 86403->86389 86404 413945 86403->86404 86412 419e30 46 API calls __cftog_l 86403->86412 86404->86389 86404->86397 86407 41395b 86404->86407 86405->86400 86405->86403 86413 419e30 46 API calls __cftog_l 86407->86413 86410->86398 86411->86405 86412->86404 86413->86397 86414->86397 86415->86393 86416->86397 86417->86397 86419 419f13 86418->86419 86420 419f0e 86418->86420 86427 417f77 46 API calls __getptd_noexit 86419->86427 86420->86419 86421 419f2b 86420->86421 86426 40e454 86421->86426 86429 417f77 46 API calls __getptd_noexit 86421->86429 86423 419f18 86428 417f25 10 API calls __cftog_l 86423->86428 86426->86353 86427->86423 86428->86426 86429->86423 86431 403367 86430->86431 86432 403358 86430->86432 86433 4115d7 52 API calls 86431->86433 86432->86376 86434 403370 86433->86434 86435 4115d7 52 API calls 86434->86435 86436 40339e 86435->86436 86436->86376 86437->86384 86438 416454 86475 416c70 86438->86475 86440 416460 GetStartupInfoW 86441 416474 86440->86441 86476 419d5a HeapCreate 86441->86476 86443 4164cd 86444 4164d8 86443->86444 86559 41642b 46 API calls 3 library calls 86443->86559 86477 417c20 GetModuleHandleW 86444->86477 86447 4164de 86448 4164e9 __RTC_Initialize 86447->86448 86560 41642b 46 API calls 3 library calls 86447->86560 86496 41aaa1 GetStartupInfoW 86448->86496 86452 416503 GetCommandLineW 86509 41f584 GetEnvironmentStringsW 86452->86509 86455 416513 86515 41f4d6 GetModuleFileNameW 86455->86515 86458 41651d 86459 416528 86458->86459 86562 411924 46 API calls 3 library calls 86458->86562 86519 41f2a4 86459->86519 86462 41652e 86463 416539 86462->86463 86563 411924 46 API calls 3 library calls 86462->86563 86533 411703 86463->86533 86466 416541 86468 41654c __wwincmdln 86466->86468 86564 411924 46 API calls 3 library calls 86466->86564 86537 40d6b0 86468->86537 86471 41657c 86566 411906 46 API calls _doexit 86471->86566 86474 416581 __lseeki64 86475->86440 86476->86443 86478 417c34 86477->86478 86479 417c3d GetProcAddress GetProcAddress GetProcAddress GetProcAddress 86477->86479 86567 4178ff 49 API calls _free 86478->86567 86481 417c87 TlsAlloc 86479->86481 86484 417cd5 TlsSetValue 86481->86484 86485 417d96 86481->86485 86483 417c39 86483->86447 86484->86485 86486 417ce6 __init_pointers 86484->86486 86485->86447 86568 418151 InitializeCriticalSectionAndSpinCount 86486->86568 86488 417d91 86576 4178ff 49 API calls _free 86488->86576 86490 417d2a 86490->86488 86569 416b49 86490->86569 86493 417d76 86575 41793c 46 API calls 4 library calls 86493->86575 86495 417d7e GetCurrentThreadId 86495->86485 86497 416b49 __calloc_crt 46 API calls 86496->86497 86508 41aabf 86497->86508 86498 41ac6a GetStdHandle 86503 41ac34 86498->86503 86499 416b49 __calloc_crt 46 API calls 86499->86508 86500 41acce SetHandleCount 86507 4164f7 86500->86507 86501 41ac7c GetFileType 86501->86503 86502 41abb4 86502->86503 86504 41abe0 GetFileType 86502->86504 86505 41abeb InitializeCriticalSectionAndSpinCount 86502->86505 86503->86498 86503->86500 86503->86501 86506 41aca2 InitializeCriticalSectionAndSpinCount 86503->86506 86504->86502 86504->86505 86505->86502 86505->86507 86506->86503 86506->86507 86507->86452 86561 411924 46 API calls 3 library calls 86507->86561 86508->86499 86508->86502 86508->86503 86508->86507 86508->86508 86510 41f595 86509->86510 86511 41f599 86509->86511 86510->86455 86586 416b04 86511->86586 86513 41f5c2 FreeEnvironmentStringsW 86513->86455 86514 41f5bb _memmove 86514->86513 86516 41f50b _wparse_cmdline 86515->86516 86517 416b04 __malloc_crt 46 API calls 86516->86517 86518 41f54e _wparse_cmdline 86516->86518 86517->86518 86518->86458 86520 41f2bc _wcslen 86519->86520 86524 41f2b4 86519->86524 86521 416b49 __calloc_crt 46 API calls 86520->86521 86526 41f2e0 _wcslen 86521->86526 86522 41f336 86593 413748 86522->86593 86524->86462 86525 416b49 __calloc_crt 46 API calls 86525->86526 86526->86522 86526->86524 86526->86525 86527 41f35c 86526->86527 86530 41f373 86526->86530 86592 41ef12 46 API calls __cftog_l 86526->86592 86529 413748 _free 46 API calls 86527->86529 86529->86524 86599 417ed3 86530->86599 86532 41f37f 86532->86462 86534 411711 __initterm_e __initp_misc_cfltcvt_tab __IsNonwritableInCurrentImage 86533->86534 86536 411750 __IsNonwritableInCurrentImage 86534->86536 86618 41130a 51 API calls __cinit 86534->86618 86536->86466 86538 42e2f3 86537->86538 86539 40d6cc 86537->86539 86619 408f40 86539->86619 86541 40d707 86623 40ebb0 86541->86623 86544 40d737 86626 411951 86544->86626 86549 40d751 86638 40f4e0 SystemParametersInfoW SystemParametersInfoW 86549->86638 86551 40d75f 86639 40d590 GetCurrentDirectoryW 86551->86639 86553 40d767 SystemParametersInfoW 86554 40d78d 86553->86554 86555 408f40 VariantClear 86554->86555 86556 40d79d 86555->86556 86557 408f40 VariantClear 86556->86557 86558 40d7a6 86557->86558 86558->86471 86565 4118da 46 API calls _doexit 86558->86565 86559->86444 86560->86448 86565->86471 86566->86474 86567->86483 86568->86490 86571 416b52 86569->86571 86572 416b8f 86571->86572 86573 416b70 Sleep 86571->86573 86577 41f677 86571->86577 86572->86488 86572->86493 86574 416b85 86573->86574 86574->86571 86574->86572 86575->86495 86576->86485 86578 41f683 86577->86578 86584 41f69e _malloc 86577->86584 86579 41f68f 86578->86579 86578->86584 86585 417f77 46 API calls __getptd_noexit 86579->86585 86581 41f6b1 RtlAllocateHeap 86583 41f6d8 86581->86583 86581->86584 86582 41f694 86582->86571 86583->86571 86584->86581 86584->86583 86585->86582 86589 416b0d 86586->86589 86587 4135bb _malloc 45 API calls 86587->86589 86588 416b43 86588->86514 86589->86587 86589->86588 86590 416b24 Sleep 86589->86590 86591 416b39 86590->86591 86591->86588 86591->86589 86592->86526 86594 41377c _free 86593->86594 86595 413753 RtlFreeHeap 86593->86595 86594->86524 86595->86594 86596 413768 86595->86596 86602 417f77 46 API calls __getptd_noexit 86596->86602 86598 41376e GetLastError 86598->86594 86603 417daa 86599->86603 86602->86598 86604 417dc9 __wctomb_s_l __call_reportfault 86603->86604 86605 417de7 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 86604->86605 86608 417eb5 __call_reportfault 86605->86608 86607 417ed1 GetCurrentProcess TerminateProcess 86607->86532 86609 41a208 86608->86609 86610 41a210 86609->86610 86611 41a212 IsDebuggerPresent 86609->86611 86610->86607 86617 41fe19 86611->86617 86614 421fd3 SetUnhandledExceptionFilter UnhandledExceptionFilter 86615 421ff8 GetCurrentProcess TerminateProcess 86614->86615 86616 421ff0 __call_reportfault 86614->86616 86615->86607 86616->86615 86617->86614 86618->86536 86620 408f48 ctype 86619->86620 86621 4265c7 VariantClear 86620->86621 86622 408f55 ctype 86620->86622 86621->86622 86622->86541 86679 40ebd0 86623->86679 86683 4182cb 86626->86683 86628 41195e 86690 4181f2 RtlLeaveCriticalSection 86628->86690 86630 40d748 86631 4119b0 86630->86631 86632 4119d6 86631->86632 86633 4119bc 86631->86633 86632->86549 86633->86632 86725 417f77 46 API calls __getptd_noexit 86633->86725 86635 4119c6 86726 417f25 10 API calls __cftog_l 86635->86726 86637 4119d1 86637->86549 86638->86551 86727 401f20 86639->86727 86641 40d5b6 IsDebuggerPresent 86642 40d5c4 86641->86642 86643 42e1bb MessageBoxA 86641->86643 86644 42e1d4 86642->86644 86645 40d5e3 86642->86645 86643->86644 86897 403a50 52 API calls 3 library calls 86644->86897 86797 40f520 86645->86797 86649 40d5fd GetFullPathNameW 86809 401460 86649->86809 86651 40d63b 86652 40d643 86651->86652 86654 42e231 SetCurrentDirectoryW 86651->86654 86653 40d64c 86652->86653 86898 432fee 6 API calls 86652->86898 86824 410390 GetSysColorBrush LoadCursorW LoadIconW LoadIconW LoadIconW 86653->86824 86654->86652 86658 42e252 86658->86653 86659 42e25a GetModuleFileNameW 86658->86659 86661 42e274 86659->86661 86662 42e2cb GetForegroundWindow ShellExecuteW 86659->86662 86899 401b10 86661->86899 86666 40d688 86662->86666 86663 40d656 86665 40d669 86663->86665 86668 40e0c0 74 API calls 86663->86668 86832 4091e0 86665->86832 86672 40d692 SetCurrentDirectoryW 86666->86672 86668->86665 86672->86553 86673 42e28d 86906 40d200 52 API calls 2 library calls 86673->86906 86676 42e299 GetForegroundWindow ShellExecuteW 86677 42e2c6 86676->86677 86677->86666 86678 40ec00 LoadLibraryA GetProcAddress 86678->86544 86680 40d72e 86679->86680 86681 40ebd6 LoadLibraryA 86679->86681 86680->86544 86680->86678 86681->86680 86682 40ebe7 GetProcAddress 86681->86682 86682->86680 86684 4182e0 86683->86684 86685 4182f3 RtlEnterCriticalSection 86683->86685 86691 418209 86684->86691 86685->86628 86687 4182e6 86687->86685 86718 411924 46 API calls 3 library calls 86687->86718 86690->86630 86692 418215 __lseeki64 86691->86692 86693 418225 86692->86693 86694 41823d 86692->86694 86719 418901 46 API calls __NMSG_WRITE 86693->86719 86696 416b04 __malloc_crt 45 API calls 86694->86696 86700 41824b __lseeki64 86694->86700 86699 418256 86696->86699 86697 41822a 86720 418752 46 API calls 6 library calls 86697->86720 86702 41825d 86699->86702 86703 41826c 86699->86703 86700->86687 86701 418231 86721 411682 GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 86701->86721 86722 417f77 46 API calls __getptd_noexit 86702->86722 86706 4182cb __lock 45 API calls 86703->86706 86708 418273 86706->86708 86709 4182a6 86708->86709 86710 41827b InitializeCriticalSectionAndSpinCount 86708->86710 86713 413748 _free 45 API calls 86709->86713 86711 418297 86710->86711 86712 41828b 86710->86712 86724 4182c2 RtlLeaveCriticalSection _doexit 86711->86724 86714 413748 _free 45 API calls 86712->86714 86713->86711 86715 418291 86714->86715 86723 417f77 46 API calls __getptd_noexit 86715->86723 86719->86697 86720->86701 86722->86700 86723->86711 86724->86700 86725->86635 86726->86637 86907 40e6e0 86727->86907 86731 401f41 GetModuleFileNameW 86925 410100 86731->86925 86733 401f5c 86937 410960 86733->86937 86736 401b10 52 API calls 86737 401f81 86736->86737 86940 401980 86737->86940 86739 401f8e 86740 408f40 VariantClear 86739->86740 86741 401f9d 86740->86741 86742 401b10 52 API calls 86741->86742 86743 401fb4 86742->86743 86744 401980 53 API calls 86743->86744 86745 401fc3 86744->86745 86746 401b10 52 API calls 86745->86746 86747 401fd2 86746->86747 86948 40c2c0 86747->86948 86749 401fe1 86750 40bc70 52 API calls 86749->86750 86751 401ff3 86750->86751 86966 401a10 86751->86966 86753 401ffe 86973 4114ab 86753->86973 86756 428b05 86758 401a10 52 API calls 86756->86758 86757 402017 86759 4114ab __wcsicoll 58 API calls 86757->86759 86761 428b18 86758->86761 86760 402022 86759->86760 86760->86761 86762 40202d 86760->86762 86763 401a10 52 API calls 86761->86763 86764 4114ab __wcsicoll 58 API calls 86762->86764 86765 428b33 86763->86765 86766 402038 86764->86766 86768 428b3b GetModuleFileNameW 86765->86768 86767 402043 86766->86767 86766->86768 86769 4114ab __wcsicoll 58 API calls 86767->86769 86770 401a10 52 API calls 86768->86770 86771 40204e 86769->86771 86772 428b6c 86770->86772 86773 402092 86771->86773 86778 401a10 52 API calls 86771->86778 86781 428b90 _wcscpy 86771->86781 86774 40e0a0 52 API calls 86772->86774 86775 4020a3 86773->86775 86773->86781 86776 428b7a 86774->86776 86777 428bc6 86775->86777 86981 40e830 53 API calls 86775->86981 86779 401a10 52 API calls 86776->86779 86783 402073 _wcscpy 86778->86783 86780 428b88 86779->86780 86780->86781 86784 401a10 52 API calls 86781->86784 86787 401a10 52 API calls 86783->86787 86792 4020d0 86784->86792 86785 4020bb 86982 40cf00 53 API calls 86785->86982 86787->86773 86788 4020c6 86789 408f40 VariantClear 86788->86789 86789->86792 86790 402110 86794 408f40 VariantClear 86790->86794 86792->86790 86795 401a10 52 API calls 86792->86795 86983 40cf00 53 API calls 86792->86983 86984 40e6a0 53 API calls 86792->86984 86796 402120 ctype 86794->86796 86795->86792 86796->86641 86798 4295c9 __wctomb_s_l 86797->86798 86799 40f53c 86797->86799 86802 4295d9 75B5D0D0 86798->86802 87680 410120 86799->87680 86801 40f545 87684 4102b0 SHGetMalloc 86801->87684 86802->86799 86804 40d5f5 86802->86804 86804->86649 86804->86651 86805 40f54c 87689 410190 GetFullPathNameW 86805->87689 86807 40f559 87700 40f570 86807->87700 87762 402400 86809->87762 86811 40146f 86812 428c29 _wcscat 86811->86812 87771 401500 86811->87771 86814 40147c 86814->86812 87779 40d440 86814->87779 86816 401489 86816->86812 86817 401491 GetFullPathNameW 86816->86817 86818 402160 52 API calls 86817->86818 86819 4014bb 86818->86819 86820 402160 52 API calls 86819->86820 86821 4014c8 86820->86821 86821->86812 86822 402160 52 API calls 86821->86822 86823 4014ee 86822->86823 86823->86651 86825 428361 86824->86825 86826 4103fc LoadImageW RegisterClassExW 86824->86826 87799 44395e EnumResourceNamesW LoadImageW 86825->87799 87798 410490 7 API calls 86826->87798 86829 40d651 86831 410570 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 86829->86831 86830 428368 86831->86663 86833 409202 86832->86833 86834 42d7ad 86832->86834 86886 409216 ctype 86833->86886 88071 410940 329 API calls 86833->88071 88074 45e737 90 API calls 3 library calls 86834->88074 86837 409386 86838 40939c 86837->86838 88072 40f190 10 API calls 86837->88072 86838->86666 86896 401000 Shell_NotifyIconW __wctomb_s_l 86838->86896 86840 4095b2 86840->86838 88073 401a50 329 API calls 86840->88073 86841 409253 PeekMessageW 86841->86886 86843 42d8cd Sleep 86843->86886 86844 4095c6 LockWindowUpdate 73A35CF0 GetMessageW 86844->86838 86847 4095f9 86844->86847 86846 42e13b 88092 40d410 VariantClear 86846->88092 86849 42e158 TranslateMessage DispatchMessageW GetMessageW 86847->86849 86849->86838 86849->86849 86851 409567 PeekMessageW 86851->86886 86854 44c29d 52 API calls 86895 4094e0 86854->86895 86855 46f3c1 107 API calls 86855->86886 86856 40e0a0 52 API calls 86856->86886 86857 46fdbf 108 API calls 86857->86895 86858 409551 TranslateMessage DispatchMessageW 86858->86851 86860 42dcd2 WaitForSingleObject 86862 42dcf0 GetExitCodeProcess CloseHandle 86860->86862 86860->86886 86861 42dd3d Sleep 86861->86895 88081 40d410 VariantClear 86862->88081 86866 4094cf Sleep 86866->86895 86868 40d410 VariantClear 86868->86886 86870 42d94d timeGetTime 88077 465124 53 API calls 86870->88077 86871 40c620 timeGetTime 86871->86895 86874 42dd89 CloseHandle 86874->86895 86875 47d33e 307 API calls 86875->86886 86877 465124 53 API calls 86877->86895 86878 42de19 GetExitCodeProcess CloseHandle 86878->86895 86881 42de88 Sleep 86881->86886 86886->86837 86886->86841 86886->86843 86886->86846 86886->86851 86886->86855 86886->86856 86886->86858 86886->86860 86886->86861 86886->86866 86886->86868 86886->86870 86886->86875 86887 42e0cc VariantClear 86886->86887 86888 408f40 VariantClear 86886->86888 86889 45e737 90 API calls 86886->86889 86886->86895 87800 4091b0 86886->87800 87858 40afa0 86886->87858 87884 408fc0 86886->87884 87919 408cc0 86886->87919 87933 40d150 86886->87933 87938 40d170 86886->87938 87944 4096a0 86886->87944 88075 465124 53 API calls 86886->88075 88076 40c620 timeGetTime 86886->88076 88091 40e270 VariantClear ctype 86886->88091 86887->86886 86888->86886 86889->86886 86890 401b10 52 API calls 86890->86895 86892 401980 53 API calls 86892->86895 86893 408f40 VariantClear 86893->86895 86895->86854 86895->86857 86895->86871 86895->86874 86895->86877 86895->86878 86895->86881 86895->86886 86895->86890 86895->86892 86895->86893 88078 45178a 54 API calls 86895->88078 88079 47d33e 329 API calls 86895->88079 88080 453bc6 54 API calls 86895->88080 88082 40d410 VariantClear 86895->88082 88083 443d19 67 API calls _wcslen 86895->88083 88084 4574b4 VariantClear 86895->88084 88085 403cd0 86895->88085 88089 4731e1 VariantClear 86895->88089 88090 4331a2 6 API calls 86895->88090 86896->86666 86897->86651 86898->86658 86900 401b16 _wcslen 86899->86900 86901 4115d7 52 API calls 86900->86901 86904 401b63 86900->86904 86902 401b4b _memmove 86901->86902 86903 4115d7 52 API calls 86902->86903 86903->86904 86905 40d200 52 API calls 2 library calls 86904->86905 86905->86673 86906->86676 86908 40bc70 52 API calls 86907->86908 86909 401f31 86908->86909 86910 402560 86909->86910 86911 40256d __write_nolock 86910->86911 86912 402160 52 API calls 86911->86912 86914 402593 86912->86914 86918 4025bd 86914->86918 86985 401c90 86914->86985 86915 4026f0 52 API calls 86915->86918 86916 4026db 86916->86731 86917 4026a7 86917->86916 86919 401b10 52 API calls 86917->86919 86918->86915 86918->86917 86920 401b10 52 API calls 86918->86920 86923 401c90 52 API calls 86918->86923 86988 40d7c0 52 API calls 2 library calls 86918->86988 86921 4026d1 86919->86921 86920->86918 86989 40d7c0 52 API calls 2 library calls 86921->86989 86923->86918 86990 40f760 86925->86990 86928 410118 86928->86733 86930 42805d 86931 42806a 86930->86931 87046 431e58 86930->87046 86933 413748 _free 46 API calls 86931->86933 86934 428078 86933->86934 86935 431e58 82 API calls 86934->86935 86936 428084 86935->86936 86936->86733 86938 4115d7 52 API calls 86937->86938 86939 401f74 86938->86939 86939->86736 86941 4019a3 86940->86941 86942 401985 86940->86942 86941->86942 86943 4019b8 86941->86943 86945 40199f 86942->86945 87668 403e10 53 API calls 86942->87668 87669 403e10 53 API calls 86943->87669 86945->86739 86946 4019c4 86946->86739 86949 40c2c7 86948->86949 86950 40c30e 86948->86950 86951 40c2d3 86949->86951 86952 426c79 86949->86952 86953 40c315 86950->86953 86954 426c2b 86950->86954 87670 403ea0 52 API calls __cinit 86951->87670 87675 4534e3 52 API calls 86952->87675 86958 40c321 86953->86958 86959 426c5a 86953->86959 86956 426c4b 86954->86956 86957 426c2e 86954->86957 87673 4534e3 52 API calls 86956->87673 86965 40c2de 86957->86965 87672 4534e3 52 API calls 86957->87672 87671 403ea0 52 API calls __cinit 86958->87671 87674 4534e3 52 API calls 86959->87674 86965->86749 86967 401a30 86966->86967 86968 401a17 86966->86968 86970 402160 52 API calls 86967->86970 86969 401a2d 86968->86969 87676 403c30 52 API calls _memmove 86968->87676 86969->86753 86972 401a3d 86970->86972 86972->86753 86974 411523 86973->86974 86975 4114ba 86973->86975 87679 4113a8 58 API calls 3 library calls 86974->87679 86977 40200c 86975->86977 87677 417f77 46 API calls __getptd_noexit 86975->87677 86977->86756 86977->86757 86979 4114c6 87678 417f25 10 API calls __cftog_l 86979->87678 86981->86785 86982->86788 86983->86792 86984->86792 86986 4026f0 52 API calls 86985->86986 86987 401c97 86986->86987 86987->86914 86988->86918 86989->86916 87050 40f6f0 86990->87050 86992 40f77b _strcat ctype 87058 40f850 86992->87058 86997 427c2a 87087 414d04 86997->87087 86999 40f7fc 86999->86997 87001 40f804 86999->87001 87074 414a46 87001->87074 87005 40f80e 87005->86928 87009 4528bd 87005->87009 87006 427c59 87093 414fe2 87006->87093 87008 427c79 87010 4150d1 _fseek 81 API calls 87009->87010 87011 452930 87010->87011 87593 452719 87011->87593 87014 452948 87014->86930 87015 414d04 __fread_nolock 61 API calls 87016 452966 87015->87016 87017 414d04 __fread_nolock 61 API calls 87016->87017 87018 452976 87017->87018 87019 414d04 __fread_nolock 61 API calls 87018->87019 87020 45298f 87019->87020 87021 414d04 __fread_nolock 61 API calls 87020->87021 87022 4529aa 87021->87022 87023 4150d1 _fseek 81 API calls 87022->87023 87024 4529c4 87023->87024 87025 4135bb _malloc 46 API calls 87024->87025 87026 4529cf 87025->87026 87027 4135bb _malloc 46 API calls 87026->87027 87028 4529db 87027->87028 87029 414d04 __fread_nolock 61 API calls 87028->87029 87030 4529ec 87029->87030 87031 44afef GetSystemTimeAsFileTime 87030->87031 87032 452a00 87031->87032 87033 452a36 87032->87033 87034 452a13 87032->87034 87036 452aa5 87033->87036 87037 452a3c 87033->87037 87035 413748 _free 46 API calls 87034->87035 87039 452a1c 87035->87039 87038 413748 _free 46 API calls 87036->87038 87599 44b1a9 87037->87599 87041 452aa3 87038->87041 87042 413748 _free 46 API calls 87039->87042 87041->86930 87044 452a25 87042->87044 87043 452a9d 87045 413748 _free 46 API calls 87043->87045 87044->86930 87045->87041 87047 431e64 87046->87047 87048 431e6a 87046->87048 87049 414a46 __fcloseall 82 API calls 87047->87049 87048->86931 87049->87048 87051 425de2 87050->87051 87052 40f6fc _wcslen 87050->87052 87051->86992 87053 40f710 WideCharToMultiByte 87052->87053 87054 40f756 87053->87054 87055 40f728 87053->87055 87054->86992 87056 4115d7 52 API calls 87055->87056 87057 40f735 WideCharToMultiByte 87056->87057 87057->86992 87060 40f85d __wctomb_s_l _strlen 87058->87060 87061 40f7ab 87060->87061 87106 414db8 87060->87106 87062 4149c2 87061->87062 87121 414904 87062->87121 87064 40f7e9 87064->86997 87065 40f5c0 87064->87065 87066 40f5cd _strcat __write_nolock _memmove 87065->87066 87067 414d04 __fread_nolock 61 API calls 87066->87067 87069 425d11 87066->87069 87073 40f691 __tzset_nolock 87066->87073 87209 4150d1 87066->87209 87067->87066 87070 4150d1 _fseek 81 API calls 87069->87070 87071 425d33 87070->87071 87072 414d04 __fread_nolock 61 API calls 87071->87072 87072->87073 87073->86999 87075 414a52 __lseeki64 87074->87075 87076 414a64 87075->87076 87077 414a79 87075->87077 87349 417f77 46 API calls __getptd_noexit 87076->87349 87079 415471 __lock_file 47 API calls 87077->87079 87085 414a74 __lseeki64 87077->87085 87081 414a92 87079->87081 87080 414a69 87350 417f25 10 API calls __cftog_l 87080->87350 87333 4149d9 87081->87333 87085->87005 87418 414c76 87087->87418 87089 414d1c 87090 44afef 87089->87090 87586 442c5a 87090->87586 87092 44b00d 87092->87006 87094 414fee __lseeki64 87093->87094 87095 414ffa 87094->87095 87096 41500f 87094->87096 87590 417f77 46 API calls __getptd_noexit 87095->87590 87098 415471 __lock_file 47 API calls 87096->87098 87100 415017 87098->87100 87099 414fff 87591 417f25 10 API calls __cftog_l 87099->87591 87102 414e4e __ftell_nolock 51 API calls 87100->87102 87103 415024 87102->87103 87592 41503d RtlLeaveCriticalSection RtlLeaveCriticalSection _fseek 87103->87592 87105 41500a __lseeki64 87105->87008 87107 414dd6 87106->87107 87108 414deb 87106->87108 87117 417f77 46 API calls __getptd_noexit 87107->87117 87108->87107 87110 414df2 87108->87110 87119 41b91b 79 API calls 10 library calls 87110->87119 87111 414ddb 87118 417f25 10 API calls __cftog_l 87111->87118 87114 414e18 87115 414de6 87114->87115 87120 418f98 77 API calls 7 library calls 87114->87120 87115->87060 87117->87111 87118->87115 87119->87114 87120->87115 87124 414910 __lseeki64 87121->87124 87122 414923 87177 417f77 46 API calls __getptd_noexit 87122->87177 87124->87122 87126 414951 87124->87126 87125 414928 87178 417f25 10 API calls __cftog_l 87125->87178 87140 41d4d1 87126->87140 87129 414956 87130 41496a 87129->87130 87131 41495d 87129->87131 87133 414992 87130->87133 87134 414972 87130->87134 87179 417f77 46 API calls __getptd_noexit 87131->87179 87157 41d218 87133->87157 87180 417f77 46 API calls __getptd_noexit 87134->87180 87139 414933 __lseeki64 @_EH4_CallFilterFunc@8 87139->87064 87141 41d4dd __lseeki64 87140->87141 87142 4182cb __lock 46 API calls 87141->87142 87143 41d4eb 87142->87143 87144 41d567 87143->87144 87152 418209 __mtinitlocknum 46 API calls 87143->87152 87155 41d560 87143->87155 87185 4154b2 47 API calls __lock 87143->87185 87186 415520 RtlLeaveCriticalSection RtlLeaveCriticalSection _doexit 87143->87186 87146 416b04 __malloc_crt 46 API calls 87144->87146 87148 41d56e 87146->87148 87147 41d5f0 __lseeki64 87147->87129 87149 41d57c InitializeCriticalSectionAndSpinCount 87148->87149 87148->87155 87150 41d59c 87149->87150 87151 41d5af RtlEnterCriticalSection 87149->87151 87154 413748 _free 46 API calls 87150->87154 87151->87155 87152->87143 87154->87155 87182 41d5fb 87155->87182 87158 41d23a 87157->87158 87159 41d255 87158->87159 87171 41d26c __wopenfile 87158->87171 87191 417f77 46 API calls __getptd_noexit 87159->87191 87161 41d421 87164 41d47a 87161->87164 87165 41d48c 87161->87165 87162 41d25a 87192 417f25 10 API calls __cftog_l 87162->87192 87196 417f77 46 API calls __getptd_noexit 87164->87196 87188 422bf9 87165->87188 87168 41499d 87181 4149b8 RtlLeaveCriticalSection RtlLeaveCriticalSection _fseek 87168->87181 87169 41d47f 87197 417f25 10 API calls __cftog_l 87169->87197 87171->87161 87171->87164 87171->87171 87193 41341f 58 API calls 2 library calls 87171->87193 87173 41d41a 87173->87161 87194 41341f 58 API calls 2 library calls 87173->87194 87175 41d439 87175->87161 87195 41341f 58 API calls 2 library calls 87175->87195 87177->87125 87178->87139 87179->87139 87180->87139 87181->87139 87187 4181f2 RtlLeaveCriticalSection 87182->87187 87184 41d602 87184->87147 87185->87143 87186->87143 87187->87184 87198 422b35 87188->87198 87190 422c14 87190->87168 87191->87162 87192->87168 87193->87173 87194->87175 87195->87161 87196->87169 87197->87168 87200 422b41 __lseeki64 87198->87200 87199 422b54 87201 417f77 __cftog_l 46 API calls 87199->87201 87200->87199 87202 422b8a 87200->87202 87203 422b59 87201->87203 87204 422400 __tsopen_nolock 109 API calls 87202->87204 87205 417f25 __cftog_l 10 API calls 87203->87205 87206 422ba4 87204->87206 87208 422b63 __lseeki64 87205->87208 87207 422bcb __wsopen_helper RtlLeaveCriticalSection 87206->87207 87207->87208 87208->87190 87211 4150dd __lseeki64 87209->87211 87210 4150e9 87240 417f77 46 API calls __getptd_noexit 87210->87240 87211->87210 87213 41510f 87211->87213 87222 415471 87213->87222 87214 4150ee 87241 417f25 10 API calls __cftog_l 87214->87241 87221 4150f9 __lseeki64 87221->87066 87223 415483 87222->87223 87224 4154a5 RtlEnterCriticalSection 87222->87224 87223->87224 87225 41548b 87223->87225 87226 415117 87224->87226 87227 4182cb __lock 46 API calls 87225->87227 87228 415047 87226->87228 87227->87226 87229 415067 87228->87229 87230 415057 87228->87230 87235 415079 87229->87235 87243 414e4e 87229->87243 87298 417f77 46 API calls __getptd_noexit 87230->87298 87234 41505c 87242 415143 RtlLeaveCriticalSection RtlLeaveCriticalSection _fseek 87234->87242 87260 41443c 87235->87260 87238 4150b9 87273 41e1f4 87238->87273 87240->87214 87241->87221 87242->87221 87244 414e61 87243->87244 87245 414e79 87243->87245 87299 417f77 46 API calls __getptd_noexit 87244->87299 87246 414139 __filbuf 46 API calls 87245->87246 87248 414e80 87246->87248 87251 41e1f4 __write 51 API calls 87248->87251 87249 414e66 87300 417f25 10 API calls __cftog_l 87249->87300 87252 414e97 87251->87252 87253 414f09 87252->87253 87255 414ec9 87252->87255 87259 414e71 87252->87259 87301 417f77 46 API calls __getptd_noexit 87253->87301 87256 41e1f4 __write 51 API calls 87255->87256 87255->87259 87257 414f64 87256->87257 87258 41e1f4 __write 51 API calls 87257->87258 87257->87259 87258->87259 87259->87235 87261 414477 87260->87261 87262 414455 87260->87262 87266 414139 87261->87266 87262->87261 87263 414139 __filbuf 46 API calls 87262->87263 87264 414470 87263->87264 87302 41b7b2 77 API calls 5 library calls 87264->87302 87267 414145 87266->87267 87268 41415a 87266->87268 87303 417f77 46 API calls __getptd_noexit 87267->87303 87268->87238 87270 41414a 87304 417f25 10 API calls __cftog_l 87270->87304 87272 414155 87272->87238 87274 41e200 __lseeki64 87273->87274 87275 41e223 87274->87275 87276 41e208 87274->87276 87277 41e22f 87275->87277 87283 41e269 87275->87283 87325 417f8a 46 API calls __getptd_noexit 87276->87325 87327 417f8a 46 API calls __getptd_noexit 87277->87327 87279 41e20d 87326 417f77 46 API calls __getptd_noexit 87279->87326 87282 41e234 87328 417f77 46 API calls __getptd_noexit 87282->87328 87305 41ae56 87283->87305 87286 41e26f 87288 41e291 87286->87288 87289 41e27d 87286->87289 87287 41e23c 87329 417f25 10 API calls __cftog_l 87287->87329 87330 417f77 46 API calls __getptd_noexit 87288->87330 87315 41e17f 87289->87315 87293 41e215 __lseeki64 87293->87234 87294 41e289 87332 41e2c0 RtlLeaveCriticalSection __unlock_fhandle 87294->87332 87295 41e296 87331 417f8a 46 API calls __getptd_noexit 87295->87331 87298->87234 87299->87249 87300->87259 87301->87259 87302->87261 87303->87270 87304->87272 87306 41ae62 __lseeki64 87305->87306 87307 41aebc 87306->87307 87308 4182cb __lock 46 API calls 87306->87308 87309 41aec1 RtlEnterCriticalSection 87307->87309 87312 41aede __lseeki64 87307->87312 87310 41ae8e 87308->87310 87309->87312 87311 41ae97 InitializeCriticalSectionAndSpinCount 87310->87311 87313 41aeaa 87310->87313 87311->87313 87312->87286 87314 41aeec ___lock_fhandle RtlLeaveCriticalSection 87313->87314 87314->87307 87316 41aded __chsize_nolock 46 API calls 87315->87316 87317 41e18e 87316->87317 87318 41e1a4 SetFilePointer 87317->87318 87319 41e194 87317->87319 87320 41e1bb GetLastError 87318->87320 87322 41e1c3 87318->87322 87321 417f77 __cftog_l 46 API calls 87319->87321 87320->87322 87323 41e199 87321->87323 87322->87323 87324 417f9d __dosmaperr 46 API calls 87322->87324 87323->87294 87324->87323 87325->87279 87326->87293 87327->87282 87328->87287 87329->87293 87330->87295 87331->87294 87332->87293 87334 4149ea 87333->87334 87335 4149fe 87333->87335 87379 417f77 46 API calls __getptd_noexit 87334->87379 87337 4149fa 87335->87337 87339 41443c __flush 77 API calls 87335->87339 87351 414ab2 RtlLeaveCriticalSection RtlLeaveCriticalSection _fseek 87337->87351 87338 4149ef 87380 417f25 10 API calls __cftog_l 87338->87380 87341 414a0a 87339->87341 87352 41d8c2 87341->87352 87344 414139 __filbuf 46 API calls 87345 414a18 87344->87345 87356 41d7fe 87345->87356 87347 414a1e 87347->87337 87348 413748 _free 46 API calls 87347->87348 87348->87337 87349->87080 87350->87085 87351->87085 87353 41d8d2 87352->87353 87355 414a12 87352->87355 87354 413748 _free 46 API calls 87353->87354 87353->87355 87354->87355 87355->87344 87357 41d80a __lseeki64 87356->87357 87358 41d812 87357->87358 87359 41d82d 87357->87359 87396 417f8a 46 API calls __getptd_noexit 87358->87396 87360 41d839 87359->87360 87366 41d873 87359->87366 87398 417f8a 46 API calls __getptd_noexit 87360->87398 87362 41d817 87397 417f77 46 API calls __getptd_noexit 87362->87397 87365 41d83e 87399 417f77 46 API calls __getptd_noexit 87365->87399 87368 41ae56 ___lock_fhandle 48 API calls 87366->87368 87369 41d879 87368->87369 87371 41d893 87369->87371 87372 41d887 87369->87372 87370 41d846 87400 417f25 10 API calls __cftog_l 87370->87400 87401 417f77 46 API calls __getptd_noexit 87371->87401 87381 41d762 87372->87381 87376 41d81f __lseeki64 87376->87347 87377 41d88d 87402 41d8ba RtlLeaveCriticalSection __unlock_fhandle 87377->87402 87379->87338 87380->87337 87403 41aded 87381->87403 87383 41d7c8 87416 41ad67 47 API calls 2 library calls 87383->87416 87384 41d772 87384->87383 87385 41d7a6 87384->87385 87387 41aded __chsize_nolock 46 API calls 87384->87387 87385->87383 87388 41aded __chsize_nolock 46 API calls 87385->87388 87391 41d79d 87387->87391 87392 41d7b2 CloseHandle 87388->87392 87389 41d7d0 87390 41d7f2 87389->87390 87417 417f9d 46 API calls 3 library calls 87389->87417 87390->87377 87394 41aded __chsize_nolock 46 API calls 87391->87394 87392->87383 87395 41d7be GetLastError 87392->87395 87394->87385 87395->87383 87396->87362 87397->87376 87398->87365 87399->87370 87400->87376 87401->87377 87402->87376 87404 41ae12 87403->87404 87405 41adfa 87403->87405 87408 417f8a __lseeki64 46 API calls 87404->87408 87409 41ae51 87404->87409 87406 417f8a __lseeki64 46 API calls 87405->87406 87407 41adff 87406->87407 87410 417f77 __cftog_l 46 API calls 87407->87410 87411 41ae23 87408->87411 87409->87384 87412 41ae07 87410->87412 87413 417f77 __cftog_l 46 API calls 87411->87413 87412->87384 87414 41ae2b 87413->87414 87415 417f25 __cftog_l 10 API calls 87414->87415 87415->87412 87416->87389 87417->87390 87419 414c82 __lseeki64 87418->87419 87420 414cc3 87419->87420 87421 414c96 __wctomb_s_l 87419->87421 87422 414cbb __lseeki64 87419->87422 87423 415471 __lock_file 47 API calls 87420->87423 87445 417f77 46 API calls __getptd_noexit 87421->87445 87422->87089 87424 414ccb 87423->87424 87431 414aba 87424->87431 87427 414cb0 87446 417f25 10 API calls __cftog_l 87427->87446 87435 414ad8 __wctomb_s_l 87431->87435 87437 414af2 87431->87437 87432 414ae2 87498 417f77 46 API calls __getptd_noexit 87432->87498 87434 414ae7 87499 417f25 10 API calls __cftog_l 87434->87499 87435->87432 87435->87437 87442 414b2d 87435->87442 87447 414cfa RtlLeaveCriticalSection RtlLeaveCriticalSection _fseek 87437->87447 87439 414c38 __wctomb_s_l 87501 417f77 46 API calls __getptd_noexit 87439->87501 87440 414139 __filbuf 46 API calls 87440->87442 87442->87437 87442->87439 87442->87440 87448 41dfcc 87442->87448 87478 41d8f3 87442->87478 87500 41e0c2 46 API calls 3 library calls 87442->87500 87445->87427 87446->87422 87447->87422 87449 41dfd8 __lseeki64 87448->87449 87450 41dfe0 87449->87450 87451 41dffb 87449->87451 87571 417f8a 46 API calls __getptd_noexit 87450->87571 87453 41e007 87451->87453 87456 41e041 87451->87456 87573 417f8a 46 API calls __getptd_noexit 87453->87573 87454 41dfe5 87572 417f77 46 API calls __getptd_noexit 87454->87572 87459 41e063 87456->87459 87460 41e04e 87456->87460 87458 41e00c 87574 417f77 46 API calls __getptd_noexit 87458->87574 87463 41ae56 ___lock_fhandle 48 API calls 87459->87463 87576 417f8a 46 API calls __getptd_noexit 87460->87576 87466 41e069 87463->87466 87464 41e014 87575 417f25 10 API calls __cftog_l 87464->87575 87465 41e053 87577 417f77 46 API calls __getptd_noexit 87465->87577 87469 41e077 87466->87469 87470 41e08b 87466->87470 87468 41dfed __lseeki64 87468->87442 87502 41da15 87469->87502 87578 417f77 46 API calls __getptd_noexit 87470->87578 87474 41e090 87579 417f8a 46 API calls __getptd_noexit 87474->87579 87475 41e083 87580 41e0ba RtlLeaveCriticalSection __unlock_fhandle 87475->87580 87479 41d900 87478->87479 87483 41d915 87478->87483 87584 417f77 46 API calls __getptd_noexit 87479->87584 87481 41d905 87585 417f25 10 API calls __cftog_l 87481->87585 87484 41d94a 87483->87484 87489 41d910 87483->87489 87581 420603 87483->87581 87486 414139 __filbuf 46 API calls 87484->87486 87487 41d95e 87486->87487 87488 41dfcc __read 59 API calls 87487->87488 87490 41d965 87488->87490 87489->87442 87490->87489 87491 414139 __filbuf 46 API calls 87490->87491 87492 41d988 87491->87492 87492->87489 87493 414139 __filbuf 46 API calls 87492->87493 87494 41d994 87493->87494 87494->87489 87495 414139 __filbuf 46 API calls 87494->87495 87496 41d9a1 87495->87496 87497 414139 __filbuf 46 API calls 87496->87497 87497->87489 87498->87434 87499->87437 87500->87442 87501->87434 87503 41da31 87502->87503 87504 41da4c 87502->87504 87505 417f8a __lseeki64 46 API calls 87503->87505 87506 41da5b 87504->87506 87508 41da7a 87504->87508 87507 41da36 87505->87507 87509 417f8a __lseeki64 46 API calls 87506->87509 87511 417f77 __cftog_l 46 API calls 87507->87511 87510 41da98 87508->87510 87524 41daac 87508->87524 87512 41da60 87509->87512 87513 417f8a __lseeki64 46 API calls 87510->87513 87525 41da3e 87511->87525 87515 417f77 __cftog_l 46 API calls 87512->87515 87517 41da9d 87513->87517 87514 41db02 87516 417f8a __lseeki64 46 API calls 87514->87516 87518 41da67 87515->87518 87519 41db07 87516->87519 87520 417f77 __cftog_l 46 API calls 87517->87520 87521 417f25 __cftog_l 10 API calls 87518->87521 87522 417f77 __cftog_l 46 API calls 87519->87522 87523 41daa4 87520->87523 87521->87525 87522->87523 87527 417f25 __cftog_l 10 API calls 87523->87527 87524->87514 87524->87525 87526 41dae1 87524->87526 87528 41db1b 87524->87528 87525->87475 87526->87514 87533 41daec ReadFile 87526->87533 87527->87525 87530 416b04 __malloc_crt 46 API calls 87528->87530 87534 41db31 87530->87534 87531 41dc17 87532 41df8f GetLastError 87531->87532 87539 41dc2b 87531->87539 87535 41de16 87532->87535 87536 41df9c 87532->87536 87533->87531 87533->87532 87537 41db59 87534->87537 87538 41db3b 87534->87538 87545 417f9d __dosmaperr 46 API calls 87535->87545 87550 41dd9b 87535->87550 87541 417f77 __cftog_l 46 API calls 87536->87541 87540 420494 __lseeki64_nolock 48 API calls 87537->87540 87542 417f77 __cftog_l 46 API calls 87538->87542 87539->87550 87552 41de5b 87539->87552 87553 41dc47 87539->87553 87543 41db67 87540->87543 87544 41dfa1 87541->87544 87546 41db40 87542->87546 87543->87533 87547 417f8a __lseeki64 46 API calls 87544->87547 87545->87550 87548 417f8a __lseeki64 46 API calls 87546->87548 87547->87550 87548->87525 87549 413748 _free 46 API calls 87549->87525 87550->87525 87550->87549 87551 41ded0 ReadFile 87556 41deef GetLastError 87551->87556 87563 41def9 87551->87563 87552->87550 87552->87551 87554 41dcab ReadFile 87553->87554 87559 41dd28 87553->87559 87555 41dcc9 GetLastError 87554->87555 87562 41dcd3 87554->87562 87555->87553 87555->87562 87556->87552 87556->87563 87557 41ddec MultiByteToWideChar 87557->87550 87558 41de10 GetLastError 87557->87558 87558->87535 87559->87550 87560 41dda3 87559->87560 87561 41dd96 87559->87561 87565 41dd60 87559->87565 87560->87565 87566 41ddda 87560->87566 87564 417f77 __cftog_l 46 API calls 87561->87564 87562->87553 87567 420494 __lseeki64_nolock 48 API calls 87562->87567 87563->87552 87568 420494 __lseeki64_nolock 48 API calls 87563->87568 87564->87550 87565->87557 87569 420494 __lseeki64_nolock 48 API calls 87566->87569 87567->87562 87568->87563 87570 41dde9 87569->87570 87570->87557 87571->87454 87572->87468 87573->87458 87574->87464 87575->87468 87576->87465 87577->87464 87578->87474 87579->87475 87580->87468 87582 416b04 __malloc_crt 46 API calls 87581->87582 87583 420618 87582->87583 87583->87484 87584->87481 87585->87489 87589 4148b3 GetSystemTimeAsFileTime __aulldiv 87586->87589 87588 442c6b 87588->87092 87589->87588 87590->87099 87591->87105 87592->87105 87594 45272f __tzset_nolock _wcscpy 87593->87594 87595 414d04 61 API calls __fread_nolock 87594->87595 87596 44afef GetSystemTimeAsFileTime 87594->87596 87597 4528a4 87594->87597 87598 4150d1 81 API calls _fseek 87594->87598 87595->87594 87596->87594 87597->87014 87597->87015 87598->87594 87600 44b1bc 87599->87600 87601 44b1ca 87599->87601 87602 4149c2 116 API calls 87600->87602 87603 44b1e1 87601->87603 87604 4149c2 116 API calls 87601->87604 87605 44b1d8 87601->87605 87602->87601 87634 4321a4 87603->87634 87606 44b2db 87604->87606 87605->87043 87606->87603 87608 44b2e9 87606->87608 87610 44b2f6 87608->87610 87614 414a46 __fcloseall 82 API calls 87608->87614 87609 44b224 87611 44b253 87609->87611 87612 44b228 87609->87612 87610->87043 87638 43213d 87611->87638 87613 44b235 87612->87613 87616 414a46 __fcloseall 82 API calls 87612->87616 87617 44b245 87613->87617 87619 414a46 __fcloseall 82 API calls 87613->87619 87614->87610 87616->87613 87617->87043 87618 44b25a 87620 44b260 87618->87620 87621 44b289 87618->87621 87619->87617 87623 44b26d 87620->87623 87626 414a46 __fcloseall 82 API calls 87620->87626 87648 44b0bf 87621->87648 87624 44b27d 87623->87624 87627 414a46 __fcloseall 82 API calls 87623->87627 87624->87043 87625 44b28f 87657 4320f8 87625->87657 87626->87623 87627->87624 87630 44b2a2 87632 44b2b2 87630->87632 87633 414a46 __fcloseall 82 API calls 87630->87633 87631 414a46 __fcloseall 82 API calls 87631->87630 87632->87043 87633->87632 87635 4321cb 87634->87635 87637 4321b4 __tzset_nolock _memmove 87634->87637 87636 414d04 __fread_nolock 61 API calls 87635->87636 87636->87637 87637->87609 87639 4135bb _malloc 46 API calls 87638->87639 87640 432150 87639->87640 87641 4135bb _malloc 46 API calls 87640->87641 87642 432162 87641->87642 87643 4135bb _malloc 46 API calls 87642->87643 87644 432174 87643->87644 87645 4320f8 46 API calls 87644->87645 87646 432189 87644->87646 87647 432198 87645->87647 87646->87618 87647->87618 87649 44b18e 87648->87649 87655 44b0da 87648->87655 87667 43206e 79 API calls 87649->87667 87651 442caf 61 API calls 87651->87655 87652 44b194 87652->87625 87655->87649 87655->87651 87656 44b19d 87655->87656 87665 44b040 61 API calls 87655->87665 87666 442d48 79 API calls 87655->87666 87656->87625 87658 432109 87657->87658 87660 43210f 87657->87660 87659 413748 _free 46 API calls 87658->87659 87659->87660 87661 413748 _free 46 API calls 87660->87661 87663 432122 87660->87663 87661->87663 87662 413748 _free 46 API calls 87664 432135 87662->87664 87663->87662 87663->87664 87664->87630 87664->87631 87665->87655 87666->87655 87667->87652 87668->86945 87669->86946 87670->86965 87671->86965 87672->86965 87673->86959 87674->86965 87675->86965 87676->86969 87677->86979 87678->86977 87679->86977 87729 410160 87680->87729 87682 41012f GetFullPathNameW 87683 410147 ctype 87682->87683 87683->86801 87685 4102cb SHGetDesktopFolder 87684->87685 87688 410333 _wcsncpy 87684->87688 87686 4102e0 _wcsncpy 87685->87686 87685->87688 87687 41031c SHGetPathFromIDListW 87686->87687 87686->87688 87687->87688 87688->86805 87690 4101bb 87689->87690 87695 425f4a 87689->87695 87691 410160 52 API calls 87690->87691 87692 4101c7 87691->87692 87733 410200 52 API calls 2 library calls 87692->87733 87693 4114ab __wcsicoll 58 API calls 87693->87695 87695->87693 87697 425f6e 87695->87697 87696 4101d6 87734 410200 52 API calls 2 library calls 87696->87734 87697->86807 87699 4101e9 87699->86807 87701 40f760 128 API calls 87700->87701 87702 40f584 87701->87702 87703 429335 87702->87703 87704 40f58c 87702->87704 87707 4528bd 118 API calls 87703->87707 87705 40f598 87704->87705 87706 429358 87704->87706 87759 4033c0 113 API calls 7 library calls 87705->87759 87760 434034 86 API calls _wprintf 87706->87760 87709 42934b 87707->87709 87712 429373 87709->87712 87713 42934f 87709->87713 87711 40f5b4 87711->86804 87715 4115d7 52 API calls 87712->87715 87716 431e58 82 API calls 87713->87716 87714 429369 87714->87712 87728 4293c5 ctype 87715->87728 87716->87706 87717 42959c 87718 413748 _free 46 API calls 87717->87718 87719 4295a5 87718->87719 87720 431e58 82 API calls 87719->87720 87721 4295b1 87720->87721 87725 401b10 52 API calls 87725->87728 87728->87717 87728->87725 87735 444af8 87728->87735 87738 44b41c 87728->87738 87745 402780 87728->87745 87753 4022d0 87728->87753 87761 44c7dd 64 API calls 3 library calls 87728->87761 87730 410167 _wcslen 87729->87730 87731 4115d7 52 API calls 87730->87731 87732 41017e _wcscpy 87731->87732 87732->87682 87733->87696 87734->87699 87736 4115d7 52 API calls 87735->87736 87737 444b27 _memmove 87736->87737 87737->87728 87739 44b429 87738->87739 87740 4115d7 52 API calls 87739->87740 87741 44b440 87740->87741 87742 44b45e 87741->87742 87743 401b10 52 API calls 87741->87743 87742->87728 87744 44b453 87743->87744 87744->87728 87746 402827 87745->87746 87749 402790 ctype _memmove 87745->87749 87748 4115d7 52 API calls 87746->87748 87747 4115d7 52 API calls 87750 402797 87747->87750 87748->87749 87749->87747 87751 4027bd 87750->87751 87752 4115d7 52 API calls 87750->87752 87751->87728 87752->87751 87754 4022e0 87753->87754 87756 40239d 87753->87756 87755 4115d7 52 API calls 87754->87755 87754->87756 87757 402320 ctype 87754->87757 87755->87757 87756->87728 87757->87756 87758 4115d7 52 API calls 87757->87758 87758->87757 87759->87711 87760->87714 87761->87728 87763 402539 ctype 87762->87763 87764 402417 87762->87764 87763->86811 87764->87763 87765 4115d7 52 API calls 87764->87765 87766 402443 87765->87766 87767 4115d7 52 API calls 87766->87767 87768 4024b4 87767->87768 87768->87763 87770 4022d0 52 API calls 87768->87770 87791 402880 95 API calls 2 library calls 87768->87791 87770->87768 87776 401566 87771->87776 87772 401794 87792 40e9a0 90 API calls 87772->87792 87775 4010a0 52 API calls 87775->87776 87776->87772 87776->87775 87777 40167a 87776->87777 87778 4017c0 87777->87778 87793 45e737 90 API calls 3 library calls 87777->87793 87778->86814 87780 40bc70 52 API calls 87779->87780 87785 40d451 87780->87785 87781 40d50f 87796 410600 52 API calls 87781->87796 87783 40e0a0 52 API calls 87783->87785 87785->87781 87785->87783 87786 401b10 52 API calls 87785->87786 87787 40d519 87785->87787 87789 427c01 87785->87789 87794 40f310 53 API calls 87785->87794 87795 40d860 91 API calls 87785->87795 87786->87785 87787->86816 87797 45e737 90 API calls 3 library calls 87789->87797 87791->87768 87792->87777 87793->87778 87794->87785 87795->87785 87796->87787 87797->87787 87798->86829 87799->86830 87801 42c5fe 87800->87801 87816 4091c6 87800->87816 87802 40bc70 52 API calls 87801->87802 87801->87816 87803 42c64e InterlockedIncrement 87802->87803 87804 42c665 87803->87804 87810 42c697 87803->87810 87806 42c672 InterlockedDecrement Sleep InterlockedIncrement 87804->87806 87804->87810 87805 42c737 InterlockedDecrement 87807 42c74a 87805->87807 87806->87804 87806->87810 87809 408f40 VariantClear 87807->87809 87808 42c731 87808->87805 87811 42c752 87809->87811 87810->87805 87810->87808 88093 408e80 87810->88093 88102 410c60 VariantClear ctype 87811->88102 87816->86886 87817 42c6db 87818 402160 52 API calls 87817->87818 87819 42c6e5 87818->87819 88098 45340c 85 API calls 87819->88098 87821 42c6f1 88099 40d200 52 API calls 2 library calls 87821->88099 87823 42c6fb 88100 465124 53 API calls 87823->88100 87825 42c715 87826 42c76a 87825->87826 87827 42c719 87825->87827 87828 401b10 52 API calls 87826->87828 88101 46fe32 VariantClear 87827->88101 87830 42c77e 87828->87830 87831 401980 53 API calls 87830->87831 87838 42c796 87831->87838 87832 42c812 88104 46fe32 VariantClear 87832->88104 87834 42c82a InterlockedDecrement 88105 46ff07 54 API calls 87834->88105 87836 42c849 87839 42c9ec 87836->87839 87845 401980 53 API calls 87836->87845 87848 408f40 VariantClear 87836->87848 87851 402780 52 API calls 87836->87851 88108 40a780 87836->88108 87837 42c864 88106 45e737 90 API calls 3 library calls 87837->88106 87838->87832 87838->87837 88103 40ba10 52 API calls 2 library calls 87838->88103 88149 47d33e 329 API calls 87839->88149 87843 42c9fe 88150 46feb1 VariantClear VariantClear 87843->88150 87845->87836 87846 42ca08 87849 401b10 52 API calls 87846->87849 87847 42c874 87850 408f40 VariantClear 87847->87850 87857 42ca59 87847->87857 87848->87836 87853 42c891 87850->87853 87851->87836 88107 410c60 VariantClear ctype 87853->88107 87857->87857 87859 40afc4 87858->87859 87860 40b156 87858->87860 87861 40afd5 87859->87861 87862 42d1e3 87859->87862 88160 45e737 90 API calls 3 library calls 87860->88160 87866 40a780 192 API calls 87861->87866 87883 40b11a ctype 87861->87883 88161 45e737 90 API calls 3 library calls 87862->88161 87865 42d1f8 87870 408f40 VariantClear 87865->87870 87868 40b00a 87866->87868 87868->87865 87872 40b012 87868->87872 87869 42d4db 87869->87869 87871 40b143 87870->87871 87871->86886 87873 40b04a 87872->87873 87874 40b094 ctype 87872->87874 87875 42d231 VariantClear 87872->87875 87882 40b05c ctype 87873->87882 88162 40e270 VariantClear ctype 87873->88162 87876 40b108 87874->87876 87879 42d425 ctype 87874->87879 87875->87882 87876->87883 88163 40e270 VariantClear ctype 87876->88163 87877 42d45a VariantClear 87877->87883 87879->87877 87879->87883 87880 4115d7 52 API calls 87880->87874 87882->87874 87882->87880 87883->87871 88164 45e737 90 API calls 3 library calls 87883->88164 87885 40900d 87884->87885 87886 408fff 87884->87886 87889 42c3f6 87885->87889 87891 42c44a 87885->87891 87892 40a780 192 API calls 87885->87892 87895 42c47b 87885->87895 87896 42c4cb 87885->87896 87897 42c564 87885->87897 87901 42c548 87885->87901 87904 409112 87885->87904 87906 42c528 87885->87906 87908 4090df 87885->87908 87909 4090ea 87885->87909 87918 4090f2 ctype 87885->87918 88167 4534e3 52 API calls 87885->88167 88169 40c4e0 192 API calls 87885->88169 88165 403ea0 52 API calls __cinit 87886->88165 88168 45e737 90 API calls 3 library calls 87889->88168 88170 45e737 90 API calls 3 library calls 87891->88170 87892->87885 88171 451b42 61 API calls 87895->88171 88173 47faae 231 API calls 87896->88173 87902 408f40 VariantClear 87897->87902 87899 42c491 87899->87918 88172 45e737 90 API calls 3 library calls 87899->88172 88176 45e737 90 API calls 3 library calls 87901->88176 87902->87918 87903 42c4da 87903->87918 88174 45e737 90 API calls 3 library calls 87903->88174 87904->87901 87911 40912b 87904->87911 88175 45e737 90 API calls 3 library calls 87906->88175 87908->87909 87913 408e80 VariantClear 87908->87913 87914 408f40 VariantClear 87909->87914 87911->87918 88166 403e10 53 API calls 87911->88166 87913->87909 87914->87918 87916 40914b 87917 408f40 VariantClear 87916->87917 87917->87918 87918->86886 88177 408d90 87919->88177 87921 429778 88204 410c60 VariantClear ctype 87921->88204 87923 408cf9 87923->87921 87925 42976c 87923->87925 87927 408d2d 87923->87927 87924 429780 88203 45e737 90 API calls 3 library calls 87925->88203 88193 403d10 87927->88193 87930 408d71 ctype 87930->86886 87931 408f40 VariantClear 87932 408d45 ctype 87931->87932 87932->87930 87932->87931 87934 425c87 87933->87934 87937 40d15f 87933->87937 87935 425cc7 87934->87935 87936 425ca1 TranslateAcceleratorW 87934->87936 87936->87937 87937->86886 87939 42602f 87938->87939 87942 40d17f 87938->87942 87939->86886 87940 42608e IsDialogMessageW 87941 40d18c 87940->87941 87940->87942 87941->86886 87942->87940 87942->87941 88500 430c46 GetClassLongW 87942->88500 87945 4096c6 _wcslen 87944->87945 87946 4115d7 52 API calls 87945->87946 88009 40a70c ctype _memmove 87945->88009 87947 4096fa _memmove 87946->87947 87949 4115d7 52 API calls 87947->87949 87948 4013a0 52 API calls 87950 4297aa 87948->87950 87951 40971b 87949->87951 87952 4115d7 52 API calls 87950->87952 87953 409749 CharUpperBuffW 87951->87953 87955 40976a ctype 87951->87955 87951->88009 87995 4297d1 _memmove 87952->87995 87953->87955 88005 4097e5 ctype 87955->88005 88502 47dcbb 194 API calls 87955->88502 87957 408f40 VariantClear 87958 42ae92 87957->87958 88529 410c60 VariantClear ctype 87958->88529 87960 42aea4 87961 409aa2 87964 4115d7 52 API calls 87961->87964 87968 409afe 87961->87968 87961->87995 87962 40a689 87965 4115d7 52 API calls 87962->87965 87963 4115d7 52 API calls 87963->88005 87964->87968 87982 40a6af ctype _memmove 87965->87982 87966 409b2a 87970 429dbe 87966->87970 88032 409b4d ctype _memmove 87966->88032 88510 40b400 VariantClear VariantClear ctype 87966->88510 87967 40c2c0 52 API calls 87967->88005 87968->87966 87969 4115d7 52 API calls 87968->87969 87971 429d31 87969->87971 87975 429dd3 87970->87975 88511 40b400 VariantClear VariantClear ctype 87970->88511 87974 429d42 87971->87974 88507 44a801 52 API calls 87971->88507 87972 409fd2 87980 40a045 87972->87980 88031 42a3f5 87972->88031 87986 40e0a0 52 API calls 87974->87986 87975->88032 88512 40e1c0 VariantClear ctype 87975->88512 87976 429a46 VariantClear 87976->88005 87977 408f40 VariantClear 87977->88005 87984 4115d7 52 API calls 87980->87984 87990 4115d7 52 API calls 87982->87990 87991 40a04c 87984->87991 87992 429d57 87986->87992 87988 42a42f 88516 45e737 90 API calls 3 library calls 87988->88516 87990->88009 87993 40a0a7 87991->87993 87997 4091e0 315 API calls 87991->87997 88508 453443 52 API calls 87992->88508 88017 40a0af 87993->88017 88517 40c790 VariantClear ctype 87993->88517 87994 4299d9 87998 408f40 VariantClear 87994->87998 88528 45e737 90 API calls 3 library calls 87995->88528 87997->87993 88004 4299e2 87998->88004 87999 429abd 87999->86886 88000 429d88 88509 453443 52 API calls 88000->88509 88504 410c60 VariantClear ctype 88004->88504 88005->87961 88005->87962 88005->87963 88005->87967 88005->87976 88005->87977 88005->87982 88005->87994 88005->87995 88005->87999 88006 40a780 192 API calls 88005->88006 88007 42a452 88005->88007 88503 40c4e0 192 API calls 88005->88503 88505 40ba10 52 API calls 2 library calls 88005->88505 88506 40e270 VariantClear ctype 88005->88506 88006->88005 88007->87957 88009->87948 88011 402780 52 API calls 88011->88032 88012 4115d7 52 API calls 88012->88032 88014 44a801 52 API calls 88014->88032 88015 408f40 VariantClear 88045 40a162 ctype _memmove 88015->88045 88016 41130a 51 API calls __cinit 88016->88032 88018 40a11b 88017->88018 88019 42a4b4 VariantClear 88017->88019 88017->88045 88025 40a12d ctype 88018->88025 88518 40e270 VariantClear ctype 88018->88518 88019->88025 88020 40a780 192 API calls 88020->88032 88022 401980 53 API calls 88022->88032 88023 408e80 VariantClear 88023->88032 88024 4115d7 52 API calls 88024->88045 88025->88024 88025->88045 88026 408e80 VariantClear 88026->88045 88028 42a74d VariantClear 88028->88045 88029 40a368 88033 42aad4 88029->88033 88039 40a397 88029->88039 88030 40e270 VariantClear 88030->88045 88515 47390f VariantClear 88031->88515 88032->87972 88032->87988 88032->88009 88032->88011 88032->88012 88032->88014 88032->88016 88032->88020 88032->88022 88032->88023 88032->88031 88037 409c95 88032->88037 88513 45f508 52 API calls 88032->88513 88514 403e10 53 API calls 88032->88514 88521 46fe90 VariantClear VariantClear ctype 88033->88521 88034 42a7e4 VariantClear 88034->88045 88035 42a886 VariantClear 88035->88045 88037->86886 88038 40a3ce 88049 40a3d9 ctype 88038->88049 88522 40b400 VariantClear VariantClear ctype 88038->88522 88039->88038 88064 40a42c ctype 88039->88064 88501 40b400 VariantClear VariantClear ctype 88039->88501 88042 42abaf 88048 42abd4 VariantClear 88042->88048 88057 40a4ee ctype 88042->88057 88043 4115d7 52 API calls 88043->88045 88044 4115d7 52 API calls 88047 42a5a6 VariantInit VariantCopy 88044->88047 88045->88015 88045->88026 88045->88028 88045->88029 88045->88030 88045->88033 88045->88034 88045->88035 88045->88043 88045->88044 88519 470870 52 API calls 88045->88519 88520 44ccf1 VariantClear ctype 88045->88520 88046 40a4dc 88046->88057 88524 40e270 VariantClear ctype 88046->88524 88047->88045 88051 42a5c6 VariantClear 88047->88051 88048->88057 88050 40a41a 88049->88050 88056 42ab44 VariantClear 88049->88056 88049->88064 88050->88064 88523 40e270 VariantClear ctype 88050->88523 88051->88045 88052 42ac4f 88058 42ac79 VariantClear 88052->88058 88062 40a546 ctype 88052->88062 88055 40a534 88055->88062 88525 40e270 VariantClear ctype 88055->88525 88056->88064 88057->88052 88057->88055 88058->88062 88059 42ad28 88065 42ad4e VariantClear 88059->88065 88070 40a583 ctype 88059->88070 88062->88059 88063 40a571 88062->88063 88063->88070 88526 40e270 VariantClear ctype 88063->88526 88064->88042 88064->88046 88065->88070 88067 40a650 ctype 88067->86886 88068 42ae0e VariantClear 88068->88070 88070->88067 88070->88068 88527 40e270 VariantClear ctype 88070->88527 88071->86886 88072->86840 88073->86844 88074->86886 88075->86886 88076->86886 88077->86886 88078->86895 88079->86895 88080->86895 88081->86895 88082->86895 88083->86895 88084->86895 88086 403cdf 88085->88086 88087 408f40 VariantClear 88086->88087 88088 403ce7 88087->88088 88088->86881 88089->86895 88090->86895 88091->86886 88092->86837 88094 408e88 88093->88094 88096 408e94 88093->88096 88095 408f40 VariantClear 88094->88095 88095->88096 88097 45340c 85 API calls 88096->88097 88097->87817 88098->87821 88099->87823 88100->87825 88101->87808 88102->87816 88103->87838 88104->87834 88105->87836 88106->87847 88107->87816 88109 40a7a6 88108->88109 88110 40ae8c 88108->88110 88112 4115d7 52 API calls 88109->88112 88151 41130a 51 API calls __cinit 88110->88151 88145 40a7c6 ctype _memmove 88112->88145 88113 40a86d 88115 40abd1 88113->88115 88131 40a878 ctype 88113->88131 88114 408e80 VariantClear 88114->88145 88156 45e737 90 API calls 3 library calls 88115->88156 88116 401b10 52 API calls 88116->88145 88118 40bc10 53 API calls 88118->88145 88119 42b791 VariantClear 88119->88145 88120 42ba2d VariantClear 88120->88145 88121 408f40 VariantClear 88121->88131 88122 40e270 VariantClear 88122->88145 88123 42b459 VariantClear 88123->88145 88124 40a884 ctype 88124->87836 88126 408cc0 185 API calls 88126->88145 88127 42b6f6 VariantClear 88127->88145 88129 42bbf5 88157 45e737 90 API calls 3 library calls 88129->88157 88130 42bb6a 88159 44b92d VariantClear 88130->88159 88131->88121 88131->88124 88132 4115d7 52 API calls 88132->88145 88133 4115d7 52 API calls 88136 42b5b3 VariantInit VariantCopy 88133->88136 88134 40b5f0 89 API calls 88134->88145 88136->88145 88138 408f40 VariantClear 88138->88145 88142 42bc37 88158 45e737 90 API calls 3 library calls 88142->88158 88145->88113 88145->88114 88145->88115 88145->88116 88145->88118 88145->88119 88145->88120 88145->88122 88145->88123 88145->88126 88145->88127 88145->88129 88145->88130 88145->88132 88145->88133 88145->88134 88145->88138 88145->88142 88148 4530c9 VariantClear 88145->88148 88152 45308a 53 API calls 88145->88152 88153 470870 52 API calls 88145->88153 88154 457f66 87 API calls __write_nolock 88145->88154 88155 472f47 127 API calls 88145->88155 88148->88145 88149->87843 88150->87846 88151->88145 88152->88145 88153->88145 88154->88145 88155->88145 88156->88130 88157->88130 88160->87862 88161->87865 88162->87882 88163->87883 88164->87869 88165->87885 88166->87916 88167->87885 88168->87918 88169->87885 88170->87918 88171->87899 88172->87918 88173->87903 88174->87918 88175->87918 88176->87897 88178 4289d2 88177->88178 88179 408db3 88177->88179 88207 45e737 90 API calls 3 library calls 88178->88207 88205 40bec0 90 API calls 88179->88205 88182 4289e5 88208 45e737 90 API calls 3 library calls 88182->88208 88183 408e5a 88183->87923 88186 428a05 88187 408f40 VariantClear 88186->88187 88187->88183 88188 40a780 192 API calls 88190 408dc9 88188->88190 88189 408e64 88191 408f40 VariantClear 88189->88191 88190->88182 88190->88183 88190->88186 88190->88188 88190->88189 88192 408f40 VariantClear 88190->88192 88206 40ba10 52 API calls 2 library calls 88190->88206 88191->88183 88192->88190 88194 408f40 VariantClear 88193->88194 88195 403d20 88194->88195 88196 403cd0 VariantClear 88195->88196 88197 403d4d 88196->88197 88209 45e17d 88197->88209 88219 4755ad 88197->88219 88222 467897 88197->88222 88266 46e91c 88197->88266 88198 403d76 88198->87921 88198->87932 88203->87921 88204->87924 88205->88190 88206->88190 88207->88182 88208->88186 88210 45e198 88209->88210 88211 45e19c 88210->88211 88212 45e1b8 88210->88212 88213 408f40 VariantClear 88211->88213 88214 45e1cc 88212->88214 88215 45e1db FindClose 88212->88215 88216 45e1a4 88213->88216 88218 45e1d9 ctype 88214->88218 88269 44ae3e 88214->88269 88215->88218 88216->88198 88218->88198 88284 475077 88219->88284 88221 4755c0 88221->88198 88223 4678bb 88222->88223 88224 467954 88223->88224 88400 45340c 85 API calls 88223->88400 88225 4115d7 52 API calls 88224->88225 88257 467964 88224->88257 88226 467989 88225->88226 88228 467995 88226->88228 88404 40da60 53 API calls 88226->88404 88232 4533eb 85 API calls 88228->88232 88229 4678f6 88231 413a0e __wsplitpath 46 API calls 88229->88231 88233 4678fc 88231->88233 88234 4679b7 88232->88234 88235 401b10 52 API calls 88233->88235 88388 40de40 88234->88388 88236 46790c 88235->88236 88401 40d200 52 API calls 2 library calls 88236->88401 88242 467917 88242->88224 88402 4339fa GetFileAttributesW FindFirstFileW FindClose 88242->88402 88250 467928 88250->88224 88255 46792f 88250->88255 88403 4335cd 56 API calls 3 library calls 88255->88403 88257->88198 88262 467939 88262->88224 88264 408f40 VariantClear 88262->88264 88265 467947 88264->88265 88265->88224 88418 46e785 88266->88418 88268 46e92f 88268->88198 88271 44ae4b ctype 88269->88271 88272 443fdf 88269->88272 88271->88218 88277 40da20 88272->88277 88274 443feb 88281 4340db 88274->88281 88276 444001 88276->88271 88278 40da37 88277->88278 88279 40da29 88277->88279 88278->88279 88280 40da3c CloseHandle 88278->88280 88279->88274 88280->88274 88282 40da20 CloseHandle 88281->88282 88283 4340e7 ctype 88282->88283 88283->88276 88335 4533eb 88284->88335 88287 4750ee 88290 408f40 VariantClear 88287->88290 88288 475129 88339 4646e0 88288->88339 88295 4750f5 88290->88295 88291 47515e 88292 475162 88291->88292 88319 47518e 88291->88319 88293 408f40 VariantClear 88292->88293 88316 475169 88293->88316 88294 475357 88296 475365 88294->88296 88297 4754ea 88294->88297 88295->88221 88373 44b3ac 57 API calls 88296->88373 88379 464812 91 API calls 88297->88379 88301 4754fc 88302 475374 88301->88302 88304 475508 88301->88304 88352 430d31 88302->88352 88303 4533eb 85 API calls 88303->88319 88305 408f40 VariantClear 88304->88305 88308 47550f 88305->88308 88308->88316 88309 475388 88312 475480 88314 408f40 VariantClear 88312->88314 88314->88316 88316->88221 88319->88294 88319->88303 88319->88312 88324 4754b5 88319->88324 88371 436299 52 API calls 2 library calls 88319->88371 88372 463ad5 64 API calls __wcsicoll 88319->88372 88325 408f40 VariantClear 88324->88325 88325->88316 88336 453404 88335->88336 88337 4533f8 88335->88337 88336->88287 88336->88288 88337->88336 88382 4531b1 85 API calls 5 library calls 88337->88382 88383 4536f7 53 API calls 88339->88383 88341 4646fc 88384 4426cd 59 API calls _wcslen 88341->88384 88343 464711 88345 40bc70 52 API calls 88343->88345 88351 46474b 88343->88351 88346 46472c 88345->88346 88385 461465 52 API calls _memmove 88346->88385 88348 464741 88349 40c600 52 API calls 88348->88349 88349->88351 88350 464793 88350->88291 88351->88350 88386 463ad5 64 API calls __wcsicoll 88351->88386 88353 430db2 88352->88353 88354 430d54 88352->88354 88353->88309 88371->88319 88372->88319 88373->88302 88379->88301 88382->88336 88383->88341 88384->88343 88385->88348 88386->88350 88389 40da20 CloseHandle 88388->88389 88390 40de4e 88389->88390 88406 40f110 88390->88406 88393 4264fa 88395 40de84 88415 40e080 SetFilePointerEx SetFilePointerEx 88395->88415 88397 40de8b 88416 40f160 SetFilePointerEx SetFilePointerEx WriteFile 88397->88416 88399 40de90 88400->88229 88401->88242 88402->88250 88403->88262 88404->88228 88407 40f125 CreateFileW 88406->88407 88408 42630c 88406->88408 88410 40de74 88407->88410 88409 426311 CreateFileW 88408->88409 88408->88410 88409->88410 88411 426337 88409->88411 88410->88393 88414 40dea0 55 API calls ctype 88410->88414 88417 40df90 SetFilePointerEx SetFilePointerEx 88411->88417 88413 426342 88413->88410 88414->88395 88415->88397 88416->88399 88417->88413 88419 46e7a2 88418->88419 88420 4115d7 52 API calls 88419->88420 88423 46e802 88419->88423 88421 46e7ad 88420->88421 88422 46e7b9 88421->88422 88466 40da60 53 API calls 88421->88466 88427 4533eb 85 API calls 88422->88427 88424 46e7e5 88423->88424 88431 46e82f 88423->88431 88426 408f40 VariantClear 88424->88426 88428 46e7ea 88426->88428 88429 46e7ca 88427->88429 88428->88268 88432 40de40 60 API calls 88429->88432 88430 46e8b5 88459 4680ed 88430->88459 88431->88430 88434 46e845 88431->88434 88435 46e7d7 88432->88435 88437 4533eb 85 API calls 88434->88437 88435->88431 88438 46e7db 88435->88438 88436 46e8bb 88463 443fbe 88436->88463 88446 46e84b 88437->88446 88438->88424 88440 44ae3e CloseHandle 88438->88440 88439 46e87a 88467 4689f4 59 API calls 88439->88467 88440->88424 88443 46e883 88445 4013c0 52 API calls 88443->88445 88447 46e88f 88445->88447 88446->88439 88446->88443 88449 40e0a0 52 API calls 88447->88449 88448 408f40 VariantClear 88458 46e881 88448->88458 88450 46e899 88449->88450 88468 40d200 52 API calls 2 library calls 88450->88468 88452 46e911 88452->88268 88453 46e8a5 88469 4689f4 59 API calls 88453->88469 88454 40da20 CloseHandle 88456 46e903 88454->88456 88457 44ae3e CloseHandle 88456->88457 88457->88452 88458->88452 88458->88454 88460 468100 88459->88460 88461 4680fa 88459->88461 88460->88436 88470 467ac4 88461->88470 88493 443e36 88463->88493 88465 443fd3 88465->88448 88465->88458 88466->88422 88467->88458 88468->88453 88469->88458 88471 467bb8 88470->88471 88472 467adc 88470->88472 88471->88460 88473 467c1d 88472->88473 88474 467c16 88472->88474 88475 467b90 88472->88475 88484 467aed 88472->88484 88477 4115d7 52 API calls 88473->88477 88492 40e270 VariantClear ctype 88474->88492 88478 4115d7 52 API calls 88475->88478 88489 467b75 _memmove 88477->88489 88478->88489 88479 467b55 88481 4115d7 52 API calls 88479->88481 88480 4115d7 52 API calls 88480->88471 88482 467b5b 88481->88482 88490 442ee0 52 API calls 88482->88490 88485 4115d7 52 API calls 88484->88485 88488 467b28 ctype 88484->88488 88485->88488 88486 467b6b 88491 45f645 54 API calls ctype 88486->88491 88488->88473 88488->88479 88488->88489 88489->88480 88490->88486 88491->88489 88492->88473 88496 443e19 88493->88496 88497 443e26 88496->88497 88498 443e32 WriteFile 88496->88498 88499 443db4 SetFilePointerEx SetFilePointerEx 88497->88499 88498->88465 88499->88498 88500->87942 88501->88038 88502->87955 88503->88005 88504->88067 88505->88005 88506->88005 88507->87974 88508->88000 88509->87966 88510->87970 88511->87975 88512->88032 88513->88032 88514->88032 88515->87988 88516->88007 88517->87993 88518->88025 88519->88045 88520->88045 88521->88038 88522->88049 88523->88064 88524->88057 88525->88062 88526->88070 88527->88070 88528->88007 88529->87960 88530 42d154 88534 480a8d 88530->88534 88532 42d161 88533 480a8d 192 API calls 88532->88533 88533->88532 88535 480ae4 88534->88535 88536 480b26 88534->88536 88537 480aeb 88535->88537 88538 480b15 88535->88538 88539 40bc70 52 API calls 88536->88539 88540 480aee 88537->88540 88541 480b04 88537->88541 88567 4805bf 192 API calls 88538->88567 88563 480b2e 88539->88563 88540->88536 88543 480af3 88540->88543 88566 47fea2 192 API calls __itow_s 88541->88566 88565 47f135 192 API calls 88543->88565 88546 40e0a0 52 API calls 88546->88563 88548 408f40 VariantClear 88550 481156 88548->88550 88549 480aff 88549->88548 88551 408f40 VariantClear 88550->88551 88552 48115e 88551->88552 88552->88532 88553 480ff5 88573 45e737 90 API calls 3 library calls 88553->88573 88554 40e710 53 API calls 88554->88563 88555 401980 53 API calls 88555->88563 88557 40c2c0 52 API calls 88557->88563 88558 408e80 VariantClear 88558->88563 88559 40a780 192 API calls 88559->88563 88563->88546 88563->88549 88563->88553 88563->88554 88563->88555 88563->88557 88563->88558 88563->88559 88568 45377f 52 API calls 88563->88568 88569 45e951 53 API calls 88563->88569 88570 40e830 53 API calls 88563->88570 88571 47925f 53 API calls 88563->88571 88572 47fcff 192 API calls 88563->88572 88565->88549 88566->88549 88567->88549 88568->88563 88569->88563 88570->88563 88571->88563 88572->88563 88573->88549 88574 3f857c0 88588 3f83410 88574->88588 88576 3f85856 88591 3f856b0 88576->88591 88594 3f86880 GetPEB 88588->88594 88590 3f83a9b 88590->88576 88592 3f856b9 Sleep 88591->88592 88593 3f856c7 88592->88593 88595 3f868aa 88594->88595 88595->88590 88596 42b14b 88603 40bc10 88596->88603 88598 42b159 88599 4096a0 329 API calls 88598->88599 88600 42b177 88599->88600 88614 44b92d VariantClear 88600->88614 88602 42bc5b 88604 40bc24 88603->88604 88605 40bc17 88603->88605 88607 40bc2a 88604->88607 88608 40bc3c 88604->88608 88606 408e80 VariantClear 88605->88606 88610 40bc1f 88606->88610 88611 408e80 VariantClear 88607->88611 88609 4115d7 52 API calls 88608->88609 88612 40bc43 88609->88612 88610->88598 88613 40bc33 88611->88613 88612->88598 88613->88598 88614->88602 88615 425b2b 88620 40f000 88615->88620 88619 425b3a 88621 4115d7 52 API calls 88620->88621 88622 40f007 88621->88622 88623 4276ea 88622->88623 88629 40f030 88622->88629 88628 41130a 51 API calls __cinit 88628->88619 88630 40f039 88629->88630 88631 40f01a 88629->88631 88659 41130a 51 API calls __cinit 88630->88659 88633 40e500 88631->88633 88634 40bc70 52 API calls 88633->88634 88635 40e515 GetVersionExW 88634->88635 88636 402160 52 API calls 88635->88636 88637 40e557 88636->88637 88660 40e660 88637->88660 88642 427674 88646 4276c6 GetSystemInfo 88642->88646 88645 40e5cd GetCurrentProcess 88681 40ef20 LoadLibraryA GetProcAddress 88645->88681 88649 4276d5 GetSystemInfo 88646->88649 88648 40e5e0 88648->88649 88674 40efd0 88648->88674 88652 40e629 88678 40ef90 88652->88678 88655 40e641 FreeLibrary 88656 40e644 88655->88656 88657 40e653 FreeLibrary 88656->88657 88658 40e656 88656->88658 88657->88658 88658->88628 88659->88631 88661 40e667 88660->88661 88662 42761d 88661->88662 88663 40c600 52 API calls 88661->88663 88664 40e55c 88663->88664 88665 40e680 88664->88665 88666 40e687 88665->88666 88667 427616 88666->88667 88668 40c600 52 API calls 88666->88668 88669 40e566 88668->88669 88669->88642 88670 40ef60 88669->88670 88671 40e5c8 88670->88671 88672 40ef66 LoadLibraryA 88670->88672 88671->88645 88671->88648 88672->88671 88673 40ef77 GetProcAddress 88672->88673 88673->88671 88675 40e620 88674->88675 88676 40efd6 LoadLibraryA 88674->88676 88675->88646 88675->88652 88676->88675 88677 40efe7 GetProcAddress 88676->88677 88677->88675 88682 40efb0 LoadLibraryA GetProcAddress 88678->88682 88680 40e632 GetNativeSystemInfo 88680->88655 88680->88656 88681->88648 88682->88680 88683 425b5e 88688 40c7f0 88683->88688 88687 425b6d 88723 40db10 52 API calls 88688->88723 88690 40c82a 88724 410ab0 6 API calls 88690->88724 88692 40c86d 88693 40bc70 52 API calls 88692->88693 88694 40c877 88693->88694 88695 40bc70 52 API calls 88694->88695 88696 40c881 88695->88696 88697 40bc70 52 API calls 88696->88697 88698 40c88b 88697->88698 88699 40bc70 52 API calls 88698->88699 88700 40c8d1 88699->88700 88701 40bc70 52 API calls 88700->88701 88702 40c991 88701->88702 88725 40d2c0 52 API calls 88702->88725 88704 40c99b 88726 40d0d0 53 API calls 88704->88726 88706 40c9c1 88707 40bc70 52 API calls 88706->88707 88708 40c9cb 88707->88708 88727 40e310 53 API calls 88708->88727 88710 40ca28 88711 408f40 VariantClear 88710->88711 88712 40ca30 88711->88712 88713 408f40 VariantClear 88712->88713 88714 40ca38 GetStdHandle 88713->88714 88715 429630 88714->88715 88716 40ca87 88714->88716 88715->88716 88717 429639 88715->88717 88722 41130a 51 API calls __cinit 88716->88722 88728 4432c0 57 API calls 88717->88728 88719 429641 88729 44b6ab CreateThread 88719->88729 88721 42964f CloseHandle 88721->88716 88722->88687 88723->88690 88724->88692 88725->88704 88726->88706 88727->88710 88728->88719 88729->88721 88730 44b5cb 58 API calls 88729->88730 88731 425b6f 88736 40dc90 88731->88736 88735 425b7e 88737 40bc70 52 API calls 88736->88737 88738 40dd03 88737->88738 88745 40f210 88738->88745 88740 426a97 88742 40dd96 88742->88740 88743 40ddb7 88742->88743 88748 40dc00 52 API calls 2 library calls 88742->88748 88744 41130a 51 API calls __cinit 88743->88744 88744->88735 88749 40f250 RegOpenKeyExW 88745->88749 88747 40f230 88747->88742 88748->88742 88750 425e17 88749->88750 88751 40f275 RegQueryValueExW 88749->88751 88750->88747 88752 40f2c3 RegCloseKey 88751->88752 88753 40f298 88751->88753 88752->88747 88754 40f2a9 RegCloseKey 88753->88754 88755 425e1d 88753->88755 88754->88747
                              APIs
                              • _wcslen.LIBCMT ref: 004096C1
                                • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                              • _memmove.LIBCMT ref: 0040970C
                                • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                                • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                                • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                              • CharUpperBuffW.USER32(?,?,?,?,?,?,?,00000000), ref: 00409753
                              • _memmove.LIBCMT ref: 00409D96
                              • _memmove.LIBCMT ref: 0040A6C4
                              • _memmove.LIBCMT ref: 004297E5
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: _memmove$std::exception::exception$BuffCharException@8ThrowUpper_malloc_wcslen
                              • String ID:
                              • API String ID: 2383988440-0
                              • Opcode ID: 0c7f704c1111840706a6f5d41559473282fc5ae19e9abcecf6c32e7dc2e8fb44
                              • Instruction ID: 3262ed4b583d717621f118bf118656dde374edbe3d76219253c131e703a2432c
                              • Opcode Fuzzy Hash: 0c7f704c1111840706a6f5d41559473282fc5ae19e9abcecf6c32e7dc2e8fb44
                              • Instruction Fuzzy Hash: CD13BF706043109FD724DF25D480A2BB7E1BF89304F54896EE8869B392D739EC56CB9B

                              Control-flow Graph

                              APIs
                              • GetCurrentDirectoryW.KERNEL32(00000104,?), ref: 0040D5AA
                                • Part of subcall function 00401F20: GetModuleFileNameW.KERNEL32(00000000,004A7F6C,00000104,?), ref: 00401F4C
                                • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 00402007
                                • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 0040201D
                                • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 00402033
                                • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 00402049
                                • Part of subcall function 00401F20: _wcscpy.LIBCMT ref: 0040207C
                              • IsDebuggerPresent.KERNEL32 ref: 0040D5B6
                              • GetFullPathNameW.KERNEL32(004A7F6C,00000104,?,004A7F50,004A7F54), ref: 0040D625
                                • Part of subcall function 00401460: GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 004014A5
                              • SetCurrentDirectoryW.KERNEL32(?,00000001), ref: 0040D699
                              • MessageBoxA.USER32(00000000,This is a compiled AutoIt script. AV researchers please email avsupport@autoitscript.com for support.,00484C92,00000010), ref: 0042E1C9
                              • SetCurrentDirectoryW.KERNEL32(?), ref: 0042E238
                              • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 0042E268
                              • GetForegroundWindow.USER32(runas,?,?,?,00000001), ref: 0042E2B2
                              • ShellExecuteW.SHELL32(00000000), ref: 0042E2B9
                                • Part of subcall function 00410390: GetSysColorBrush.USER32(0000000F), ref: 0041039B
                                • Part of subcall function 00410390: LoadCursorW.USER32(00000000,00007F00), ref: 004103AA
                                • Part of subcall function 00410390: LoadIconW.USER32(?,00000063), ref: 004103C0
                                • Part of subcall function 00410390: LoadIconW.USER32(?,000000A4), ref: 004103D3
                                • Part of subcall function 00410390: LoadIconW.USER32(?,000000A2), ref: 004103E6
                                • Part of subcall function 00410390: LoadImageW.USER32(?,00000063,00000001,00000010,00000010,00000000), ref: 0041040E
                                • Part of subcall function 00410390: RegisterClassExW.USER32(?), ref: 0041045D
                                • Part of subcall function 00410570: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,?,00000000), ref: 004105A5
                                • Part of subcall function 00410570: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,?,00000000), ref: 004105CE
                                • Part of subcall function 00410570: ShowWindow.USER32(?,00000000), ref: 004105E4
                                • Part of subcall function 00410570: ShowWindow.USER32(?,00000000), ref: 004105EE
                                • Part of subcall function 0040E0C0: Shell_NotifyIconW.SHELL32(00000000,?), ref: 0040E1A7
                              Strings
                              • runas, xrefs: 0042E2AD, 0042E2DC
                              • This is a compiled AutoIt script. AV researchers please email avsupport@autoitscript.com for support., xrefs: 0042E1C2
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: LoadWindow$IconName__wcsicoll$CurrentDirectory$CreateFileFullModulePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__wcscpy
                              • String ID: This is a compiled AutoIt script. AV researchers please email avsupport@autoitscript.com for support.$runas
                              • API String ID: 2495805114-3383388033
                              • Opcode ID: a40813cb8be74a7845095afbf10676f30eabccecee99da57b5cbcca8d29a6aad
                              • Instruction ID: d8104b1e62918721d1641daf81013a976a0e8d4b3b5b72af0edf1e1af392be53
                              • Opcode Fuzzy Hash: a40813cb8be74a7845095afbf10676f30eabccecee99da57b5cbcca8d29a6aad
                              • Instruction Fuzzy Hash: A3513B71A48201AFD710B7E1AC45BEE3B689B59714F4049BFF905672D2CBBC4A88C72D

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1904 40e500-40e57c call 40bc70 GetVersionExW call 402160 call 40e660 call 40e680 1913 40e582-40e583 1904->1913 1914 427674-427679 1904->1914 1917 40e585-40e596 1913->1917 1918 40e5ba-40e5cb call 40ef60 1913->1918 1915 427683-427686 1914->1915 1916 42767b-427681 1914->1916 1921 427693-427696 1915->1921 1922 427688-427691 1915->1922 1920 4276b4-4276be 1916->1920 1923 427625-427629 1917->1923 1924 40e59c-40e59f 1917->1924 1935 40e5ec-40e60c 1918->1935 1936 40e5cd-40e5e6 GetCurrentProcess call 40ef20 1918->1936 1937 4276c6-4276ca GetSystemInfo 1920->1937 1921->1920 1925 427698-4276a8 1921->1925 1922->1920 1927 427636-427640 1923->1927 1928 42762b-427631 1923->1928 1929 40e5a5-40e5ae 1924->1929 1930 427654-427657 1924->1930 1933 4276b0 1925->1933 1934 4276aa-4276ae 1925->1934 1927->1918 1928->1918 1931 40e5b4 1929->1931 1932 427645-42764f 1929->1932 1930->1918 1938 42765d-42766f 1930->1938 1931->1918 1932->1918 1933->1920 1934->1920 1940 40e612-40e623 call 40efd0 1935->1940 1941 4276d5-4276df GetSystemInfo 1935->1941 1936->1935 1947 40e5e8 1936->1947 1937->1941 1938->1918 1940->1937 1946 40e629-40e63f call 40ef90 GetNativeSystemInfo 1940->1946 1950 40e641-40e642 FreeLibrary 1946->1950 1951 40e644-40e651 1946->1951 1947->1935 1950->1951 1952 40e653-40e654 FreeLibrary 1951->1952 1953 40e656-40e65d 1951->1953 1952->1953
                              APIs
                              • GetVersionExW.KERNEL32(?), ref: 0040E52A
                                • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                              • GetCurrentProcess.KERNEL32(?), ref: 0040E5D4
                              • GetNativeSystemInfo.KERNELBASE(?), ref: 0040E632
                              • FreeLibrary.KERNEL32(?), ref: 0040E642
                              • FreeLibrary.KERNEL32(?), ref: 0040E654
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: FreeLibrary$CurrentInfoNativeProcessSystemVersion_memmove_wcslen
                              • String ID: 0SH$ou
                              • API String ID: 3363477735-1412203762
                              • Opcode ID: f8f98c37c4406a4215dc85d7f2641c0e713eb1a411c42a342b42510fc6581298
                              • Instruction ID: 6dc39e8e7f592ebea2fdbb3e4710260bd4e3e134fe0a85e77c096ec086c2d55c
                              • Opcode Fuzzy Hash: f8f98c37c4406a4215dc85d7f2641c0e713eb1a411c42a342b42510fc6581298
                              • Instruction Fuzzy Hash: E361C170908656EECB10CFA9D84429DFBB0BF19308F54496ED404A3B42D379E969CB9A
                              APIs
                              • LoadLibraryA.KERNELBASE(uxtheme.dll,0040EBB5,0040D72E), ref: 0040EBDB
                              • GetProcAddress.KERNEL32(00000000,IsThemeActive), ref: 0040EBED
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: AddressLibraryLoadProc
                              • String ID: IsThemeActive$uxtheme.dll
                              • API String ID: 2574300362-3542929980
                              • Opcode ID: d24d5e89e243abfb53b7c80675e6652b9f125c078b3c3d01997506936a79e34d
                              • Instruction ID: d0aec1e7cdd3fc231052cfb2f432bc7d0e698e699ac1f50efe2d89ca8b78c0bc
                              • Opcode Fuzzy Hash: d24d5e89e243abfb53b7c80675e6652b9f125c078b3c3d01997506936a79e34d
                              • Instruction Fuzzy Hash: D6D0C7B49407039AD7305F71C91871B76E47B50751F104C3DF946A1294DB7CD040D768
                              APIs
                              • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 0040D779
                              • FreeLibrary.KERNEL32(?), ref: 0040D78E
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: FreeInfoLibraryParametersSystem
                              • String ID: ou
                              • API String ID: 3403648963-3837949563
                              • Opcode ID: 1bcd72a0122d59f5f1ef4a441970033eb21b1c6439336685a4482ae7c853bb59
                              • Instruction ID: 5fcdf068f8d8459ddaa7ea8882eac3df2259875866eaebb33036fc29c92b3e87
                              • Opcode Fuzzy Hash: 1bcd72a0122d59f5f1ef4a441970033eb21b1c6439336685a4482ae7c853bb59
                              • Instruction Fuzzy Hash: BB2184719083019FC300DF5ADC8190ABBE4FB84358F40493FF988A7392D735D9458B9A
                              APIs
                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00409266
                              • Sleep.KERNEL32(0000000A,?), ref: 004094D1
                              • TranslateMessage.USER32(?), ref: 00409556
                              • DispatchMessageW.USER32(?), ref: 00409561
                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00409574
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: Message$Peek$DispatchSleepTranslate
                              • String ID: @GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE
                              • API String ID: 1762048999-758534266
                              • Opcode ID: 23d079a985ba2b1b40b9133d067a4c416b55a71ed9da253c2d941bd9d0d29544
                              • Instruction ID: 6221a9036d09df45d33125ba93b856da71e554157a22c4cdc10a0b2ba1356448
                              • Opcode Fuzzy Hash: 23d079a985ba2b1b40b9133d067a4c416b55a71ed9da253c2d941bd9d0d29544
                              • Instruction Fuzzy Hash: EF62E370608341AFD724DF25C884BABF7A4BF85304F14492FF94597292D778AC89CB9A

                              Control-flow Graph

                              APIs
                              • GetModuleFileNameW.KERNEL32(00000000,004A7F6C,00000104,?), ref: 00401F4C
                                • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                              • __wcsicoll.LIBCMT ref: 00402007
                              • __wcsicoll.LIBCMT ref: 0040201D
                              • __wcsicoll.LIBCMT ref: 00402033
                                • Part of subcall function 004114AB: __wcsicmp_l.LIBCMT ref: 0041152B
                              • __wcsicoll.LIBCMT ref: 00402049
                              • _wcscpy.LIBCMT ref: 0040207C
                              • GetModuleFileNameW.KERNEL32(00000000,004A7F6C,00000104), ref: 00428B5B
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: __wcsicoll$FileModuleName$__wcsicmp_l_memmove_wcscpy_wcslen
                              • String ID: /AutoIt3ExecuteLine$/AutoIt3ExecuteScript$/AutoIt3OutputDebug$/ErrorStdOut$CMDLINE$CMDLINERAW
                              • API String ID: 3948761352-1609664196
                              • Opcode ID: de7630e39462d0d30620e5d386b824db2ab2692deedf796b652438eb031e1025
                              • Instruction ID: a67d1fff980de619c7b08a01c822048bbc87f212fdb5160913ca6de555091b2a
                              • Opcode Fuzzy Hash: de7630e39462d0d30620e5d386b824db2ab2692deedf796b652438eb031e1025
                              • Instruction Fuzzy Hash: 0E718571D0021A9ACB10EBA1DD456EE7774AF54308F40843FF905772D1EBBC6A49CB99

                              Control-flow Graph

                              APIs
                                • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                              • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 0040E3FF
                              • __wsplitpath.LIBCMT ref: 0040E41C
                                • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
                              • _wcsncat.LIBCMT ref: 0040E433
                              • __wmakepath.LIBCMT ref: 0040E44F
                                • Part of subcall function 00413A9E: __wmakepath_s.LIBCMT ref: 00413AB4
                                • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                                • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                                • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                              • _wcscpy.LIBCMT ref: 0040E487
                                • Part of subcall function 0040E4C0: RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,?,?,0040E4A1), ref: 0040E4DD
                              • _wcscat.LIBCMT ref: 00427541
                              • _wcslen.LIBCMT ref: 00427551
                              • _wcslen.LIBCMT ref: 00427562
                              • _wcscat.LIBCMT ref: 0042757C
                              • _wcsncpy.LIBCMT ref: 004275BC
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: _wcscat_wcslenstd::exception::exception$Exception@8FileModuleNameOpenThrow__wmakepath__wmakepath_s__wsplitpath__wsplitpath_helper_malloc_wcscpy_wcsncat_wcsncpy
                              • String ID: Include$\
                              • API String ID: 3173733714-3429789819
                              • Opcode ID: 319b33b76db705e9c7f26a1fcfbfbea2712403a0e0e393e117160b8853bc2a6c
                              • Instruction ID: e70d120923bcd55e0c09bdb97153e7c20ea4c8242d515b2096525f9594b4aeca
                              • Opcode Fuzzy Hash: 319b33b76db705e9c7f26a1fcfbfbea2712403a0e0e393e117160b8853bc2a6c
                              • Instruction Fuzzy Hash: 9851DAB1504301ABE314EF66DC8589BBBE4FB8D304F40493EF589972A1E7749944CB5E

                              Control-flow Graph

                              APIs
                              • _fseek.LIBCMT ref: 0045292B
                                • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045273E
                                • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452780
                                • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045279E
                                • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 004527D2
                                • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 004527E2
                                • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452800
                                • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 00452831
                              • __fread_nolock.LIBCMT ref: 00452961
                              • __fread_nolock.LIBCMT ref: 00452971
                              • __fread_nolock.LIBCMT ref: 0045298A
                              • __fread_nolock.LIBCMT ref: 004529A5
                              • _fseek.LIBCMT ref: 004529BF
                              • _malloc.LIBCMT ref: 004529CA
                              • _malloc.LIBCMT ref: 004529D6
                              • __fread_nolock.LIBCMT ref: 004529E7
                              • _free.LIBCMT ref: 00452A17
                              • _free.LIBCMT ref: 00452A20
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: __fread_nolock$_free_fseek_malloc_wcscpy
                              • String ID:
                              • API String ID: 1255752989-0
                              • Opcode ID: 3f43f4209565cf9930803292f55859f81113a3883ec0e7be7bac3bff720706a2
                              • Instruction ID: f7ea06a446360153d9086f7ce944ba4ee1a7a4a6ab52c1fb03413739877f8e55
                              • Opcode Fuzzy Hash: 3f43f4209565cf9930803292f55859f81113a3883ec0e7be7bac3bff720706a2
                              • Instruction Fuzzy Hash: B95111F1900218AFDB60DF65DC81B9A77B9EF88304F0085AEF50CD7241E675AA84CF59

                              Control-flow Graph

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: __fread_nolock$_fseek_wcscpy
                              • String ID: FILE
                              • API String ID: 3888824918-3121273764
                              • Opcode ID: b4a6abdb64f38c8defcee882be961308622b799a5cba7293a02d79de09a932e7
                              • Instruction ID: d9efd4ed024b2b159ad8c10c4a9bf0fd337e36d0f3dc2ca46923192c63d65648
                              • Opcode Fuzzy Hash: b4a6abdb64f38c8defcee882be961308622b799a5cba7293a02d79de09a932e7
                              • Instruction Fuzzy Hash: DC4196B2910204BBEB20EBD5DC81FEF7379AF88704F14455EFA0497281F6799684CBA5

                              Control-flow Graph

                              APIs
                              • GetSysColorBrush.USER32(0000000F), ref: 004104C3
                              • RegisterClassExW.USER32(00000030), ref: 004104ED
                              • RegisterClipboardFormatW.USER32(TaskbarCreated), ref: 004104FE
                              • 6F0C33E0.COMCTL32(004A90E8), ref: 0041051B
                              • 6F0D2980.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 0041052B
                              • LoadIconW.USER32(00400000,000000A9), ref: 00410542
                              • 6F0CC400.COMCTL32(009F23A8,000000FF,00000000), ref: 00410552
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: Register$BrushC400ClassClipboardColorD2980FormatIconLoad
                              • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                              • API String ID: 3456339390-1005189915
                              • Opcode ID: d6ae890ac616c70b0adde597a8f502ff5fb08519606e77913bb64844803ac3e9
                              • Instruction ID: 324008788ca11066222c16167fc5b3db855b21205033cf9bff29629ff6c43806
                              • Opcode Fuzzy Hash: d6ae890ac616c70b0adde597a8f502ff5fb08519606e77913bb64844803ac3e9
                              • Instruction Fuzzy Hash: 6221F7B1900218AFDB40DFA4E988B9DBFB4FB09710F10862EFA15A6390D7B40544CF99

                              Control-flow Graph

                              APIs
                              • GetSysColorBrush.USER32(0000000F), ref: 0041039B
                              • LoadCursorW.USER32(00000000,00007F00), ref: 004103AA
                              • LoadIconW.USER32(?,00000063), ref: 004103C0
                              • LoadIconW.USER32(?,000000A4), ref: 004103D3
                              • LoadIconW.USER32(?,000000A2), ref: 004103E6
                              • LoadImageW.USER32(?,00000063,00000001,00000010,00000010,00000000), ref: 0041040E
                              • RegisterClassExW.USER32(?), ref: 0041045D
                                • Part of subcall function 00410490: GetSysColorBrush.USER32(0000000F), ref: 004104C3
                                • Part of subcall function 00410490: RegisterClassExW.USER32(00000030), ref: 004104ED
                                • Part of subcall function 00410490: RegisterClipboardFormatW.USER32(TaskbarCreated), ref: 004104FE
                                • Part of subcall function 00410490: 6F0C33E0.COMCTL32(004A90E8), ref: 0041051B
                                • Part of subcall function 00410490: 6F0D2980.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 0041052B
                                • Part of subcall function 00410490: LoadIconW.USER32(00400000,000000A9), ref: 00410542
                                • Part of subcall function 00410490: 6F0CC400.COMCTL32(009F23A8,000000FF,00000000), ref: 00410552
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: Load$Icon$Register$BrushClassColor$C400ClipboardCursorD2980FormatImage
                              • String ID: #$0$AutoIt v3
                              • API String ID: 1393848302-4155596026
                              • Opcode ID: c82d51e411665b6a3a3e76d1a8d87b49acf25a0f72c8993ed2556b78267af7e8
                              • Instruction ID: fa3beea58d24b169a793a749875a715f65b9999dd8e8f54869ce90ead7ff89b0
                              • Opcode Fuzzy Hash: c82d51e411665b6a3a3e76d1a8d87b49acf25a0f72c8993ed2556b78267af7e8
                              • Instruction Fuzzy Hash: 31212AB1E55214AFD720DFA9ED45B9EBBB8BB4C700F00447AFA08A7290D7B559408B98
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: _malloc
                              • String ID: Default
                              • API String ID: 1579825452-753088835
                              • Opcode ID: 443df2c3c68efbd16d3948df002b7be0acb455de1234585f427717e2e3840c69
                              • Instruction ID: a673259d86369fb9501a746496732cc59a2062e12c9a0651055f0cdb6904a52b
                              • Opcode Fuzzy Hash: 443df2c3c68efbd16d3948df002b7be0acb455de1234585f427717e2e3840c69
                              • Instruction Fuzzy Hash: 13729DB06043019FD714DF25D481A2BB7E5EF85314F14882EE986AB391D738EC56CB9B

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1954 40f5c0-40f5cf call 422240 1957 40f5d0-40f5e8 1954->1957 1957->1957 1958 40f5ea-40f613 call 413650 call 410e60 1957->1958 1963 40f614-40f633 call 414d04 1958->1963 1966 40f691 1963->1966 1967 40f635-40f63c 1963->1967 1968 40f696-40f69c 1966->1968 1969 40f660-40f674 call 4150d1 1967->1969 1970 40f63e 1967->1970 1974 40f679-40f67c 1969->1974 1971 40f640 1970->1971 1973 40f642-40f650 1971->1973 1975 40f652-40f655 1973->1975 1976 40f67e-40f68c 1973->1976 1974->1963 1979 40f65b-40f65e 1975->1979 1980 425d1e-425d3e call 4150d1 call 414d04 1975->1980 1977 40f68e-40f68f 1976->1977 1978 40f69f-40f6ad 1976->1978 1977->1975 1981 40f6b4-40f6c2 1978->1981 1982 40f6af-40f6b2 1978->1982 1979->1969 1979->1971 1990 425d43-425d5f call 414d30 1980->1990 1985 425d16 1981->1985 1986 40f6c8-40f6d6 1981->1986 1982->1975 1985->1980 1988 425d05-425d0b 1986->1988 1989 40f6dc-40f6df 1986->1989 1988->1973 1991 425d11 1988->1991 1989->1975 1990->1968 1991->1985
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: __fread_nolock_fseek_memmove_strcat
                              • String ID: AU3!$EA06
                              • API String ID: 1268643489-2658333250
                              • Opcode ID: 344840b9fdfdbe4b30e8dbd48a4dc96b4183e4050995daab1dbb295d1862c352
                              • Instruction ID: 581a58983a44a30c9dde9fea67fd4d6d070b0eb534c71953d0d39c84ae2506d9
                              • Opcode Fuzzy Hash: 344840b9fdfdbe4b30e8dbd48a4dc96b4183e4050995daab1dbb295d1862c352
                              • Instruction Fuzzy Hash: A541EF3160414CABCB21DF64D891FFD3B749B15304F2808BFF581A7692EA79A58AC754

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1994 401100-401111 1995 401113-401119 1994->1995 1996 401179-401180 1994->1996 1998 401144-40114a 1995->1998 1999 40111b-40111e 1995->1999 1996->1995 1997 401182 1996->1997 2002 40112c-401141 73A346C0 1997->2002 2000 401184-40118e call 401250 1998->2000 2001 40114c-40114f 1998->2001 1999->1998 2003 401120-401126 1999->2003 2011 401193-40119a 2000->2011 2004 401151-401157 2001->2004 2005 40119d 2001->2005 2003->2002 2007 42b038-42b03f 2003->2007 2008 401219-40121f 2004->2008 2009 40115d 2004->2009 2012 4011a3-4011a9 2005->2012 2013 42afb4-42afc5 call 40f190 2005->2013 2007->2002 2010 42b045-42b059 call 401000 call 40e0c0 2007->2010 2008->2003 2016 401225-42b06d call 468b0e 2008->2016 2014 401163-401166 2009->2014 2015 42b01d-42b024 2009->2015 2010->2002 2012->2003 2019 4011af 2012->2019 2013->2011 2021 42afe9-42b018 call 40f190 call 401a50 2014->2021 2022 40116c-401172 2014->2022 2015->2002 2020 42b02a-42b033 call 4370f4 2015->2020 2016->2011 2019->2003 2026 4011b6-4011d8 KillTimer call 401000 PostQuitMessage 2019->2026 2027 4011db-401202 SetTimer RegisterClipboardFormatW 2019->2027 2020->2002 2021->2002 2022->2003 2031 401174-42afde call 45fd57 2022->2031 2027->2011 2029 401204-401216 CreatePopupMenu 2027->2029 2031->2002 2045 42afe4 2031->2045 2045->2011
                              APIs
                              • 73A346C0.USER32(?,?,?,?,?,?,?,004010F8,?,?,?), ref: 00401136
                              • KillTimer.USER32(?,00000001,?), ref: 004011B9
                              • PostQuitMessage.USER32(00000000), ref: 004011CB
                              • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 004011E5
                              • RegisterClipboardFormatW.USER32(TaskbarCreated), ref: 004011F0
                              • CreatePopupMenu.USER32 ref: 00401204
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: Timer$A346ClipboardCreateFormatKillMenuMessagePopupPostQuitRegister
                              • String ID: TaskbarCreated
                              • API String ID: 2241329557-2362178303
                              • Opcode ID: cce8c5a03ea04b09f31441a39b36d20ef7a6309a2ce36e618d98c5e601e7cd17
                              • Instruction ID: c871ea33cf18a3cc9178abcaf30b48d6b70312a550ef0fd47f6a389c1f0ea6f4
                              • Opcode Fuzzy Hash: cce8c5a03ea04b09f31441a39b36d20ef7a6309a2ce36e618d98c5e601e7cd17
                              • Instruction Fuzzy Hash: 1E417932B0420497DB28DB68EC85BBE3355E759320F10493FFA11AB6F1C67D9850879E

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 2046 4115d7-4115df 2047 4115ee-4115f9 call 4135bb 2046->2047 2050 4115e1-4115ec call 411988 2047->2050 2051 4115fb-4115fc 2047->2051 2050->2047 2054 4115fd-41160e 2050->2054 2055 411610-41163b call 417fc0 call 41130a 2054->2055 2056 41163c-411656 call 4180af call 418105 2054->2056 2055->2056
                              APIs
                              • _malloc.LIBCMT ref: 004115F1
                                • Part of subcall function 004135BB: __FF_MSGBANNER.LIBCMT ref: 004135D4
                                • Part of subcall function 004135BB: __NMSG_WRITE.LIBCMT ref: 004135DB
                                • Part of subcall function 004135BB: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,004115F6,?,00401BAC,?,?,?), ref: 00413600
                              • std::exception::exception.LIBCMT ref: 00411626
                              • std::exception::exception.LIBCMT ref: 00411640
                              • __CxxThrowException@8.LIBCMT ref: 00411651
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: std::exception::exception$AllocateException@8HeapThrow_malloc
                              • String ID: ,*H$4*H$@fI
                              • API String ID: 615853336-1459471987
                              • Opcode ID: 221d40d7984faa14442154e9f969528898a85ced6d82758f7c2d656e85d04d6d
                              • Instruction ID: 1677ae912bb9c86ef767233b76c14da205579da8f33ef274bedc9cd0e4e1b94c
                              • Opcode Fuzzy Hash: 221d40d7984faa14442154e9f969528898a85ced6d82758f7c2d656e85d04d6d
                              • Instruction Fuzzy Hash: C5F0F9716001196BCB24AB56DC01AEE7AA5AB40708F15002FF904951A1CBB98AC2875D

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 2065 3f859d0-3f85a7e call 3f83410 2068 3f85a85-3f85aab call 3f868e0 CreateFileW 2065->2068 2071 3f85aad 2068->2071 2072 3f85ab2-3f85ac2 2068->2072 2073 3f85bfd-3f85c01 2071->2073 2077 3f85ac9-3f85ae3 VirtualAlloc 2072->2077 2078 3f85ac4 2072->2078 2075 3f85c43-3f85c46 2073->2075 2076 3f85c03-3f85c07 2073->2076 2079 3f85c49-3f85c50 2075->2079 2080 3f85c09-3f85c0c 2076->2080 2081 3f85c13-3f85c17 2076->2081 2082 3f85aea-3f85b01 ReadFile 2077->2082 2083 3f85ae5 2077->2083 2078->2073 2084 3f85c52-3f85c5d 2079->2084 2085 3f85ca5-3f85cba 2079->2085 2080->2081 2086 3f85c19-3f85c23 2081->2086 2087 3f85c27-3f85c2b 2081->2087 2092 3f85b08-3f85b48 VirtualAlloc 2082->2092 2093 3f85b03 2082->2093 2083->2073 2094 3f85c5f 2084->2094 2095 3f85c61-3f85c6d 2084->2095 2088 3f85cca-3f85cd2 2085->2088 2089 3f85cbc-3f85cc7 VirtualFree 2085->2089 2086->2087 2090 3f85c3b 2087->2090 2091 3f85c2d-3f85c37 2087->2091 2089->2088 2090->2075 2091->2090 2096 3f85b4a 2092->2096 2097 3f85b4f-3f85b6a call 3f86b30 2092->2097 2093->2073 2094->2085 2098 3f85c6f-3f85c7f 2095->2098 2099 3f85c81-3f85c8d 2095->2099 2096->2073 2105 3f85b75-3f85b7f 2097->2105 2101 3f85ca3 2098->2101 2102 3f85c9a-3f85ca0 2099->2102 2103 3f85c8f-3f85c98 2099->2103 2101->2079 2102->2101 2103->2101 2106 3f85b81-3f85bb0 call 3f86b30 2105->2106 2107 3f85bb2-3f85bc6 call 3f86940 2105->2107 2106->2105 2113 3f85bc8 2107->2113 2114 3f85bca-3f85bce 2107->2114 2113->2073 2115 3f85bda-3f85bde 2114->2115 2116 3f85bd0-3f85bd4 CloseHandle 2114->2116 2117 3f85bee-3f85bf7 2115->2117 2118 3f85be0-3f85beb VirtualFree 2115->2118 2116->2115 2117->2068 2117->2073 2118->2117
                              APIs
                              • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 03F85AA1
                              • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 03F85CC7
                              Memory Dump Source
                              • Source File: 00000000.00000002.1348783565.0000000003F83000.00000040.00000020.00020000.00000000.sdmp, Offset: 03F83000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_3f83000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: CreateFileFreeVirtual
                              • String ID:
                              • API String ID: 204039940-0
                              • Opcode ID: ed516440ab75e0c1ded8a7b1870b24392b753ad5cf7d4aa929dd61e32643855c
                              • Instruction ID: 7fc1b90ccc7d6198128c1835fc688728c88bcf1ebd4d865b7fd90f758ebaf358
                              • Opcode Fuzzy Hash: ed516440ab75e0c1ded8a7b1870b24392b753ad5cf7d4aa929dd61e32643855c
                              • Instruction Fuzzy Hash: 23A11674E00209EBDB18DFA4C994BEEBBB5FF49304F248599E105BB280D7759A84CF94

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 2119 401250-40125c 2120 401262-401293 call 412f40 call 401b80 2119->2120 2121 4012e8-4012ed 2119->2121 2126 4012d1-4012e2 KillTimer SetTimer 2120->2126 2127 401295-4012b5 2120->2127 2126->2121 2128 4012bb-4012bf 2127->2128 2129 4272ec-4272f2 2127->2129 2130 4012c5-4012cb 2128->2130 2131 42733f-427346 2128->2131 2132 4272f4-427315 Shell_NotifyIconW 2129->2132 2133 42731a-42733a Shell_NotifyIconW 2129->2133 2130->2126 2134 427393-4273b4 Shell_NotifyIconW 2130->2134 2135 427348-427369 Shell_NotifyIconW 2131->2135 2136 42736e-42738e Shell_NotifyIconW 2131->2136 2132->2126 2133->2126 2134->2126 2135->2126 2136->2126
                              APIs
                                • Part of subcall function 00401B80: _wcsncpy.LIBCMT ref: 00401C41
                                • Part of subcall function 00401B80: _wcscpy.LIBCMT ref: 00401C5D
                                • Part of subcall function 00401B80: Shell_NotifyIconW.SHELL32(00000001,?), ref: 00401C6F
                              • KillTimer.USER32(?,?,?,?,?), ref: 004012D3
                              • SetTimer.USER32(?,?,000002EE,00000000), ref: 004012E2
                              • Shell_NotifyIconW.SHELL32(?,000003A8), ref: 0042730F
                              • Shell_NotifyIconW.SHELL32(?,000003A8), ref: 00427363
                              • Shell_NotifyIconW.SHELL32(?,000003A8), ref: 004273AE
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: IconNotifyShell_$Timer$Kill_wcscpy_wcsncpy
                              • String ID:
                              • API String ID: 3300667738-0
                              • Opcode ID: 4b14c7d07e087387f8a3c98a8cd4bd71866d27c85158e2001d1b6fa40e2d0dfa
                              • Instruction ID: ad6fff92b80ef16b1053521cf30c66606da497e43c90b6e238f917110e524b22
                              • Opcode Fuzzy Hash: 4b14c7d07e087387f8a3c98a8cd4bd71866d27c85158e2001d1b6fa40e2d0dfa
                              • Instruction Fuzzy Hash: AF31EA70604259BFDB16CB24DC55BEAFBBCBB02304F0000EAF58CA3291C7741A95CB9A

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 2137 40e4c0-40e4e5 call 403350 RegOpenKeyExW 2140 427190-4271ae RegQueryValueExW 2137->2140 2141 40e4eb-40e4f0 2137->2141 2142 4271b0-4271f5 call 4115d7 call 43652f RegQueryValueExW 2140->2142 2143 42721a-42722a RegCloseKey 2140->2143 2148 427210-427219 call 436508 2142->2148 2149 4271f7-42720e call 402160 2142->2149 2148->2143 2149->2148
                              APIs
                              • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,?,?,0040E4A1), ref: 0040E4DD
                              • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,0040E4A1,00000000,?,?,?,0040E4A1), ref: 004271A6
                              • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,0040E4A1,?,00000000,?,?,?,?,0040E4A1), ref: 004271ED
                              • RegCloseKey.ADVAPI32(?,?,?,?,0040E4A1), ref: 0042721E
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: QueryValue$CloseOpen
                              • String ID: Include$Software\AutoIt v3\AutoIt
                              • API String ID: 1586453840-614718249
                              • Opcode ID: 413bff81f872addaca3d9ad162024b649ce289641a3285436bc7eb0a5f7ce606
                              • Instruction ID: d6672e68ffeed78ba434be4ce119fa1e10800d5a5bf196f8e2f41644cb46c1f5
                              • Opcode Fuzzy Hash: 413bff81f872addaca3d9ad162024b649ce289641a3285436bc7eb0a5f7ce606
                              • Instruction Fuzzy Hash: CF21D871780204BBDB14EBF4ED46FAF737CEB54700F10055EB605E7281EAB5AA008768

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 2154 410570-4105f1 CreateWindowExW * 2 ShowWindow * 2
                              APIs
                              • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,?,00000000), ref: 004105A5
                              • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,?,00000000), ref: 004105CE
                              • ShowWindow.USER32(?,00000000), ref: 004105E4
                              • ShowWindow.USER32(?,00000000), ref: 004105EE
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: Window$CreateShow
                              • String ID: AutoIt v3$edit
                              • API String ID: 1584632944-3779509399
                              • Opcode ID: b28a7d78b19f48c216133de275d8b0452446851dd496b073adb1022152ad6d67
                              • Instruction ID: 021b1916d714280a6beb379f8f8b29d81737bdb93309e58067b2166fb7f1837a
                              • Opcode Fuzzy Hash: b28a7d78b19f48c216133de275d8b0452446851dd496b073adb1022152ad6d67
                              • Instruction Fuzzy Hash: 29F01771BE43107BF6B0A764AC43F5A2698A758F65F31083BB700BB5D0E1E4B8408B9C
                              APIs
                                • Part of subcall function 03F856B0: Sleep.KERNELBASE(000001F4), ref: 03F856C1
                              • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 03F858C2
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1348783565.0000000003F83000.00000040.00000020.00020000.00000000.sdmp, Offset: 03F83000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_3f83000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: CreateFileSleep
                              • String ID: 52U20W4MY79RK34
                              • API String ID: 2694422964-4144780697
                              • Opcode ID: 714d6364a315c0921287e0aa4bdc9a27def67b63c701d8e518e3ade7781a45af
                              • Instruction ID: 339111050bdb30bdc4da6ebf4b57108b9801554972c5315cc3794db4b3d64c01
                              • Opcode Fuzzy Hash: 714d6364a315c0921287e0aa4bdc9a27def67b63c701d8e518e3ade7781a45af
                              • Instruction Fuzzy Hash: B1517031D14249EBEF15EBA4C808BEFBBB8AF09300F004199E608BB2C0D7755B45CBA5
                              APIs
                              • LoadStringW.USER32(?,00000065,?,0000007F), ref: 0042723B
                                • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                              • _wcsncpy.LIBCMT ref: 00401C41
                              • _wcscpy.LIBCMT ref: 00401C5D
                              • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00401C6F
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: IconLoadNotifyShell_String_memmove_wcscpy_wcslen_wcsncpy
                              • String ID: Line:
                              • API String ID: 1874344091-1585850449
                              • Opcode ID: 71d679a4a9352c46b300ee00bac0ebd609a16659c7848ecadc14a4878baa23f7
                              • Instruction ID: 22c0e507134e40740d6fd31dbafdd21c3b8ff828be9a92102ab360472f74cad7
                              • Opcode Fuzzy Hash: 71d679a4a9352c46b300ee00bac0ebd609a16659c7848ecadc14a4878baa23f7
                              • Instruction Fuzzy Hash: EB31A1715083459BD320EB61DC45BDA77E8BF85318F04093EF588931E1E7B8AA49C75E
                              APIs
                              • RegOpenKeyExW.KERNELBASE(00000004,Control Panel\Mouse,00000000,00000001,00000004,00000004), ref: 0040F267
                              • RegQueryValueExW.KERNELBASE(00000000,?,00000000,00000000,?,?,00000002,00000000), ref: 0040F28E
                              • RegCloseKey.KERNELBASE(?), ref: 0040F2B5
                              • RegCloseKey.ADVAPI32(?), ref: 0040F2C9
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: Close$OpenQueryValue
                              • String ID: Control Panel\Mouse
                              • API String ID: 1607946009-824357125
                              • Opcode ID: 0a2ddf5dd10fc63f6e19eedc2563a5e53f3783e3c799d68c1c3a3a1866560054
                              • Instruction ID: a31ac2e1b7deaa2d1d9e7506379341dce8fcd1dacbe24dc49005ae4a0027d3ba
                              • Opcode Fuzzy Hash: 0a2ddf5dd10fc63f6e19eedc2563a5e53f3783e3c799d68c1c3a3a1866560054
                              • Instruction Fuzzy Hash: 91118C76640108AFCB10CFA8ED459EFB7BCEF59300B1089AAF908C3210E6759A11DBA4
                              APIs
                              • SHGetMalloc.SHELL32(0040F54C), ref: 004102BD
                              • SHGetDesktopFolder.SHELL32(?,004A90E8), ref: 004102D2
                              • _wcsncpy.LIBCMT ref: 004102ED
                              • SHGetPathFromIDListW.SHELL32(?,?), ref: 00410327
                              • _wcsncpy.LIBCMT ref: 00410340
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: _wcsncpy$DesktopFolderFromListMallocPath
                              • String ID:
                              • API String ID: 3170942423-0
                              • Opcode ID: bfe3e3032d26ed5990890659b1503a19068975a9e613434ef85ace480ecdfa96
                              • Instruction ID: 8627f7bfe00d67ecf541507c27de0d1a6b0c746b93627a891ac6cfe5d1469166
                              • Opcode Fuzzy Hash: bfe3e3032d26ed5990890659b1503a19068975a9e613434ef85ace480ecdfa96
                              • Instruction Fuzzy Hash: 4B219475A00619ABCB14DBA4DC84DEFB37DEF88700F108599F909D7210E674EE45DBA4
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID:
                              • String ID: ou
                              • API String ID: 0-3837949563
                              • Opcode ID: 7af5e299b258df5e9c9a2551ed0e7af6e1d4c875de24c7fdf76d77545964eae0
                              • Instruction ID: 8c99b1ef877cebc7a747b8a97cc81d83a07aa3771b44d3adc2ea031a64448d8d
                              • Opcode Fuzzy Hash: 7af5e299b258df5e9c9a2551ed0e7af6e1d4c875de24c7fdf76d77545964eae0
                              • Instruction Fuzzy Hash: CEF18C716043019FC700DF29C884A5AB7E5FF88318F14C95EF9998B392D7B9E945CB86
                              APIs
                              • GetCurrentProcess.KERNEL32(00000000,?,00000067,000000FF), ref: 004753C7
                              • TerminateProcess.KERNEL32(00000000), ref: 004753CE
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: Process$CurrentTerminate
                              • String ID: ou
                              • API String ID: 2429186680-3837949563
                              • Opcode ID: aaa6002d905a33e4c3ceade7f85f71e7f986a1c67485104df61a1a5e3f63762c
                              • Instruction ID: dddcdfafc98398d1c0f0a19edd80e49036cf45bbfca44c020541658de01b6296
                              • Opcode Fuzzy Hash: aaa6002d905a33e4c3ceade7f85f71e7f986a1c67485104df61a1a5e3f63762c
                              • Instruction Fuzzy Hash: 2C519D71604301AFC710DF65C881BABB7E5EF88308F14891EF9598B382D7B9D945CB96
                              APIs
                              • CreateProcessW.KERNELBASE(?,00000000), ref: 03F84EDD
                              • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 03F84F01
                              • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 03F84F23
                              Memory Dump Source
                              • Source File: 00000000.00000002.1348783565.0000000003F83000.00000040.00000020.00020000.00000000.sdmp, Offset: 03F83000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_3f83000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: Process$ContextCreateMemoryReadThreadWow64
                              • String ID:
                              • API String ID: 2438371351-0
                              • Opcode ID: fc310a6135c3389c0587bc6629e9838c2c50d5be0bfc8bfa2df8a04cac11b1e3
                              • Instruction ID: ee1268d1ed96d9774b933f704943cda8f8342da94374f90f945ae6ad4a89af03
                              • Opcode Fuzzy Hash: fc310a6135c3389c0587bc6629e9838c2c50d5be0bfc8bfa2df8a04cac11b1e3
                              • Instruction Fuzzy Hash: 55621A34A142199BEB24DFA4CC50BDEB376EF58300F1091A9D10DEB3A0E7799E81CB59
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: _memmove
                              • String ID: Error:
                              • API String ID: 4104443479-232661952
                              • Opcode ID: 20a21836adb2195423de36251fb93945767d574b7418eb2d4267c7510a98c7d8
                              • Instruction ID: 2c658176ab693071ca67d4d31bd2fe4acf4d59654e7b744331f3a235cb1e2e29
                              • Opcode Fuzzy Hash: 20a21836adb2195423de36251fb93945767d574b7418eb2d4267c7510a98c7d8
                              • Instruction Fuzzy Hash: 0D3191716006059FC324DF29C881AA7B3E6EF84314B24853FE95AC7791EB79E941CBD8
                              APIs
                              • 75B5D0D0.COMDLG32(?), ref: 0042961B
                                • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,004A7F6C,0040F545,004A7F6C,004A90E8,004A7F6C,?,0040F545), ref: 0041013C
                                • Part of subcall function 004102B0: SHGetMalloc.SHELL32(0040F54C), ref: 004102BD
                                • Part of subcall function 004102B0: SHGetDesktopFolder.SHELL32(?,004A90E8), ref: 004102D2
                                • Part of subcall function 004102B0: _wcsncpy.LIBCMT ref: 004102ED
                                • Part of subcall function 004102B0: SHGetPathFromIDListW.SHELL32(?,?), ref: 00410327
                                • Part of subcall function 004102B0: _wcsncpy.LIBCMT ref: 00410340
                                • Part of subcall function 00410190: GetFullPathNameW.KERNEL32(?,00000104,?,?,?), ref: 004101AB
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: Path$FullName_wcsncpy$DesktopFolderFromListMalloc
                              • String ID: X$pWH
                              • API String ID: 2653188779-941433119
                              • Opcode ID: 1b62eedeb2ba23f3a12794f4d72c3fd3ac9c0abd578206ca8986e50026ca9cbc
                              • Instruction ID: b6f0e4d7e30e2857a1e9cc165fafff24640ac0dd2e9829c062eaf90218724cbe
                              • Opcode Fuzzy Hash: 1b62eedeb2ba23f3a12794f4d72c3fd3ac9c0abd578206ca8986e50026ca9cbc
                              • Instruction Fuzzy Hash: 1F118AB0A00244ABDB11EFD9DC457DEBBF95F45304F14842AE504AB392D7FD08498BA9
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: __filbuf__getptd_noexit__read_memcpy_s
                              • String ID:
                              • API String ID: 1794320848-0
                              • Opcode ID: b5af9ce9d8135965a8c163c1359f1833c669f36246c0dfec509ee2915f8c5eb0
                              • Instruction ID: 2f36134af58cf06217a4581a57f76d3547d7b7b98d7afe96428f3577b7504850
                              • Opcode Fuzzy Hash: b5af9ce9d8135965a8c163c1359f1833c669f36246c0dfec509ee2915f8c5eb0
                              • Instruction Fuzzy Hash: 6C51E631A01208DBCB249F69C9446DFB7B1AFC0364F25826BE43597290E378EED1CB59
                              APIs
                              • Shell_NotifyIconW.SHELL32(00000000,?), ref: 0040E1A7
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: IconNotifyShell_
                              • String ID:
                              • API String ID: 1144537725-0
                              • Opcode ID: 02018e3f435d091181cdea07546ede041b4d96144d17d916b2823846d4297506
                              • Instruction ID: eb3a406907b17a2fb372061a5351d340f380801689ea858bebf243c914dbfa85
                              • Opcode Fuzzy Hash: 02018e3f435d091181cdea07546ede041b4d96144d17d916b2823846d4297506
                              • Instruction Fuzzy Hash: 16318F70608701DFD320CF25D855797BBE4BB85314F000C3EE5AA87391E7B8A958CB5A
                              APIs
                              • _malloc.LIBCMT ref: 0043214B
                                • Part of subcall function 004135BB: __FF_MSGBANNER.LIBCMT ref: 004135D4
                                • Part of subcall function 004135BB: __NMSG_WRITE.LIBCMT ref: 004135DB
                                • Part of subcall function 004135BB: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,004115F6,?,00401BAC,?,?,?), ref: 00413600
                              • _malloc.LIBCMT ref: 0043215D
                              • _malloc.LIBCMT ref: 0043216F
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: _malloc$AllocateHeap
                              • String ID:
                              • API String ID: 680241177-0
                              • Opcode ID: f71c381a9a4e64bea8472010c286ed0a2169748a03ca4327bb91778eef0474c7
                              • Instruction ID: dac51259f70ca5acf95ac1b1a30df86389447b5c3122b5fc7e5239b6c816f1c7
                              • Opcode Fuzzy Hash: f71c381a9a4e64bea8472010c286ed0a2169748a03ca4327bb91778eef0474c7
                              • Instruction Fuzzy Hash: A0F0E273200B142AD2206A6A6DC1BE7B39ADBD4765F00403FFB058A206DAE9988542EC
                              APIs
                              • TranslateMessage.USER32(?), ref: 00409556
                              • DispatchMessageW.USER32(?), ref: 00409561
                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00409574
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: Message$DispatchPeekTranslate
                              • String ID:
                              • API String ID: 4217535847-0
                              • Opcode ID: ced410c349f54cf5afb894e4facd1df4a4f56f438d67fe37ea70020fd5d89546
                              • Instruction ID: 9fbe2eaaa5ffb99098057fa667d4f29c0aa55754a5137076743fac66577e99fa
                              • Opcode Fuzzy Hash: ced410c349f54cf5afb894e4facd1df4a4f56f438d67fe37ea70020fd5d89546
                              • Instruction Fuzzy Hash: D8F05431554300AAE624D7A18D41F9B76A89F98784F40482EB641962E1EB78D444CB5A
                              APIs
                              • _free.LIBCMT ref: 0043210A
                                • Part of subcall function 00413748: RtlFreeHeap.NTDLL(00000000,00000000,?,00417A5A,00000000), ref: 0041375E
                                • Part of subcall function 00413748: GetLastError.KERNEL32(00000000,?,00417A5A,00000000), ref: 00413770
                              • _free.LIBCMT ref: 0043211D
                              • _free.LIBCMT ref: 00432130
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: _free$ErrorFreeHeapLast
                              • String ID:
                              • API String ID: 776569668-0
                              • Opcode ID: 471d261c1978e8fd492efb66726f25644d258391566ce7e49abf025be84b45d1
                              • Instruction ID: d08fe22c6a524c27e4c6c7bcf1019f14b9a5eff3fc739cf1d41fcb720108e0a5
                              • Opcode Fuzzy Hash: 471d261c1978e8fd492efb66726f25644d258391566ce7e49abf025be84b45d1
                              • Instruction Fuzzy Hash: 29E092F290071433CD1099219941A87F38C4B15B11F08402AFA15A3301E969FA40C1E9
                              APIs
                                • Part of subcall function 0040F760: _strcat.LIBCMT ref: 0040F786
                              • _free.LIBCMT ref: 004295A0
                                • Part of subcall function 004033C0: GetCurrentDirectoryW.KERNEL32(00000104,?,?), ref: 00403451
                                • Part of subcall function 004033C0: GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00403467
                                • Part of subcall function 004033C0: __wsplitpath.LIBCMT ref: 00403492
                                • Part of subcall function 004033C0: _wcscpy.LIBCMT ref: 004034A7
                                • Part of subcall function 004033C0: _wcscat.LIBCMT ref: 004034BC
                                • Part of subcall function 004033C0: SetCurrentDirectoryW.KERNEL32(?), ref: 004034CC
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: CurrentDirectory$FullNamePath__wsplitpath_free_strcat_wcscat_wcscpy
                              • String ID: >>>AUTOIT SCRIPT<<<
                              • API String ID: 3938964917-2806939583
                              • Opcode ID: 04a933f2bae5c84e1ec678a83764c5dff2752dbbd219a3b8ffd94249686463e6
                              • Instruction ID: c8289cc7cde30cfde4dff3f83c8481f20f860a5b07fa540731426c520eca24fb
                              • Opcode Fuzzy Hash: 04a933f2bae5c84e1ec678a83764c5dff2752dbbd219a3b8ffd94249686463e6
                              • Instruction Fuzzy Hash: 9A919171A00219ABCF04EFA5D8819EE7774BF48314F50452EF915B7391D778EA06CBA8
                              Strings
                              • >>>AUTOIT NO CMDEXECUTE<<<, xrefs: 0042804F
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: _strcat
                              • String ID: >>>AUTOIT NO CMDEXECUTE<<<
                              • API String ID: 1765576173-2684727018
                              • Opcode ID: afbcd64a5de9b9cf0401a7756764eed502eca04e8b93ddfb1cf174919bef9872
                              • Instruction ID: e645463cc19bd0c1a49bcabea2d674544a6c2f3c5714d62cb3526a870e150300
                              • Opcode Fuzzy Hash: afbcd64a5de9b9cf0401a7756764eed502eca04e8b93ddfb1cf174919bef9872
                              • Instruction Fuzzy Hash: FBF090B390020D768B00F6E6D942CEFB37C9985704B5006AFA905B3152EA79EA0987B6
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: ClearVariant
                              • String ID:
                              • API String ID: 1473721057-0
                              • Opcode ID: f800691a6c58702cf5a996edc2c5780f63a8d9386b34bd2a46259168d6db88b9
                              • Instruction ID: 76271617df0236ab3ccd2777984eb13d60b28668e4953fb9a85eec064aa2abc3
                              • Opcode Fuzzy Hash: f800691a6c58702cf5a996edc2c5780f63a8d9386b34bd2a46259168d6db88b9
                              • Instruction Fuzzy Hash: F891A370A00204DFDB14DF65D884AAAB3B5EF09304F24C56BE915AB391D739EC41CBAE
                              APIs
                              • __wsplitpath.LIBCMT ref: 004678F7
                                • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                              • GetLastError.KERNEL32(00000000,00000000), ref: 004679C7
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: ErrorLast__wsplitpath_malloc
                              • String ID:
                              • API String ID: 4163294574-0
                              • Opcode ID: b7e2b2e067b321cb14cd8dd870a284e502ce9d37bff932640fd458450c7e1011
                              • Instruction ID: 5ded281afda408fdcd401bf2365ceabb828b89a129c607e264fb1023d06c7d2e
                              • Opcode Fuzzy Hash: b7e2b2e067b321cb14cd8dd870a284e502ce9d37bff932640fd458450c7e1011
                              • Instruction Fuzzy Hash: FB5126712083018BD710EF75C881A5BB3E5AF84318F044A6EF9559B381EB39ED09CB97
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: _memmove
                              • String ID:
                              • API String ID: 4104443479-0
                              • Opcode ID: 3d6c7d7a6ae677920793bf96237225282887b2b30ba90914ff16095f93448b68
                              • Instruction ID: 2565b1472f88146c75409e19c065a4aacb94a5f6c219594ae44f545f2623c2f3
                              • Opcode Fuzzy Hash: 3d6c7d7a6ae677920793bf96237225282887b2b30ba90914ff16095f93448b68
                              • Instruction Fuzzy Hash: 85412871D00104AFDB10AF15C881BAE7B74AF4670CF14C05AFA055B342E63DA946CBAA
                              APIs
                                • Part of subcall function 0040F6F0: _wcslen.LIBCMT ref: 0040F705
                                • Part of subcall function 0040F6F0: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,?,?,?,00454478,?,00000000,?,?), ref: 0040F71E
                                • Part of subcall function 0040F6F0: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,?,?,00000000,?,?,?,?), ref: 0040F747
                              • _strcat.LIBCMT ref: 0040F786
                                • Part of subcall function 0040F850: _strlen.LIBCMT ref: 0040F858
                                • Part of subcall function 0040F850: _sprintf.LIBCMT ref: 0040F9AE
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: ByteCharMultiWide$_sprintf_strcat_strlen_wcslen
                              • String ID:
                              • API String ID: 3199840319-0
                              • Opcode ID: bd3755d61cabc1630a419da0a5008bdf21fb0fae9682b7453e2f960da4ed9882
                              • Instruction ID: aac9d08775c2cbfae45fd546c2dd5c585d34072f6b495fb7426f91ad36779b1c
                              • Opcode Fuzzy Hash: bd3755d61cabc1630a419da0a5008bdf21fb0fae9682b7453e2f960da4ed9882
                              • Instruction Fuzzy Hash: 7B2148B260825027D724EF3A9C82A6EF2D4AF85304F14893FF555C22C2F738D554879A
                              APIs
                              • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000,?,0040DE74,?,00000001,?,00403423,?), ref: 0040F13A
                              • CreateFileW.KERNEL32(?,C0000000,00000007,00000000,00000004,00000080,00000000,?,0040DE74,?,00000001,?,00403423,?), ref: 00426326
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: CreateFile
                              • String ID:
                              • API String ID: 823142352-0
                              • Opcode ID: 01c8104855b6be3cf9f3f51c38ffad3c9237c0860841684a852cd2675ef3d23e
                              • Instruction ID: 8a88c5525f76e0b0fff62cf48ad84dc7055e673dbb4ccc29545257d8619b8f55
                              • Opcode Fuzzy Hash: 01c8104855b6be3cf9f3f51c38ffad3c9237c0860841684a852cd2675ef3d23e
                              • Instruction Fuzzy Hash: 16011D70784310BAF2305A68DD0BF5266546B45B24F20473ABBE5BE2D1D2F86885870C
                              APIs
                                • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
                              • __lock_file.LIBCMT ref: 00414A8D
                                • Part of subcall function 00415471: __lock.LIBCMT ref: 00415496
                              • __fclose_nolock.LIBCMT ref: 00414A98
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                              • String ID:
                              • API String ID: 2800547568-0
                              • Opcode ID: a5ee4eb6f63f5c531cf15d6f0d52328148e0080a1a420ce895dcb566fcff73ac
                              • Instruction ID: d9443fdd3ee0a3059f5d17ec53abbfe2105cc8a5d10ddad395bff0ae1f283336
                              • Opcode Fuzzy Hash: a5ee4eb6f63f5c531cf15d6f0d52328148e0080a1a420ce895dcb566fcff73ac
                              • Instruction Fuzzy Hash: EEF0F6308417019AD710AB7588027EF37A09F41379F22864FA061961D1C73C85C29B5D
                              APIs
                              • __lock_file.LIBCMT ref: 00415012
                              • __ftell_nolock.LIBCMT ref: 0041501F
                                • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: __ftell_nolock__getptd_noexit__lock_file
                              • String ID:
                              • API String ID: 2999321469-0
                              • Opcode ID: 5d7fd30e9bb4e6974f03027405c635b91b5e55acacb14f372dcacdb3af77c648
                              • Instruction ID: e3e7bc223609ce985a1750c66bb322057640979a4505571362f253753ce4bf01
                              • Opcode Fuzzy Hash: 5d7fd30e9bb4e6974f03027405c635b91b5e55acacb14f372dcacdb3af77c648
                              • Instruction Fuzzy Hash: 64F03030900605EADB107FB5DD027EE3B70AF443A8F20825BB0259A0E1DB7C8AC29A59
                              APIs
                              • CreateProcessW.KERNELBASE(?,00000000), ref: 03F84EDD
                              • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 03F84F01
                              • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 03F84F23
                              Memory Dump Source
                              • Source File: 00000000.00000002.1348783565.0000000003F83000.00000040.00000020.00020000.00000000.sdmp, Offset: 03F83000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_3f83000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: Process$ContextCreateMemoryReadThreadWow64
                              • String ID:
                              • API String ID: 2438371351-0
                              • Opcode ID: c7490eb0849e98549b11c4fe0459da6d53c4872c769bbd933b9fbf1e0076ab14
                              • Instruction ID: c9a6791075eb521e9202760b6892891aaa49d990dc3ca2e6a646955f9a007fa3
                              • Opcode Fuzzy Hash: c7490eb0849e98549b11c4fe0459da6d53c4872c769bbd933b9fbf1e0076ab14
                              • Instruction Fuzzy Hash: 4412BD24E24658C6EB24DF64D8507DEB232FF68300F1094E9910DEB7A5E77A4F81CB5A
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: _memmove
                              • String ID:
                              • API String ID: 4104443479-0
                              • Opcode ID: 6d743864f950f4e8dd6af4daa6c332586bf39a41c922c31670318adef7ff7de3
                              • Instruction ID: 6397ebbfaf442e519c955e074037b65107783079284990db5ef0c3dd021860ed
                              • Opcode Fuzzy Hash: 6d743864f950f4e8dd6af4daa6c332586bf39a41c922c31670318adef7ff7de3
                              • Instruction Fuzzy Hash: 36317371E00209EBDF009F52E9866AEFBF4FF40740F2189BED855E2650E7389990D759
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: ProtectVirtual
                              • String ID:
                              • API String ID: 544645111-0
                              • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                              • Instruction ID: 21b87f0337b3904faf2e49e7d89a80b8c5538d611ad57d97d778efbd48141229
                              • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                              • Instruction Fuzzy Hash: 8131F770A00105DBC718DF88E590AAAF7B1FB49310B6486A6E409CF355DB78EDC1CBD9
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: b88f9543b806201cae42d4d121fbe4b2eaeb6b479e9688354450343e49ff2077
                              • Instruction ID: 427b4a632c312742ac0951887501238d3178a51c37fde1d0fd35c98815df3d2a
                              • Opcode Fuzzy Hash: b88f9543b806201cae42d4d121fbe4b2eaeb6b479e9688354450343e49ff2077
                              • Instruction Fuzzy Hash: 21119674200201ABDB249F36D984E26B3A5AF45304B244D2FF9C5D7790DB7CE881DB5E
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 53ac66c0a220e583b8bd8a833cb4d0ab2488ecf71834bb63135a5f6edfec8b4a
                              • Instruction ID: fe3c5e01fee558804f1d0cd68762aa03bf47037873853bda5dcd607d85013340
                              • Opcode Fuzzy Hash: 53ac66c0a220e583b8bd8a833cb4d0ab2488ecf71834bb63135a5f6edfec8b4a
                              • Instruction Fuzzy Hash: 2D118B352046019FDB10DF69D884E96B3E9AF8A314F14856EFD298B362CB35FC41CB95
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: __lock_file
                              • String ID:
                              • API String ID: 3031932315-0
                              • Opcode ID: 9d46abaf5bc0bef18357e8259ddf310e5220bee08d011669e2131a09b3543261
                              • Instruction ID: 324047821ed349453e17c5e7f52af34d31ade4ebcb64e32b23ce3c6ad3b356a0
                              • Opcode Fuzzy Hash: 9d46abaf5bc0bef18357e8259ddf310e5220bee08d011669e2131a09b3543261
                              • Instruction Fuzzy Hash: FF011E71801219EBCF21AFA5C8028DF7B71AF44764F11851BF824551A1E7398AE2DBD9
                              APIs
                              • WriteFile.KERNELBASE(?,?,?,?,00000000,?,?,?,004263D0,?,00487ACC,00000003,0040DE90,?,?,00000001), ref: 00443E54
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: FileWrite
                              • String ID:
                              • API String ID: 3934441357-0
                              • Opcode ID: 873a582ac05df194872d3361efdc1b64d97226b1633050e8059638026df5ad0f
                              • Instruction ID: f8d6e32d6ecef3e6c51c5ea05c7ff41eb941b2b6d152ec47b845c679c5cedb0e
                              • Opcode Fuzzy Hash: 873a582ac05df194872d3361efdc1b64d97226b1633050e8059638026df5ad0f
                              • Instruction Fuzzy Hash: 6BE01276100318ABDB10DF98D844FDA77BCEF48765F10891AFA048B200C7B4EA908BE4
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: __wfsopen
                              • String ID:
                              • API String ID: 197181222-0
                              • Opcode ID: b5c1dd7f54315c70b952dff0fe33ec93e52da603c388fdf08d18a597afa050f6
                              • Instruction ID: b34ddb7a850719c89311ce964fc9f65e9e9400c6a390d5c1cbb008c3125e494a
                              • Opcode Fuzzy Hash: b5c1dd7f54315c70b952dff0fe33ec93e52da603c388fdf08d18a597afa050f6
                              • Instruction Fuzzy Hash: 82C092B244020C77CF112A93EC02F9A3F1E9BC0764F058021FB1C1A162AA77EAA19689
                              APIs
                              • CloseHandle.KERNELBASE(?,?,00426FBF), ref: 0040DA3D
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: CloseHandle
                              • String ID:
                              • API String ID: 2962429428-0
                              • Opcode ID: 4893ac657bcef9b9334a0355bd28ce0f0291ef024a1c9f1561977d8c5be9d70a
                              • Instruction ID: 552ddd844a8bbede063c80161f66c4637379340f91e2bb70a518b226642b2913
                              • Opcode Fuzzy Hash: 4893ac657bcef9b9334a0355bd28ce0f0291ef024a1c9f1561977d8c5be9d70a
                              • Instruction Fuzzy Hash: B9E045B4A04B008BC6308F5BE444416FBF8EEE46203108E1FD4A6C2A64C3B4A1498F50
                              APIs
                              • Sleep.KERNELBASE(000001F4), ref: 03F856C1
                              Memory Dump Source
                              • Source File: 00000000.00000002.1348783565.0000000003F83000.00000040.00000020.00020000.00000000.sdmp, Offset: 03F83000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_3f83000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: Sleep
                              • String ID:
                              • API String ID: 3472027048-0
                              • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                              • Instruction ID: 69331e05688d9ceff7e891abbd495e54578f0aea19f49e5fbe8cb7a800e27d7e
                              • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                              • Instruction Fuzzy Hash: 91E0E67494010DDFDB00EFB8D54969E7FB4EF04301F1005A1FD05D2280D6319D508A62
                              APIs
                              • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0047C8E1
                              • NtdllDialogWndProc_W.USER32(?,0000004E,?,?), ref: 0047C8FC
                              • GetKeyState.USER32(00000011), ref: 0047C92D
                              • GetKeyState.USER32(00000009), ref: 0047C936
                              • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0047C949
                              • GetKeyState.USER32(00000010), ref: 0047C953
                              • 73A345F0.USER32(00000002,000000F0), ref: 0047C967
                              • SendMessageW.USER32(00000002,0000110A,00000009,00000000), ref: 0047C993
                              • SendMessageW.USER32(00000002,0000113E,00000000,?), ref: 0047C9B6
                              • _wcsncpy.LIBCMT ref: 0047CA29
                              • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0047CA5A
                              • SendMessageW.USER32 ref: 0047CA7F
                              • InvalidateRect.USER32(?,00000000,00000001), ref: 0047CADF
                              • SendMessageW.USER32(?,00001030,?,0047EA68), ref: 0047CB84
                              • 6F13CB00.COMCTL32(009F23A8,00000000,00000000,00000000), ref: 0047CB9B
                              • 6F13C2F0.COMCTL32(009F23A8,00000000,000000F8,000000F0), ref: 0047CBAC
                              • SetCapture.USER32(?), ref: 0047CBB6
                              • ClientToScreen.USER32(?,?), ref: 0047CC17
                              • 6F13C530.COMCTL32(00000000,?,?,?,?), ref: 0047CC26
                              • ReleaseCapture.USER32 ref: 0047CC3A
                              • GetCursorPos.USER32(?), ref: 0047CC72
                              • ScreenToClient.USER32(?,?), ref: 0047CC80
                              • SendMessageW.USER32(?,00001012,00000000,?), ref: 0047CCE6
                              • SendMessageW.USER32 ref: 0047CD12
                              • SendMessageW.USER32(?,00001111,00000000,?), ref: 0047CD53
                              • SendMessageW.USER32 ref: 0047CD80
                              • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 0047CD99
                              • SendMessageW.USER32(?,0000110B,00000009,?), ref: 0047CDAA
                              • GetCursorPos.USER32(?), ref: 0047CDC8
                              • ScreenToClient.USER32(?,?), ref: 0047CDD6
                              • GetParent.USER32(00000000), ref: 0047CDF7
                              • SendMessageW.USER32(?,00001012,00000000,?), ref: 0047CE60
                              • SendMessageW.USER32 ref: 0047CE93
                              • ClientToScreen.USER32(?,?), ref: 0047CEEE
                              • TrackPopupMenuEx.USER32(?,00000000,?,?,02F81A48,00000000,?,?,?,?), ref: 0047CF1C
                              • SendMessageW.USER32(?,00001111,00000000,?), ref: 0047CF46
                              • SendMessageW.USER32 ref: 0047CF6B
                              • ClientToScreen.USER32(?,?), ref: 0047CFB5
                              • TrackPopupMenuEx.USER32(?,00000080,?,?,02F81A48,00000000,?,?,?,?), ref: 0047CFE6
                              • 73A345F0.USER32(?,000000F0), ref: 0047D086
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: MessageSend$ClientScreen$State$A345CaptureCursorMenuPopupTrack$C530DialogInvalidateNtdllParentProc_RectRelease_wcsncpy
                              • String ID: @GUI_DRAGID$F
                              • API String ID: 3054501467-4164748364
                              • Opcode ID: 2b9e17ba3223fb7b4804536e302a42d427f78481ee09a8534aafb1e4469c1a6d
                              • Instruction ID: 980357f173c9be8e312ccaa606797ee7157b6525bda81ee0817efdfc4c954517
                              • Opcode Fuzzy Hash: 2b9e17ba3223fb7b4804536e302a42d427f78481ee09a8534aafb1e4469c1a6d
                              • Instruction Fuzzy Hash: F842AD706043419FD714DF28C884FABB7A5FF89700F14865EFA489B291C7B8E846CB5A
                              APIs
                              • GetForegroundWindow.USER32 ref: 00434420
                              • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00434446
                              • IsIconic.USER32(?), ref: 0043444F
                              • ShowWindow.USER32(?,00000009), ref: 0043445C
                              • SetForegroundWindow.USER32(?), ref: 0043446A
                              • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00434481
                              • GetCurrentThreadId.KERNEL32 ref: 00434485
                              • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00434493
                              • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 004344A2
                              • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 004344A8
                              • AttachThreadInput.USER32(00000000,?,00000001), ref: 004344B1
                              • SetForegroundWindow.USER32(00000000), ref: 004344B7
                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 004344C6
                              • keybd_event.USER32(00000012,00000000), ref: 004344CF
                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 004344DD
                              • keybd_event.USER32(00000012,00000000), ref: 004344E6
                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 004344F4
                              • keybd_event.USER32(00000012,00000000), ref: 004344FD
                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 0043450B
                              • keybd_event.USER32(00000012,00000000), ref: 00434514
                              • SetForegroundWindow.USER32(00000000), ref: 0043451E
                              • AttachThreadInput.USER32(00000000,?,00000000), ref: 0043453F
                              • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 00434545
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: ThreadWindow$AttachInput$ForegroundVirtualkeybd_event$Process$CurrentFindIconicShow
                              • String ID: Shell_TrayWnd
                              • API String ID: 2889586943-2988720461
                              • Opcode ID: 8fb90041bee2e10260771149cd23f534c9f7767a381d567acbe6a88cba9e6a8e
                              • Instruction ID: 0b42b206f44700a00bd4aa1610e9651ae8f7722fee000eb3c659fd44b6abead8
                              • Opcode Fuzzy Hash: 8fb90041bee2e10260771149cd23f534c9f7767a381d567acbe6a88cba9e6a8e
                              • Instruction Fuzzy Hash: AD416272640218BFE7205BA4DE4AFBE7B6CDB58B11F10442EFA01EA1D0D6F458419BA9
                              APIs
                              • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 0044638E
                              • CloseHandle.KERNEL32(?), ref: 004463A0
                              • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 004463B8
                              • GetProcessWindowStation.USER32 ref: 004463D1
                              • SetProcessWindowStation.USER32(00000000), ref: 004463DB
                              • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 004463F7
                              • _wcslen.LIBCMT ref: 00446498
                                • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                              • _wcsncpy.LIBCMT ref: 004464C0
                              • 746E5590.USERENV(?,00000020), ref: 004464D9
                              • 746E7ED0.USERENV(?,?,00000000), ref: 004464F3
                              • CreateProcessAsUserW.ADVAPI32(?,00000000,00000000,00000000,00000000,?,?,?,?,000F01FF,00000400), ref: 00446522
                              • 746E5030.USERENV(?,?), ref: 00446555
                              • CloseWindowStation.USER32(00000000), ref: 0044656C
                              • CloseDesktop.USER32(?), ref: 0044657A
                              • SetProcessWindowStation.USER32(?), ref: 00446588
                              • CloseHandle.KERNEL32(?), ref: 00446592
                              • 746E7F30.USERENV(?), ref: 004465A9
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: StationWindow$CloseProcess$DesktopHandleOpen$CreateDuplicateE5030E5590TokenUser_malloc_wcslen_wcsncpy
                              • String ID: $@OH$default$winsta0
                              • API String ID: 2825827391-3791954436
                              • Opcode ID: b5525f1ade2b057c7f9e31d74da72dff15b4031de69b799d2ab87430ccd2f155
                              • Instruction ID: a255b9755a473e3b45922b0ee48cea4cb67e1360e8ecd59b8ab49ad27cdc7b44
                              • Opcode Fuzzy Hash: b5525f1ade2b057c7f9e31d74da72dff15b4031de69b799d2ab87430ccd2f155
                              • Instruction Fuzzy Hash: A28180B0A00209ABEF10CFA5DD4AFAF77B8AF49704F05455EF914A7284D778D901CB69
                              APIs
                              • FindFirstFileW.KERNEL32(00000000,?,?), ref: 004788E4
                              • FindClose.KERNEL32(00000000), ref: 00478924
                              • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00478949
                              • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00478961
                              • FileTimeToSystemTime.KERNEL32(?,?), ref: 00478989
                              • __swprintf.LIBCMT ref: 004789D3
                              • __swprintf.LIBCMT ref: 00478A1D
                              • __swprintf.LIBCMT ref: 00478A4B
                              • __swprintf.LIBCMT ref: 00478A79
                                • Part of subcall function 0041329B: __flsbuf.LIBCMT ref: 00413314
                                • Part of subcall function 0041329B: __flsbuf.LIBCMT ref: 0041332C
                              • __swprintf.LIBCMT ref: 00478AA7
                              • __swprintf.LIBCMT ref: 00478AD5
                              • __swprintf.LIBCMT ref: 00478B03
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem
                              • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                              • API String ID: 999945258-2428617273
                              • Opcode ID: 438ad41bdba169d6dbcdf3912f97c2a8dc3502a0945a742a170651836116907f
                              • Instruction ID: 8fd0730747e081185947bc4026d2fd3d0a29cbe563c255e8678d3cf3417a7967
                              • Opcode Fuzzy Hash: 438ad41bdba169d6dbcdf3912f97c2a8dc3502a0945a742a170651836116907f
                              • Instruction Fuzzy Hash: 32719772204300ABC310EF55CC85FAFB7E9AF88705F504D2FF645962D1E6B9E944875A
                              APIs
                                • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                              • GetCurrentDirectoryW.KERNEL32(00000104,?,?), ref: 00403451
                              • GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00403467
                              • __wsplitpath.LIBCMT ref: 00403492
                                • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
                              • _wcscpy.LIBCMT ref: 004034A7
                              • _wcscat.LIBCMT ref: 004034BC
                              • SetCurrentDirectoryW.KERNEL32(?), ref: 004034CC
                                • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                                • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                                • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                                • Part of subcall function 00403AF0: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,?,?,?,0040355C,?,?,?,00000010), ref: 00403B08
                                • Part of subcall function 00403AF0: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,?,?,00000010), ref: 00403B41
                              • _wcscpy.LIBCMT ref: 004035A0
                              • _wcslen.LIBCMT ref: 00403623
                              • _wcslen.LIBCMT ref: 0040367D
                              Strings
                              • _, xrefs: 0040371C
                              • #include depth exceeded. Make sure there are no recursive includes, xrefs: 00428200
                              • Error opening the file, xrefs: 00428231
                              • Unterminated string, xrefs: 00428348
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: _wcslen$ByteCharCurrentDirectoryMultiWide_wcscpystd::exception::exception$Exception@8FullNamePathThrow__wsplitpath__wsplitpath_helper_malloc_memmove_wcscat
                              • String ID: #include depth exceeded. Make sure there are no recursive includes$Error opening the file$Unterminated string$_
                              • API String ID: 3393021363-188983378
                              • Opcode ID: 7ca9ad7ef7208bb045d11657cd721343b767352ed1bccac0ebefd6c576abac4e
                              • Instruction ID: 51a390cb75b153cc6cab8b26b712b327f6f81406d0e69f910df9a3585dc9283e
                              • Opcode Fuzzy Hash: 7ca9ad7ef7208bb045d11657cd721343b767352ed1bccac0ebefd6c576abac4e
                              • Instruction Fuzzy Hash: CCD105B1508341AAD710EF64D841AEFBBE8AF85304F404C2FF98553291DB79DA49C7AB
                              APIs
                              • PostMessageW.USER32(?,00000112,0000F060,00000000), ref: 0046A0C9
                              • GetFocus.USER32 ref: 0046A0DD
                              • GetDlgCtrlID.USER32(00000000), ref: 0046A0E8
                              • PostMessageW.USER32(?,00000111,?,00000000), ref: 0046A13C
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: MessagePost$CtrlFocus
                              • String ID: 0
                              • API String ID: 1534620443-4108050209
                              • Opcode ID: 5cb98421042f455ec4000b61dd51e58b9a21b7b09c176f3470d706b88b7d88ce
                              • Instruction ID: bf3f5449e9a8ba554bb586fd0597798874618ae7c394ba8af81d11134a55f14d
                              • Opcode Fuzzy Hash: 5cb98421042f455ec4000b61dd51e58b9a21b7b09c176f3470d706b88b7d88ce
                              • Instruction Fuzzy Hash: 9791AD71604711AFE710CF14D884BABB7A4FB85314F004A1EF991A7381E7B9D895CBAB
                              APIs
                              • FindFirstFileW.KERNEL32(?,?), ref: 00431AAA
                              • GetFileAttributesW.KERNEL32(?), ref: 00431AE7
                              • SetFileAttributesW.KERNEL32(?,?), ref: 00431AFD
                              • FindNextFileW.KERNEL32(00000000,?), ref: 00431B0F
                              • FindClose.KERNEL32(00000000), ref: 00431B20
                              • FindClose.KERNEL32(00000000), ref: 00431B34
                              • FindFirstFileW.KERNEL32(*.*,?), ref: 00431B4F
                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00431B96
                              • SetCurrentDirectoryW.KERNEL32(0048AB30), ref: 00431BBA
                              • FindNextFileW.KERNEL32(00000000,00000010), ref: 00431BC2
                              • FindClose.KERNEL32(00000000), ref: 00431BCD
                              • FindClose.KERNEL32(00000000), ref: 00431BDB
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
                              • String ID: *.*
                              • API String ID: 1409584000-438819550
                              • Opcode ID: 375c8f5163c02f9b34b1ce4408ff1b09f98ffe2d72fc8025119183882b6461df
                              • Instruction ID: b696eadadcb8a1627fc7fa6feda0e6e57aab690e04623b9265854ab7309d24dd
                              • Opcode Fuzzy Hash: 375c8f5163c02f9b34b1ce4408ff1b09f98ffe2d72fc8025119183882b6461df
                              • Instruction Fuzzy Hash: CE41D8726002046BC700EF65DC45EAFB3ACAE89311F04592FF954C3190E7B8E519C7A9
                              APIs
                              • GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00431C09
                              • __swprintf.LIBCMT ref: 00431C2E
                              • _wcslen.LIBCMT ref: 00431C3A
                              • CreateDirectoryW.KERNEL32(?,00000000), ref: 00431C67
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: CreateDirectoryFullNamePath__swprintf_wcslen
                              • String ID: :$\$\??\%s
                              • API String ID: 2192556992-3457252023
                              • Opcode ID: e3674d1d1678aa5b2072ca287ea13c599f7f343b69fea712d52b9408e430d9c0
                              • Instruction ID: 5b8928ca783b893dacbf0721098a8616f59dd17613a34138e213b27d6ec4c177
                              • Opcode Fuzzy Hash: e3674d1d1678aa5b2072ca287ea13c599f7f343b69fea712d52b9408e430d9c0
                              • Instruction Fuzzy Hash: EE413E726403186BD720DB54DC45FDFB3BCFF58710F00859AFA0896191EBB49A548BD8
                              APIs
                              • GetLocalTime.KERNEL32(?), ref: 004722A2
                              • __swprintf.LIBCMT ref: 004722B9
                              • SHGetFolderPathW.SHELL32(00000000,00000026,00000000,00000000,0048BF68), ref: 004724EC
                              • SHGetFolderPathW.SHELL32(00000000,0000002B,00000000,00000000,0048BF68), ref: 00472506
                              • SHGetFolderPathW.SHELL32(00000000,00000005,00000000,00000000,0048BF68), ref: 00472520
                              • SHGetFolderPathW.SHELL32(00000000,00000023,00000000,00000000,0048BF68), ref: 0047253A
                              • SHGetFolderPathW.SHELL32(00000000,00000019,00000000,00000000,0048BF68), ref: 00472554
                              • SHGetFolderPathW.SHELL32(00000000,0000002E,00000000,00000000,0048BF68), ref: 0047256E
                              • SHGetFolderPathW.SHELL32(00000000,0000001F,00000000,00000000,0048BF68), ref: 00472588
                              • SHGetFolderPathW.SHELL32(00000000,00000017,00000000,00000000,0048BF68), ref: 004725A2
                              • SHGetFolderPathW.SHELL32(00000000,00000016,00000000,00000000,0048BF68), ref: 004725BC
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: FolderPath$LocalTime__swprintf
                              • String ID: %.3d
                              • API String ID: 3337348382-986655627
                              • Opcode ID: e729fe0eecd02e77c5ee8deaec4c56456965897f8b2a75efd2bc4ea0d4b88c57
                              • Instruction ID: 0d137f706e98bab13a4a4c7fcb7914b07bdb7c22a72ec07ab57cd4d47a51df83
                              • Opcode Fuzzy Hash: e729fe0eecd02e77c5ee8deaec4c56456965897f8b2a75efd2bc4ea0d4b88c57
                              • Instruction Fuzzy Hash: A6C1EC326101185BD710FBA1DD8AFEE7328EB44701F5045BFF909A60C2DBB99B598F64
                              APIs
                              • FindFirstFileW.KERNEL32(?,?), ref: 004428A8
                              • FindNextFileW.KERNEL32(00000000,?), ref: 0044290B
                              • FindClose.KERNEL32(00000000), ref: 0044291C
                              • FindClose.KERNEL32(00000000), ref: 00442930
                              • FindFirstFileW.KERNEL32(*.*,?), ref: 0044294D
                              • SetCurrentDirectoryW.KERNEL32(?), ref: 0044299C
                              • SetCurrentDirectoryW.KERNEL32(0048AB30), ref: 004429BF
                              • FindNextFileW.KERNEL32(00000000,00000010), ref: 004429C9
                              • FindClose.KERNEL32(00000000), ref: 004429D4
                                • Part of subcall function 00433C08: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00433C2A
                              • FindClose.KERNEL32(00000000), ref: 004429E2
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
                              • String ID: *.*
                              • API String ID: 2640511053-438819550
                              • Opcode ID: 8a47bb142582fb369a588aeabde8b58686abdf3d8367fad8d2448c9b03ae91f1
                              • Instruction ID: 696d482812dd8bff2d9106dd2d2144e175b5fe2258968c3fd44c1969776f6f9a
                              • Opcode Fuzzy Hash: 8a47bb142582fb369a588aeabde8b58686abdf3d8367fad8d2448c9b03ae91f1
                              • Instruction Fuzzy Hash: AD410AB2A001186BDB10EBA5ED45FEF73689F89321F50465BFD0493280D6B8DE558BB8
                              APIs
                              • GetCurrentProcess.KERNEL32(00000028,?), ref: 004333CE
                              • OpenProcessToken.ADVAPI32(00000000), ref: 004333D5
                              • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 004333EA
                              • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 0043340E
                              • GetLastError.KERNEL32 ref: 00433414
                              • ExitWindowsEx.USER32(?,00000000), ref: 00433437
                              • InitiateSystemShutdownExW.ADVAPI32(00000000,00000000,00000000,00000000,00000000,?), ref: 00433466
                              • SetSystemPowerState.KERNEL32(00000001,00000000), ref: 00433479
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: ProcessSystemToken$AdjustCurrentErrorExitInitiateLastLookupOpenPowerPrivilegePrivilegesShutdownStateValueWindows
                              • String ID: SeShutdownPrivilege
                              • API String ID: 2938487562-3733053543
                              • Opcode ID: e998af62085c6697935ed50d35c6a1543144275e53dff9101095b3913992069c
                              • Instruction ID: ad32a9094aef850e2966724807b7d50af50c82f056daff98c21d8f44207777ad
                              • Opcode Fuzzy Hash: e998af62085c6697935ed50d35c6a1543144275e53dff9101095b3913992069c
                              • Instruction Fuzzy Hash: F221C971640205ABF7108FA4EC4EF7FB3ACE708702F144569FE09D51D1D6BA5D408765
                              APIs
                                • Part of subcall function 00436E2B: GetUserObjectSecurity.USER32(?,?,?,00000000,?), ref: 00436E45
                                • Part of subcall function 00436E2B: GetLastError.KERNEL32(?,00000000,?), ref: 00436E4F
                                • Part of subcall function 00436E2B: GetUserObjectSecurity.USER32(?,?,00000000,?,?), ref: 00436E75
                                • Part of subcall function 00436DF7: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001), ref: 00436E12
                              • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 0044618A
                              • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 004461BE
                              • GetLengthSid.ADVAPI32(?), ref: 004461D0
                              • GetAce.ADVAPI32(?,00000000,?), ref: 0044620D
                              • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00446229
                              • GetLengthSid.ADVAPI32(?), ref: 00446241
                              • GetLengthSid.ADVAPI32(?,00000008,?), ref: 0044626A
                              • CopySid.ADVAPI32(00000000), ref: 00446271
                              • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 004462A3
                              • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 004462C5
                              • SetUserObjectSecurity.USER32(?,00000004,?), ref: 004462D8
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: Security$DescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                              • String ID:
                              • API String ID: 1255039815-0
                              • Opcode ID: cf498e736c0040d611dc61921388a4e783ba54ad69564fff20abd6321b712b19
                              • Instruction ID: cbecfdc94e872455e881353a2ef69e95113e06a92746e25f2a634f38edc45108
                              • Opcode Fuzzy Hash: cf498e736c0040d611dc61921388a4e783ba54ad69564fff20abd6321b712b19
                              • Instruction Fuzzy Hash: C251BC71A00209BBEB10EFA1CD84EEFB778BF49704F01855EF515A7241D6B8DA05CB69
                              APIs
                              • __swprintf.LIBCMT ref: 00433073
                              • __swprintf.LIBCMT ref: 00433085
                              • __wcsicoll.LIBCMT ref: 00433092
                              • FindResourceW.KERNEL32(?,?,0000000E), ref: 004330A5
                              • LoadResource.KERNEL32(?,00000000), ref: 004330BD
                              • LockResource.KERNEL32(00000000), ref: 004330CA
                              • FindResourceW.KERNEL32(?,?,00000003), ref: 004330F7
                              • LoadResource.KERNEL32(?,00000000), ref: 00433105
                              • SizeofResource.KERNEL32(?,00000000), ref: 00433114
                              • LockResource.KERNEL32(?), ref: 00433120
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: Resource$FindLoadLock__swprintf$Sizeof__wcsicoll
                              • String ID:
                              • API String ID: 1158019794-0
                              • Opcode ID: b140e135c5f727b40d296f2f4b3108eaeb1a217ee9fa6a28346dce69b8385e70
                              • Instruction ID: 48d2d5a3af9b637b7fc6f2c6b5a7fdd3517197a5f8dc2ef3994740021b7ed835
                              • Opcode Fuzzy Hash: b140e135c5f727b40d296f2f4b3108eaeb1a217ee9fa6a28346dce69b8385e70
                              • Instruction Fuzzy Hash: C741F1322002146BDB10EF65EC84FAB37ADEB89321F00846BFD01C6245E779DA51C7A8
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                              • String ID:
                              • API String ID: 1737998785-0
                              • Opcode ID: bc1c5a0e04e7211697dd638385d424d337038878635646daacac479226a8eb74
                              • Instruction ID: d84b136cee2c902db59abfe4f82a3f409d39725fe24efd6a62fd8a04edebb5dd
                              • Opcode Fuzzy Hash: bc1c5a0e04e7211697dd638385d424d337038878635646daacac479226a8eb74
                              • Instruction Fuzzy Hash: 334114726001119FC310EFA5EC89B5EB7A4FF54315F00856EF909EB3A1EB75A941CB88
                              APIs
                                • Part of subcall function 00456391: GetCursorPos.USER32(?), ref: 004563A6
                                • Part of subcall function 00456391: ScreenToClient.USER32(?,?), ref: 004563C3
                                • Part of subcall function 00456391: GetAsyncKeyState.USER32(?), ref: 00456400
                                • Part of subcall function 00456391: GetAsyncKeyState.USER32(?), ref: 00456410
                              • NtdllDialogWndProc_W.USER32(?,00000205,?,?), ref: 00471145
                              • 6F13C580.COMCTL32(00000000), ref: 00471163
                              • 6F13C6F0.COMCTL32 ref: 00471169
                              • ReleaseCapture.USER32 ref: 0047116F
                              • SetWindowTextW.USER32(?,00000000), ref: 00471206
                              • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 00471216
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: AsyncState$C580CaptureClientCursorDialogMessageNtdllProc_ReleaseScreenSendTextWindow
                              • String ID: @GUI_DRAGFILE$@GUI_DROPID
                              • API String ID: 4205032950-2107944366
                              • Opcode ID: 20a5a3ce7c175183900f948b12cd71fc676271c7bfbce6bb48b8262f94f29e03
                              • Instruction ID: f70d9246110d4513cc5ea0640624bfdb04bec8758509bedf4130776013c57ff9
                              • Opcode Fuzzy Hash: 20a5a3ce7c175183900f948b12cd71fc676271c7bfbce6bb48b8262f94f29e03
                              • Instruction Fuzzy Hash: D751E5706002109FD700EF59CC85BAF77A5FB89310F004A6EF945A72E2DB789D45CBAA
                              APIs
                              • SetErrorMode.KERNEL32(00000001), ref: 0045D627
                              • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,?), ref: 0045D6B5
                              • GetLastError.KERNEL32 ref: 0045D6BF
                              • SetErrorMode.KERNEL32(00000000,?), ref: 0045D751
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: Error$Mode$DiskFreeLastSpace
                              • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                              • API String ID: 4194297153-14809454
                              • Opcode ID: 7585e308607772b0055f7746bf91c511cc03d2319b95ee688ecb5d1da683c46d
                              • Instruction ID: 1f300c266cb1daf6abeae651b696e439ee3a0372042695327ab67fb83666ce96
                              • Opcode Fuzzy Hash: 7585e308607772b0055f7746bf91c511cc03d2319b95ee688ecb5d1da683c46d
                              • Instruction Fuzzy Hash: FE418235D00209DFCB10EFA5C884A9DB7B4FF48315F10846BE905AB352D7799A85CB69
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: _memmove$_strncmp
                              • String ID: @oH$\$^$h
                              • API String ID: 2175499884-3701065813
                              • Opcode ID: 988809b36a944a9929e300e154a4cfc85b4d4f50dea7e6e4a67b5f519bc2876c
                              • Instruction ID: 796dcd1322dc9123c5f4e5533c800aedaabe8dca19c5b95ba0af32eff2573e22
                              • Opcode Fuzzy Hash: 988809b36a944a9929e300e154a4cfc85b4d4f50dea7e6e4a67b5f519bc2876c
                              • Instruction Fuzzy Hash: 4242E170E04249CFEB14CF69C8806AEBBF2FF85304F2481AAD856AB351D7399946CF55
                              APIs
                              • socket.WSOCK32(00000002,00000001,00000006,00000000), ref: 0046530D
                              • WSAGetLastError.WSOCK32(00000000), ref: 0046531C
                              • bind.WSOCK32(00000000,?,00000010), ref: 00465356
                              • WSAGetLastError.WSOCK32(00000000), ref: 00465363
                              • closesocket.WSOCK32(00000000,00000000), ref: 00465377
                              • listen.WSOCK32(00000000,00000005), ref: 00465381
                              • WSAGetLastError.WSOCK32(00000000), ref: 004653A9
                              • closesocket.WSOCK32(00000000,00000000), ref: 004653BD
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: ErrorLast$closesocket$bindlistensocket
                              • String ID:
                              • API String ID: 540024437-0
                              • Opcode ID: 56b395d1b7441155ee1d78469f99a9871a9e2360f64803e3ab449944eb02724f
                              • Instruction ID: 689f190a2b8ca197395c4559ba4ec64c13dad074e2778b61c05f6be918bdb8b0
                              • Opcode Fuzzy Hash: 56b395d1b7441155ee1d78469f99a9871a9e2360f64803e3ab449944eb02724f
                              • Instruction Fuzzy Hash: A8319331200500ABD310EF25DD89B6EB7A8EF44725F10866EF855E73D1DBB4AC818B99
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID:
                              • String ID: ERCP$VUUU$VUUU$VUUU$XjH
                              • API String ID: 0-2872873767
                              • Opcode ID: 34fecdbc504fccc055e136d4951117c2a740426f4eee1b738e863fbded63ce7f
                              • Instruction ID: d175e7d0ae6fb3d700f9da8fb6b70819649eb02c4ceaf458d011f7582104736e
                              • Opcode Fuzzy Hash: 34fecdbc504fccc055e136d4951117c2a740426f4eee1b738e863fbded63ce7f
                              • Instruction Fuzzy Hash: D772D871A042198BEF24CF58C8807AEB7F1EB42314F25829BD859A7380D7799DC5CF5A
                              APIs
                              • GetSystemMetrics.USER32(0000000F), ref: 00440527
                              • MoveWindow.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00440763
                              • SendMessageW.USER32(?,00000142,00000000,0000FFFF), ref: 00440782
                              • InvalidateRect.USER32(?,00000000,00000001), ref: 004407A5
                              • SendMessageW.USER32(?,00000469,?,00000000), ref: 004407DA
                              • ShowWindow.USER32(?,00000000,?,00000469,?,00000000), ref: 004407FD
                              • NtdllDialogWndProc_W.USER32(?,00000005,?,?), ref: 00440817
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: MessageSendWindow$DialogInvalidateMetricsMoveNtdllProc_RectShowSystem
                              • String ID:
                              • API String ID: 2044739998-0
                              • Opcode ID: d4bac657e1d3c25226f3662cee365975ebc34d7204b8b764d69e27e9e2fa035e
                              • Instruction ID: 469fbb3f3db71b9324cb07d082b932f31bc4dcc79b85a5821822f518eef070f3
                              • Opcode Fuzzy Hash: d4bac657e1d3c25226f3662cee365975ebc34d7204b8b764d69e27e9e2fa035e
                              • Instruction Fuzzy Hash: 0BB19F71600619EFEB14CF68C984BAFBBF1FF48301F15851AEA5597280D738BA61CB54
                              APIs
                              • CreateToolhelp32Snapshot.KERNEL32 ref: 00475608
                              • Process32FirstW.KERNEL32(00000000,0000022C), ref: 00475618
                              • __wsplitpath.LIBCMT ref: 00475644
                                • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
                              • _wcscat.LIBCMT ref: 00475657
                              • __wcsicoll.LIBCMT ref: 0047567B
                              • Process32NextW.KERNEL32(00000000,?), ref: 004756AB
                              • CloseHandle.KERNEL32(00000000), ref: 004756BA
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32__wcsicoll__wsplitpath__wsplitpath_helper_wcscat
                              • String ID:
                              • API String ID: 2547909840-0
                              • Opcode ID: 9e44ac92eedd99fdf3f2932738b6949334d3f24a3592eb41664da5fdf167909f
                              • Instruction ID: 52239f647ae7113ca4c6e3167181772f82882466072c53a1302db900a9aecbbd
                              • Opcode Fuzzy Hash: 9e44ac92eedd99fdf3f2932738b6949334d3f24a3592eb41664da5fdf167909f
                              • Instruction Fuzzy Hash: B3518671900618ABDB10DF55CD85FDE77B8EF44704F1084AAF509AB282DA75AF84CF68
                              APIs
                                • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                              • FindFirstFileW.KERNEL32(?,?), ref: 004524DF
                              • Sleep.KERNEL32(0000000A), ref: 0045250B
                              • FindNextFileW.KERNEL32(?,?), ref: 004525E9
                              • FindClose.KERNEL32(?), ref: 004525FF
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: Find$File$CloseFirstNextSleep_memmove_wcslen
                              • String ID: *.*$\VH
                              • API String ID: 2786137511-2657498754
                              • Opcode ID: 952b61541a12346a9a2631e93aef0720ba9757898c7ad2f9180af277910d7a38
                              • Instruction ID: de376bcde865418ddd8e10142a6165d1fec8b8ecf5afc9fd422e88b207ce0255
                              • Opcode Fuzzy Hash: 952b61541a12346a9a2631e93aef0720ba9757898c7ad2f9180af277910d7a38
                              • Instruction Fuzzy Hash: 37417F7190021DABDB14DF64CD58AEE77B4AF49305F14445BEC09A3281E678EE49CB98
                              APIs
                              • IsDebuggerPresent.KERNEL32 ref: 00421FC1
                              • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00421FD6
                              • UnhandledExceptionFilter.KERNEL32(pqI), ref: 00421FE1
                              • GetCurrentProcess.KERNEL32(C0000409), ref: 00421FFD
                              • TerminateProcess.KERNEL32(00000000), ref: 00422004
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                              • String ID: pqI
                              • API String ID: 2579439406-2459173057
                              • Opcode ID: 25dc777f16e4295b66819c01749bb17431433dcbcd396824bac5e12fb106518c
                              • Instruction ID: 2caf929301e55fbdfba35cdc3931bb3174c20cf3198a7c5bb5494214f042e870
                              • Opcode Fuzzy Hash: 25dc777f16e4295b66819c01749bb17431433dcbcd396824bac5e12fb106518c
                              • Instruction Fuzzy Hash: 9E21CDB45392059FCB50DF65FE456483BA4BB68304F5005BBF90987371E7B969818F0D
                              APIs
                              • __wcsicoll.LIBCMT ref: 00433349
                              • mouse_event.USER32(00000800,00000000,00000000,00000078,00000000), ref: 0043335F
                              • __wcsicoll.LIBCMT ref: 00433375
                              • mouse_event.USER32(00000800,00000000,00000000,00000088,00000000), ref: 0043338B
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: __wcsicollmouse_event
                              • String ID: DOWN
                              • API String ID: 1033544147-711622031
                              • Opcode ID: 3af7a305a716ba131119f47d61043d9bc75f7fbd5de0530911e4e2de0579c383
                              • Instruction ID: c5effa3e7e2998e6ee15a8e10ce6e2e5d36a5fc043d4170c53cc9f091e4fe068
                              • Opcode Fuzzy Hash: 3af7a305a716ba131119f47d61043d9bc75f7fbd5de0530911e4e2de0579c383
                              • Instruction Fuzzy Hash: 78F0A0726846103AF80026947C02EFB334C9B26767F004023FE0CD1280EA59290557BD
                              APIs
                              • GetKeyboardState.USER32(?), ref: 0044C3D2
                              • SetKeyboardState.USER32(00000080), ref: 0044C3F6
                              • PostMessageW.USER32(00000000,00000101,?,?), ref: 0044C43A
                              • PostMessageW.USER32(00000000,00000105,?,?), ref: 0044C472
                              • SendInput.USER32(00000001,?,0000001C), ref: 0044C4FF
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: KeyboardMessagePostState$InputSend
                              • String ID:
                              • API String ID: 3031425849-0
                              • Opcode ID: 0ab52cc7f1a00f618f34bf6b1006ae93bda3478e58ada741bb1ac89fd44d8d1c
                              • Instruction ID: ca9f4cb769efad0e1be190fe8763212e5a79bd7c4ee8908ff6f5a5d8a4a0dc9b
                              • Opcode Fuzzy Hash: 0ab52cc7f1a00f618f34bf6b1006ae93bda3478e58ada741bb1ac89fd44d8d1c
                              • Instruction Fuzzy Hash: 4D415D755001082AEB109FA9DCD5BFFBB68AF96320F04815BFD8456283C378D9518BF8
                              APIs
                                • Part of subcall function 00465225: inet_addr.WSOCK32(?), ref: 00465249
                              • socket.WSOCK32(00000002,00000002,00000011,?,00000000), ref: 0047666F
                              • WSAGetLastError.WSOCK32(00000000), ref: 00476692
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: ErrorLastinet_addrsocket
                              • String ID:
                              • API String ID: 4170576061-0
                              • Opcode ID: beba4ad3326242fe02a37a331f69581919bdb462f679bf8c0e3d41d719e28549
                              • Instruction ID: b6cffcacb6afaf0b8cd9bee7f3c7ce362d61c656181a10c6507bcc72ef542d5a
                              • Opcode Fuzzy Hash: beba4ad3326242fe02a37a331f69581919bdb462f679bf8c0e3d41d719e28549
                              • Instruction Fuzzy Hash: 604129326002005BD710EF39DC86F5A73D59F44728F15866FF944AB3C2DABAEC418799
                              APIs
                              • GetCursorPos.USER32(?), ref: 004478E2
                              • TrackPopupMenuEx.USER32(00000000,00000000,?,?,?,00000000), ref: 004478FC
                              • NtdllDialogWndProc_W.USER32(?,0000007B,?,?), ref: 0044791D
                              • GetCursorPos.USER32(00000000), ref: 0044796A
                              • TrackPopupMenuEx.USER32(02F863C0,00000000,00000000,?,?,00000000), ref: 00447991
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: CursorMenuPopupTrack$DialogNtdllProc_
                              • String ID:
                              • API String ID: 192203443-0
                              • Opcode ID: 3a0c1b1e924032964aae082f89503a6e76aba0c647238f1368234d9f75c94910
                              • Instruction ID: 8079d3ea29232e2d8a780d7c6517a0c600664366e77620ab1eef72d1e193e80f
                              • Opcode Fuzzy Hash: 3a0c1b1e924032964aae082f89503a6e76aba0c647238f1368234d9f75c94910
                              • Instruction Fuzzy Hash: EF31CF75600108AFE724CF59DC88FABB768EB89310F20455AF94587391C775AC53CBA8
                              APIs
                              • GetClientRect.USER32(?,?), ref: 004479CC
                              • GetCursorPos.USER32(?), ref: 004479D7
                              • ScreenToClient.USER32(?,?), ref: 004479F3
                              • WindowFromPoint.USER32(?,?), ref: 00447A34
                              • NtdllDialogWndProc_W.USER32(?,00000020,?,?), ref: 00447AAD
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: Client$CursorDialogFromNtdllPointProc_RectScreenWindow
                              • String ID:
                              • API String ID: 4176674648-0
                              • Opcode ID: 0f9a8e9b3e4e036e66763aee309a2391e7a5810cceb8633c4940fa55a949c157
                              • Instruction ID: a7e7621e8492875af53c289f1ad187460d50aec5ad556b3834d9a5cb4abdf121
                              • Opcode Fuzzy Hash: 0f9a8e9b3e4e036e66763aee309a2391e7a5810cceb8633c4940fa55a949c157
                              • Instruction Fuzzy Hash: B831A2741082029FE710DF69D884D7FB7A4FB89314F144A1EF850D7291D774E946CBA6
                              APIs
                                • Part of subcall function 0046F3C1: IsWindow.USER32(00000000), ref: 0046F3F1
                              • IsWindowVisible.USER32 ref: 0047A368
                              • IsWindowEnabled.USER32 ref: 0047A378
                              • GetForegroundWindow.USER32(?,?,?,00000001), ref: 0047A385
                              • IsIconic.USER32 ref: 0047A393
                              • IsZoomed.USER32 ref: 0047A3A1
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: Window$EnabledForegroundIconicVisibleZoomed
                              • String ID:
                              • API String ID: 292994002-0
                              • Opcode ID: 0a48a302b729025e65be405b7f5f19fe679dbad6397f14c7d9a4bdd7ec3e43df
                              • Instruction ID: 143e3079ffab126fd184b85051f6534cdea6adf6d01d93e69c1b4810180b6228
                              • Opcode Fuzzy Hash: 0a48a302b729025e65be405b7f5f19fe679dbad6397f14c7d9a4bdd7ec3e43df
                              • Instruction Fuzzy Hash: 8F11A2322001119BE3219F2ADC05B9FB798AF80715F15842FF849E7250DBB8E85187A9
                              APIs
                                • Part of subcall function 004426CD: _wcslen.LIBCMT ref: 004426F9
                              • CoInitialize.OLE32(00000000), ref: 00478442
                              • CoCreateInstance.OLE32(00482A08,00000000,00000001,004828A8,?), ref: 0047845B
                              • CoUninitialize.OLE32 ref: 0047863C
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: CreateInitializeInstanceUninitialize_wcslen
                              • String ID: .lnk
                              • API String ID: 886957087-24824748
                              • Opcode ID: a78490bbd6710ed4fb80770143ba5b6b6d69e34379d2ac1719b679a46047f49b
                              • Instruction ID: cf4755465b87a828534c2837f83e1451e93ee4f6fe559e45c0b7480b45348b92
                              • Opcode Fuzzy Hash: a78490bbd6710ed4fb80770143ba5b6b6d69e34379d2ac1719b679a46047f49b
                              • Instruction Fuzzy Hash: 17816D70344301AFD210EB54CC82F5AB3E5AFC8B18F10896EF658DB2D1DAB5E945CB96
                              APIs
                              • GetParent.USER32(?), ref: 004503C8
                              • NtdllDialogWndProc_W.USER32(?,00000138,?,?), ref: 00450417
                              • NtdllDialogWndProc_W.USER32(?,00000133,?,?), ref: 00450466
                              • NtdllDialogWndProc_W.USER32(?,00000134,?,?), ref: 00450497
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: DialogNtdllProc_$Parent
                              • String ID:
                              • API String ID: 3146699748-0
                              • Opcode ID: 953005dfd523491bc8661b2d189c1fe3a1d27544861a9947cd3b684206b02ae0
                              • Instruction ID: 48835c6935d03606f494e5d0f95072c3389227be5880c4b08380f2331de9f088
                              • Opcode Fuzzy Hash: 953005dfd523491bc8661b2d189c1fe3a1d27544861a9947cd3b684206b02ae0
                              • Instruction Fuzzy Hash: F231B73A2001046BD720CF18DC94DAB7719EF97335B14461BFA298B3D3CB759856C769
                              APIs
                              • OpenClipboard.USER32(?), ref: 0046DCE7
                              • IsClipboardFormatAvailable.USER32(0000000D), ref: 0046DCF5
                              • GetClipboardData.USER32(0000000D), ref: 0046DD01
                              • CloseClipboard.USER32 ref: 0046DD0D
                              • GlobalLock.KERNEL32(00000000), ref: 0046DD37
                              • CloseClipboard.USER32 ref: 0046DD41
                              • IsClipboardFormatAvailable.USER32(00000001), ref: 0046DD81
                              • GetClipboardData.USER32(00000001), ref: 0046DD8D
                              • CloseClipboard.USER32 ref: 0046DD99
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: Clipboard$Close$AvailableDataFormat$GlobalLockOpen
                              • String ID:
                              • API String ID: 15083398-0
                              • Opcode ID: 15add7cba21d4e7b0994eb4f29ae7fc89ecef22f443925247f1b4e4ac981ab14
                              • Instruction ID: df02eb04a95629b292fb88db9571ebb8a4b5ed240788a0c572d8156b6d3d2bc0
                              • Opcode Fuzzy Hash: 15add7cba21d4e7b0994eb4f29ae7fc89ecef22f443925247f1b4e4ac981ab14
                              • Instruction Fuzzy Hash: 1A0128326042416BC311BBB99C8596E7B64EF4A324F04097FF984A72C1EB74A912C3A9
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: _memmove
                              • String ID: U$\
                              • API String ID: 4104443479-100911408
                              • Opcode ID: 8409e1e1a3b6e8568ef346b3eec2e6609d783923d36277a6c09bfee55c093031
                              • Instruction ID: 961864e7757f6edfa256f53df2fe8495351bb1c33360f7104140ceff5b52ad59
                              • Opcode Fuzzy Hash: 8409e1e1a3b6e8568ef346b3eec2e6609d783923d36277a6c09bfee55c093031
                              • Instruction Fuzzy Hash: 7002A070E002499FEF28CF69C4907AEBBF2AF95304F2481AED45297381D7396D4ACB55
                              APIs
                              • FindFirstFileW.KERNEL32(00000000,?,?), ref: 0045CB1F
                              • FindNextFileW.KERNEL32(00000000,?), ref: 0045CB7C
                              • FindClose.KERNEL32(00000000,00000001,00000000), ref: 0045CBAB
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: Find$File$CloseFirstNext
                              • String ID:
                              • API String ID: 3541575487-0
                              • Opcode ID: b82a98c6df9a243ef4fbf3c667c5144d50f68704456ba494e21579813087d3e5
                              • Instruction ID: f333144462bda28c064cc07c1e05bb1389ec512a64b809c533c1c3d7cc497df0
                              • Opcode Fuzzy Hash: b82a98c6df9a243ef4fbf3c667c5144d50f68704456ba494e21579813087d3e5
                              • Instruction Fuzzy Hash: 6741DF716003019FC710EF69D881A9BB3E5FF89315F108A6EE9698B351DB75F844CB94
                              APIs
                              • GetFileAttributesW.KERNEL32(?,00000000), ref: 004339C7
                              • FindFirstFileW.KERNEL32(?,?), ref: 004339D8
                              • FindClose.KERNEL32(00000000), ref: 004339EB
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: FileFind$AttributesCloseFirst
                              • String ID:
                              • API String ID: 48322524-0
                              • Opcode ID: 957631a30c41d6cd228e989780156951a90b63876f33aac8b2b1d3c9657f363e
                              • Instruction ID: b419dbaef297d354eb99830e4178f101d1a7f75c7260f3cbf0392e7d05c3e8e7
                              • Opcode Fuzzy Hash: 957631a30c41d6cd228e989780156951a90b63876f33aac8b2b1d3c9657f363e
                              • Instruction Fuzzy Hash: 22E092328145189B8610AA78AC0D4EE779CDF0A236F100B56FE38C21E0D7B49A9047DA
                              APIs
                              • InternetQueryDataAvailable.WININET(?,?,00000000,00000000), ref: 0044231E
                              • InternetReadFile.WININET(?,00000000,?,?), ref: 00442356
                                • Part of subcall function 004422CB: GetLastError.KERNEL32 ref: 004422E1
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: Internet$AvailableDataErrorFileLastQueryRead
                              • String ID:
                              • API String ID: 901099227-0
                              • Opcode ID: a84f1234d60d0bfd4ae1c18445e4b4f4e353c9d3ff10812a8b0aa1e25e6dfae4
                              • Instruction ID: 2cb050104b41b6b223ad4d4b8d529f91c68f3ac810c45c6f1fc1690b5501c343
                              • Opcode Fuzzy Hash: a84f1234d60d0bfd4ae1c18445e4b4f4e353c9d3ff10812a8b0aa1e25e6dfae4
                              • Instruction Fuzzy Hash: B32174752002047BFB10DE26DC41FAB73A8EB54765F40C42BFE059A141D6B8E5458BA5
                              APIs
                              • GetParent.USER32(?), ref: 004503C8
                              • NtdllDialogWndProc_W.USER32(?,00000138,?,?), ref: 00450417
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: DialogNtdllParentProc_
                              • String ID:
                              • API String ID: 2395719762-0
                              • Opcode ID: 257248ebf188e141d38afd5c48be2ff607e0986a31bd54eef4ebc635ce2a3468
                              • Instruction ID: c99212cd859981529d564057689d428d6c5f9a70333a9b0d3c053c51a1006402
                              • Opcode Fuzzy Hash: 257248ebf188e141d38afd5c48be2ff607e0986a31bd54eef4ebc635ce2a3468
                              • Instruction Fuzzy Hash: 6911D6351062C0ABD7139B38CC8589B3F68DE43335B18069BF9984F2A3CA344849CB6B
                              APIs
                              • NtdllDialogWndProc_W.USER32(?,00000114,00000000,?), ref: 0046A41E
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: DialogNtdllProc_
                              • String ID:
                              • API String ID: 3239928679-0
                              • Opcode ID: 48e87686a5ea7b01e998f9eaac7baca7642045ed066bdf8ff442be2b7787ab7b
                              • Instruction ID: c63ea47e1094e29e9280ddef29c929305bd4827c6ad27dba34d4d07e9709e350
                              • Opcode Fuzzy Hash: 48e87686a5ea7b01e998f9eaac7baca7642045ed066bdf8ff442be2b7787ab7b
                              • Instruction Fuzzy Hash: DF1127322001046BDB10CB04DC849AB7B24EF86324F20811BF60597282CF799C62DBA6
                              APIs
                              • SendMessageW.USER32(?,00000401,00000000,00000000), ref: 00447B1B
                              • NtdllDialogWndProc_W.USER32(?,0000002B,?,?), ref: 00447B41
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: DialogMessageNtdllProc_Send
                              • String ID:
                              • API String ID: 3814093946-0
                              • Opcode ID: 4cacbd902a3e8074bd40219f09cd08209c02a14dfdcaa0ba7cf7d9d990aaa468
                              • Instruction ID: c1d44d43ee376328972d656b5f00bca06b75d59f5ecfdf91114eb8bc10ef771e
                              • Opcode Fuzzy Hash: 4cacbd902a3e8074bd40219f09cd08209c02a14dfdcaa0ba7cf7d9d990aaa468
                              • Instruction Fuzzy Hash: C611C832200250ABE220DF45EC84FABB769FBD6728F10462FF6404B290C775A846C765
                              APIs
                                • Part of subcall function 00456391: GetCursorPos.USER32(?), ref: 004563A6
                                • Part of subcall function 00456391: ScreenToClient.USER32(?,?), ref: 004563C3
                                • Part of subcall function 00456391: GetAsyncKeyState.USER32(?), ref: 00456400
                                • Part of subcall function 00456391: GetAsyncKeyState.USER32(?), ref: 00456410
                              • NtdllDialogWndProc_W.USER32(?,00000201,?), ref: 00462A03
                              • NtdllDialogWndProc_W.USER32(?,00000204,?,00000000), ref: 00462A24
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: AsyncDialogNtdllProc_State$ClientCursorScreen
                              • String ID:
                              • API String ID: 2121657457-0
                              • Opcode ID: 3aa67e009f936217d0391dd0aa5e8dd8940afc03e729d5e986ef420fd54892e7
                              • Instruction ID: 08c67b91cd2399f8ba12915c6cae0ffbb32616dfeb2567f7c91428428e8fa67e
                              • Opcode Fuzzy Hash: 3aa67e009f936217d0391dd0aa5e8dd8940afc03e729d5e986ef420fd54892e7
                              • Instruction Fuzzy Hash: 76018172240124BBE7049F86EC99DFFB76CEB85762F10402BFA4197192C6B59811CBB5
                              APIs
                              • NtdllDialogWndProc_W.USER32(?,?,?,?), ref: 0047EA9E
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: DialogNtdllProc_
                              • String ID:
                              • API String ID: 3239928679-0
                              • Opcode ID: abcbf0d1afc1a497e280cfdffd4bd47b828388575322d1f456f5668f6881d692
                              • Instruction ID: f892bfb12232205f5f58103f0897237a3558493ed3735c4837d976d353c396a9
                              • Opcode Fuzzy Hash: abcbf0d1afc1a497e280cfdffd4bd47b828388575322d1f456f5668f6881d692
                              • Instruction Fuzzy Hash: 82B1167330C1182DF218A6AABC81EFF679CD7C5779B10863FF248C55C2D62B5821A1B9
                              APIs
                              • NtdllDialogWndProc_W.USER32(?,00000112,?,?), ref: 00454E27
                                • Part of subcall function 0044A2D2: GetForegroundWindow.USER32(?,?,00454D9F), ref: 0044A2D4
                                • Part of subcall function 0044A2D2: GetFocus.USER32 ref: 0044A2DC
                                • Part of subcall function 0044A2D2: SendMessageW.USER32(?,000000B0,-000001C0,000001C4), ref: 0044A34E
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: DialogFocusForegroundMessageNtdllProc_SendWindow
                              • String ID:
                              • API String ID: 3709282597-0
                              • Opcode ID: 2a1abc26f848726e463eeb31abb0a79edbc8a7602353227157934bc66e6abeed
                              • Instruction ID: 0d7498517a66c8e0d20d87096163d77891ca4f2c4ab911853f7c76cc33d73eb4
                              • Opcode Fuzzy Hash: 2a1abc26f848726e463eeb31abb0a79edbc8a7602353227157934bc66e6abeed
                              • Instruction Fuzzy Hash: 0A21263168411535F7341A15CD06FBB2618E79272BF20022FFE50991D3CADC5CD9A23E
                              APIs
                              • NtdllDialogWndProc_W.USER32(?,00000006,?,?), ref: 004404DC
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: DialogNtdllProc_
                              • String ID:
                              • API String ID: 3239928679-0
                              • Opcode ID: 2b72283bca5b9e831272dd2a7d53a0b5c7148644ca1e9fa5d4a4720e5b910540
                              • Instruction ID: 57bcafdb766b4b2a09d5adb44fbeadd94fd8413be8ed8c1894e52dfe49116fd8
                              • Opcode Fuzzy Hash: 2b72283bca5b9e831272dd2a7d53a0b5c7148644ca1e9fa5d4a4720e5b910540
                              • Instruction Fuzzy Hash: 1EF0B471500254ABE7148F05DC40A7B7B79EB86720F20461EFA144B280CB75AC62CBF4
                              APIs
                              • NtdllDialogWndProc_W.USER32(?,00000053,?,?), ref: 004403A3
                                • Part of subcall function 00430B0F: CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,004A9568,004A9554), ref: 00430B6C
                                • Part of subcall function 00430B0F: CloseHandle.KERNEL32(00000000), ref: 00430B7D
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: CloseCreateDialogHandleNtdllProc_Process
                              • String ID:
                              • API String ID: 4178364262-0
                              • Opcode ID: 18637488ffc27074e36ea774df1fe185273bfafa6678f284e57b2aa28cd93e6f
                              • Instruction ID: b7a625ee7c2def1aa5d9f3d540ff339fd2ef2d8d1ff8bada222fa30ad2921ed2
                              • Opcode Fuzzy Hash: 18637488ffc27074e36ea774df1fe185273bfafa6678f284e57b2aa28cd93e6f
                              • Instruction Fuzzy Hash: B9F06D76240218ABDB00EF88EC50D9B73ADEF8D355B00881AFE449B341CB74BD60CBA4
                              APIs
                              • NtdllDialogWndProc_W.USER32(?,00000232,?,?), ref: 00454D3F
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: DialogNtdllProc_
                              • String ID:
                              • API String ID: 3239928679-0
                              • Opcode ID: 8b2826b66b2b31c60da67efd8c1127cd395e8061a58d0ebf04d064e84851811b
                              • Instruction ID: 9a3c2df9a808ce5be259132a16ac8c8eacf78c0d12b80627a94478e4176c466c
                              • Opcode Fuzzy Hash: 8b2826b66b2b31c60da67efd8c1127cd395e8061a58d0ebf04d064e84851811b
                              • Instruction Fuzzy Hash: DCF08C70244208BBE310DE48CC45F9B7BA8EB4A715F508109F958572D2CAB07844CBA5
                              APIs
                                • Part of subcall function 00430CCB: FreeLibrary.KERNEL32(?), ref: 00430CD8
                              • NtdllDialogWndProc_W.USER32(?,0000031A,?,?), ref: 0044789F
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: DialogFreeLibraryNtdllProc_
                              • String ID:
                              • API String ID: 4233852882-0
                              • Opcode ID: 2bb9f87cd0a41e8130f62da48c4106c6c5914e99f78363fa9e43659e77d0986b
                              • Instruction ID: fc5b3b6852e979a31c658b193d70e7a126e9e4bfaffbe52d983344414c160798
                              • Opcode Fuzzy Hash: 2bb9f87cd0a41e8130f62da48c4106c6c5914e99f78363fa9e43659e77d0986b
                              • Instruction Fuzzy Hash: 79E0EDB5D15218BBDB00EFB5DC498EEB7ACEB88301B00896AFC1193241D6749A118FA5
                              APIs
                              • BlockInput.USER32(00000001), ref: 0045A38B
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: BlockInput
                              • String ID:
                              • API String ID: 3456056419-0
                              • Opcode ID: 458ede1686394d551c7eb4c8b41db034409c2976cc7efd11918dc51f9e1a79d5
                              • Instruction ID: ec784d9e1adcb2c5bdb0852901797f150ca91aa996cd98963819779bf85d9a24
                              • Opcode Fuzzy Hash: 458ede1686394d551c7eb4c8b41db034409c2976cc7efd11918dc51f9e1a79d5
                              • Instruction Fuzzy Hash: D8E0DF352002029FC300EF66C84495AB7E8EF94368F10883EFD45D7341EA74E80087A6
                              APIs
                              • NtdllDialogWndProc_W.USER32(?,00000007,?,00000000), ref: 00447B7E
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: DialogNtdllProc_
                              • String ID:
                              • API String ID: 3239928679-0
                              • Opcode ID: 8e6373e291cc12f70f08d4f4410b7c8524115a22fdba9030887a55257885973c
                              • Instruction ID: 312b02e0ec000ae8217ec3e2a2b597e760e3ea2cc33aa0823c57154ec146f294
                              • Opcode Fuzzy Hash: 8e6373e291cc12f70f08d4f4410b7c8524115a22fdba9030887a55257885973c
                              • Instruction Fuzzy Hash: F0E08635640114BFD600EF85DC51FEB772CEF8A754F20800AFA044B291CA75F802CBA9
                              APIs
                              • LogonUserW.ADVAPI32(?,?,?,?,00000000,?), ref: 00436CF9
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: LogonUser
                              • String ID:
                              • API String ID: 1244722697-0
                              • Opcode ID: 58321df28e67eb099ee318ec18723cdf01b8a378577a77c5fc1e9d8837392bcc
                              • Instruction ID: 7208d1371e48addad7a82bf776aec5a394cd9d1c10cc53d221989696c058f8f6
                              • Opcode Fuzzy Hash: 58321df28e67eb099ee318ec18723cdf01b8a378577a77c5fc1e9d8837392bcc
                              • Instruction Fuzzy Hash: 4DE0ECB626460EAFDB04CF68DC42EBF37ADA749710F004618BA16D7280C670E911CA74
                              APIs
                              • NtdllDialogWndProc_W.USER32(?,00000212), ref: 0044032E
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: DialogNtdllProc_
                              • String ID:
                              • API String ID: 3239928679-0
                              • Opcode ID: c8074131f37bb21e52515d0e719f0e6372a069fb1b0bf1c5daab0305562a1656
                              • Instruction ID: cdfa3c7c0e358d42617837c3919da1626915cb286f17707c0539985eb8f146ed
                              • Opcode Fuzzy Hash: c8074131f37bb21e52515d0e719f0e6372a069fb1b0bf1c5daab0305562a1656
                              • Instruction Fuzzy Hash: DFE0B675240248AFD700DF48D898D9A77A9EB89700F048458FA554B3A2C6B0B810CB61
                              APIs
                                • Part of subcall function 00470928: DestroyAcceleratorTable.USER32(?), ref: 0047094A
                              • NtdllDialogWndProc_W.USER32(?,00000002,00000000,00000000), ref: 0047134E
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: AcceleratorDestroyDialogNtdllProc_Table
                              • String ID:
                              • API String ID: 2638641937-0
                              • Opcode ID: 1fe523bc3ffe7451472abd685aad30700db2524a9dbb340e0d67ef59a1e13db2
                              • Instruction ID: 049d54cb1fe6716e8d8a3831c4e241097285c9e82ec9b29a3d6a302b973cbdb4
                              • Opcode Fuzzy Hash: 1fe523bc3ffe7451472abd685aad30700db2524a9dbb340e0d67ef59a1e13db2
                              • Instruction Fuzzy Hash: 33D012B26C2324B6E51036965D1BFCFFA5CCF1ABA1F108017F704B60C289E9640086FD
                              APIs
                              • NtdllDialogWndProc_W.USER32(?,00000211), ref: 00440360
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: DialogNtdllProc_
                              • String ID:
                              • API String ID: 3239928679-0
                              • Opcode ID: 5f87cae89cac6f8e2d25e27d115a3a7f1dea2ab8eb24d34981d9022fbff52b9c
                              • Instruction ID: 3c6c68f393c460ac128c5d0723b5b392c07b23a02b9a2d0c15d00fa147821f68
                              • Opcode Fuzzy Hash: 5f87cae89cac6f8e2d25e27d115a3a7f1dea2ab8eb24d34981d9022fbff52b9c
                              • Instruction Fuzzy Hash: A4E0EC75240248AFDB00DF48D898E9B77A9FB89700F048458FA554B3A2C7B0F810CFA1
                              APIs
                              • GetUserNameW.ADVAPI32(?,?), ref: 00472C51
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: NameUser
                              • String ID:
                              • API String ID: 2645101109-0
                              • Opcode ID: b76fc723219d1f30d7a8c85bc8b1429fb957fe091183e5ae036ed6f26941642b
                              • Instruction ID: cbdb53fe1e94bfc77c89611ca4b62432a5518fa0aa6a76fb1323f8d63e00c007
                              • Opcode Fuzzy Hash: b76fc723219d1f30d7a8c85bc8b1429fb957fe091183e5ae036ed6f26941642b
                              • Instruction Fuzzy Hash: C3C04CB5004008EBDB148F50D9889D93B78BB04340F108199B60E95040D7B496C9DBA5
                              APIs
                              • SetUnhandledExceptionFilter.KERNEL32(Function_0001F20E), ref: 0041F255
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: ExceptionFilterUnhandled
                              • String ID:
                              • API String ID: 3192549508-0
                              • Opcode ID: c60cc95176153529ac13be9fefe03fec559109ed9a450e1086cc56a024ff5f26
                              • Instruction ID: fb0c5f5a3ae0de1c345b26270a1521b23addb5e119a177cdcf8b78f668196b28
                              • Opcode Fuzzy Hash: c60cc95176153529ac13be9fefe03fec559109ed9a450e1086cc56a024ff5f26
                              • Instruction Fuzzy Hash: 8190027625150157470417705E1964925905B5960275108BA6D11C8564DAA98089A619
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID:
                              • String ID: N@
                              • API String ID: 0-1509896676
                              • Opcode ID: 92e9a144b7047ce14b539b05f6d9118c1a7fbc1d7368d7adfc1bc9e5646efcc8
                              • Instruction ID: 433aa61276291b0397d7e0efaabfbd78b7095b9e612e68cb1662ee3b8c9c8781
                              • Opcode Fuzzy Hash: 92e9a144b7047ce14b539b05f6d9118c1a7fbc1d7368d7adfc1bc9e5646efcc8
                              • Instruction Fuzzy Hash: 48618E71A003259FCB18CF48D584AAEBBF2FF84310F5AC1AED9095B361C7B59955CB88
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 9ccd90b163c6adb52abe1d2335d475eb1e8f24fdd15ffb4383e0e414a09222a9
                              • Instruction ID: 421b1f2eadcb2952f8febc08502f38db6b120a980ad90a3a21cdce547adf9c29
                              • Opcode Fuzzy Hash: 9ccd90b163c6adb52abe1d2335d475eb1e8f24fdd15ffb4383e0e414a09222a9
                              • Instruction Fuzzy Hash: 132270B7E5151A9BDB08CE95CC415D9B3A3BBC832471F9129D819E7305EE78BA078BC0
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: f02dcea883d10451d84a59732baab65edb0b568fbd8ca007beb23fa60eef1400
                              • Instruction ID: 2bcfc4213c201322ab01e918109ed7ba488288358e1fe6702c600853dbf8b640
                              • Opcode Fuzzy Hash: f02dcea883d10451d84a59732baab65edb0b568fbd8ca007beb23fa60eef1400
                              • Instruction Fuzzy Hash: 9CC1B473D0E6B3058B35466D45182BFFE626E91B8031FC392DDD03F399C22AADA196D4
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 0c69e47d847606dd43a020a10b245ffd8c98205713db3c8f796c6159738d0b06
                              • Instruction ID: 7014f9c6c4bb04029b5f83a2624c32223adacf072d8c068e18a9ecb8bc3ae66d
                              • Opcode Fuzzy Hash: 0c69e47d847606dd43a020a10b245ffd8c98205713db3c8f796c6159738d0b06
                              • Instruction Fuzzy Hash: 04C1A473D1A6B2058B36476D05182BFFE626E91B8031FC3D6CCD03F299C22AAD9596D4
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 21018234ac6c65dce347e9eb3c09d9e563dc327998c84d170fb29f747537f1fa
                              • Instruction ID: 878ae001d8650add2b069b622ec184fb54f95ec25c04ba16196e518284591b6f
                              • Opcode Fuzzy Hash: 21018234ac6c65dce347e9eb3c09d9e563dc327998c84d170fb29f747537f1fa
                              • Instruction Fuzzy Hash: FBC19473D0A6B2068B36476D05582BFFE626E91B8131FC3D2CCD03F299C22AAD9595D4
                              Memory Dump Source
                              • Source File: 00000000.00000002.1348783565.0000000003F83000.00000040.00000020.00020000.00000000.sdmp, Offset: 03F83000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_3f83000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                              • Instruction ID: bbfa6dd8ff0d72f9763b37e8f93c862d925160ee2aa99cb2b1cc5fcb4f753081
                              • Opcode Fuzzy Hash: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                              • Instruction Fuzzy Hash: 7B41A171D1051CEBCF48CFADC991AEEBBF2AF88201F548299D516AB345D730AB41DB90
                              Memory Dump Source
                              • Source File: 00000000.00000002.1348783565.0000000003F83000.00000040.00000020.00020000.00000000.sdmp, Offset: 03F83000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_3f83000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                              • Instruction ID: a6d6138270cf2ce467303b56e0fa49bbcae50e67ca472d1a430028f5d8f827f5
                              • Opcode Fuzzy Hash: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                              • Instruction Fuzzy Hash: F8019279E00209EFCB48EF98C6909AEF7B5FB48310F208599D919E7741D730AE42DB80
                              Memory Dump Source
                              • Source File: 00000000.00000002.1348783565.0000000003F83000.00000040.00000020.00020000.00000000.sdmp, Offset: 03F83000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_3f83000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                              • Instruction ID: 3a7217e880a6dbe0bb421282f6da59cf2b052f7a789f8c0fa6fbfd5c8d3bf975
                              • Opcode Fuzzy Hash: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                              • Instruction Fuzzy Hash: 53018078E01209EFCB48EF98C6909AEF7B5FF48210F208599D909A7701D730AE41DB80
                              Memory Dump Source
                              • Source File: 00000000.00000002.1348783565.0000000003F83000.00000040.00000020.00020000.00000000.sdmp, Offset: 03F83000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_3f83000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                              • Instruction ID: 2052e7d0eb43af8a57a5c2d707c06396f1b84aee57587abda472ed480d51124b
                              • Opcode Fuzzy Hash: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                              • Instruction Fuzzy Hash: 1AB012310527488BC2118B89E008B1073ECA308E04F1000B0D40C07B01827874008D48
                              APIs
                              • DeleteObject.GDI32(?), ref: 0045953B
                              • DeleteObject.GDI32(?), ref: 00459551
                              • 73A35CF0.USER32(?), ref: 00459563
                              • GetDesktopWindow.USER32 ref: 00459581
                              • GetWindowRect.USER32(00000000), ref: 00459588
                              • SetRect.USER32(?,00000000,00000000,000001F4,00000190), ref: 0045969E
                              • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 004596AC
                              • CreateWindowExW.USER32(?,AutoIt v3,00000000,?,88C00000,00000002,00000007,?,?,?,00000000,00000000), ref: 004596E8
                              • GetClientRect.USER32(00000000,?), ref: 004596F8
                              • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,?,00000000,00000000,00000000), ref: 0045973B
                              • CreateFileW.KERNEL32(00000000,000001F4,80000000,00000000,00000000,00000003,00000000,00000000), ref: 00459760
                              • GetFileSize.KERNEL32(00000000,00000000), ref: 0045977B
                              • GlobalAlloc.KERNEL32(00000002,00000000), ref: 00459786
                              • GlobalLock.KERNEL32(00000000), ref: 0045978F
                              • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 0045979E
                              • GlobalUnlock.KERNEL32(00000000), ref: 004597A5
                              • CloseHandle.KERNEL32(00000000), ref: 004597AC
                              • CreateStreamOnHGlobal.OLE32(00000000,00000001,000001F4), ref: 004597B9
                              • OleLoadPicture.OLEAUT32(000001F4,00000000,00000000,004829F8,00000000), ref: 004597D0
                              • GlobalFree.KERNEL32(00000000), ref: 004597E2
                              • CopyImage.USER32(50000001,00000000,00000000,00000000,00002000), ref: 0045980E
                              • SendMessageW.USER32(00000000,00000172,00000000,50000001), ref: 00459831
                              • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020), ref: 00459857
                              • ShowWindow.USER32(?,00000004), ref: 00459865
                              • CreateWindowExW.USER32(00000000,static,00000000,000001F4,50000001,0000000B,0000000B,?,?,?,00000000,00000000), ref: 004598AF
                              • 73A361E0.GDI32(DISPLAY,00000000,00000000,00000000), ref: 004598C3
                              • GetStockObject.GDI32(00000011), ref: 004598CD
                              • SelectObject.GDI32(00000000,00000000), ref: 004598D5
                              • GetTextFaceW.GDI32(00000000,00000040,?), ref: 004598E5
                              • 73A34620.GDI32(00000000,0000005A), ref: 004598EE
                              • DeleteDC.GDI32(00000000), ref: 004598F8
                              • _wcslen.LIBCMT ref: 00459916
                              • _wcscpy.LIBCMT ref: 0045993A
                              • CreateFontW.GDI32(?,00000000,00000000,00000000,00000190,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 004599DB
                              • SendMessageW.USER32(00000000,00000030,00000000,00000001), ref: 004599EF
                              • 73A2A570.USER32(00000000,?,00000000,00000000,00000000,00000190,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 004599FC
                              • SelectObject.GDI32(00000000,?), ref: 00459A0C
                              • SelectObject.GDI32(00000000,00000007), ref: 00459A37
                              • 73A2A480.USER32(00000000,00000000), ref: 00459A42
                              • MoveWindow.USER32(00000000,0000000B,?,?,00000190,00000001), ref: 00459A5F
                              • ShowWindow.USER32(?,00000004,?,00000000,00000000,00000000,00000190,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00459A6D
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: Window$CreateObject$Global$Rect$DeleteFileSelect$MessageSendShow$A34620A361A480A570AdjustAllocClientCloseCopyDesktopFaceFontFreeHandleImageLoadLockMovePictureReadSizeStockStreamTextUnlock_wcscpy_wcslen
                              • String ID: $AutoIt v3$DISPLAY$static
                              • API String ID: 1033470602-2373415609
                              • Opcode ID: 6d6993f212ed0893db9275c3f84f169bec7eeddded5228c42ae13acbc858d7fb
                              • Instruction ID: 0470743097681e939cd033c9659fc80dd101af82a4c7fdd8c03ae3a829a790b9
                              • Opcode Fuzzy Hash: 6d6993f212ed0893db9275c3f84f169bec7eeddded5228c42ae13acbc858d7fb
                              • Instruction Fuzzy Hash: 92027D71600204EFDB14DF64CD89FAE7BB9BB48305F108569FA05AB292D7B4ED05CB68
                              APIs
                              • GetSysColor.USER32(00000012), ref: 0044181E
                              • SetTextColor.GDI32(?,?), ref: 00441826
                              • GetSysColorBrush.USER32(0000000F), ref: 0044183D
                              • GetSysColor.USER32(0000000F), ref: 00441849
                              • SetBkColor.GDI32(?,?), ref: 00441864
                              • SelectObject.GDI32(?,?), ref: 00441874
                              • InflateRect.USER32(?,000000FF,000000FF), ref: 004418AA
                              • GetSysColor.USER32(00000010), ref: 004418B2
                              • CreateSolidBrush.GDI32(00000000), ref: 004418B9
                              • FrameRect.USER32(?,?,00000000), ref: 004418CA
                              • DeleteObject.GDI32(?), ref: 004418D5
                              • InflateRect.USER32(?,000000FE,000000FE), ref: 0044192F
                              • FillRect.USER32(?,?,?), ref: 00441970
                                • Part of subcall function 004308EF: GetSysColor.USER32(0000000E), ref: 00430913
                                • Part of subcall function 004308EF: SetTextColor.GDI32(?,00000000), ref: 0043091B
                                • Part of subcall function 004308EF: GetSysColorBrush.USER32(0000000F), ref: 0043094E
                                • Part of subcall function 004308EF: GetSysColor.USER32(0000000F), ref: 00430959
                                • Part of subcall function 004308EF: GetSysColor.USER32(00000011), ref: 00430979
                                • Part of subcall function 004308EF: CreatePen.GDI32(00000000,00000001,00743C00), ref: 0043098B
                                • Part of subcall function 004308EF: SelectObject.GDI32(?,00000000), ref: 0043099C
                                • Part of subcall function 004308EF: SetBkColor.GDI32(?,?), ref: 004309A6
                                • Part of subcall function 004308EF: SelectObject.GDI32(?,?), ref: 004309B4
                                • Part of subcall function 004308EF: InflateRect.USER32(?,000000FF,000000FF), ref: 004309D9
                                • Part of subcall function 004308EF: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 004309F4
                                • Part of subcall function 004308EF: 73A345F0.USER32(?,000000F0), ref: 00430A09
                                • Part of subcall function 004308EF: SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00430A29
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: Color$Rect$Object$BrushInflateSelect$CreateText$A345DeleteFillFrameMessageRoundSendSolid
                              • String ID:
                              • API String ID: 358562401-0
                              • Opcode ID: 0916c3cf28f962cebf3c58740b3ff5bfe8190551d5af4ba49c76a685ec03c0b9
                              • Instruction ID: 7a723b7ebc9985c742df47702d768576d0729d4f0beaa2415310c4eb73739e4f
                              • Opcode Fuzzy Hash: 0916c3cf28f962cebf3c58740b3ff5bfe8190551d5af4ba49c76a685ec03c0b9
                              • Instruction Fuzzy Hash: 76B15BB1508301AFD304DF64DD88A6FB7F8FB88720F104A2DF996922A0D774E945CB66
                              APIs
                              • 73A35CF0.USER32(?), ref: 004590F2
                              • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 004591AF
                              • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 004591EF
                              • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 00459200
                              • CreateWindowExW.USER32(00000008,AutoIt v3,00000000,?,88C00000,?,?,?,00000001,?,00000000,00000000), ref: 00459242
                              • GetClientRect.USER32(00000000,?), ref: 0045924E
                              • CreateWindowExW.USER32(00000000,static,00000000,?,50000000,?,00000004,00000500,00000018,?,00000000,00000000), ref: 00459290
                              • 73A361E0.GDI32(DISPLAY,00000000,00000000,00000000), ref: 004592A2
                              • GetStockObject.GDI32(00000011), ref: 004592AC
                              • SelectObject.GDI32(00000000,00000000), ref: 004592B4
                              • GetTextFaceW.GDI32(00000000,00000040,?), ref: 004592C4
                              • 73A34620.GDI32(00000000,0000005A), ref: 004592CD
                              • DeleteDC.GDI32(00000000), ref: 004592D6
                              • CreateFontW.GDI32(?,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 0045931C
                              • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00459334
                              • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,?,00000000,00000000,00000000), ref: 0045936E
                              • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00459382
                              • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00459393
                              • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,?,00000000,00000000,00000000), ref: 004593C8
                              • GetStockObject.GDI32(00000011), ref: 004593D3
                              • SendMessageW.USER32(?,00000030,00000000), ref: 004593E3
                              • ShowWindow.USER32(?,00000004,?,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 004593EE
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: Window$Create$MessageSend$ObjectRect$Stock$A34620A361AdjustClientDeleteFaceFontInfoParametersSelectShowSystemText
                              • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                              • API String ID: 397376448-517079104
                              • Opcode ID: 7a94e82ab5e7eba8c21ff2ad013f2909889a905bd0bc04285d9267b4528ddb10
                              • Instruction ID: c5562805fc82c6770b180505aab83e69ed0b4cba248239bed49a3b83ebf26fc7
                              • Opcode Fuzzy Hash: 7a94e82ab5e7eba8c21ff2ad013f2909889a905bd0bc04285d9267b4528ddb10
                              • Instruction Fuzzy Hash: 71A18371B40214BFEB14DF64CD8AFAE7769AB44711F208529FB05BB2D1D6B4AD00CB68
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: __wcsnicmp
                              • String ID: #NoAutoIt3Execute$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#requireadmin$Cannot parse #include$Unterminated group of comments
                              • API String ID: 1038674560-3360698832
                              • Opcode ID: 60e7c0ccc2de36542d37a783a5f9e034653244a609c45985bfd1ff28648e5169
                              • Instruction ID: 9c7d50a5cd0ee83047e92bfb3361563e61671b380f2e7b4b5fccf758bfaba57c
                              • Opcode Fuzzy Hash: 60e7c0ccc2de36542d37a783a5f9e034653244a609c45985bfd1ff28648e5169
                              • Instruction Fuzzy Hash: B5610670701621B7D711AE219C42FAF335C9F50705F50442BFE05AA286FB7DEE8686AE
                              APIs
                              • LoadCursorW.USER32(00000000,00007F89), ref: 00430754
                              • SetCursor.USER32(00000000), ref: 0043075B
                              • LoadCursorW.USER32(00000000,00007F8A), ref: 0043076C
                              • SetCursor.USER32(00000000), ref: 00430773
                              • LoadCursorW.USER32(00000000,00007F03), ref: 00430784
                              • SetCursor.USER32(00000000), ref: 0043078B
                              • LoadCursorW.USER32(00000000,00007F8B), ref: 0043079C
                              • SetCursor.USER32(00000000), ref: 004307A3
                              • LoadCursorW.USER32(00000000,00007F01), ref: 004307B4
                              • SetCursor.USER32(00000000), ref: 004307BB
                              • LoadCursorW.USER32(00000000,00007F88), ref: 004307CC
                              • SetCursor.USER32(00000000), ref: 004307D3
                              • LoadCursorW.USER32(00000000,00007F86), ref: 004307E4
                              • SetCursor.USER32(00000000), ref: 004307EB
                              • LoadCursorW.USER32(00000000,00007F83), ref: 004307FC
                              • SetCursor.USER32(00000000), ref: 00430803
                              • LoadCursorW.USER32(00000000,00007F85), ref: 00430814
                              • SetCursor.USER32(00000000), ref: 0043081B
                              • LoadCursorW.USER32(00000000,00007F82), ref: 0043082C
                              • SetCursor.USER32(00000000), ref: 00430833
                              • LoadCursorW.USER32(00000000,00007F84), ref: 00430844
                              • SetCursor.USER32(00000000), ref: 0043084B
                              • LoadCursorW.USER32(00000000,00007F04), ref: 0043085C
                              • SetCursor.USER32(00000000), ref: 00430863
                              • LoadCursorW.USER32(00000000,00007F02), ref: 00430874
                              • SetCursor.USER32(00000000), ref: 0043087B
                              • SetCursor.USER32(00000000), ref: 00430887
                              • LoadCursorW.USER32(00000000,00007F00), ref: 00430898
                              • SetCursor.USER32(00000000), ref: 0043089F
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: Cursor$Load
                              • String ID:
                              • API String ID: 1675784387-0
                              • Opcode ID: c7473186da6a924b3206e1e01d9541ab2871430d40d1833d6e341d2f3415b8bd
                              • Instruction ID: ada3a8d1d263842f4cf6b5ed80e179871947c4c62c163598e9ab22da256eac1d
                              • Opcode Fuzzy Hash: c7473186da6a924b3206e1e01d9541ab2871430d40d1833d6e341d2f3415b8bd
                              • Instruction Fuzzy Hash: AF3101729C8205B7EA546BE0BE1DF5D3618AB28727F004836F309B54D09AF551509B6D
                              APIs
                              • GetSysColor.USER32(0000000E), ref: 00430913
                              • SetTextColor.GDI32(?,00000000), ref: 0043091B
                              • GetSysColor.USER32(00000012), ref: 00430933
                              • SetTextColor.GDI32(?,?), ref: 0043093B
                              • GetSysColorBrush.USER32(0000000F), ref: 0043094E
                              • GetSysColor.USER32(0000000F), ref: 00430959
                              • CreateSolidBrush.GDI32(?), ref: 00430962
                              • GetSysColor.USER32(00000011), ref: 00430979
                              • CreatePen.GDI32(00000000,00000001,00743C00), ref: 0043098B
                              • SelectObject.GDI32(?,00000000), ref: 0043099C
                              • SetBkColor.GDI32(?,?), ref: 004309A6
                              • SelectObject.GDI32(?,?), ref: 004309B4
                              • InflateRect.USER32(?,000000FF,000000FF), ref: 004309D9
                              • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 004309F4
                              • 73A345F0.USER32(?,000000F0), ref: 00430A09
                              • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00430A29
                              • GetWindowTextW.USER32(00000000,00000000,?), ref: 00430A5A
                              • InflateRect.USER32(?,000000FD,000000FD), ref: 00430A86
                              • DrawFocusRect.USER32(?,?), ref: 00430A91
                              • GetSysColor.USER32(00000011), ref: 00430A9F
                              • SetTextColor.GDI32(?,00000000), ref: 00430AA7
                              • DrawTextW.USER32(?,?,000000FF,?,00000105), ref: 00430ABC
                              • SelectObject.GDI32(?,?), ref: 00430AD0
                              • DeleteObject.GDI32(00000105), ref: 00430ADC
                              • SelectObject.GDI32(?,?), ref: 00430AE3
                              • DeleteObject.GDI32(?), ref: 00430AE9
                              • SetTextColor.GDI32(?,?), ref: 00430AF0
                              • SetBkColor.GDI32(?,?), ref: 00430AFB
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: Color$ObjectText$RectSelect$BrushCreateDeleteDrawInflate$A345FocusMessageRoundSendSolidWindow
                              • String ID:
                              • API String ID: 2831956184-0
                              • Opcode ID: 86b869e5b8bb6c2dba163effb8278b4f001f0824fd106c928e18bea154194c17
                              • Instruction ID: b12033eb3fa9204049de4d7caedd8dcf025edfa44633034d6aae7949f8ecba99
                              • Opcode Fuzzy Hash: 86b869e5b8bb6c2dba163effb8278b4f001f0824fd106c928e18bea154194c17
                              • Instruction Fuzzy Hash: 6F713071900209BFDB04DFA8DD88EAEBBB9FF48710F104619F915A7290D774A941CFA8
                              APIs
                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046BAE6
                              • RegCreateKeyExW.ADVAPI32(?,?,00000000,00484EA8,00000000,?,00000000,?,?,?), ref: 0046BB40
                              • RegCloseKey.ADVAPI32(?,00000001,00000000,00000000,00000000), ref: 0046BB8A
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: CloseConnectCreateRegistry
                              • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                              • API String ID: 3217815495-966354055
                              • Opcode ID: 7d529682ee5fc17807d9f1869fe525bc37d3a13623003215e7c5094f22c59936
                              • Instruction ID: 14c723365299aea1e32a80c9e2d98689f85295d348ed372ee81e16963ac3f886
                              • Opcode Fuzzy Hash: 7d529682ee5fc17807d9f1869fe525bc37d3a13623003215e7c5094f22c59936
                              • Instruction Fuzzy Hash: BCE18171604200ABD710EF65C885F1BB7E8EF88704F14895EB949DB352D739ED41CBA9
                              APIs
                              • GetCursorPos.USER32(?), ref: 004566AE
                              • GetDesktopWindow.USER32 ref: 004566C3
                              • GetWindowRect.USER32(00000000), ref: 004566CA
                              • 73A345F0.USER32(?,000000F0), ref: 00456722
                              • 73A345F0.USER32(?,000000F0), ref: 00456735
                              • 73A35CF0.USER32(?), ref: 00456746
                              • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00456794
                              • SendMessageW.USER32(00000000,00000432,00000000,0000002C), ref: 004567B2
                              • SendMessageW.USER32(?,00000418,00000000,?), ref: 004567C6
                              • SendMessageW.USER32(?,00000439,00000000,0000002C), ref: 004567D6
                              • SendMessageW.USER32(?,00000421,?,?), ref: 004567F6
                              • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 0045680C
                              • IsWindowVisible.USER32(?), ref: 0045682C
                              • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 00456848
                              • SendMessageW.USER32(?,00000411,00000001,0000002C), ref: 0045685C
                              • GetWindowRect.USER32(?,?), ref: 00456873
                              • MonitorFromPoint.USER32(?,00000001,00000002), ref: 00456891
                              • GetMonitorInfoW.USER32(00000000,?), ref: 004568A9
                              • CopyRect.USER32(?,?), ref: 004568BE
                              • SendMessageW.USER32(?,00000412,00000000), ref: 00456914
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: MessageSend$Window$Rect$A345Monitor$CopyCreateCursorDesktopFromInfoPointVisible
                              • String ID: ($,$tooltips_class32
                              • API String ID: 1881922274-3320066284
                              • Opcode ID: d36279d6046af7916fa8cb53b873a9c87cdaa8c87180e7b1c59dea88ca998a74
                              • Instruction ID: fcdb4dd5bfb9c4cfeeadc9569793f3eee26ed74f2078e1bfb0220ba6a1b85fea
                              • Opcode Fuzzy Hash: d36279d6046af7916fa8cb53b873a9c87cdaa8c87180e7b1c59dea88ca998a74
                              • Instruction Fuzzy Hash: 4CB17170A00205AFDB54DFA4CD85BAEB7B4BF48304F10895DE919BB282D778A949CB58
                              APIs
                              • OpenClipboard.USER32(?), ref: 0046DCE7
                              • IsClipboardFormatAvailable.USER32(0000000D), ref: 0046DCF5
                              • GetClipboardData.USER32(0000000D), ref: 0046DD01
                              • CloseClipboard.USER32 ref: 0046DD0D
                              • GlobalLock.KERNEL32(00000000), ref: 0046DD37
                              • CloseClipboard.USER32 ref: 0046DD41
                              • IsClipboardFormatAvailable.USER32(00000001), ref: 0046DD81
                              • GetClipboardData.USER32(00000001), ref: 0046DD8D
                              • CloseClipboard.USER32 ref: 0046DD99
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: Clipboard$Close$AvailableDataFormat$GlobalLockOpen
                              • String ID:
                              • API String ID: 15083398-0
                              • Opcode ID: 5d52f7a8e2fbd0ab087c8c139685d9916ac200a5779b15fccd04bfb456a25eb2
                              • Instruction ID: c6f05cb0c77453757aa6b00544986da50a17ac1627668c5aecb5782462309948
                              • Opcode Fuzzy Hash: 5d52f7a8e2fbd0ab087c8c139685d9916ac200a5779b15fccd04bfb456a25eb2
                              • Instruction Fuzzy Hash: CE81B072704201ABD310EF65DD8AB5EB7A8FF94315F00482EF605E72D1EB74E905879A
                              APIs
                                • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                              • GetWindowRect.USER32(?,?), ref: 00471CF7
                              • GetClientRect.USER32(?,?), ref: 00471D05
                              • GetSystemMetrics.USER32(00000007), ref: 00471D0D
                              • GetSystemMetrics.USER32(00000008), ref: 00471D20
                              • GetSystemMetrics.USER32(00000004), ref: 00471D42
                              • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00471D71
                              • GetSystemMetrics.USER32(00000007), ref: 00471D79
                              • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00471DA3
                              • GetSystemMetrics.USER32(00000008), ref: 00471DAB
                              • GetSystemMetrics.USER32(00000004), ref: 00471DCF
                              • SetRect.USER32(?,00000000,00000000,?,?), ref: 00471DEE
                              • AdjustWindowRectEx.USER32(?,?,00000000,00000040), ref: 00471DFF
                              • CreateWindowExW.USER32(00000040,AutoIt v3 GUI,?,?,?,?,?,?,?,00000000,00400000,00000000), ref: 00471E35
                              • 73A359E0.USER32(00000000,000000EB,?), ref: 00471E6E
                              • GetClientRect.USER32(?,?), ref: 00471E8A
                              • GetStockObject.GDI32(00000011), ref: 00471EA6
                              • SendMessageW.USER32(?,00000030,00000000), ref: 00471EB2
                              • SetTimer.USER32(00000000,00000000,00000028,00462986), ref: 00471ED9
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: System$Metrics$Rect$Window$ClientInfoParameters$A359AdjustCreateMessageObjectSendStockTimer_malloc
                              • String ID: @$AutoIt v3 GUI
                              • API String ID: 1200906009-3359773793
                              • Opcode ID: d466945cffb50a7196a7867ec3c7573785653ff52612d7c288cf7d01b72dc8e8
                              • Instruction ID: 8cf5fd9e7b0abf2f472dad9b41bae804ea9cb1b32c1b51d65689880f1cfe2d6c
                              • Opcode Fuzzy Hash: d466945cffb50a7196a7867ec3c7573785653ff52612d7c288cf7d01b72dc8e8
                              • Instruction Fuzzy Hash: 7DC17F71A402059FDB14DFA8DD85BAF77B4FB58714F10862EFA09A7290DB78A840CB58
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: _wcscat$D515$D51560__wcsicoll_wcscpy_wcslen_wcsncpy
                              • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                              • API String ID: 3566034298-1459072770
                              • Opcode ID: 317b836bd45d303022c8cfe41fd482541af156a870e12d87d8544c7d52709fdd
                              • Instruction ID: bf9a9138137c8e48d15734b0b0bf1383f69a7efb75f9ce998fc77f2ad016157b
                              • Opcode Fuzzy Hash: 317b836bd45d303022c8cfe41fd482541af156a870e12d87d8544c7d52709fdd
                              • Instruction Fuzzy Hash: D551F672A402043BD610BB269C43EFFB36C9F49715F10055FFE09A6242EA7DEA5183AD
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: __wcsicoll$__wcsnicmp
                              • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:$pQH
                              • API String ID: 790654849-32604322
                              • Opcode ID: 29d435e902b015a153743909057decd258383f7606cc46ad0233eead686698a2
                              • Instruction ID: c91e69f26a1c2718e03151092e39642ccf44f92bf630fd0466772f198d10bc2a
                              • Opcode Fuzzy Hash: 29d435e902b015a153743909057decd258383f7606cc46ad0233eead686698a2
                              • Instruction Fuzzy Hash: CA317731A0420966DB10FAA2DD46BAE736C9F15315F20053BBD00BB2D5E7BC6E4587AE
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 37a5c787a7b2188dc8d5479775b41731b0c96863aaa01ab20318fba061c3c2a8
                              • Instruction ID: 62dae473257cc2caee0a49c5626d46440081d624880130feb25903cd50123649
                              • Opcode Fuzzy Hash: 37a5c787a7b2188dc8d5479775b41731b0c96863aaa01ab20318fba061c3c2a8
                              • Instruction Fuzzy Hash: 84C128727002046BE724CFA8DC46FAFB7A4EF55311F00416AFA05DA2C1EBB99909C795
                              APIs
                                • Part of subcall function 00442C5A: __time64.LIBCMT ref: 00442C66
                              • _fseek.LIBCMT ref: 00452B3B
                              • __wsplitpath.LIBCMT ref: 00452B9B
                              • _wcscpy.LIBCMT ref: 00452BB0
                              • _wcscat.LIBCMT ref: 00452BC5
                              • __wsplitpath.LIBCMT ref: 00452BEF
                              • _wcscat.LIBCMT ref: 00452C07
                              • _wcscat.LIBCMT ref: 00452C1C
                              • __fread_nolock.LIBCMT ref: 00452C53
                              • __fread_nolock.LIBCMT ref: 00452C64
                              • __fread_nolock.LIBCMT ref: 00452C83
                              • __fread_nolock.LIBCMT ref: 00452C94
                              • __fread_nolock.LIBCMT ref: 00452CB5
                              • __fread_nolock.LIBCMT ref: 00452CC6
                              • __fread_nolock.LIBCMT ref: 00452CD7
                              • __fread_nolock.LIBCMT ref: 00452CE8
                                • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045273E
                                • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452780
                                • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045279E
                                • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 004527D2
                                • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 004527E2
                                • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452800
                                • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 00452831
                              • __fread_nolock.LIBCMT ref: 00452D78
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: __fread_nolock$_wcscat_wcscpy$__wsplitpath$__time64_fseek
                              • String ID:
                              • API String ID: 2054058615-0
                              • Opcode ID: 0fea368d492e8b0ff51cb8fd7897a71ebf5dc00d39f6f8cf48bc83bd06102a16
                              • Instruction ID: 04d0e47ed4a2b248740d2851a73093f1b496c65d3ae4d984919b8c0089c9d159
                              • Opcode Fuzzy Hash: 0fea368d492e8b0ff51cb8fd7897a71ebf5dc00d39f6f8cf48bc83bd06102a16
                              • Instruction Fuzzy Hash: 6FC14EB2508340ABD720DF65D881EEFB7E8EFC9704F40492FF68987241E6759548CB66
                              APIs
                              • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 004487BD
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: Window
                              • String ID: 0
                              • API String ID: 2353593579-4108050209
                              • Opcode ID: b0df0e29545e706fc7615ccb9c436c62dbee4145767baabea16aca18bd76baa2
                              • Instruction ID: 06508bea8339de1511a48146ac1d08a96458f0089f80555ee302a354f7131a6f
                              • Opcode Fuzzy Hash: b0df0e29545e706fc7615ccb9c436c62dbee4145767baabea16aca18bd76baa2
                              • Instruction Fuzzy Hash: 35B18BB0204341ABF324CF24CC89BABBBE4FB89744F14491EF591962D1DBB8A845CB59
                              APIs
                              • GetSysColor.USER32(0000000F), ref: 0044A05E
                              • GetClientRect.USER32(?,?), ref: 0044A0D1
                              • SendMessageW.USER32(?,00001328,00000000,?), ref: 0044A0E9
                              • 73A36110.USER32(?), ref: 0044A0F6
                              • GetPixel.GDI32(00000000,?,?), ref: 0044A108
                              • 73A2A480.USER32(?,?), ref: 0044A11B
                              • GetSysColor.USER32(0000000F), ref: 0044A131
                              • 73A345F0.USER32(?,000000F0), ref: 0044A140
                              • GetSysColor.USER32(0000000F), ref: 0044A14F
                              • GetSysColor.USER32(00000005), ref: 0044A15B
                              • 73A36110.USER32(?), ref: 0044A1BE
                              • GetPixel.GDI32(00000000,00000000,00000000), ref: 0044A1CB
                              • GetPixel.GDI32(00000000,?,00000000), ref: 0044A1E4
                              • GetPixel.GDI32(00000000,00000000,?), ref: 0044A1FD
                              • GetPixel.GDI32(00000000,?,?), ref: 0044A21D
                              • 73A2A480.USER32(?,00000000), ref: 0044A229
                              • SetBkColor.GDI32(?,00000000), ref: 0044A24C
                              • GetSysColor.USER32(00000008), ref: 0044A265
                              • SetTextColor.GDI32(?,00000000), ref: 0044A270
                              • SetBkMode.GDI32(?,00000001), ref: 0044A282
                              • GetStockObject.GDI32(00000005), ref: 0044A28A
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: Color$Pixel$A36110A480$A345ClientMessageModeObjectRectSendStockText
                              • String ID:
                              • API String ID: 2664180972-0
                              • Opcode ID: e73dd003506282a75ec33c48a00615cd632731ac0e25c139f5641f86d6275693
                              • Instruction ID: 0380b5c53d8a23173c1b90063483f03488caaf4f58ae5d2001aea5c06c56dff4
                              • Opcode Fuzzy Hash: e73dd003506282a75ec33c48a00615cd632731ac0e25c139f5641f86d6275693
                              • Instruction Fuzzy Hash: E6612531140101ABE7109F78CC88BAB7764FB46320F14876AFD659B3D0DBB49C529BAA
                              APIs
                              • GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,004164DE), ref: 00417C28
                              • __mtterm.LIBCMT ref: 00417C34
                                • Part of subcall function 004178FF: TlsFree.KERNEL32(00000017,00417D96,?,004164DE), ref: 0041792A
                                • Part of subcall function 004178FF: RtlDeleteCriticalSection.KERNEL32(00000000,00000000,00410E44,?,00417D96,?,004164DE), ref: 004181B8
                                • Part of subcall function 004178FF: _free.LIBCMT ref: 004181BB
                                • Part of subcall function 004178FF: RtlDeleteCriticalSection.KERNEL32(00000017,00410E44,?,00417D96,?,004164DE), ref: 004181E2
                              • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00417C4A
                              • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00417C57
                              • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00417C64
                              • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00417C71
                              • TlsAlloc.KERNEL32(?,004164DE), ref: 00417CC1
                              • TlsSetValue.KERNEL32(00000000,?,004164DE), ref: 00417CDC
                              • __init_pointers.LIBCMT ref: 00417CE6
                              • __calloc_crt.LIBCMT ref: 00417D54
                              • GetCurrentThreadId.KERNEL32 ref: 00417D80
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: AddressProc$CriticalDeleteSection$AllocCurrentFreeHandleModuleThreadValue__calloc_crt__init_pointers__mtterm_free
                              • String ID: FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$KERNEL32.DLL
                              • API String ID: 4163708885-3819984048
                              • Opcode ID: b664ad2f65df639e4a6a12b7ff6e2ff430dd15d20f416fce335d42a987fa1153
                              • Instruction ID: ca22d9d2e1075830452d52834408fe47c465c3b6ac2468b12672dd77d4d5938c
                              • Opcode Fuzzy Hash: b664ad2f65df639e4a6a12b7ff6e2ff430dd15d20f416fce335d42a987fa1153
                              • Instruction Fuzzy Hash: D5315A75808710DECB10AF75BD0865A3EB8BB60764B12093FE914932B0DB7D8881CF9C
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID:
                              • String ID: >>>AUTOIT SCRIPT<<<$\
                              • API String ID: 0-1896584978
                              • Opcode ID: 0f644335f765ba1f090fa429f6a047d8548bdb555fde32e118ce45ae114b4fa6
                              • Instruction ID: daa296ce3da71eb1ea4b2d74bac6de3536c6b190185545f0361092b1072d42a3
                              • Opcode Fuzzy Hash: 0f644335f765ba1f090fa429f6a047d8548bdb555fde32e118ce45ae114b4fa6
                              • Instruction Fuzzy Hash: 4081B9B1900204ABCB20EB61CD85FDB73ED9F54304F40859EF505AB142EA39EA85CB99
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: __wcsicoll$IconLoad
                              • String ID: blank$info$question$stop$warning
                              • API String ID: 2485277191-404129466
                              • Opcode ID: 90066845996854fde84de619c40f1fe09919dc61d56db525c82daa747bae1459
                              • Instruction ID: a4c8356a5cb7371e963c7ba7671977edd7eb5cf64b0a9c0e84f2fcb3e6131cad
                              • Opcode Fuzzy Hash: 90066845996854fde84de619c40f1fe09919dc61d56db525c82daa747bae1459
                              • Instruction Fuzzy Hash: 9121A732B4021566DB00AB65BC05FEF3358DB98762F040837FA05E2282E3A9A52093BD
                              APIs
                              • LoadIconW.USER32(?,00000063), ref: 0045464C
                              • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 0045465E
                              • SetWindowTextW.USER32(?,?), ref: 00454678
                              • GetDlgItem.USER32(?,000003EA), ref: 00454690
                              • SetWindowTextW.USER32(00000000,?), ref: 00454697
                              • GetDlgItem.USER32(?,000003E9), ref: 004546A8
                              • SetWindowTextW.USER32(00000000,?), ref: 004546AF
                              • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 004546D1
                              • SendDlgItemMessageW.USER32(?,000003E9,000000C5,?,00000000), ref: 004546EB
                              • GetWindowRect.USER32(?,?), ref: 004546F5
                              • SetWindowTextW.USER32(?,?), ref: 00454765
                              • GetDesktopWindow.USER32 ref: 0045476F
                              • GetWindowRect.USER32(00000000), ref: 00454776
                              • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 004547C4
                              • GetClientRect.USER32(?,?), ref: 004547D2
                              • PostMessageW.USER32(?,00000005,00000000,00000080), ref: 004547FC
                              • SetTimer.USER32(?,0000040A,?,00000000), ref: 0045483F
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer
                              • String ID:
                              • API String ID: 3869813825-0
                              • Opcode ID: 7299b5a8a54a0497ad48b5c2470d2d1877852c465202323cb5b3bdfcc53dc08d
                              • Instruction ID: 23cbb84c7db07f79204f7fb68ef1a354279dd66d41dce19f663d7a5246859b32
                              • Opcode Fuzzy Hash: 7299b5a8a54a0497ad48b5c2470d2d1877852c465202323cb5b3bdfcc53dc08d
                              • Instruction Fuzzy Hash: 06619D75A00705ABD720DFA8CE89F6FB7F8AB48705F00491DEA46A7290D778E944CB54
                              APIs
                              • _wcslen.LIBCMT ref: 00464B28
                              • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00464B38
                              • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00464B60
                              • _wcslen.LIBCMT ref: 00464C28
                              • GetCurrentDirectoryW.KERNEL32(00000000,00000000,?), ref: 00464C3C
                              • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00464C64
                              • _wcslen.LIBCMT ref: 00464CBA
                              • _wcslen.LIBCMT ref: 00464CD0
                              • _wcslen.LIBCMT ref: 00464CEF
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: _wcslen$Directory$CurrentSystem
                              • String ID: D
                              • API String ID: 1914653954-2746444292
                              • Opcode ID: 0d94b415f8f4be32da9437a4562fd2ea9250d6af123b13f45aceadf0defadff8
                              • Instruction ID: cb0983c86ca1fa87ccea60adda1cf5635047c5df12380c224dcb23d097980814
                              • Opcode Fuzzy Hash: 0d94b415f8f4be32da9437a4562fd2ea9250d6af123b13f45aceadf0defadff8
                              • Instruction Fuzzy Hash: 98E101716043409BD710EF65C845B6BB7E4AFC4308F148D2EF98987392EB39E945CB9A
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: __wcsicoll
                              • String ID: LEFT$MAIN$MENU$MIDDLE$PRIMARY$RIGHT$SECONDARY
                              • API String ID: 3832890014-4202584635
                              • Opcode ID: 95885f1eddacfd63033607ac838e89683eff4e7941016429c0898dbf95f86d61
                              • Instruction ID: 3b59ed03df0c76d23b576b9f0bbd6b5c96606bf3e4c0b80e5c93e428ec3f30be
                              • Opcode Fuzzy Hash: 95885f1eddacfd63033607ac838e89683eff4e7941016429c0898dbf95f86d61
                              • Instruction Fuzzy Hash: AB117772A4422512E91072657C03BFF219CCF1177AF14487BF90DE5A82FB4EDA9541ED
                              APIs
                              • 73A35CF0.USER32(?), ref: 004558E3
                              • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00400000,00000000), ref: 0045592C
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: CreateWindow
                              • String ID: ,$tooltips_class32
                              • API String ID: 716092398-3856767331
                              • Opcode ID: ae2d9903759a545ce0c494cdefa096f9672d9422e9f4a365a31b4f6ccc33a5ca
                              • Instruction ID: 3e2a402d8ef05c983ab6a33f0f0d51d253aadf8c8a2d9d50fdabec1795fb524a
                              • Opcode Fuzzy Hash: ae2d9903759a545ce0c494cdefa096f9672d9422e9f4a365a31b4f6ccc33a5ca
                              • Instruction Fuzzy Hash: AE71AD71650208AFE720CF58DC84FBA77B8FB59310F20851AFD45AB391DA74AD46CB98
                              APIs
                              • GetMenuItemInfoW.USER32(?,00000007,00000000,00000030), ref: 00468BB1
                              • GetMenuItemCount.USER32(?), ref: 00468C45
                              • DeleteMenu.USER32(?,00000005,00000000,?,?,?), ref: 00468CD9
                              • DeleteMenu.USER32(?,00000004,00000000,?,?), ref: 00468CE2
                              • DeleteMenu.USER32(00000000,00000006,00000000,?,00000004,00000000,?,?), ref: 00468CEB
                              • DeleteMenu.USER32(?,00000003,00000000,?,00000004,00000000,?,?), ref: 00468CF4
                              • GetMenuItemCount.USER32 ref: 00468CFD
                              • SetMenuItemInfoW.USER32(?,00000004,00000000,00000030), ref: 00468D35
                              • GetCursorPos.USER32(?), ref: 00468D3F
                              • SetForegroundWindow.USER32(?), ref: 00468D49
                              • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,?,00000003,00000000,?,00000004,00000000,?,?), ref: 00468D5F
                              • PostMessageW.USER32(?,00000000,00000000,00000000), ref: 00468D6C
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: Menu$DeleteItem$CountInfo$CursorForegroundMessagePopupPostTrackWindow
                              • String ID: 0
                              • API String ID: 1441871840-4108050209
                              • Opcode ID: 12c28d3332ad221b92e3a636ba418a85e822d4b5186b1920d2f56c44304fb3db
                              • Instruction ID: 6d2915cdebcc0779354c8c01805c07fba6dcd836026253be2713676dcba25ca6
                              • Opcode Fuzzy Hash: 12c28d3332ad221b92e3a636ba418a85e822d4b5186b1920d2f56c44304fb3db
                              • Instruction Fuzzy Hash: F571A0B0644300BBE720DB58CC45F5AB7A4AF85724F20470EF5656B3D1DBB8B8448B2A
                              APIs
                              • GetModuleHandleW.KERNEL32(00000000,00000066,?,00000FFF,00000010,00000001,?,?,00427F75,?,0000138C,?,00000001,?,?,?), ref: 004608A9
                              • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608B0
                                • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                              • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,00427F75,?,0000138C,?,00000001,?,?,?,?,?,00000000), ref: 004608D0
                              • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608D7
                              • __swprintf.LIBCMT ref: 00460915
                              • __swprintf.LIBCMT ref: 0046092D
                              • _wprintf.LIBCMT ref: 004609E1
                              • MessageBoxW.USER32(00000000,?,?,00011010), ref: 004609FA
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: HandleLoadModuleString__swprintf$Message_memmove_wcslen_wprintf
                              • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                              • API String ID: 3631882475-2268648507
                              • Opcode ID: 34748020dcaf007b6c88f6c4c4dd7bf7ecfb2d58ebabdf7d9dae9be74c8fa7b1
                              • Instruction ID: 03c51728676f919c2e33c8c13cfd5c1cee97c3d48cab2dbcdd3400b30208eb52
                              • Opcode Fuzzy Hash: 34748020dcaf007b6c88f6c4c4dd7bf7ecfb2d58ebabdf7d9dae9be74c8fa7b1
                              • Instruction Fuzzy Hash: F5416071900209ABDB00FB91CD46AEF7778AF44314F44447AF50577192EA786E45CBA9
                              APIs
                              • ExtractIconExW.SHELL32(?,?,?,?,00000001), ref: 004716C7
                              • ExtractIconExW.SHELL32(?,000000FF,?,?,00000001), ref: 004716E1
                              • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00471711
                              • SendMessageW.USER32 ref: 00471740
                              • 6F0D2980.COMCTL32(00000010,00000010,00000021,?,00000001,?,?,?,?,?,?,?,?,?,?,00001053), ref: 00471779
                              • SendMessageW.USER32(?,00001003,00000001,00000000), ref: 0047179A
                              • 6F0D2980.COMCTL32(00000020,00000020,00000021,00000000,00000001,?,?,?,?,?,?,?,?,?,?,00001053), ref: 004717B0
                              • SendMessageW.USER32(?,00001003,00000000,00000000), ref: 004717D3
                              • 6F0CC400.COMCTL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 004717F8
                              • 6F0CC400.COMCTL32(00000000,000000FF,?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 00471807
                              • SendMessageW.USER32 ref: 0047184F
                              • SendMessageW.USER32(?,0000104C,00000000,00000002), ref: 00471872
                              • SendMessageW.USER32(?,00001015,00000000,00000000), ref: 00471890
                              • DestroyCursor.USER32(?), ref: 0047189C
                              • DestroyCursor.USER32(?), ref: 004718A2
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: MessageSend$C400CursorD2980DestroyExtractIcon
                              • String ID:
                              • API String ID: 394922398-0
                              • Opcode ID: 0980e37b37b59800b468ddf3c96ce45e1e3e21a553a40365caf2b501cbb695b2
                              • Instruction ID: aa77b4eb3e0d334a4980849760fe45b072e458157f6a66894e70986bfe60c355
                              • Opcode Fuzzy Hash: 0980e37b37b59800b468ddf3c96ce45e1e3e21a553a40365caf2b501cbb695b2
                              • Instruction Fuzzy Hash: 39617D75A00209AFEB10DF68CD85FEEB7B4FB48710F10855AF618AB2D0D7B4A981CB54
                              APIs
                              • GetClassNameW.USER32(?,?,00000100), ref: 00461678
                              • _wcslen.LIBCMT ref: 00461683
                              • __swprintf.LIBCMT ref: 00461721
                              • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00461794
                              • GetClassNameW.USER32(?,?,00000400), ref: 00461811
                              • GetDlgCtrlID.USER32(?), ref: 00461869
                              • GetWindowRect.USER32(?,?), ref: 004618A4
                              • GetParent.USER32(?), ref: 004618C3
                              • ScreenToClient.USER32(00000000), ref: 004618CA
                              • GetClassNameW.USER32(?,?,00000100), ref: 00461941
                              • GetWindowTextW.USER32(?,?,00000400), ref: 0046197E
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_wcslen
                              • String ID: %s%u
                              • API String ID: 1899580136-679674701
                              • Opcode ID: 766f23a74968ff95f09f311a42cbe987384f70ffc1712f5abd724c40a01aa324
                              • Instruction ID: 362d1c13b2509f288ecdbc272899e32e1bd8f20a7ba75cfa55bfcaf2deda5cb5
                              • Opcode Fuzzy Hash: 766f23a74968ff95f09f311a42cbe987384f70ffc1712f5abd724c40a01aa324
                              • Instruction Fuzzy Hash: 1DA1B2715043019FDB10DF55C884BAB73A8FF84314F08896EFD899B255E738E94ACBA6
                              APIs
                              • GetMenuItemInfoW.USER32(?,FFFFFFFF,00000000,00000030), ref: 0045FDDB
                              • SetMenuItemInfoW.USER32(00000008,00000004,00000000,00000030), ref: 0045FE14
                              • Sleep.KERNEL32(000001F4,?,FFFFFFFF,00000000,00000030,?,?,?,?,?,?), ref: 0045FE26
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: InfoItemMenu$Sleep
                              • String ID: 0
                              • API String ID: 1196289194-4108050209
                              • Opcode ID: c65cffcb0b41bccfc2e749f507a7067f69681543840726e93d819a57ffaed043
                              • Instruction ID: 163fe6e236f433162160dce37f71c375d73f8c96772172175a1e07f10d517f7e
                              • Opcode Fuzzy Hash: c65cffcb0b41bccfc2e749f507a7067f69681543840726e93d819a57ffaed043
                              • Instruction Fuzzy Hash: 12710172500244ABDB20CF55EC49FAFBBA8EB95316F00842FFD0197292C374A94DCB69
                              APIs
                              • 73A2A570.USER32(00000000,?,?), ref: 0043143E
                              • 73A34C00.GDI32(00000000,?,?), ref: 0043144F
                              • 73A34C40.GDI32(00000000), ref: 00431459
                              • SelectObject.GDI32(00000000,?), ref: 00431466
                              • StretchBlt.GDI32(00000000,00000000,00000000,?,?,?,?,?,?,?,00CC0020), ref: 004314CC
                              • GetDIBits.GDI32(00000000,?,00000000,00000000,00000000,?,00000000), ref: 00431505
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: A570BitsObjectSelectStretch
                              • String ID: (
                              • API String ID: 4270841370-3887548279
                              • Opcode ID: 7cf8b5f06cf9837a80c5bf18f75efab984d242103ae75fea6cfb4fef03d4f8e7
                              • Instruction ID: 70523424e9a4c52fdd53d867b9eeb1eac2d89839f103c71a78559f5a5eece38f
                              • Opcode Fuzzy Hash: 7cf8b5f06cf9837a80c5bf18f75efab984d242103ae75fea6cfb4fef03d4f8e7
                              • Instruction Fuzzy Hash: 63514971A00209AFDB14CF98C884FAFBBB8EF49310F10891DFA5997290D774A940CBA4
                              APIs
                                • Part of subcall function 004536F7: CharLowerBuffW.USER32(?,?), ref: 0045370C
                                • Part of subcall function 00445AE0: _wcslen.LIBCMT ref: 00445AF0
                              • GetDriveTypeW.KERNEL32 ref: 0045DB32
                              • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DB78
                              • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DBB3
                              • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DBED
                                • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: SendString$_wcslen$BuffCharDriveLowerType_memmove
                              • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                              • API String ID: 1976180769-4113822522
                              • Opcode ID: a85f7e6fea3b256bd08f49877ae03d0a36a67fa55ca674d77d79428d7feae10a
                              • Instruction ID: 81dc6b2e9a5b1b7ac5bd11c7175921e379baf9e0c2b27e14ed053c07c028f3b1
                              • Opcode Fuzzy Hash: a85f7e6fea3b256bd08f49877ae03d0a36a67fa55ca674d77d79428d7feae10a
                              • Instruction Fuzzy Hash: 75516E715043049FD710EF21C981B5EB3E4BF88304F14896FF995AB292D7B8E909CB5A
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: _wcslen$_wcsncpy$LocalTime__fassign
                              • String ID:
                              • API String ID: 461458858-0
                              • Opcode ID: 26761b0a7209b856481a9ddbc8736091f87f92f0ac2320453e44697a96ade7e6
                              • Instruction ID: 9848deb76f2cd1bd94a84263f46e444e1138d8b87e7a9916e51222e649cc75ea
                              • Opcode Fuzzy Hash: 26761b0a7209b856481a9ddbc8736091f87f92f0ac2320453e44697a96ade7e6
                              • Instruction Fuzzy Hash: B1417372D10204B6CF10EFA5C946ADFF3B8DF49314F90885BE909E3121F6B4E65583A9
                              APIs
                              • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000), ref: 004300C3
                              • GetFileSize.KERNEL32(00000000,00000000), ref: 004300DE
                              • GlobalAlloc.KERNEL32(00000002,00000000), ref: 004300E9
                              • GlobalLock.KERNEL32(00000000), ref: 004300F6
                              • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00430105
                              • GlobalUnlock.KERNEL32(00000000), ref: 0043010C
                              • CloseHandle.KERNEL32(00000000), ref: 00430113
                              • CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 00430120
                              • OleLoadPicture.OLEAUT32(?,00000000,00000000,004829F8,?), ref: 0043013E
                              • GlobalFree.KERNEL32(00000000), ref: 00430150
                              • GetObjectW.GDI32(?,00000018,?), ref: 00430177
                              • CopyImage.USER32(?,00000000,?,?,00002000), ref: 004301A8
                              • DeleteObject.GDI32(?), ref: 004301D0
                              • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 004301E7
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: Global$File$CreateObject$AllocCloseCopyDeleteFreeHandleImageLoadLockMessagePictureReadSendSizeStreamUnlock
                              • String ID:
                              • API String ID: 3969911579-0
                              • Opcode ID: fd1addb57dfcb9cf3c81a7192785a12cb72203be8d3c1966912b6329e8233f20
                              • Instruction ID: 40287395d2d29e4935595b2baf4d6657c54b4003bec4d35786bf86d2452689d1
                              • Opcode Fuzzy Hash: fd1addb57dfcb9cf3c81a7192785a12cb72203be8d3c1966912b6329e8233f20
                              • Instruction Fuzzy Hash: 41414C75600208AFDB10DF64DD88FAE77B8EF48711F108659FA05AB290D7B5AD01CB68
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: Menu$Delete$DestroyItemObject$CountCursorDrawInfo
                              • String ID: 0
                              • API String ID: 3807689593-4108050209
                              • Opcode ID: d13a276e73d68c5a88ff05331af00a4635b68400f986b822500444c43e982ccd
                              • Instruction ID: b5af5d15e8ca477bb279da78e69062a53aed449fe0dbaae2e4c2ef00f9b57ed5
                              • Opcode Fuzzy Hash: d13a276e73d68c5a88ff05331af00a4635b68400f986b822500444c43e982ccd
                              • Instruction Fuzzy Hash: 91412770200601AFD714DF64D9A8B6B77A8BF48302F10896DFD45CB292D778E848CFA9
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: _wcscpy$Cleanup$Startup_memmove_strcatgethostbynamegethostnameinet_ntoa
                              • String ID: 0.0.0.0
                              • API String ID: 1965227024-3771769585
                              • Opcode ID: 076f4e753302d8e1360c69636e2804f45f3b9e513b8bc5fd0a6f442411ef1df6
                              • Instruction ID: 28916de6e65f37ac85efecafd260a3a31c9a3caf28ae6c56f7260ddb0d4b80cb
                              • Opcode Fuzzy Hash: 076f4e753302d8e1360c69636e2804f45f3b9e513b8bc5fd0a6f442411ef1df6
                              • Instruction Fuzzy Hash: 4F213A32A00114BBC710AF65DC05EEF736CEF99716F0045AFF90993151EEB99A8187E8
                              APIs
                                • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                              • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 0045F5D5
                              • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 0045F5EC
                              • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045F5FE
                              • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 0045F611
                              • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 0045F61E
                              • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 0045F634
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: SendString$_memmove_wcslen
                              • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                              • API String ID: 369157077-1007645807
                              • Opcode ID: f963851227cb2bcafec7df3ef8778280fda42e08bc5c03876a4728c3ed9f2a05
                              • Instruction ID: e81aaa69409cfefceaf3864659f825962b2ddf67c6d06b6a861a29a56a66176d
                              • Opcode Fuzzy Hash: f963851227cb2bcafec7df3ef8778280fda42e08bc5c03876a4728c3ed9f2a05
                              • Instruction Fuzzy Hash: 7F21A83168021D66E720FB95DC46FFE7368AF40700F20087BFA14B71D1DAB4A949879D
                              APIs
                              • GetParent.USER32 ref: 00445BF8
                              • GetClassNameW.USER32(00000000,?,00000100), ref: 00445C0D
                              • __wcsicoll.LIBCMT ref: 00445C33
                              • __wcsicoll.LIBCMT ref: 00445C4F
                              • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00445CA9
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: __wcsicoll$ClassMessageNameParentSend
                              • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                              • API String ID: 3125838495-3381328864
                              • Opcode ID: 17bab07e815737d0aecd422002c3b7a0f260523ca91fc6be5302b60c0052203b
                              • Instruction ID: b9a51c7f116d0e73852bd225d20f6d8bcb5f39b8f57bd3164038c04ed7d94027
                              • Opcode Fuzzy Hash: 17bab07e815737d0aecd422002c3b7a0f260523ca91fc6be5302b60c0052203b
                              • Instruction Fuzzy Hash: C6110AB1E447017BFE10BA659D46EBB339C9B54B11F00051BFE44D7242F6ACA94147A9
                              APIs
                              • SendMessageW.USER32(?,?,000000FF,?), ref: 004492A4
                              • SendMessageW.USER32(?,?,00000000,00000000), ref: 004492B7
                              • CharNextW.USER32(?,?,?,000000FF,?), ref: 004492E9
                              • SendMessageW.USER32(?,?,00000000,00000000), ref: 00449301
                              • SendMessageW.USER32(?,?,00000000,?), ref: 00449332
                              • SendMessageW.USER32(?,?,000000FF,?), ref: 00449349
                              • SendMessageW.USER32(?,?,00000000,00000000), ref: 0044935C
                              • SendMessageW.USER32(?,00000402,?), ref: 00449399
                              • SendMessageW.USER32(?,000000C2,00000001,?), ref: 0044940D
                              • SendMessageW.USER32(?,00001002,00000000,?), ref: 00449477
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: MessageSend$CharNext
                              • String ID:
                              • API String ID: 1350042424-0
                              • Opcode ID: 0066c399e5a393c923680e2e66105d8530035c3b09cc99687380ea8ee93f4497
                              • Instruction ID: 867fdc7b80e212b75fe5daf06e5219747a853435bb2a874e280223eddbea68d3
                              • Opcode Fuzzy Hash: 0066c399e5a393c923680e2e66105d8530035c3b09cc99687380ea8ee93f4497
                              • Instruction Fuzzy Hash: 5B81D535A00119BBEB10CF85DD80FFFB778FB55720F10825AFA14AA280D7B99D4197A4
                              APIs
                                • Part of subcall function 004536F7: CharLowerBuffW.USER32(?,?), ref: 0045370C
                                • Part of subcall function 00445AE0: _wcslen.LIBCMT ref: 00445AF0
                              • GetDriveTypeW.KERNEL32(?), ref: 004787B9
                              • _wcscpy.LIBCMT ref: 004787E5
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: BuffCharDriveLowerType_wcscpy_wcslen
                              • String ID: \VH$a$all$cdrom$fixed$network$ramdisk$removable$unknown
                              • API String ID: 3052893215-2127371420
                              • Opcode ID: d2cef25e8da5c5e3ff62787a2d5bf57075b394b4544bde345958b2b0489681b6
                              • Instruction ID: 541bc2b2506c052d744bcb7e7e177e26c036821b53f5a58429f0f0853ea8de24
                              • Opcode Fuzzy Hash: d2cef25e8da5c5e3ff62787a2d5bf57075b394b4544bde345958b2b0489681b6
                              • Instruction Fuzzy Hash: 4761C1716443018BD700EF14CC85B9BB7D4AB84348F14892FF949AB382DB79E94987AB
                              APIs
                              • LoadStringW.USER32(?,00000066,?,00000FFF), ref: 0045E77F
                                • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                              • LoadStringW.USER32(?,?,?,00000FFF), ref: 0045E7A0
                              • __swprintf.LIBCMT ref: 0045E7F7
                              • _wprintf.LIBCMT ref: 0045E8B3
                              • _wprintf.LIBCMT ref: 0045E8D7
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: LoadString_wprintf$__swprintf_memmove_wcslen
                              • String ID: Error: $%s (%d) : ==> %s:$%s (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                              • API String ID: 2295938435-2354261254
                              • Opcode ID: bb058454d561a71d3962b6834df81d7638d9abf9c215052f6de6d44e2e152ebf
                              • Instruction ID: 453f5dd12ee62c270a242db3517b58e8b6225e49c0ff470bc5072f32437c925c
                              • Opcode Fuzzy Hash: bb058454d561a71d3962b6834df81d7638d9abf9c215052f6de6d44e2e152ebf
                              • Instruction Fuzzy Hash: 6A519E71A10219ABDB14EB91CC85EEF7778AF44314F14407EF90477292DB78AE49CBA8
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: __swprintf_wcscpy$__i64tow__itow
                              • String ID: %.15g$0x%p$False$True
                              • API String ID: 3038501623-2263619337
                              • Opcode ID: 0ed174719ccce37c49a7b10a239214af4415cbf245d9ef728fb1cecd9ea5956d
                              • Instruction ID: fd507a47f7d2c8f7f5848ea17d112ce969af4838d766d220e6d3988dad71e25c
                              • Opcode Fuzzy Hash: 0ed174719ccce37c49a7b10a239214af4415cbf245d9ef728fb1cecd9ea5956d
                              • Instruction Fuzzy Hash: 264108729001005BDB10EF75DC42FAAB364EF55306F0445ABFE09CB242EA39DA48C79A
                              APIs
                              • LoadStringW.USER32(?,00000066,?,00000FFF), ref: 0045E580
                                • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                              • LoadStringW.USER32(?,00000072,?,00000FFF), ref: 0045E59F
                              • __swprintf.LIBCMT ref: 0045E5F6
                              • _wprintf.LIBCMT ref: 0045E6A3
                              • _wprintf.LIBCMT ref: 0045E6C7
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: LoadString_wprintf$__swprintf_memmove_wcslen
                              • String ID: Error: $%s (%d) : ==> %s:$%s (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                              • API String ID: 2295938435-8599901
                              • Opcode ID: c66a723599ffab058b3f3cea1f0729b04811ebb293e3d225dd53f192e4035716
                              • Instruction ID: ff3e2b23dced8a629e5b21f12e79e468b5cd48208a3d74017576322ff0354a8f
                              • Opcode Fuzzy Hash: c66a723599ffab058b3f3cea1f0729b04811ebb293e3d225dd53f192e4035716
                              • Instruction Fuzzy Hash: 9A519171D00109ABDB14EBA1C845EEF7778EF44304F50847EF91477292EA78AE49CBA8
                              APIs
                              • timeGetTime.WINMM ref: 00443B67
                                • Part of subcall function 0040C620: timeGetTime.WINMM(0042DD5D), ref: 0040C620
                              • Sleep.KERNEL32(0000000A), ref: 00443B9F
                              • FindWindowExW.USER32(?,00000000,BUTTON,00000000), ref: 00443BC8
                              • SetActiveWindow.USER32(?), ref: 00443BEC
                              • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00443BFC
                              • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 00443C22
                              • Sleep.KERNEL32(000000FA), ref: 00443C2D
                              • IsWindow.USER32(?), ref: 00443C3A
                              • EndDialog.USER32(?,00000000), ref: 00443C4C
                                • Part of subcall function 004439C1: GetWindowThreadProcessId.USER32(?,00000000), ref: 004439E4
                                • Part of subcall function 004439C1: GetCurrentThreadId.KERNEL32 ref: 004439EB
                                • Part of subcall function 004439C1: AttachThreadInput.USER32(00000000), ref: 004439F2
                              • 73A35940.USER32(00000000,Function_00033D09,00000000), ref: 00443C6B
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: Window$Thread$MessageSendSleepTimetime$A35940ActiveAttachCurrentDialogFindInputProcess
                              • String ID: BUTTON
                              • API String ID: 3836772650-3405671355
                              • Opcode ID: 0b90b562b2b8ddd8d32d3d53e67965f547c0866e24595f66544518a968b379f6
                              • Instruction ID: 3c6370bb7d17ad47abda0b7088cfd3672c19e1ca6c3f529de1b12449ce3ad6f8
                              • Opcode Fuzzy Hash: 0b90b562b2b8ddd8d32d3d53e67965f547c0866e24595f66544518a968b379f6
                              • Instruction Fuzzy Hash: 6B31E676784200BFE3349F74FD99F5A3B58AB55B22F10083AF600EA2A1D6B5A441876C
                              APIs
                              • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,?,?,?,0042820D,?,?,?,#include depth exceeded. Make sure there are no recursive includes,?), ref: 00454039
                              • LoadStringW.USER32(00000000), ref: 00454040
                                • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                              • _wprintf.LIBCMT ref: 00454074
                              • __swprintf.LIBCMT ref: 004540A3
                              • MessageBoxW.USER32(00000000,?,?,00011010), ref: 0045410F
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: HandleLoadMessageModuleString__swprintf_memmove_wcslen_wprintf
                              • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                              • API String ID: 455036304-4153970271
                              • Opcode ID: 0cc89bd23a2e2e53ac7bb2b5ed0e913a3f1e972501752cb0da19f3bd95e8304c
                              • Instruction ID: e2f14448b15a7dab571624068eda089460c560eca1c8ebe4dd0daaccfe0aa2c5
                              • Opcode Fuzzy Hash: 0cc89bd23a2e2e53ac7bb2b5ed0e913a3f1e972501752cb0da19f3bd95e8304c
                              • Instruction Fuzzy Hash: 3B31E872B0011997CB00EF95CD069AE3378AF88714F50445EFA0877282D678AE45C7A9
                              APIs
                              • SafeArrayAccessData.OLEAUT32(0000007F,?), ref: 00467D63
                              • SafeArrayAccessData.OLEAUT32(0000007F,0000007F), ref: 00467DDC
                              • SafeArrayGetVartype.OLEAUT32(0000007F,?), ref: 00467E71
                              • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00467E9D
                              • _memmove.LIBCMT ref: 00467EB8
                              • SafeArrayUnaccessData.OLEAUT32(00000000), ref: 00467EC1
                              • SafeArrayAccessData.OLEAUT32(0000007F,?), ref: 00467EDE
                              • _memmove.LIBCMT ref: 00467F6C
                              • SafeArrayAccessData.OLEAUT32(0000007F,?), ref: 00467FC1
                              • SafeArrayUnaccessData.OLEAUT32(00000004), ref: 00467FAB
                                • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                                • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                                • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                              • SafeArrayUnaccessData.OLEAUT32(00479A50), ref: 00467E48
                                • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                              • SafeArrayUnaccessData.OLEAUT32(00479A50), ref: 00468030
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: ArraySafe$Data$Access$Unaccess$_memmovestd::exception::exception$Exception@8ThrowVartype_malloc
                              • String ID:
                              • API String ID: 2170234536-0
                              • Opcode ID: aa00afaeb95d016149156b33273ce501c4b0800cd775f7336c4c4d99d01e60ec
                              • Instruction ID: 6369f5c3f22445f0d5bf5c4520e4337682cbd46778e63a39b460943b9460954a
                              • Opcode Fuzzy Hash: aa00afaeb95d016149156b33273ce501c4b0800cd775f7336c4c4d99d01e60ec
                              • Instruction Fuzzy Hash: 26B124716042059FD700CF59D884BAEB7B5FF88308F24856EEA05DB351EB3AD845CB6A
                              APIs
                              • GetKeyboardState.USER32(?), ref: 00453CE0
                              • SetKeyboardState.USER32(?), ref: 00453D3B
                              • GetAsyncKeyState.USER32(000000A0), ref: 00453D5E
                              • GetKeyState.USER32(000000A0), ref: 00453D75
                              • GetAsyncKeyState.USER32(000000A1), ref: 00453DA4
                              • GetKeyState.USER32(000000A1), ref: 00453DB5
                              • GetAsyncKeyState.USER32(00000011), ref: 00453DE1
                              • GetKeyState.USER32(00000011), ref: 00453DEF
                              • GetAsyncKeyState.USER32(00000012), ref: 00453E18
                              • GetKeyState.USER32(00000012), ref: 00453E26
                              • GetAsyncKeyState.USER32(0000005B), ref: 00453E4F
                              • GetKeyState.USER32(0000005B), ref: 00453E5D
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: State$Async$Keyboard
                              • String ID:
                              • API String ID: 541375521-0
                              • Opcode ID: a3f88cab2abdfc68c44a637c7b6f2bd83c4aa3bfdff3a706604d8f1b20d6ef18
                              • Instruction ID: 009fbf1908f75ed0a62addf5985db529f64a747a45b1090b1102dc3b9208550d
                              • Opcode Fuzzy Hash: a3f88cab2abdfc68c44a637c7b6f2bd83c4aa3bfdff3a706604d8f1b20d6ef18
                              • Instruction Fuzzy Hash: BC61DD3190478829FB329F6488057EBBBF45F12346F08459ED9C2162C3D7AC6B4CCB65
                              APIs
                              • GetDlgItem.USER32(?,00000001), ref: 004357DB
                              • GetWindowRect.USER32(00000000,?), ref: 004357ED
                              • MoveWindow.USER32(?,0000000A,?,?,?,00000000), ref: 00435857
                              • GetDlgItem.USER32(?,00000002), ref: 0043586A
                              • GetWindowRect.USER32(00000000,?), ref: 0043587C
                              • MoveWindow.USER32(?,?,00000000,?,00000001,00000000), ref: 004358CE
                              • GetDlgItem.USER32(?,000003E9), ref: 004358DC
                              • GetWindowRect.USER32(00000000,?), ref: 004358EE
                              • MoveWindow.USER32(?,0000000A,00000000,?,?,00000000), ref: 00435933
                              • GetDlgItem.USER32(?,000003EA), ref: 00435941
                              • MoveWindow.USER32(00000000,0000000A,0000000A,?,-000000FB,00000000), ref: 0043595A
                              • InvalidateRect.USER32(?,00000000,00000001), ref: 00435967
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: Window$ItemMoveRect$Invalidate
                              • String ID:
                              • API String ID: 3096461208-0
                              • Opcode ID: 5d52927da84fb547f57ff0a94c85d4d7e4cc3ec4f802ea2f498aab0433028225
                              • Instruction ID: 6af1b44a8b8b1dd3dfd8c00d901dfbe31295268d39f582813a56aed3f3dd18d2
                              • Opcode Fuzzy Hash: 5d52927da84fb547f57ff0a94c85d4d7e4cc3ec4f802ea2f498aab0433028225
                              • Instruction Fuzzy Hash: 7C515FB1B00609ABCB18DF68CD95AAEB7B9EF88310F148529F905E7390E774ED008B54
                              APIs
                              • 73A345F0.USER32(?,000000F0), ref: 004714DC
                              • LoadImageW.USER32(00000000,?,00000000,00000000,00000000,00002010), ref: 004714F7
                              • SendMessageW.USER32(?,000000F7,00000000,00000000), ref: 00471510
                              • DeleteObject.GDI32(?), ref: 0047151E
                              • DestroyCursor.USER32(?), ref: 0047152C
                              • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00002010), ref: 0047156F
                              • SendMessageW.USER32(?,000000F7,00000001,00000000), ref: 00471588
                              • ExtractIconExW.SHELL32(?,?,?,?,00000001), ref: 004715A9
                              • DestroyCursor.USER32(?), ref: 004715CD
                              • SendMessageW.USER32(?,000000F7,00000001,?), ref: 004715DC
                              • DeleteObject.GDI32(?), ref: 004715EA
                              • DestroyCursor.USER32(?), ref: 004715F8
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: CursorDestroyMessageSend$DeleteImageLoadObject$A345ExtractIcon
                              • String ID:
                              • API String ID: 3311172121-0
                              • Opcode ID: 09c61f0bb0da2772a57e209ce6a73de2c43359248684d71e73f4e5cafd481585
                              • Instruction ID: 6a50b90733f0312424b7b906018c15bc054940e4c1588362709ca6bab20dc4d5
                              • Opcode Fuzzy Hash: 09c61f0bb0da2772a57e209ce6a73de2c43359248684d71e73f4e5cafd481585
                              • Instruction Fuzzy Hash: D2419231740206ABDB209F69DD49FEB77A8EB84711F10452AFA46E72D0DBB4E805C768
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: _wcscat_wcscpy$__wsplitpath$_wcschr
                              • String ID:
                              • API String ID: 136442275-0
                              • Opcode ID: 6cac6aaee55c93d52b89e688f8fbcd2468be5ec8bb4ca81dd5968faf06821e55
                              • Instruction ID: 55d98b2249b58b9b89d53d2d63704957c70a659fb5fc0040d5683289e7d9fa4f
                              • Opcode Fuzzy Hash: 6cac6aaee55c93d52b89e688f8fbcd2468be5ec8bb4ca81dd5968faf06821e55
                              • Instruction Fuzzy Hash: C24174B381021C66CB24EB55CC41DEE737DAB98705F0085DEB60963141EA796BC8CFA5
                              APIs
                              • _wcsncpy.LIBCMT ref: 00467490
                              • _wcsncpy.LIBCMT ref: 004674BC
                                • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                                • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                              • _wcstok.LIBCMT ref: 004674FF
                                • Part of subcall function 00413EB8: __getptd.LIBCMT ref: 00413EBE
                              • _wcstok.LIBCMT ref: 004675B2
                              • 75B5D0D0.COMDLG32(00000058), ref: 00467774
                              • _wcslen.LIBCMT ref: 00467793
                              • _wcscpy.LIBCMT ref: 00467641
                                • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                              • _wcslen.LIBCMT ref: 004677BD
                              • 75B5D1A0.COMDLG32(00000058), ref: 00467807
                                • Part of subcall function 00461465: _memmove.LIBCMT ref: 004614F8
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: _wcslen$_memmove_wcscpy_wcsncpy_wcstok$__getptd
                              • String ID: X
                              • API String ID: 1962976255-3081909835
                              • Opcode ID: eb9283ffadc70d7ae5f0b14c33a6b36f7734343f68681e5f3ce0481c1d9d9f7d
                              • Instruction ID: 683e1e2944aeccc99b179fad4e52216d38d827d7da526ed866e93360804c4864
                              • Opcode Fuzzy Hash: eb9283ffadc70d7ae5f0b14c33a6b36f7734343f68681e5f3ce0481c1d9d9f7d
                              • Instruction Fuzzy Hash: 69C1C5306083009BD310FF65C985A5FB7E4AF84318F108D2EF559972A2EB78ED45CB9A
                              APIs
                              • OleInitialize.OLE32(00000000), ref: 0046CBC7
                              • CLSIDFromProgID.OLE32(?,?), ref: 0046CBDF
                              • CLSIDFromString.OLE32(?,?), ref: 0046CBF1
                              • CoCreateInstance.OLE32(?,?,00000005,00482998,?), ref: 0046CC56
                              • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000), ref: 0046CCCA
                              • _wcslen.LIBCMT ref: 0046CDB0
                              • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 0046CE33
                              • CoTaskMemFree.OLE32(?), ref: 0046CE42
                              • CoSetProxyBlanket.OLE32(?,?,?,?,?,?,?,00000800), ref: 0046CE85
                                • Part of subcall function 00468070: VariantInit.OLEAUT32(00000000), ref: 004680B0
                                • Part of subcall function 00468070: VariantCopy.OLEAUT32(00000000,00479A50), ref: 004680BA
                                • Part of subcall function 00468070: VariantClear.OLEAUT32 ref: 004680C7
                              Strings
                              • NULL Pointer assignment, xrefs: 0046CEA6
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: Variant$CreateFromInitializeInstance$BlanketClearCopyFreeInitProgProxySecurityStringTask_wcslen
                              • String ID: NULL Pointer assignment
                              • API String ID: 440038798-2785691316
                              • Opcode ID: 58df38d68bb8b0de8b452a242e06650ce93d7fbbb76e65ad7c2ec0be56c62684
                              • Instruction ID: 7aab634462a7dbcbf958abac95e41bd58996b502d0213671d322085b5631b432
                              • Opcode Fuzzy Hash: 58df38d68bb8b0de8b452a242e06650ce93d7fbbb76e65ad7c2ec0be56c62684
                              • Instruction Fuzzy Hash: 74B13FB1D00229AFDB10DFA5CC85FEEB7B8EF48700F10855AF909A7281EB745A45CB95
                              APIs
                              • GetClassNameW.USER32(?,?,00000400), ref: 00461056
                              • GetWindowTextW.USER32(?,?,00000400), ref: 00461092
                              • _wcslen.LIBCMT ref: 004610A3
                              • CharUpperBuffW.USER32(?,00000000), ref: 004610B1
                              • GetClassNameW.USER32(?,?,00000400), ref: 00461124
                              • GetWindowTextW.USER32(?,?,00000400), ref: 0046115D
                              • GetClassNameW.USER32(?,?,00000400), ref: 004611A1
                              • GetClassNameW.USER32(?,?,00000400), ref: 004611D9
                              • GetWindowRect.USER32(?,?), ref: 00461248
                                • Part of subcall function 00436299: _memmove.LIBCMT ref: 004362D9
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: ClassName$Window$Text$BuffCharRectUpper_memmove_wcslen
                              • String ID: ThumbnailClass
                              • API String ID: 4136854206-1241985126
                              • Opcode ID: d083942efa6e299b81e87f64ddc190b4296276633e8192dbc1e7cc466e4535cb
                              • Instruction ID: 9bdbaadfe46dce382da1609a4111f175dadd43cf518d3c7fb815d390e9d71813
                              • Opcode Fuzzy Hash: d083942efa6e299b81e87f64ddc190b4296276633e8192dbc1e7cc466e4535cb
                              • Instruction Fuzzy Hash: D991F3715043009FCB14DF51C881BAB77A8EF89719F08895FFD84A6252E738E946CBA7
                              APIs
                              • ExtractIconExW.SHELL32(?,?,00000000,?,00000001), ref: 004718C7
                              • 6F0D2980.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00471922
                              • SendMessageW.USER32(?,00001109,00000000,00000000), ref: 00471947
                              • 6F0CC400.COMCTL32(?,000000FF,?), ref: 00471960
                              • SendMessageW.USER32(?,0000113E,00000000,?), ref: 004719E0
                              • SendMessageW.USER32(?,0000113F,00000000,00000032), ref: 00471A0D
                              • GetClientRect.USER32(?,?), ref: 00471A1A
                              • 73A35EE0.USER32(?,?,00000000,00000000), ref: 00471A29
                              • DestroyCursor.USER32(?), ref: 00471AF4
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: MessageSend$C400ClientCursorD2980DestroyExtractIconRect
                              • String ID: 2
                              • API String ID: 1513486426-450215437
                              • Opcode ID: 35af861e1287c83bf6b22685c9feb70a55a109cab4d535c9bbd66d0cf124b3e0
                              • Instruction ID: 8a8bfaa361b8e4ad447499ed02e60938d35b352fbee86dd909721fc396438cf5
                              • Opcode Fuzzy Hash: 35af861e1287c83bf6b22685c9feb70a55a109cab4d535c9bbd66d0cf124b3e0
                              • Instruction Fuzzy Hash: 19519070A00209AFDB10CF98CD95BEEB7B5FF49310F10815AEA09AB3A1D7B4AD41CB55
                              APIs
                              • GetModuleHandleW.KERNEL32(00000000,00000066,?,00000FFF,00000010,00000001,?,?,00427F75,?,0000138C,?,00000001,?,?,?), ref: 004608A9
                              • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608B0
                                • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                              • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,00427F75,?,0000138C,?,00000001,?,?,?,?,?,00000000), ref: 004608D0
                              • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608D7
                              • __swprintf.LIBCMT ref: 00460915
                              • __swprintf.LIBCMT ref: 0046092D
                              • _wprintf.LIBCMT ref: 004609E1
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: HandleLoadModuleString__swprintf$_memmove_wcslen_wprintf
                              • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d:$^ ERROR
                              • API String ID: 3054410614-2561132961
                              • Opcode ID: 70def87c4b28ee4ab6614adc46955888b63d74e37d3694ee9c83f9e80406ad7b
                              • Instruction ID: 8ea7bd36613c7ff98b4c02c5a019b599898316a67ab96f708308d0ed756dbd7a
                              • Opcode Fuzzy Hash: 70def87c4b28ee4ab6614adc46955888b63d74e37d3694ee9c83f9e80406ad7b
                              • Instruction Fuzzy Hash: 654183B29001099BDB00FBD1DC9AAEF7778EF44354F45403AF504B7192EB78AA45CBA9
                              APIs
                                • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                              • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 00458721
                              • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 0045873E
                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?), ref: 0045875C
                              • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?), ref: 0045878A
                              • CLSIDFromString.OLE32(?,?), ref: 004587B3
                              • RegCloseKey.ADVAPI32(000001FE), ref: 004587BF
                              • RegCloseKey.ADVAPI32(?), ref: 004587C5
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_memmove_wcslen
                              • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                              • API String ID: 600699880-22481851
                              • Opcode ID: cfc91adc3568b3696bc93f198b4a86b184f94eddf56cabac594ca02b2fd0747b
                              • Instruction ID: 095cb2d92039a6881e8bf561e9cb0619f72fc8c68408713302cc045b8cca0367
                              • Opcode Fuzzy Hash: cfc91adc3568b3696bc93f198b4a86b184f94eddf56cabac594ca02b2fd0747b
                              • Instruction Fuzzy Hash: 58415275D0020DABCB04EBA4DC45ADE77B8EF48304F10846EE914B7291EF78A909CB94
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID:
                              • String ID: static
                              • API String ID: 0-2160076837
                              • Opcode ID: d780a762e7facdedeb15ece3d926807f2c32385f8c9501599d87c18bab5c95b9
                              • Instruction ID: e571488c54e010bbe3192cf51c39f0d33963e2fa0fa89bc12fd4c8100c345edb
                              • Opcode Fuzzy Hash: d780a762e7facdedeb15ece3d926807f2c32385f8c9501599d87c18bab5c95b9
                              • Instruction Fuzzy Hash: 2C41B375200205ABDB149F64DC85FEB33A8EF89725F20472AFA15E72C0D7B4E841CB68
                              APIs
                              • SetErrorMode.KERNEL32(00000001), ref: 0045D959
                              • GetDriveTypeW.KERNEL32(?,?), ref: 0045D9AB
                              • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045DA4B
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: ErrorMode$DriveType
                              • String ID: CDROM$Fixed$Network$RAMDisk$Removable$Unknown$\VH
                              • API String ID: 2907320926-3566645568
                              • Opcode ID: d176aaa606c69a21fa64de5f54fcf515c340d5c4a7f23c4320f7b4e4ff292d02
                              • Instruction ID: 8c6a7395db7573f60177d60b7e789de744ab79b943898383e565048f237880a7
                              • Opcode Fuzzy Hash: d176aaa606c69a21fa64de5f54fcf515c340d5c4a7f23c4320f7b4e4ff292d02
                              • Instruction Fuzzy Hash: B7316E35A042049BCB10FFA9C48595EB771FF88315B1088ABFD05AB392C739DD45CB6A
                              APIs
                                • Part of subcall function 00430003: InvalidateRect.USER32(?,00000000,00000001), ref: 00430091
                              • DestroyAcceleratorTable.USER32(?), ref: 0047094A
                              • 6F0D0860.COMCTL32(?), ref: 004709AD
                              • 6F0D0860.COMCTL32(?), ref: 004709C5
                              • 6F0D0860.COMCTL32(?), ref: 004709D5
                              • DeleteObject.GDI32(003D0000), ref: 00470A04
                              • DestroyCursor.USER32(003A0043), ref: 00470A1C
                              • DeleteObject.GDI32(C3A5F891), ref: 00470A34
                              • 73A35CF0.USER32(0049006F), ref: 00470A4C
                              • DestroyCursor.USER32(?), ref: 00470A73
                              • DestroyCursor.USER32(?), ref: 00470A81
                              • KillTimer.USER32(00000000,00000000), ref: 00470B00
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: Destroy$CursorD0860$DeleteObject$AcceleratorInvalidateKillRectTableTimer
                              • String ID:
                              • API String ID: 3195513514-0
                              • Opcode ID: 4ee17edbf3fbf185c7a1b530a933687592c26a3f705ddbb244818e4a2882b4b3
                              • Instruction ID: 3938066daea6daae9dc0c39577387909b3bcb8112bd91d3310d64c2ecda3814a
                              • Opcode Fuzzy Hash: 4ee17edbf3fbf185c7a1b530a933687592c26a3f705ddbb244818e4a2882b4b3
                              • Instruction Fuzzy Hash: 24616874601201CFE714DF65DD94FAA77B8FB6A304B54856EE6098B3A2CB38EC41CB58
                              APIs
                              • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,00000000,004795FD), ref: 00479380
                              • SafeArrayAllocData.OLEAUT32(004795FD), ref: 004793CF
                              • VariantInit.OLEAUT32(?), ref: 004793E1
                              • SafeArrayAccessData.OLEAUT32(004795FD,?), ref: 00479402
                              • VariantCopy.OLEAUT32(?,?), ref: 00479461
                              • SafeArrayUnaccessData.OLEAUT32(004795FD), ref: 00479474
                              • VariantClear.OLEAUT32(?), ref: 00479489
                              • SafeArrayDestroyData.OLEAUT32(004795FD), ref: 004794AE
                              • SafeArrayDestroyDescriptor.OLEAUT32(004795FD), ref: 004794B8
                              • VariantClear.OLEAUT32(?), ref: 004794CA
                              • SafeArrayDestroyDescriptor.OLEAUT32(004795FD), ref: 004794E7
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                              • String ID:
                              • API String ID: 2706829360-0
                              • Opcode ID: 604ca7338ef7579289b82c182b4992e50dced26e61eee24e9e1f7f7e4088d468
                              • Instruction ID: 8c269571b42c1441f814514f03b92edd351012a73d8239c9f379a0a89e1b4ae1
                              • Opcode Fuzzy Hash: 604ca7338ef7579289b82c182b4992e50dced26e61eee24e9e1f7f7e4088d468
                              • Instruction Fuzzy Hash: F6515E76A00119ABCB00DFA5DD849DEB7B9FF88704F10856EE905A7241DB749E06CBA4
                              APIs
                              • GetKeyboardState.USER32(?), ref: 0044480E
                              • GetAsyncKeyState.USER32(000000A0), ref: 00444899
                              • GetKeyState.USER32(000000A0), ref: 004448AA
                              • GetAsyncKeyState.USER32(000000A1), ref: 004448C8
                              • GetKeyState.USER32(000000A1), ref: 004448D9
                              • GetAsyncKeyState.USER32(00000011), ref: 004448F5
                              • GetKeyState.USER32(00000011), ref: 00444903
                              • GetAsyncKeyState.USER32(00000012), ref: 0044491F
                              • GetKeyState.USER32(00000012), ref: 0044492D
                              • GetAsyncKeyState.USER32(0000005B), ref: 00444949
                              • GetKeyState.USER32(0000005B), ref: 00444958
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: State$Async$Keyboard
                              • String ID:
                              • API String ID: 541375521-0
                              • Opcode ID: 9fce1f5b3a66d3eff563dda32bd6bc0484776d74d04e18c21d6e4f8d76764453
                              • Instruction ID: 827c2ee343902556a703916e37c968ecd50c133e95067caf6822082f003788d3
                              • Opcode Fuzzy Hash: 9fce1f5b3a66d3eff563dda32bd6bc0484776d74d04e18c21d6e4f8d76764453
                              • Instruction Fuzzy Hash: 27412B34A047C969FF31A6A4C8043A7BBA16FA1314F04805FD5C5477C1DBED99C8C7A9
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: InitVariant$_malloc_wcscpy_wcslen
                              • String ID:
                              • API String ID: 3413494760-0
                              • Opcode ID: b3fce9f732112990bbb163bb6abadbd830b92813f31b22ad1e38064008f16c53
                              • Instruction ID: 93a03e1dde4748921c3f7e50244c45dc9774a8ad470eaa8d68eb3f4e8808ad8d
                              • Opcode Fuzzy Hash: b3fce9f732112990bbb163bb6abadbd830b92813f31b22ad1e38064008f16c53
                              • Instruction Fuzzy Hash: 33414BB260070AAFC754DF69C880A86BBE8FF48314F00862AE619C7750D775E564CBE5
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: AddressProc_free_malloc$_strcat_strlen
                              • String ID: AU3_FreeVar
                              • API String ID: 2634073740-771828931
                              • Opcode ID: 0205934085a73e828eb836af54efcf0b2f745960cf3f8f52847b126bcd632882
                              • Instruction ID: 8d08e60933d1045585c44e473594da8d0bbfd8a8652ecee4fcef853dc29158a1
                              • Opcode Fuzzy Hash: 0205934085a73e828eb836af54efcf0b2f745960cf3f8f52847b126bcd632882
                              • Instruction Fuzzy Hash: 00B1ADB4A00206DFCB00DF55C880A6AB7A5FF88319F2485AEED058F352D739ED95CB94
                              APIs
                              • CoInitialize.OLE32 ref: 0046C63A
                              • CoUninitialize.OLE32 ref: 0046C645
                                • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                • Part of subcall function 0044CB87: CreateDispTypeInfo.OLEAUT32(?,00000800,?), ref: 0044CBD4
                                • Part of subcall function 0044CB87: CreateStdDispatch.OLEAUT32(00000000,?,?,?), ref: 0044CBF4
                              • CLSIDFromProgID.OLE32(00000000,?), ref: 0046C694
                              • CLSIDFromString.OLE32(00000000,?), ref: 0046C6A4
                              • CoCreateInstance.OLE32(?,00000000,00000017,00482998,?), ref: 0046C6CD
                              • IIDFromString.OLE32(?,?), ref: 0046C705
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: CreateFrom$String$DispDispatchInfoInitializeInstanceProgTypeUninitialize_malloc
                              • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                              • API String ID: 2294789929-1287834457
                              • Opcode ID: 4dfaed0549f409efa28524cf643488acd2e6b782f2d71f2a42dfc1cbbaa944b5
                              • Instruction ID: adb6a6f601bf1a612e569d1fac1689f55b30b767fcafa950e0578031a668eb85
                              • Opcode Fuzzy Hash: 4dfaed0549f409efa28524cf643488acd2e6b782f2d71f2a42dfc1cbbaa944b5
                              • Instruction Fuzzy Hash: B861BC712043019FD710EF21D885B7BB3E8FB84715F10891EF9859B241E779E909CBAA
                              APIs
                              • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 004506A0
                              • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 004506B4
                              • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 004506D5
                              • _wcslen.LIBCMT ref: 00450720
                              • _wcscat.LIBCMT ref: 00450733
                              • SendMessageW.USER32(?,00001057,00000000,?), ref: 0045074C
                              • SendMessageW.USER32(?,00001061,?,?), ref: 0045077E
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: MessageSend$Window_wcscat_wcslen
                              • String ID: -----$SysListView32
                              • API String ID: 4008455318-3975388722
                              • Opcode ID: ffec743b0eb36e838b163f32d05296d45530ca8b23685d337e61e8ea6b23e255
                              • Instruction ID: d83f74bd31ff7b91e94eebeff09b40632409ca0fd113a8de7250d6f1aa6a1b31
                              • Opcode Fuzzy Hash: ffec743b0eb36e838b163f32d05296d45530ca8b23685d337e61e8ea6b23e255
                              • Instruction Fuzzy Hash: 9C51D470500308ABDB24CF64CD89FEE77A5EF98304F10065EF944A72C2D3B99959CB58
                              APIs
                                • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                              • SendMessageW.USER32(00000000,0000018C,000000FF,00000000), ref: 00469C73
                              • GetDlgCtrlID.USER32(00000000), ref: 00469C84
                              • GetParent.USER32 ref: 00469C98
                              • SendMessageW.USER32(00000000,?,00000111), ref: 00469C9F
                              • GetDlgCtrlID.USER32(00000000), ref: 00469CA5
                              • GetParent.USER32 ref: 00469CBC
                              • SendMessageW.USER32(00000000,?,00000111,?), ref: 00469CC3
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: MessageSend$CtrlParent$_memmove_wcslen
                              • String ID: ComboBox$ListBox
                              • API String ID: 2360848162-1403004172
                              • Opcode ID: 7a27601cbaa80f740c595597d901cdf30e8ed390f6d586fa417b55efe09de5c4
                              • Instruction ID: b77daa4920d68b7dc7b38413de7e2b04daab878370679d8231203fb1b5b646ea
                              • Opcode Fuzzy Hash: 7a27601cbaa80f740c595597d901cdf30e8ed390f6d586fa417b55efe09de5c4
                              • Instruction Fuzzy Hash: 0121E7716001187BDB00AB69CC85ABF779CEB85320F00855BFA149B2D1D6B8D845C7A5
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: _wcscpy$FolderUninitialize$BrowseDesktopFromInitializeListMallocPath
                              • String ID:
                              • API String ID: 262282135-0
                              • Opcode ID: 6572a5b0ab20a3b352b20f616e179ebe31bc85c3400954ff5f88a0c3e804af97
                              • Instruction ID: f209a7e015878e5ef66622a864ec89938c936514b9877fb167e893f071c19078
                              • Opcode Fuzzy Hash: 6572a5b0ab20a3b352b20f616e179ebe31bc85c3400954ff5f88a0c3e804af97
                              • Instruction Fuzzy Hash: 25718275900208AFCB14EF95C9849DEB7B9EF88304F00899AE9099B312D735EE45CF64
                              APIs
                              • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 004481A8
                              • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 004481AB
                              • 73A345F0.USER32(?,000000F0,?,0000101F,00000000,00000000,00001200,00000000,00000000), ref: 004481CF
                              • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004481F2
                              • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00448266
                              • SendMessageW.USER32(?,00001074,?,00000007), ref: 004482B4
                              • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 004482CF
                              • SendMessageW.USER32(?,0000101D,00000001,00000000), ref: 004482F1
                              • SendMessageW.USER32(?,0000101E,00000001,?), ref: 00448308
                              • SendMessageW.USER32(?,00001008,?,00000007), ref: 00448320
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: MessageSend$A345
                              • String ID:
                              • API String ID: 2444598715-0
                              • Opcode ID: 6a3a0ce9ab1f2311975bf00a061da1b0f9e556c56634a45a126b5d9c196b7e2c
                              • Instruction ID: c7c5d5d6f9bf0949bb943eac7ac5a8ec30049dd2ce11923e35461b50cec8bdb0
                              • Opcode Fuzzy Hash: 6a3a0ce9ab1f2311975bf00a061da1b0f9e556c56634a45a126b5d9c196b7e2c
                              • Instruction Fuzzy Hash: 97617C70A00208AFEB10DF94DC81FEE77B9FF49714F10429AF914AB291DBB5AA41CB54
                              APIs
                              • GetCurrentThreadId.KERNEL32 ref: 00434643
                              • GetForegroundWindow.USER32(00000000), ref: 00434655
                              • GetWindowThreadProcessId.USER32(00000000), ref: 0043465C
                              • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 00434671
                              • GetWindowThreadProcessId.USER32(?,?), ref: 0043467F
                              • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 00434698
                              • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 004346A6
                              • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 004346F3
                              • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 00434707
                              • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 00434712
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                              • String ID:
                              • API String ID: 2156557900-0
                              • Opcode ID: 67cee910062edc5350ae4d2b9d1366d6ad4b01d413104696f98c87e4c7643c1b
                              • Instruction ID: 33c2ceff45d8cb0672f592c0823183733d26e7ad7419b63083ab10cfbc882f35
                              • Opcode Fuzzy Hash: 67cee910062edc5350ae4d2b9d1366d6ad4b01d413104696f98c87e4c7643c1b
                              • Instruction Fuzzy Hash: 98313EB2600204BFDB11DF69DC859AEB7A9FB9A310F00552AF905D7250E778AD40CB6C
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID:
                              • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                              • API String ID: 0-1603158881
                              • Opcode ID: b2205c720eb57eaa9acd20c5cdad8c47631596d61f09c649adc7dd6ac6f1094b
                              • Instruction ID: 400245e8055df5988f0e80dfbae95eacb55e3b8a933f722a5dc1e2c8929bf265
                              • Opcode Fuzzy Hash: b2205c720eb57eaa9acd20c5cdad8c47631596d61f09c649adc7dd6ac6f1094b
                              • Instruction Fuzzy Hash: FAA162B5800204ABDF00EF61D8C1BEA3368AF54349F58857BEC096B146EB7D6909D77A
                              APIs
                              • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00401D06
                              • 73A35CF0.USER32(?), ref: 00426F50
                              • UnregisterHotKey.USER32(?), ref: 00426F77
                              • FreeLibrary.KERNEL32(?), ref: 0042701F
                              • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00427050
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: Free$LibrarySendStringUnregisterVirtual
                              • String ID: close all$ou
                              • API String ID: 2389397985-2099725088
                              • Opcode ID: 2f66c89a40f0e85c5d6dd4ec67defb2116834faec8b505cc193eeea2d12e665d
                              • Instruction ID: 89fc9d45334329c88beddca7a6314a06ce6e15860ee53b488cbf8147960762b2
                              • Opcode Fuzzy Hash: 2f66c89a40f0e85c5d6dd4ec67defb2116834faec8b505cc193eeea2d12e665d
                              • Instruction Fuzzy Hash: 9BA1C174710212CFC710EF15C985B5AF3A8BF48304F5045AEE909672A2CB78BD96CF99
                              APIs
                              • CreateMenu.USER32 ref: 00448603
                              • SetMenu.USER32(?,00000000), ref: 00448613
                              • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00448697
                              • IsMenu.USER32(?), ref: 004486AB
                              • CreatePopupMenu.USER32 ref: 004486B5
                              • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 004486EC
                              • DrawMenuBar.USER32 ref: 004486F5
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: Menu$CreateItem$DrawInfoInsertPopup
                              • String ID: 0
                              • API String ID: 161812096-4108050209
                              • Opcode ID: 5f9c542d8f07ae56d95057f828c3334b95156dd137b7db0efda9360fb5a3d221
                              • Instruction ID: 1651b4fd0bf3e4e6d8e032b2651979207be8780685d2f09cc615cc8e1c1775d8
                              • Opcode Fuzzy Hash: 5f9c542d8f07ae56d95057f828c3334b95156dd137b7db0efda9360fb5a3d221
                              • Instruction Fuzzy Hash: 9D418B75A01209AFEB40DF98D884ADEB7B4FF49314F10815EED189B340DB74A851CFA8
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 0b34b3a5b5d670eb49a5e2d7b5cd424f37d7569b2aa50e3450060746f4beba41
                              • Instruction ID: 0df76164974c5272bb459d6cb57aadea20bc0786d7edd9cc69ce034119999088
                              • Opcode Fuzzy Hash: 0b34b3a5b5d670eb49a5e2d7b5cd424f37d7569b2aa50e3450060746f4beba41
                              • Instruction Fuzzy Hash: 10A1CE726083009FD310EF65D886B5BB3E9EBC4718F108E2EF559E7281D679E804CB96
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: b2351d13dc7e01734d52893050a6426585663f8e33c7fb02d488baa67b0c7faf
                              • Instruction ID: d12da5a9263b129e99c802cec43d72d92cc496201e336192e500ad81068e5f87
                              • Opcode Fuzzy Hash: b2351d13dc7e01734d52893050a6426585663f8e33c7fb02d488baa67b0c7faf
                              • Instruction Fuzzy Hash: D7519C70600305ABEB20DF69CC81F9B77A8AB08715F50462AFE05DB3C1E7B5E8588B58
                              APIs
                                • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,004A7F6C,0040F545,004A7F6C,004A90E8,004A7F6C,?,0040F545), ref: 0041013C
                                • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
                              • lstrcmpiW.KERNEL32(?,?), ref: 00453900
                              • MoveFileW.KERNEL32(?,?), ref: 00453932
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: File$AttributesFullMoveNamePathlstrcmpi
                              • String ID:
                              • API String ID: 978794511-0
                              • Opcode ID: e7576e1258f6bbb5b55b57ee2c4336deeb121e8720ac0ec1c8be93e036d3feb8
                              • Instruction ID: 27746a5f3a3ee1b1e58f24b17d6851fe0efcb48f315c8e59f2eb92c6bb7fc6f1
                              • Opcode Fuzzy Hash: e7576e1258f6bbb5b55b57ee2c4336deeb121e8720ac0ec1c8be93e036d3feb8
                              • Instruction Fuzzy Hash: 295155B2C0021996CF20EFA1DD45BEEB379AF44305F0445DEEA0DA3101EB79AB98CB55
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: dd945b6e1d8e8d9855cf24d2d3706bb91709aa24080d3beeb23df65cd9890c42
                              • Instruction ID: 5433ce91f60fc94fc18d391a2a535eeaa569d09d9a52eba385401fd30cec28f3
                              • Opcode Fuzzy Hash: dd945b6e1d8e8d9855cf24d2d3706bb91709aa24080d3beeb23df65cd9890c42
                              • Instruction Fuzzy Hash: 5B41C4322142405AF3619B6DFCC4BEBBB98FBA6324F10056FF185E55A0C3EA74C58769
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: ClearVariant
                              • String ID:
                              • API String ID: 1473721057-0
                              • Opcode ID: 3e0aaa4ed6ce8b6007e7bdda37da77eca1e161273c17b4dd860825949f7c6934
                              • Instruction ID: 82c0e5a8bed1f7f82a0371e607e4af2e63fad7cf90771a3a9635cac59f663638
                              • Opcode Fuzzy Hash: 3e0aaa4ed6ce8b6007e7bdda37da77eca1e161273c17b4dd860825949f7c6934
                              • Instruction Fuzzy Hash: C301ECB6000B486AD630E7B9DC84FD7B7ED6B85600F018E1DE69A82514DA75F188CB64
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: _memmove$_memcmp
                              • String ID: '$\$h
                              • API String ID: 2205784470-1303700344
                              • Opcode ID: b142f59b2296442f2f65cbc20b4c9604eb51a9c16c8aaf0febd8f469beae5ca2
                              • Instruction ID: e67660c870af743a7fabfec7c4e9e8b186464fd05e4f656457aecd1ba61caca8
                              • Opcode Fuzzy Hash: b142f59b2296442f2f65cbc20b4c9604eb51a9c16c8aaf0febd8f469beae5ca2
                              • Instruction Fuzzy Hash: 5CE1C070A002498FDB18CFA9D8806BEFBF2FF89304F28816ED84697341D778A945CB54
                              APIs
                              • VariantInit.OLEAUT32(00000000), ref: 0045EA56
                              • VariantCopy.OLEAUT32(00000000), ref: 0045EA60
                              • VariantClear.OLEAUT32 ref: 0045EA6D
                              • VariantTimeToSystemTime.OLEAUT32 ref: 0045EC06
                              • __swprintf.LIBCMT ref: 0045EC33
                              • VariantInit.OLEAUT32(00000000), ref: 0045ECEE
                              Strings
                              • %4d%02d%02d%02d%02d%02d, xrefs: 0045EC2D
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: Variant$InitTime$ClearCopySystem__swprintf
                              • String ID: %4d%02d%02d%02d%02d%02d
                              • API String ID: 2441338619-1568723262
                              • Opcode ID: c256a0e8f79103727635468c6c39d920c699b266699b53e39892a4f9942b48fe
                              • Instruction ID: 6ef9d3a4897ddb850998a39013325e9d2daf595bbef4806ea59c93c68b265cd6
                              • Opcode Fuzzy Hash: c256a0e8f79103727635468c6c39d920c699b266699b53e39892a4f9942b48fe
                              • Instruction Fuzzy Hash: F8A10873A0061487CB209F5AE48066AF7B0FF84721F1485AFED849B341C736AD99D7E5
                              APIs
                              • InterlockedIncrement.KERNEL32(004A7F04), ref: 0042C659
                              • InterlockedDecrement.KERNEL32(004A7F04), ref: 0042C677
                              • Sleep.KERNEL32(0000000A), ref: 0042C67F
                              • InterlockedIncrement.KERNEL32(004A7F04), ref: 0042C68A
                              • InterlockedDecrement.KERNEL32(004A7F04), ref: 0042C73C
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: Interlocked$DecrementIncrement$Sleep
                              • String ID: @COM_EVENTOBJ
                              • API String ID: 327565842-2228938565
                              • Opcode ID: ca0223daa9e96e83c575322b086aef175ea6f60956e985fc72e5b4b432ff0b62
                              • Instruction ID: 079f2a2c733a9a3e151bbe14bd9981fb61a061d6167fc58a91b905d371dd4d86
                              • Opcode Fuzzy Hash: ca0223daa9e96e83c575322b086aef175ea6f60956e985fc72e5b4b432ff0b62
                              • Instruction Fuzzy Hash: 18D1D271A002198FDB10EF94C985BEEB7B0FF45304F60856AE5057B392D778AE46CB98
                              APIs
                              • VariantClear.OLEAUT32(?), ref: 0047031B
                              • VariantClear.OLEAUT32(?), ref: 0047044F
                              • VariantInit.OLEAUT32(?), ref: 004704A3
                              • DispCallFunc.OLEAUT32(?,?,?,00000015,?,?,?,?), ref: 00470504
                              • VariantClear.OLEAUT32(?), ref: 00470516
                                • Part of subcall function 00435481: VariantCopy.OLEAUT32(?,?), ref: 00435492
                              • VariantCopy.OLEAUT32(?,?), ref: 0047057A
                                • Part of subcall function 00435403: VariantClear.OLEAUT32(?), ref: 00435414
                              • VariantClear.OLEAUT32(00000000), ref: 0047060D
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: Variant$Clear$Copy$CallDispFuncInit
                              • String ID: H
                              • API String ID: 3613100350-2852464175
                              • Opcode ID: a0993396c5b8998c97eda62eb292956ea80afa76050d6468dceab7f561fa4670
                              • Instruction ID: 4e55d858753f5aac0b63ea9498fb9ef25a468b81cfd7169f1740116cc4944d08
                              • Opcode Fuzzy Hash: a0993396c5b8998c97eda62eb292956ea80afa76050d6468dceab7f561fa4670
                              • Instruction Fuzzy Hash: 93B15BB5605311EFD710DF54C880A6BB3A4FF88308F049A2EFA8997351D738E951CB9A
                              APIs
                              • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0044AAC5
                              • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0044AAFA
                              • InternetQueryOptionW.WININET(00000000,0000001F,00000000,00001000), ref: 0044AB5E
                              • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 0044AB74
                              • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0044AB83
                              • HttpQueryInfoW.WININET(00000000,00000005,?,00001000,00000000), ref: 0044ABBB
                                • Part of subcall function 004422CB: GetLastError.KERNEL32 ref: 004422E1
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: HttpInternet$OptionQueryRequest$ConnectErrorInfoLastOpenSend
                              • String ID:
                              • API String ID: 1291720006-3916222277
                              • Opcode ID: 91fdcc8e85295173cca015a6521aec32459a41892940df1d160b2f6c73229ea3
                              • Instruction ID: 89538bfc19842651326e528327905a39262a83d8aa3acd63c003c629d13479a9
                              • Opcode Fuzzy Hash: 91fdcc8e85295173cca015a6521aec32459a41892940df1d160b2f6c73229ea3
                              • Instruction Fuzzy Hash: FA51B1756403087BF710DF56DC86FEBB7A8FB88715F00851EFB0196281D7B8A5148BA8
                              APIs
                              • GetMenuItemInfoW.USER32(?,FFFFFFFF,00000000,00000030), ref: 0045FC48
                              • IsMenu.USER32(?), ref: 0045FC5F
                              • CreatePopupMenu.USER32 ref: 0045FC97
                              • GetMenuItemCount.USER32(?), ref: 0045FCFD
                              • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 0045FD26
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: Menu$Item$CountCreateInfoInsertPopup
                              • String ID: 0$2
                              • API String ID: 93392585-3793063076
                              • Opcode ID: f01c363b391305104942df3bb39f3e86dedaf87795108832ec1df4cdc4019c53
                              • Instruction ID: a5f6d3c146e885c54ead74f35c39eec4acd60bc9fc93d28bc39e3d14768ea649
                              • Opcode Fuzzy Hash: f01c363b391305104942df3bb39f3e86dedaf87795108832ec1df4cdc4019c53
                              • Instruction Fuzzy Hash: B55192719002099BDB11DF69D888BAF7BB4BB44319F14853EEC15DB282D3B8984CCB66
                              APIs
                              • SafeArrayAccessData.OLEAUT32(?,?), ref: 004352E6
                              • VariantClear.OLEAUT32(?), ref: 00435320
                              • SafeArrayUnaccessData.OLEAUT32(?), ref: 00435340
                              • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00435373
                              • VariantClear.OLEAUT32(?), ref: 004353B3
                              • SafeArrayUnaccessData.OLEAUT32(?), ref: 004353F6
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: ArrayDataSafeVariant$ClearUnaccess$AccessChangeType
                              • String ID: crts
                              • API String ID: 586820018-3724388283
                              • Opcode ID: 545d374044e3945891266c858ffc3b068b1e43ab9a1ba77500f3c10b34ab4cdf
                              • Instruction ID: e94501f388d0d73ced66c0aa9444ce68fa972137b9c89e1913ae9ea64c05cbbc
                              • Opcode Fuzzy Hash: 545d374044e3945891266c858ffc3b068b1e43ab9a1ba77500f3c10b34ab4cdf
                              • Instruction Fuzzy Hash: DE418BB5200208EBDB10CF1CD884A9AB7B5FF9C314F20852AEE49CB351E775E911CBA4
                              APIs
                                • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,004A7F6C,0040F545,004A7F6C,004A90E8,004A7F6C,?,0040F545), ref: 0041013C
                              • lstrcmpiW.KERNEL32(?,?), ref: 0044BC09
                              • MoveFileW.KERNEL32(?,?), ref: 0044BC3F
                              • _wcscat.LIBCMT ref: 0044BCAF
                              • _wcslen.LIBCMT ref: 0044BCBB
                              • _wcslen.LIBCMT ref: 0044BCD1
                              • SHFileOperationW.SHELL32(?), ref: 0044BD17
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: File_wcslen$FullMoveNameOperationPath_wcscatlstrcmpi
                              • String ID: \*.*
                              • API String ID: 2326526234-1173974218
                              • Opcode ID: dfa273c9728ae0aa44cf40aad3cddd2261aca17058b0337a789aafef13e29e40
                              • Instruction ID: cfb238852dc788c6f4e4306d35388aa956c556a9525b71239849112dc74cb112
                              • Opcode Fuzzy Hash: dfa273c9728ae0aa44cf40aad3cddd2261aca17058b0337a789aafef13e29e40
                              • Instruction Fuzzy Hash: 5C3184B1800219AACF14EFB1DC85ADEB3B5AF48304F5095EEE90997211EB35D748CB98
                              APIs
                                • Part of subcall function 00433244: _wcsncpy.LIBCMT ref: 0043325C
                              • _wcslen.LIBCMT ref: 004335F2
                              • GetFileAttributesW.KERNEL32(?), ref: 0043361C
                              • GetLastError.KERNEL32 ref: 0043362B
                              • CreateDirectoryW.KERNEL32(?,00000000), ref: 0043363F
                              • _wcsrchr.LIBCMT ref: 00433666
                                • Part of subcall function 004335CD: CreateDirectoryW.KERNEL32(?,00000000), ref: 004336A7
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: CreateDirectory$AttributesErrorFileLast_wcslen_wcsncpy_wcsrchr
                              • String ID: \
                              • API String ID: 321622961-2967466578
                              • Opcode ID: c150a4e9996d72ab87fed94048e5703dbc8ac01b5d1c28e2aacddbc68f85fc9a
                              • Instruction ID: 66c6ecc179b40ab72a0151a8d865592f5e80cbeaaa2383c239fb12261b929cf9
                              • Opcode Fuzzy Hash: c150a4e9996d72ab87fed94048e5703dbc8ac01b5d1c28e2aacddbc68f85fc9a
                              • Instruction Fuzzy Hash: C72129719013146ADF30AF25AC06BEB73AC9B05715F10569AFD18C2241E6799A888BE9
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: __wcsnicmp
                              • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                              • API String ID: 1038674560-2734436370
                              • Opcode ID: 7c13aa0513e4bb2138c96398a5a2566d58b08304d963883aeef11e8644bf4991
                              • Instruction ID: d05ed79ef8649e951018b8bbb1c2d61e3c33a7345c6b0b1fc41c187b8edaa79f
                              • Opcode Fuzzy Hash: 7c13aa0513e4bb2138c96398a5a2566d58b08304d963883aeef11e8644bf4991
                              • Instruction Fuzzy Hash: 1221003365151066E72176199C82FDBB3989FA5314F04442BFE049B242D26EF99A83E9
                              APIs
                              • GetModuleHandleW.KERNEL32(00000000,004A90E8,?,00000100,?,004A7F6C), ref: 00434057
                              • LoadStringW.USER32(00000000), ref: 00434060
                              • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00434075
                              • LoadStringW.USER32(00000000), ref: 00434078
                              • _wprintf.LIBCMT ref: 004340A1
                              • MessageBoxW.USER32(00000000,?,?,00011010), ref: 004340B9
                              Strings
                              • %s (%d) : ==> %s: %s %s, xrefs: 0043409C
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: HandleLoadModuleString$Message_wprintf
                              • String ID: %s (%d) : ==> %s: %s %s
                              • API String ID: 3648134473-3128320259
                              • Opcode ID: 5806584fae846cee426602f55e287a2c1afdddb79e6f9c87a69d5249cd46d2cb
                              • Instruction ID: 3f99f1473d628bc1a501e0113e735bb0cc043e2cca9b2706ac47da9b95460e2a
                              • Opcode Fuzzy Hash: 5806584fae846cee426602f55e287a2c1afdddb79e6f9c87a69d5249cd46d2cb
                              • Instruction Fuzzy Hash: EB016CB26903187EE710E754DD06FFA376CEBC4B11F00459AB708A61C49AF469848BB5
                              APIs
                              • GetModuleHandleW.KERNEL32(KERNEL32.DLL,0048D148,00000008,00417A44,00000000,00000000,?,004115F6,?,00401BAC,?,?,?), ref: 0041794D
                              • __lock.LIBCMT ref: 00417981
                                • Part of subcall function 004182CB: __mtinitlocknum.LIBCMT ref: 004182E1
                                • Part of subcall function 004182CB: __amsg_exit.LIBCMT ref: 004182ED
                                • Part of subcall function 004182CB: RtlEnterCriticalSection.KERNEL32(004115F6,004115F6,?,00417986,0000000D,?,004115F6,?,00401BAC,?,?,?), ref: 004182F5
                              • InterlockedIncrement.KERNEL32(FF00482A), ref: 0041798E
                              • __lock.LIBCMT ref: 004179A2
                              • ___addlocaleref.LIBCMT ref: 004179C0
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: __lock$CriticalEnterHandleIncrementInterlockedModuleSection___addlocaleref__amsg_exit__mtinitlocknum
                              • String ID: KERNEL32.DLL$pI
                              • API String ID: 637971194-197072765
                              • Opcode ID: de2ab6b473c2d5586c9f362b8c2f57dc22cd34abb7029a86a899895714b74b87
                              • Instruction ID: a50d44c6e21ae10dfe2421e8c890a682036196f235240147777d58dc068d601e
                              • Opcode Fuzzy Hash: de2ab6b473c2d5586c9f362b8c2f57dc22cd34abb7029a86a899895714b74b87
                              • Instruction Fuzzy Hash: A401A171404B00EFD720AF66C90A78DBBF0AF50324F20890FE496536A1CBB8A684CB5D
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: _memmove$_malloc
                              • String ID:
                              • API String ID: 1938898002-0
                              • Opcode ID: 1f9281079767c86d8b96628a3580c8a8d8da7ec8fe09033d6c47d2aab1b684b9
                              • Instruction ID: bb51e0d14dcfee45c4d36839732496dc4400bff611838f67d83ec86e680bb9ef
                              • Opcode Fuzzy Hash: 1f9281079767c86d8b96628a3580c8a8d8da7ec8fe09033d6c47d2aab1b684b9
                              • Instruction Fuzzy Hash: FC81CB726001195BDB00EF66DC42AFF7368EF84318F040A6FFD04A7282EE7D995587A9
                              APIs
                              • InterlockedExchange.KERNEL32(?,000001F5), ref: 0044B4A7
                                • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                              • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 0044B4DA
                              • RtlEnterCriticalSection.KERNEL32(?), ref: 0044B4F7
                              • _memmove.LIBCMT ref: 0044B555
                              • _memmove.LIBCMT ref: 0044B578
                              • RtlLeaveCriticalSection.KERNEL32(?), ref: 0044B587
                              • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 0044B5A3
                              • InterlockedExchange.KERNEL32(?,000001F6), ref: 0044B5B8
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterLeave_malloc
                              • String ID:
                              • API String ID: 2737351978-0
                              • Opcode ID: 7e8c1d8edbf82e8c7821aeb5991414bf18d3cd2399c52039398c0efb06360fcc
                              • Instruction ID: 70cbfa243a2dcbaabd352bc30cb9c3ad46017a318630e818b765f133545e4983
                              • Opcode Fuzzy Hash: 7e8c1d8edbf82e8c7821aeb5991414bf18d3cd2399c52039398c0efb06360fcc
                              • Instruction Fuzzy Hash: 4F41BC71900308EFDB20DF55D984EAFB7B8EF48704F10896EF54696650D7B4EA80CB58
                              APIs
                              • ___set_flsgetvalue.LIBCMT ref: 0041523A
                              • __calloc_crt.LIBCMT ref: 00415246
                              • __getptd.LIBCMT ref: 00415253
                              • CreateThread.KERNEL32(00000000,?,004151BB,00000000,00000004,00000000), ref: 0041527A
                              • ResumeThread.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 0041528A
                              • GetLastError.KERNEL32(?,?,?,?,?,00000000), ref: 00415295
                              • _free.LIBCMT ref: 0041529E
                              • __dosmaperr.LIBCMT ref: 004152A9
                                • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: Thread$CreateErrorLastResume___set_flsgetvalue__calloc_crt__dosmaperr__getptd__getptd_noexit_free
                              • String ID:
                              • API String ID: 3638380555-0
                              • Opcode ID: ceb77f577b932ecc061a214adf97d6bda1f2bbbde8b0acc1a90a04adb45bcfac
                              • Instruction ID: 1ae632b5747f25178f06b1f704b10109f3b838f12a9538f44878b4cc3517b2ff
                              • Opcode Fuzzy Hash: ceb77f577b932ecc061a214adf97d6bda1f2bbbde8b0acc1a90a04adb45bcfac
                              • Instruction Fuzzy Hash: 31110A33105B00ABD2102BB69C45ADB37A4DF85734B24065FF924862D1CA7C98814AAD
                              APIs
                              • VariantInit.OLEAUT32(?), ref: 0046C96E
                                • Part of subcall function 00451B42: GetLastError.KERNEL32(?,?,00000000), ref: 00451BA0
                                • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451BF8
                                • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451C0E
                                • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451C27
                                • Part of subcall function 00451B42: VariantClear.OLEAUT32(?), ref: 00451CA1
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: Variant$Copy$ClearErrorInitLast
                              • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                              • API String ID: 3207048006-625585964
                              • Opcode ID: ca4782e3f1b8c357821c68e66e95b499971d8adc7301cf0feb6afda3dd37ffd4
                              • Instruction ID: 684ba17e2c3ca727561f7970afa8535519679aefa5cdc663b381c32651820a10
                              • Opcode Fuzzy Hash: ca4782e3f1b8c357821c68e66e95b499971d8adc7301cf0feb6afda3dd37ffd4
                              • Instruction Fuzzy Hash: F6A19472600209ABDB10DF99DCC1EFEB3B9FB84714F10852EF604A7281E7B59D458BA5
                              APIs
                              • WSAStartup.WSOCK32(00000101,?), ref: 00465559
                                • Part of subcall function 0045F645: WideCharToMultiByte.KERNEL32(00000000,00000000,5004C483,D29EE858,00000000,00000000,00000000,00000000,?,?,?,00467B75,?,00473BB8,00473BB8,?), ref: 0045F661
                              • inet_addr.WSOCK32(?,00000000,?,?), ref: 0046559B
                              • gethostbyname.WSOCK32(?), ref: 004655A6
                              • GlobalAlloc.KERNEL32(00000040,00000040), ref: 0046561C
                              • _memmove.LIBCMT ref: 004656CA
                              • GlobalFree.KERNEL32(00000000), ref: 0046575C
                              • WSACleanup.WSOCK32 ref: 00465762
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: Global$AllocByteCharCleanupFreeMultiStartupWide_memmovegethostbynameinet_addr
                              • String ID:
                              • API String ID: 2945290962-0
                              • Opcode ID: b73dd2c417b7ad13d51beda6076b83dea337e616a356c7a57e90c36d1df505c0
                              • Instruction ID: 472bd1bc5547e678c188051989a3a6c7a671c7751f2ff3ad056c489052ad9926
                              • Opcode Fuzzy Hash: b73dd2c417b7ad13d51beda6076b83dea337e616a356c7a57e90c36d1df505c0
                              • Instruction Fuzzy Hash: CAA19E72604300AFD310EF65C981F5FB7E8AF88704F544A1EF64597291E778E905CB9A
                              APIs
                                • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B799
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: ConnectRegistry_memmove_wcslen
                              • String ID:
                              • API String ID: 15295421-0
                              • Opcode ID: af9aed33993baa0a6bbf415c0be9acaad95f35a4fb003459e4997ac6d107bcf3
                              • Instruction ID: 8aea567fc0405534ed4901798b67d501f7e0ea7b8d3e81485b6dc33093e60a2a
                              • Opcode Fuzzy Hash: af9aed33993baa0a6bbf415c0be9acaad95f35a4fb003459e4997ac6d107bcf3
                              • Instruction Fuzzy Hash: 96A170B12043019FD710EF65CC85B1BB7E8EF85304F14892EF6859B291DB78E945CB9A
                              APIs
                                • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                              • _wcstok.LIBCMT ref: 004675B2
                                • Part of subcall function 00413EB8: __getptd.LIBCMT ref: 00413EBE
                              • _wcscpy.LIBCMT ref: 00467641
                              • 75B5D0D0.COMDLG32(00000058), ref: 00467774
                              • _wcslen.LIBCMT ref: 00467793
                              • _wcslen.LIBCMT ref: 004677BD
                                • Part of subcall function 00461465: _memmove.LIBCMT ref: 004614F8
                              • 75B5D1A0.COMDLG32(00000058), ref: 00467807
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: _wcslen$_memmove$__getptd_wcscpy_wcstok
                              • String ID: X
                              • API String ID: 3297605031-3081909835
                              • Opcode ID: 59d8333ba564867e966a45eb1cae5b5c9aa55f5f2a82546ce07c615cef46a44c
                              • Instruction ID: 4d78316a312392ccd7929e5b9cc6f9f998d70627324fd0ae594e8e4bf7546d1d
                              • Opcode Fuzzy Hash: 59d8333ba564867e966a45eb1cae5b5c9aa55f5f2a82546ce07c615cef46a44c
                              • Instruction Fuzzy Hash: 1381A3315083008FD310EF65C985A5FB7E5AF84318F108A2FF599572A1EB78ED46CB9A
                              APIs
                                • Part of subcall function 0044719B: DeleteObject.GDI32(00000000), ref: 004471D8
                                • Part of subcall function 0044719B: ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
                                • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447228
                                • Part of subcall function 0044719B: BeginPath.GDI32(?), ref: 0044723D
                                • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447266
                              • Ellipse.GDI32(?,?,FFFFFFFE,00000000,00000000), ref: 004474C4
                              • MoveToEx.GDI32(?,?,FFFFFFFE,00000000), ref: 004474D4
                              • AngleArc.GDI32(?,?,FFFFFFFE,00000000), ref: 0044750F
                              • LineTo.GDI32(?,?,FFFFFFFE), ref: 00447518
                              • CloseFigure.GDI32(?), ref: 0044751F
                              • SetPixel.GDI32(?,?,FFFFFFFE,00000000), ref: 0044752E
                              • Rectangle.GDI32(?,?,FFFFFFFE,00000000), ref: 0044754A
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: Object$Select$AngleBeginCloseCreateDeleteEllipseFigureLineMovePathPixelRectangle
                              • String ID:
                              • API String ID: 4082120231-0
                              • Opcode ID: 7999c5ddb42d2811e8fcb41125d4db3c21d66abb345ae56e6caae54fa290efb2
                              • Instruction ID: e674395c2b36b0b5590bf657e4107f8d2570055e184bc57fe517c57e0a53fcaf
                              • Opcode Fuzzy Hash: 7999c5ddb42d2811e8fcb41125d4db3c21d66abb345ae56e6caae54fa290efb2
                              • Instruction Fuzzy Hash: 36713CB4904109EFEB04CF94C884EBEBBB9EF85310F24855AE9156B341D774AE42CBA5
                              APIs
                                • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B3A6
                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?), ref: 0046B3D2
                              • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 0046B3FD
                              • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 0046B430
                              • RegCloseKey.ADVAPI32(?,000000FF,00000000), ref: 0046B459
                              • RegCloseKey.ADVAPI32(?,?,00000000), ref: 0046B492
                              • RegCloseKey.ADVAPI32(?), ref: 0046B49D
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: Close$ConnectEnumOpenRegistryValue_malloc_memmove_wcslen
                              • String ID:
                              • API String ID: 2027346449-0
                              • Opcode ID: 2b9cac7d06e9b3c82fe541c1c7e321d1f48fab5647307c3a769b9fb80d6ae4cb
                              • Instruction ID: e744fe3a0f0af3658e2b80b3541497a384b181c150b1b14c88f03688e4e42502
                              • Opcode Fuzzy Hash: 2b9cac7d06e9b3c82fe541c1c7e321d1f48fab5647307c3a769b9fb80d6ae4cb
                              • Instruction Fuzzy Hash: 92613D71218301ABD304EF65C985E6BB7A8FFC8704F008A2EF945D7281DB75E945CBA6
                              APIs
                                • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                • Part of subcall function 0046F3C1: IsWindow.USER32(00000000), ref: 0046F3F1
                              • GetMenu.USER32 ref: 0047A703
                              • GetMenuItemCount.USER32(00000000), ref: 0047A74F
                              • GetMenuStringW.USER32(00000000,?,?,00007FFF,00000400), ref: 0047A783
                              • _wcslen.LIBCMT ref: 0047A79E
                              • GetMenuItemID.USER32(00000000,?), ref: 0047A7E0
                              • GetSubMenu.USER32(00000000,?), ref: 0047A7F2
                              • PostMessageW.USER32(?,00000111,?,00000000), ref: 0047A884
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: Menu$Item$CountMessagePostStringWindow_malloc_wcslen
                              • String ID:
                              • API String ID: 3257027151-0
                              • Opcode ID: c981ea3ceee1feb4f68cdf1bad830475cd4f783826951488cb1c5ff232b53bc9
                              • Instruction ID: 02f8ada5611b6a2978ded3aa89f74167ce8c021908d800e5e23178b580333db3
                              • Opcode Fuzzy Hash: c981ea3ceee1feb4f68cdf1bad830475cd4f783826951488cb1c5ff232b53bc9
                              • Instruction Fuzzy Hash: AA51FA71504301ABD310EF25DC81B9FB7E8FF88314F108A2EF989A7241D779E95487A6
                              APIs
                              • select.WSOCK32(00000000,?,00000000,00000000,?), ref: 0046D3D3
                              • WSAGetLastError.WSOCK32(00000000), ref: 0046D3E4
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: ErrorLastselect
                              • String ID:
                              • API String ID: 215497628-0
                              • Opcode ID: bd199fa730e01bd6eb844f10b5a9d2666f16aab98b040269f67dcb89f4e9aede
                              • Instruction ID: fadcceb5308e48970113ceaff65c18732520a09434288b0a98514d96d8681c7b
                              • Opcode Fuzzy Hash: bd199fa730e01bd6eb844f10b5a9d2666f16aab98b040269f67dcb89f4e9aede
                              • Instruction Fuzzy Hash: 65510772E001046BD710EF69DC85FAEB3A8EB94320F14856EF905D7381EA35DD41C7A5
                              APIs
                              • GetParent.USER32(?), ref: 0044443B
                              • GetKeyboardState.USER32(?), ref: 00444450
                              • SetKeyboardState.USER32(?), ref: 004444A4
                              • PostMessageW.USER32(?,00000101,00000010,?), ref: 004444D4
                              • PostMessageW.USER32(?,00000101,00000011,?), ref: 004444F5
                              • PostMessageW.USER32(?,00000101,00000012,?), ref: 00444541
                              • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00444566
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: MessagePost$KeyboardState$Parent
                              • String ID:
                              • API String ID: 87235514-0
                              • Opcode ID: 4481168041494e1849bbb8b05fe85edf3de4190132d6f0e43f59e21d2d662a19
                              • Instruction ID: 8f44bbd55e3387c5fecf3766ecc31f273ddc6601011f0052083f6d8a5cbafb33
                              • Opcode Fuzzy Hash: 4481168041494e1849bbb8b05fe85edf3de4190132d6f0e43f59e21d2d662a19
                              • Instruction Fuzzy Hash: 2051D6A05047D53AFB3682748846BA7BFE42F86704F08868BE1D5559C3D3ECE994CB68
                              APIs
                              • GetParent.USER32(?), ref: 00444633
                              • GetKeyboardState.USER32(?), ref: 00444648
                              • SetKeyboardState.USER32(?), ref: 0044469C
                              • PostMessageW.USER32(?,00000100,00000010,?), ref: 004446C9
                              • PostMessageW.USER32(?,00000100,00000011,?), ref: 004446E7
                              • PostMessageW.USER32(?,00000100,00000012,?), ref: 00444730
                              • PostMessageW.USER32(?,00000100,0000005B,?), ref: 00444752
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: MessagePost$KeyboardState$Parent
                              • String ID:
                              • API String ID: 87235514-0
                              • Opcode ID: 988eb571eba6180a4ec7f7c38e49780efe397f424a6b2059308ac6c1f0666447
                              • Instruction ID: 3b822c4357a53f38689f34ecdfb8cd013e642acfd09065eaf4f6fa9230d15588
                              • Opcode Fuzzy Hash: 988eb571eba6180a4ec7f7c38e49780efe397f424a6b2059308ac6c1f0666447
                              • Instruction Fuzzy Hash: 7451D4B05047D139F73692688C45BA7BFD86B8B304F08868FF1D5156C2D3ACB895CB69
                              APIs
                              • SendMessageW.USER32(?,00001308,?,00000000), ref: 0045539F
                              • 6F0F0200.COMCTL32(?,?), ref: 004553D3
                              • SendMessageW.USER32(?,0000133D,?,00000002), ref: 004554BB
                              • DeleteObject.GDI32(?), ref: 00455736
                              • DeleteObject.GDI32(?), ref: 00455744
                              • DestroyCursor.USER32(?), ref: 00455752
                              • 73A35CF0.USER32(?), ref: 00455760
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: DeleteMessageObjectSend$CursorDestroyF0200
                              • String ID:
                              • API String ID: 13600914-0
                              • Opcode ID: 35278296b08b7a07ab4037b75477043e0b107217007b5923df3ad7b8258325fa
                              • Instruction ID: c6eb43681ca9132c11a6020d2ba108f27148fdc9c8ef1f50c91adec3b3f4716e
                              • Opcode Fuzzy Hash: 35278296b08b7a07ab4037b75477043e0b107217007b5923df3ad7b8258325fa
                              • Instruction Fuzzy Hash: 76516B74204A419FC714DF24C4A4BB677F5FF8A302F1486AAED998B392D738A849CB54
                              APIs
                              • LoadLibraryW.KERNEL32(00000000,?,?,?), ref: 0046485D
                              • GetProcAddress.KERNEL32(?,?), ref: 004648F7
                              • GetProcAddress.KERNEL32(?,00000000), ref: 00464916
                              • GetProcAddress.KERNEL32(?,?), ref: 0046495A
                              • FreeLibrary.KERNEL32(?,?,?,?), ref: 0046497C
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: AddressProc$Library$FreeLoad
                              • String ID: ou
                              • API String ID: 2449869053-3837949563
                              • Opcode ID: 178b694003ef1c8c6ddf6c03964e3c93f4f33891ff2eeadba8088ba5e41252f8
                              • Instruction ID: 8919579e2c9fc9b2d94c4928dd3202a5bdd7863bc063e44bf2a6fba2f1eed130
                              • Opcode Fuzzy Hash: 178b694003ef1c8c6ddf6c03964e3c93f4f33891ff2eeadba8088ba5e41252f8
                              • Instruction Fuzzy Hash: 2351BF756002049FCB00EFA4C985A9EB7B4EF88304F14856EFD05AB392DB79ED45CB99
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 3e9aeaa8e8d9a9efa26880ce8322a829618f36bb2b0e75f2f32cf9c77c57eef6
                              • Instruction ID: 5d193f65ffce5f3a1406795a0d9a37a93f2f4887bdc9b14e5c8c629f49d9966a
                              • Opcode Fuzzy Hash: 3e9aeaa8e8d9a9efa26880ce8322a829618f36bb2b0e75f2f32cf9c77c57eef6
                              • Instruction Fuzzy Hash: 0A413871900114ABE710DF58CC84FAF7765EB46320F14826EF858AB3C1C7745D02EB98
                              APIs
                              • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 004488BD
                              • SendMessageW.USER32(?,00000469,?,00000000), ref: 004488D3
                              • EnableWindow.USER32(?,00000000), ref: 00448B5C
                              • EnableWindow.USER32(?,00000001), ref: 00448B72
                              • ShowWindow.USER32(?,00000000), ref: 00448BE8
                              • ShowWindow.USER32(?,00000004), ref: 00448BF4
                              • EnableWindow.USER32(?,00000001), ref: 00448C09
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: Window$Enable$Show$MessageMoveSend
                              • String ID:
                              • API String ID: 896007046-0
                              • Opcode ID: 487afd455632248a3d509b30b3d46b8f07dcfb1983bcccedac1426ad742150ab
                              • Instruction ID: 578be1c3660e2fd518c7beccd973f741d6ce186f3db94e5441c29ef1e5fc56da
                              • Opcode Fuzzy Hash: 487afd455632248a3d509b30b3d46b8f07dcfb1983bcccedac1426ad742150ab
                              • Instruction Fuzzy Hash: 5F419D742003809FF724DB24C894BAB77E0FF96305F18446EF5859B291DB78A845CB59
                              APIs
                              • SendMessageW.USER32(?,00000401,?,00000000), ref: 00448AC9
                              • GetFocus.USER32 ref: 00448ACF
                              • EnableWindow.USER32(?,00000000), ref: 00448B5C
                              • EnableWindow.USER32(?,00000001), ref: 00448B72
                              • ShowWindow.USER32(?,00000000), ref: 00448BE8
                              • ShowWindow.USER32(?,00000004), ref: 00448BF4
                              • EnableWindow.USER32(?,00000001), ref: 00448C09
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: Window$Enable$Show$FocusMessageSend
                              • String ID:
                              • API String ID: 3429747543-0
                              • Opcode ID: 611a307e80107d343a79f7fc2cfd1bfbec1158008c6b2b7743f92638a6db6fc0
                              • Instruction ID: 6f3afe48a64986b2df7f4b22be5166ca64fe0b5af1f2aee4406df3dc20f3ce1d
                              • Opcode Fuzzy Hash: 611a307e80107d343a79f7fc2cfd1bfbec1158008c6b2b7743f92638a6db6fc0
                              • Instruction Fuzzy Hash: F331C4706043805BF7248F24CCC8BAFB7D4FB95305F08491EF581A6291DBBCA845CB59
                              APIs
                              • SetErrorMode.KERNEL32(00000001), ref: 0045D459
                              • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D4CF
                              • __swprintf.LIBCMT ref: 0045D4E9
                              • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D52D
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: ErrorMode$InformationVolume__swprintf
                              • String ID: %lu$\VH
                              • API String ID: 3164766367-2432546070
                              • Opcode ID: 886de82fe176795aba7bdb97f378ec25336d41d961a023bcb5d27bbb6add7ed5
                              • Instruction ID: a5bcfc38f1a54d16d783223dfbe865d4bc924dff4e6617147b97584b2165572c
                              • Opcode Fuzzy Hash: 886de82fe176795aba7bdb97f378ec25336d41d961a023bcb5d27bbb6add7ed5
                              • Instruction Fuzzy Hash: 11317171A00209AFCB14EF95DD85EAEB7B8FF48304F1084AAF905A7291D774EA45CB94
                              APIs
                              • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00450BE7
                              • SendMessageW.USER32(00000000,00000409,00000000,FF000000), ref: 00450BF8
                              • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00450C06
                              • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00450C17
                              • SendMessageW.USER32(00000000,00000404,00000001,00000000), ref: 00450C25
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: MessageSend
                              • String ID: Msctls_Progress32
                              • API String ID: 3850602802-3636473452
                              • Opcode ID: bde72abdda352e35c3e71b9276821fa19048fea6f3879b5342d5f34549d04d22
                              • Instruction ID: 3e9a69ee1b5e3cb2ffa50bc712587bba9ef5757239c838e11c91c46d95a842ac
                              • Opcode Fuzzy Hash: bde72abdda352e35c3e71b9276821fa19048fea6f3879b5342d5f34549d04d22
                              • Instruction Fuzzy Hash: 7A21667135030477EB20DEA9DC82F97B3AD9F94B24F21460AFB54A72D1C5B5F8418B58
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: D0860DeleteObject$CursorDestroy
                              • String ID:
                              • API String ID: 3454650959-0
                              • Opcode ID: 49ccd75876ce99cd15ee405d1ac93d8c116bb45471ccb95599c5d22b34275644
                              • Instruction ID: 510e71718d61fb01ae158a6e5fa7ad280301b7661e5b3aef53c80a3471921dd4
                              • Opcode Fuzzy Hash: 49ccd75876ce99cd15ee405d1ac93d8c116bb45471ccb95599c5d22b34275644
                              • Instruction Fuzzy Hash: 70217E70200A00EFCB20DF25D9D4A2A77AABF48712F10896DE906CB356D739EC45CB69
                              APIs
                              • _malloc.LIBCMT ref: 0041F707
                                • Part of subcall function 004135BB: __FF_MSGBANNER.LIBCMT ref: 004135D4
                                • Part of subcall function 004135BB: __NMSG_WRITE.LIBCMT ref: 004135DB
                                • Part of subcall function 004135BB: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,004115F6,?,00401BAC,?,?,?), ref: 00413600
                              • _free.LIBCMT ref: 0041F71A
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: AllocateHeap_free_malloc
                              • String ID: [B
                              • API String ID: 1020059152-632041663
                              • Opcode ID: 5ae3695c4899d33c0c5016eec090c96391fe5f6cd2bec6778d3ea2d81492c429
                              • Instruction ID: 066e14217b5799beb7557260d36092b09813ce611e9d099bbd870b86b34de80c
                              • Opcode Fuzzy Hash: 5ae3695c4899d33c0c5016eec090c96391fe5f6cd2bec6778d3ea2d81492c429
                              • Instruction Fuzzy Hash: 0211EB32454615AACB213F75EC086DB3BA49F443A5B20053BF824CA2D1DB7C88C7C7AC
                              APIs
                                • Part of subcall function 00436B19: GetProcessHeap.KERNEL32(00000008,0000000C,00436C79), ref: 00436B1D
                                • Part of subcall function 00436B19: RtlAllocateHeap.KERNEL32(00000000), ref: 00436B24
                              • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002), ref: 00436C88
                              • GetCurrentProcess.KERNEL32(?,00000000), ref: 00436C91
                              • DuplicateHandle.KERNEL32(00000000,?,00000000), ref: 00436C9A
                              • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,00000000), ref: 00436CA6
                              • GetCurrentProcess.KERNEL32(?,00000000,?,00000000), ref: 00436CAF
                              • DuplicateHandle.KERNEL32(00000000,?,00000000,?,00000000), ref: 00436CB2
                              • CreateThread.KERNEL32(00000000,00000000,Function_00036C2B,00000000,00000000,00000000), ref: 00436CCA
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: Process$Current$DuplicateHandleHeap$AllocateCreateThread
                              • String ID:
                              • API String ID: 1422014791-0
                              • Opcode ID: 3f80535c3287afe012eec8eac85a3d96c91e040866ec74b6355b9bdb3dfb6838
                              • Instruction ID: 99b39fe8e7f3ac854e5c8e3994335d5d6f6ef2f737fc2b72a46a077924210789
                              • Opcode Fuzzy Hash: 3f80535c3287afe012eec8eac85a3d96c91e040866ec74b6355b9bdb3dfb6838
                              • Instruction Fuzzy Hash: A301E6753403047BD620EB65DC96F5B775CEB89B50F114819FA04DB1D1C6B5E8008B78
                              APIs
                              • GetClientRect.USER32(?,?), ref: 004302E6
                              • GetWindowRect.USER32(00000000,?), ref: 00430316
                              • GetClientRect.USER32(?,?), ref: 00430364
                              • GetSystemMetrics.USER32(0000000F), ref: 004303B1
                              • GetWindowRect.USER32(?,?), ref: 004303C3
                              • ScreenToClient.USER32(?,?), ref: 004303EC
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: Rect$Client$Window$MetricsScreenSystem
                              • String ID:
                              • API String ID: 3220332590-0
                              • Opcode ID: b722cec4de1de3fe17d9867fbb91cd497d3f089f761d48fb585960e999a4a017
                              • Instruction ID: e4235e81f7515d2978e088f6fadb01cec8eb5fe04dcc4a3bbd5a83ea815e8f28
                              • Opcode Fuzzy Hash: b722cec4de1de3fe17d9867fbb91cd497d3f089f761d48fb585960e999a4a017
                              • Instruction Fuzzy Hash: 13A14875A0070A9BCB10CFA8C594BEFB7B1FF58314F00961AE9A9E7350E734AA44CB54
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: _malloc_wcslen$_strcat_wcscpy
                              • String ID:
                              • API String ID: 1612042205-0
                              • Opcode ID: de986be264bc4095e11606319f6bc53bb2fe9b52cfcfc757ffd23d2b2712e847
                              • Instruction ID: da8a40d04f443fc8bffa22af6bb0a7b3fb41b3e40a14b17b7fca75945af8e81c
                              • Opcode Fuzzy Hash: de986be264bc4095e11606319f6bc53bb2fe9b52cfcfc757ffd23d2b2712e847
                              • Instruction Fuzzy Hash: 40914A74604205EFCB10DF98D4C09A9BBA5FF48305B60C66AEC0A8B35AD738EE55CBD5
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: _memmove_strncmp
                              • String ID: >$U$\
                              • API String ID: 2666721431-237099441
                              • Opcode ID: 22f22e1ac28dc69493aec85f3eea1e1d82883446f00fc80900d5fd24c0790888
                              • Instruction ID: 902f5a6c35c0d49260658601fd29bdf8c292b60929ab84f6d376942388b5a00c
                              • Opcode Fuzzy Hash: 22f22e1ac28dc69493aec85f3eea1e1d82883446f00fc80900d5fd24c0790888
                              • Instruction Fuzzy Hash: 8DF1B170A00249CFEB14CFA9C8906AEFBF1FF89304F2485AED845A7341D779A946CB55
                              APIs
                              • GetKeyboardState.USER32(?), ref: 0044C570
                              • SetKeyboardState.USER32(00000080), ref: 0044C594
                              • PostMessageW.USER32(?,00000100,?,?), ref: 0044C5D5
                              • PostMessageW.USER32(?,00000104,?,?), ref: 0044C60D
                              • PostMessageW.USER32(?,00000102,?,00000001), ref: 0044C62F
                              • SendInput.USER32(00000001,?,0000001C), ref: 0044C6C2
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: MessagePost$KeyboardState$InputSend
                              • String ID:
                              • API String ID: 2221674350-0
                              • Opcode ID: 253f2b6e14f8b29283c151e9eff2603b50f4fedb3541a599f467ca45a100d6c4
                              • Instruction ID: 625ea0eb49cc588760ebb6bc0eb208289033378f73eea84c13a2ca11a8b118cf
                              • Opcode Fuzzy Hash: 253f2b6e14f8b29283c151e9eff2603b50f4fedb3541a599f467ca45a100d6c4
                              • Instruction Fuzzy Hash: D1514A725001187AEB109FA99C81BFFBB68AF9E311F44815BFD8496242C379D941CBA8
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: _wcscpy$_wcscat
                              • String ID:
                              • API String ID: 2037614760-0
                              • Opcode ID: d8b18b1f5d4952a0fc5752811c1295952a1c4566f52136af492825f039622e45
                              • Instruction ID: 99b1098f8f7a3a84d55f117cb3556dd5d93458401dda30520ad7f1c57b96c0d6
                              • Opcode Fuzzy Hash: d8b18b1f5d4952a0fc5752811c1295952a1c4566f52136af492825f039622e45
                              • Instruction Fuzzy Hash: 0741357190011466DB34EF5998C1BFF7368EFE6314F84455FFC4287212DB2DAA92C2A9
                              APIs
                              • GetLastError.KERNEL32(?,?,00000000), ref: 00451BA0
                              • VariantCopy.OLEAUT32(?,?), ref: 00451BF8
                              • VariantCopy.OLEAUT32(?,?), ref: 00451C0E
                              • VariantCopy.OLEAUT32(?,?), ref: 00451C27
                              • VariantClear.OLEAUT32(?), ref: 00451CA1
                              • SysAllocString.OLEAUT32(00000000), ref: 00451CBA
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: Variant$Copy$AllocClearErrorLastString
                              • String ID:
                              • API String ID: 960795272-0
                              • Opcode ID: 218b2f6110521206867dfa84a42cd28f2b67ec3390fd0729a790b06cd777bcc7
                              • Instruction ID: e234943060a9aef7ccdf580943a4f321f6ba3cfb1df2bc58669f78ff50eabc4c
                              • Opcode Fuzzy Hash: 218b2f6110521206867dfa84a42cd28f2b67ec3390fd0729a790b06cd777bcc7
                              • Instruction Fuzzy Hash: C751AE719042099FCB14DF65CC84BAAB7B4FF48300F14856EED05A7361DB79AE45CBA8
                              APIs
                              • BeginPaint.USER32(00000000,?), ref: 00447BDF
                              • GetWindowRect.USER32(?,?), ref: 00447C5D
                              • ScreenToClient.USER32(?,?), ref: 00447C7B
                              • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00447C8E
                              • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00447CD5
                              • EndPaint.USER32(?,?), ref: 00447D13
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: Paint$BeginClientRectRectangleScreenViewportWindow
                              • String ID:
                              • API String ID: 4189319755-0
                              • Opcode ID: 0de1757924998e3fd5473b1ac31060e8ba53e31114793872216692834f921a18
                              • Instruction ID: 4e3fb435071a661ad846631c1082d1486cc319c76cae6976ccfd06e2d512f03c
                              • Opcode Fuzzy Hash: 0de1757924998e3fd5473b1ac31060e8ba53e31114793872216692834f921a18
                              • Instruction Fuzzy Hash: DC417F706042019FE310DF14D8C4F7B7BA8EB86724F14466EF9A487391CB74A806CB69
                              APIs
                              • SendMessageW.USER32(?,00001024,00000000,00000000), ref: 0044908B
                              • SendMessageW.USER32(?,00000409,00000000,?), ref: 0044909F
                              • SendMessageW.USER32(?,0000111E,00000000,00000000), ref: 004490B3
                              • InvalidateRect.USER32(?,00000000,00000001,?,0000111E,00000000,00000000,?,00000409,00000000,?), ref: 004490C9
                              • 73A345F0.USER32(?,000000F0,?,00001024,00000000,00000000,?,0000111E,00000000,00000000,?,00000409,00000000,?), ref: 004490D4
                              • 73A359E0.USER32(?,000000F0,00000000,?,000000F0,?,00001024,00000000,00000000,?,0000111E,00000000,00000000,?,00000409,00000000), ref: 004490E1
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: MessageSend$A345A359InvalidateRect
                              • String ID:
                              • API String ID: 1724771122-0
                              • Opcode ID: 2001084b9f030ce18b996af9061ac6ceee4bb7592284355317d8a12df4a6bddd
                              • Instruction ID: 8674d855734444f977eaeabaa32478bd653fbe911923e0a4a3d3eb28cec46bd0
                              • Opcode Fuzzy Hash: 2001084b9f030ce18b996af9061ac6ceee4bb7592284355317d8a12df4a6bddd
                              • Instruction Fuzzy Hash: 2531E135240104AFF724CF48DC89FBB77B9EB49320F10851AFA559B290CA79AD41DB69
                              APIs
                              • ShowWindow.USER32(?,00000000), ref: 00440A8A
                              • EnableWindow.USER32(?,00000000), ref: 00440AAF
                              • ShowWindow.USER32(?,00000000), ref: 00440B18
                              • ShowWindow.USER32(?,00000004), ref: 00440B2B
                              • EnableWindow.USER32(?,00000001), ref: 00440B50
                              • SendMessageW.USER32(?,0000130C,?,00000000), ref: 00440B75
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: Window$Show$Enable$MessageSend
                              • String ID:
                              • API String ID: 642888154-0
                              • Opcode ID: 7c24049b1d37fdb6142be8766dc22fb93f1068172a9e83c57f7795f596ff73c7
                              • Instruction ID: a5db896fb2ae06c85211a956f566d4ff66a2da6af11bfa2c2b637766cd700386
                              • Opcode Fuzzy Hash: 7c24049b1d37fdb6142be8766dc22fb93f1068172a9e83c57f7795f596ff73c7
                              • Instruction Fuzzy Hash: F4413C346003409FEB25CF24C588BA67BE1FF55304F1885AAEB599B3A1CB78A851CB58
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: Variant$Copy$ClearErrorLast
                              • String ID: NULL Pointer assignment$Not an Object type
                              • API String ID: 2487901850-572801152
                              • Opcode ID: bb0f7491a1d8fcb1a9e92f7a9394b8a60bc93380917bfa262315a66d62baea93
                              • Instruction ID: 7224d39ad4dd36db717bb7decd6d6f3456075e50b8db1d036073f09e8ed5fad7
                              • Opcode Fuzzy Hash: bb0f7491a1d8fcb1a9e92f7a9394b8a60bc93380917bfa262315a66d62baea93
                              • Instruction Fuzzy Hash: 70C1AFB1A00209ABDF14DF98C881FEEB7B9EB44304F10C55EE909AB341D7799D85CBA5
                              APIs
                              • SendMessageW.USER32(?,000000F1,?,00000000), ref: 0044881F
                              • EnableWindow.USER32(?,00000000), ref: 00448B5C
                              • EnableWindow.USER32(?,00000001), ref: 00448B72
                              • ShowWindow.USER32(?,00000000), ref: 00448BE8
                              • ShowWindow.USER32(?,00000004), ref: 00448BF4
                              • EnableWindow.USER32(?,00000001), ref: 00448C09
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: Window$Enable$Show$MessageSend
                              • String ID:
                              • API String ID: 1871949834-0
                              • Opcode ID: 24295af7dc8a36502def6d29e9c9bc5dd9332af4054e76ab47d27171ed2ecc38
                              • Instruction ID: ab733961f10eda6fa12bc0977b233c6b2b6736debfa9bed553c9f015fe8cd40e
                              • Opcode Fuzzy Hash: 24295af7dc8a36502def6d29e9c9bc5dd9332af4054e76ab47d27171ed2ecc38
                              • Instruction Fuzzy Hash: 6931B3B17443815BF7258E24CCC4BAFB7D0EB95345F08482EF58196291DBAC9845C75A
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: b4f5e70efc1acb4fe019c63046a51222323f6892fbde794835cc8a87d9f58231
                              • Instruction ID: c6101d665a98d140be62f029472ab7f8db1b0ce4c02a7c647e8453833b83309f
                              • Opcode Fuzzy Hash: b4f5e70efc1acb4fe019c63046a51222323f6892fbde794835cc8a87d9f58231
                              • Instruction Fuzzy Hash: 5F21B672204110ABEB108F699C85B6F7798EB49370F24463BF625C62E0DB74D8C1C76D
                              APIs
                              • ExtractIconExW.SHELL32(?,?,00000000,?,00000001), ref: 00471A45
                              • 6F0D2980.COMCTL32(00000010,00000010,00000021,00000001,00000001,?,00000000,?,00000001), ref: 00471A86
                              • SendMessageW.USER32(?,00001303,00000000,00000000), ref: 00471AA8
                              • 6F0CC400.COMCTL32(?,?,?,?,00000000,?,00000001), ref: 00471ABF
                              • SendMessageW.USER32 ref: 00471AE3
                              • DestroyCursor.USER32(?), ref: 00471AF4
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: MessageSend$C400CursorD2980DestroyExtractIcon
                              • String ID:
                              • API String ID: 394922398-0
                              • Opcode ID: b0e439fc93c86aa425f752c0c26de9476ffc90f5fc0a1de8674fd8c7e7c0c220
                              • Instruction ID: ff529b192773d28f9e5fe2f6f8d7a9043cb056f7fe4a3f7912da33dbd9270a4a
                              • Opcode Fuzzy Hash: b0e439fc93c86aa425f752c0c26de9476ffc90f5fc0a1de8674fd8c7e7c0c220
                              • Instruction Fuzzy Hash: FB21AB71600204AFEB10CF64DD85FAA73B5FF88700F10846EFA05AB290DBB4A9428B64
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: DeleteObject$CursorDestroyMoveWindow
                              • String ID:
                              • API String ID: 3883585953-0
                              • Opcode ID: a9e5de2d3b90f467c30d036e219f0746eef0d56afd734d018f8f78b53e6c5f41
                              • Instruction ID: 1af524ae86da71fe4f89171a472fc693caa25f853ed14bd6ff7d4c509651bbe6
                              • Opcode Fuzzy Hash: a9e5de2d3b90f467c30d036e219f0746eef0d56afd734d018f8f78b53e6c5f41
                              • Instruction Fuzzy Hash: C6311874200A41DFC710DF24D9D8B3A77E9FB48712F0445AAE946CB262D778E848CB69
                              APIs
                                • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                                • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                              • _wcslen.LIBCMT ref: 004438CD
                              • _wcslen.LIBCMT ref: 004438E6
                              • _wcstok.LIBCMT ref: 004438F8
                              • _wcslen.LIBCMT ref: 0044390C
                              • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 0044391A
                              • _wcstok.LIBCMT ref: 00443931
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: _wcslen$_wcstok$ExtentPoint32Text_wcscpy
                              • String ID:
                              • API String ID: 3632110297-0
                              • Opcode ID: 5ca99eab14a2200aefa90245e429ddeb3cf04e0f88646427c0d38f27a71423b2
                              • Instruction ID: d12b8bce329459066c03420e1b0c57cf331e6d1a2def9435cce8fb2ce1fb425a
                              • Opcode Fuzzy Hash: 5ca99eab14a2200aefa90245e429ddeb3cf04e0f88646427c0d38f27a71423b2
                              • Instruction Fuzzy Hash: 9621B072900305ABDB10AF559C82AAFB7F8FF48711F64482EF95993301E678EA5087A5
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: Destroy$DeleteMenuObject$Cursor
                              • String ID:
                              • API String ID: 1736985952-0
                              • Opcode ID: 877022e28911037ff8e4029beee24c6714a8c165e8bca7c16b59b5f39fc2e0c5
                              • Instruction ID: 7b220c8407ffc283b2c26cc65a644285b0b18e1ed163c7e0472fb9f2b18bc557
                              • Opcode Fuzzy Hash: 877022e28911037ff8e4029beee24c6714a8c165e8bca7c16b59b5f39fc2e0c5
                              • Instruction Fuzzy Hash: B7215970600A01DFD714DF29D9E8B3A7BA9BF49312F04855AE8468B352C738EC89CB59
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: DeleteObject$CursorD0860Destroy
                              • String ID:
                              • API String ID: 1063677496-0
                              • Opcode ID: bee8e7950a17a017ef8c4c424090cfe506cbffc57fc41e64353b46a851298919
                              • Instruction ID: 11d86efc281b6c380d974b68bd8b9632be9d9c574e85584f431c859402bfc888
                              • Opcode Fuzzy Hash: bee8e7950a17a017ef8c4c424090cfe506cbffc57fc41e64353b46a851298919
                              • Instruction Fuzzy Hash: 9C217C70200A01DFC714DF39D998A6AB7E4BF49311F10862EE959C7392D778D845CB58
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: DeleteObject$CursorD0860Destroy
                              • String ID:
                              • API String ID: 1063677496-0
                              • Opcode ID: ef392be253363c3276fd2682622d0856bd6baec92828374cdc4114f01cb4ab17
                              • Instruction ID: f2615e71845bffb995fe2c2b9381f89f67980fa6d4eb7dd8f13843e5971e4781
                              • Opcode Fuzzy Hash: ef392be253363c3276fd2682622d0856bd6baec92828374cdc4114f01cb4ab17
                              • Instruction Fuzzy Hash: 54213D70200A01DFD710EF25D9D4A2B37E9BF49312F10896EE945CB352D739D845CB69
                              APIs
                              • Sleep.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331B9
                              • QueryPerformanceCounter.KERNEL32(?,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331D4
                              • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331DE
                              • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331E6
                              • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331F0
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: PerformanceQuery$CounterSleep$Frequency
                              • String ID:
                              • API String ID: 2833360925-0
                              • Opcode ID: 454a0f1f7a5b9dabfe1a5840f9ecaff855ca9224c6d53cc9b14a46810094a05c
                              • Instruction ID: f8c058edd9890a080c9b5d5c764251204f1987641da473bf5ecf7e3e358c806a
                              • Opcode Fuzzy Hash: 454a0f1f7a5b9dabfe1a5840f9ecaff855ca9224c6d53cc9b14a46810094a05c
                              • Instruction Fuzzy Hash: 1911B632D0011DABCF00DFD9EA489EEB778FF49722F1145AAED04A6204DB755A01CBA4
                              APIs
                              • SendMessageW.USER32 ref: 004555C7
                              • SendMessageW.USER32(?,00001008,00000000,00000000), ref: 004555E2
                              • DeleteObject.GDI32(?), ref: 00455736
                              • DeleteObject.GDI32(?), ref: 00455744
                              • DestroyCursor.USER32(?), ref: 00455752
                              • 73A35CF0.USER32(?), ref: 00455760
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: DeleteMessageObjectSend$CursorDestroy
                              • String ID:
                              • API String ID: 200077650-0
                              • Opcode ID: a36765697229ff4e213bf7548d3c220621229afc2c11469716cb0ded27b8d901
                              • Instruction ID: 7bbaf3a525edecc9c7f674a1bc178dbce74773f27e06def1294b58b6a87c9b54
                              • Opcode Fuzzy Hash: a36765697229ff4e213bf7548d3c220621229afc2c11469716cb0ded27b8d901
                              • Instruction Fuzzy Hash: 3D116071204601DBC710DF69EDC8A2A77A8FB58322F10466AFD10DB292D779D849CB68
                              APIs
                                • Part of subcall function 0044719B: DeleteObject.GDI32(00000000), ref: 004471D8
                                • Part of subcall function 0044719B: ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
                                • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447228
                                • Part of subcall function 0044719B: BeginPath.GDI32(?), ref: 0044723D
                                • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447266
                              • MoveToEx.GDI32(?,?,?,00000000), ref: 004472A0
                              • LineTo.GDI32(?,?,?), ref: 004472AC
                              • MoveToEx.GDI32(?,?,?,00000000), ref: 004472BA
                              • LineTo.GDI32(?,?,?), ref: 004472C6
                              • EndPath.GDI32(?), ref: 004472D6
                              • StrokePath.GDI32(?), ref: 004472E4
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: ObjectPath$LineMoveSelect$BeginCreateDeleteStroke
                              • String ID:
                              • API String ID: 372113273-0
                              • Opcode ID: 31eeda2ce056db83d926a779f5beead5a54a2e657b8e2367e9d837ae160c277d
                              • Instruction ID: 9972a7b2ea06d4c5ad2b855a17b8a9a0d98d12ec42d2644493c4a69bc6448ed6
                              • Opcode Fuzzy Hash: 31eeda2ce056db83d926a779f5beead5a54a2e657b8e2367e9d837ae160c277d
                              • Instruction Fuzzy Hash: 7701BC76101214BBE3119B44ED8DFDF7B6CEF4A710F104259FA01A629187F42A02CBBD
                              APIs
                              • 73A2A570.USER32(00000000), ref: 0044CC6D
                              • 73A34620.GDI32(00000000,00000058), ref: 0044CC78
                              • 73A34620.GDI32(00000000,0000005A), ref: 0044CC84
                              • 73A2A480.USER32(00000000,00000000), ref: 0044CC90
                              • MulDiv.KERNEL32(000009EC,?,?), ref: 0044CCA8
                              • MulDiv.KERNEL32(000009EC,?,?), ref: 0044CCB9
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: A34620$A480A570
                              • String ID:
                              • API String ID: 3483206597-0
                              • Opcode ID: 30463c625ccaefc53399fcb5a1d51c2b4aa5fdcbff3641f1d403fc7908ff7e54
                              • Instruction ID: 48d0fedbc9b5ed1f8cca1220e36c4d83aa6571d18a2c693a8c9b468b660f0fbb
                              • Opcode Fuzzy Hash: 30463c625ccaefc53399fcb5a1d51c2b4aa5fdcbff3641f1d403fc7908ff7e54
                              • Instruction Fuzzy Hash: 60015276240214BFFB009F95DD89F5A7BACFF54751F14802EFF089B240D6B098008BA4
                              APIs
                              • __getptd.LIBCMT ref: 0041708E
                                • Part of subcall function 00417A69: __getptd_noexit.LIBCMT ref: 00417A6C
                                • Part of subcall function 00417A69: __amsg_exit.LIBCMT ref: 00417A79
                              • __amsg_exit.LIBCMT ref: 004170AE
                              • __lock.LIBCMT ref: 004170BE
                              • InterlockedDecrement.KERNEL32(?), ref: 004170DB
                              • _free.LIBCMT ref: 004170EE
                              • InterlockedIncrement.KERNEL32(02F82CE0), ref: 00417106
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock_free
                              • String ID:
                              • API String ID: 3470314060-0
                              • Opcode ID: 24516f4010ce0b93e8566e6a8de288d1d1524a4de8e6263f522fbb499f39661f
                              • Instruction ID: d92c7102fc6d098775a0f5363b9b5483e5b10d08a1c29475ed017091780ded1e
                              • Opcode Fuzzy Hash: 24516f4010ce0b93e8566e6a8de288d1d1524a4de8e6263f522fbb499f39661f
                              • Instruction Fuzzy Hash: 3301AD32905711ABC721ABA698497DE7BB0AB04724F15416BF950A7381CB3CAAC1CFDD
                              APIs
                              • InterlockedExchange.KERNEL32(?,?), ref: 0044B655
                              • RtlEnterCriticalSection.KERNEL32(?), ref: 0044B666
                              • TerminateThread.KERNEL32(?,000001F6), ref: 0044B674
                              • WaitForSingleObject.KERNEL32(?,000003E8,?,000001F6), ref: 0044B682
                                • Part of subcall function 00432614: CloseHandle.KERNEL32(00000000,00000000,?,0044B68E,00000000,?,000003E8,?,000001F6), ref: 00432622
                              • InterlockedExchange.KERNEL32(?,000001F6), ref: 0044B697
                              • RtlLeaveCriticalSection.KERNEL32(?), ref: 0044B69E
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                              • String ID:
                              • API String ID: 3495660284-0
                              • Opcode ID: 80b6dccbd1e5d9cd8e45b8a26e63ab1859993381d971fdb3943588aa16a91346
                              • Instruction ID: c0d5b59c8b9084ef0a5212f46b36de0b3fb5a8468090cd03c061fc2099eb7203
                              • Opcode Fuzzy Hash: 80b6dccbd1e5d9cd8e45b8a26e63ab1859993381d971fdb3943588aa16a91346
                              • Instruction Fuzzy Hash: A8F0AF72141201BBD210AB64EE8CDAFB77CFF88311F40092AFA0192560CBB4E420CBB6
                              APIs
                              • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00410AE8
                              • MapVirtualKeyW.USER32(00000010,00000000), ref: 00410AF0
                              • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00410AFB
                              • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00410B06
                              • MapVirtualKeyW.USER32(00000011,00000000), ref: 00410B0E
                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 00410B16
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: Virtual
                              • String ID:
                              • API String ID: 4278518827-0
                              • Opcode ID: c23d3b718cf4e8061cd741903dec6eccba5b4b0418601ad509713896de31bf0c
                              • Instruction ID: ec5b0e47a8727e2ef01e8325cfcf1e1c5a721ad9102a6d662b709b351e7b749c
                              • Opcode Fuzzy Hash: c23d3b718cf4e8061cd741903dec6eccba5b4b0418601ad509713896de31bf0c
                              • Instruction Fuzzy Hash: 79016770106B88ADD3309F668C84B47FFF8EF95704F01491DD1D507A52C6B5A84CCB69
                              APIs
                                • Part of subcall function 004118F0: _doexit.LIBCMT ref: 004118FC
                              • ___set_flsgetvalue.LIBCMT ref: 004151C0
                                • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
                                • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
                              • ___fls_getvalue@4.LIBCMT ref: 004151CB
                                • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
                              • ___fls_setvalue@8.LIBCMT ref: 004151DD
                              • GetLastError.KERNEL32(00000000,?,00000000), ref: 004151E6
                              • RtlExitUserThread.KERNEL32(00000000), ref: 004151ED
                              • __freefls@4.LIBCMT ref: 00415209
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: Value$ErrorExitLastThreadUser___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4_doexit
                              • String ID:
                              • API String ID: 3590604804-0
                              • Opcode ID: 9accb2c970c3ad42c36fa16d08c3c3a8e1e2ab1c4653ce7caab8e07ca954b280
                              • Instruction ID: 33dbf055cdb8ff64cef25b7eefd28ade4c14083f8bd1581388e3e252127bbc8b
                              • Opcode Fuzzy Hash: 9accb2c970c3ad42c36fa16d08c3c3a8e1e2ab1c4653ce7caab8e07ca954b280
                              • Instruction Fuzzy Hash: B3F03675904705AFC704BFB2C9498CE7B75AF84349720845EB90847222DA3CD8C2CA59
                              APIs
                              • ___set_flsgetvalue.LIBCMT ref: 004151C0
                                • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
                                • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
                              • ___fls_getvalue@4.LIBCMT ref: 004151CB
                                • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
                              • ___fls_setvalue@8.LIBCMT ref: 004151DD
                              • GetLastError.KERNEL32(00000000,?,00000000), ref: 004151E6
                              • RtlExitUserThread.KERNEL32(00000000), ref: 004151ED
                              • __freefls@4.LIBCMT ref: 00415209
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: Value$ErrorExitLastThreadUser___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4
                              • String ID:
                              • API String ID: 3516609193-0
                              • Opcode ID: 3ee415d2c127bcf6c5e710345aa78d19554ad97a0662bc484850007a9fc41a8b
                              • Instruction ID: 28e435cdead01fd65333368df2891c86ea6a44e569ea48f613a140ff37384f5b
                              • Opcode Fuzzy Hash: 3ee415d2c127bcf6c5e710345aa78d19554ad97a0662bc484850007a9fc41a8b
                              • Instruction Fuzzy Hash: FEF01975544700AFC704BF76C54D9CE7BB99F94349720845EB80887222DA3CD8C2C669
                              APIs
                                • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                                • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                              • GetMenuItemInfoW.USER32(?,00000000), ref: 0045F85C
                              • _wcslen.LIBCMT ref: 0045F94A
                              • SetMenuItemInfoW.USER32(00000011,00000000,00000000,?), ref: 0045F9AE
                                • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                              • SetMenuDefaultItem.USER32(00000000,000000FF,00000000,?,00000000), ref: 0045F9CA
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: ItemMenu$Info_wcslen$Default_malloc_wcscpy
                              • String ID: 0
                              • API String ID: 621800784-4108050209
                              • Opcode ID: ba56779765e6f71d67f6246429d0af9e67b9def047912433c0c15b7e926c8fa5
                              • Instruction ID: 8916cda2fcff4f3da81aa675480f1736598f59ba0f795e6899437ff2d0190f01
                              • Opcode Fuzzy Hash: ba56779765e6f71d67f6246429d0af9e67b9def047912433c0c15b7e926c8fa5
                              • Instruction Fuzzy Hash: E061EDB1604301AAD710EF69D885B6B77A4AF99315F04493FF98087292E7BCD84CC79B
                              APIs
                                • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                              • SetErrorMode.KERNEL32 ref: 004781CE
                              • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 00478387
                                • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
                              • SetErrorMode.KERNEL32(?), ref: 00478270
                              • SetErrorMode.KERNEL32(?), ref: 00478340
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: ErrorMode$AttributesFile_memmove_wcslen
                              • String ID: \VH
                              • API String ID: 3884216118-234962358
                              • Opcode ID: 178592a45c440348c39a3b7bd59973aab5981f95bb0f1257baca06643fcd57b5
                              • Instruction ID: 3f1cdca54a202f1bd1938e87a451cd9606667cca5306a7eaf6ab6c0a6d737147
                              • Opcode Fuzzy Hash: 178592a45c440348c39a3b7bd59973aab5981f95bb0f1257baca06643fcd57b5
                              • Instruction Fuzzy Hash: F9619F715043019BC310EF25C585A5BB7E0BFC8708F04896EFA996B392CB76ED45CB96
                              APIs
                              • LoadLibraryA.KERNEL32(?), ref: 00434B10
                              • GetProcAddress.KERNEL32(?,AU3_GetPluginDetails), ref: 00434B88
                              • FreeLibrary.KERNEL32(?), ref: 00434B9F
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: Library$AddressFreeLoadProc
                              • String ID: AU3_GetPluginDetails$ou
                              • API String ID: 145871493-528704710
                              • Opcode ID: eeab42aefd2d36d06d7687f66def4b4fc74e6333f2f3c4216b61849e5f0d6007
                              • Instruction ID: fc8523f5daf935d660d2a9c884068eb8da3e2fc1adb06f3317e0194b47a185ca
                              • Opcode Fuzzy Hash: eeab42aefd2d36d06d7687f66def4b4fc74e6333f2f3c4216b61849e5f0d6007
                              • Instruction Fuzzy Hash: C24107B9600605EFC710DF59D8C0E9AF7A5FF89304B1082AAEA1A8B311D735FD52CB95
                              APIs
                              • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00448539
                              • IsMenu.USER32(?), ref: 0044854D
                              • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 0044859B
                              • DrawMenuBar.USER32 ref: 004485AF
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: Menu$Item$DrawInfoInsert
                              • String ID: 0
                              • API String ID: 3076010158-4108050209
                              • Opcode ID: 1799694fe08fa7a149e3e917ddeca428ef12783b8609c92dee7a023332204936
                              • Instruction ID: 7b58e0297b022ec9ba855d833b0382692745775969200e6848d17b537ef0d45f
                              • Opcode Fuzzy Hash: 1799694fe08fa7a149e3e917ddeca428ef12783b8609c92dee7a023332204936
                              • Instruction Fuzzy Hash: 1F417975A00209AFEB10DF55D884B9FB7B5FF59300F14852EE9059B390DB74A845CFA8
                              APIs
                                • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                              • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00469D69
                              • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00469D7C
                              • SendMessageW.USER32(?,00000189,00000000,00000000), ref: 00469DAC
                                • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: MessageSend$_memmove_wcslen
                              • String ID: ComboBox$ListBox
                              • API String ID: 1589278365-1403004172
                              • Opcode ID: e833c5f683c324df3584e13527d60df096f9c23fae9490791bb62fc6faf22f53
                              • Instruction ID: b025c67d46b61e1fa51b41144ded2117d8c1ab71acdc4e5cb50a5164a05e923b
                              • Opcode Fuzzy Hash: e833c5f683c324df3584e13527d60df096f9c23fae9490791bb62fc6faf22f53
                              • Instruction Fuzzy Hash: 8D31287160010477DB10BB69CC45BEF775C9F86324F10852FF918AB2D1DABC9E4583A6
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: Handle
                              • String ID: nul
                              • API String ID: 2519475695-2873401336
                              • Opcode ID: efdaae6ab43bf4356d88622121a7e42c7f624cc6de1d12637521731ec53ca4c5
                              • Instruction ID: 058e2060cb23de8d889deff533ab301820a4ae088d702658d54b05e79d5a48de
                              • Opcode Fuzzy Hash: efdaae6ab43bf4356d88622121a7e42c7f624cc6de1d12637521731ec53ca4c5
                              • Instruction Fuzzy Hash: 84319571500204ABEB20DF68DC46BEB77A8EF04721F104A4EFD50973D1E7B59A50CBA5
                              APIs
                              • GetStdHandle.KERNEL32(000000F6), ref: 0044337D
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: Handle
                              • String ID: nul
                              • API String ID: 2519475695-2873401336
                              • Opcode ID: 97b946d9a765a46b1e85699804a5cf49c651f34dfecb3a2317456e71fe30ed78
                              • Instruction ID: 7fb8f1e98e57093f7bc771e71f756598ee5282d4f5ffeaa4ddc08f3ab3272662
                              • Opcode Fuzzy Hash: 97b946d9a765a46b1e85699804a5cf49c651f34dfecb3a2317456e71fe30ed78
                              • Instruction Fuzzy Hash: 05219331600204ABE720DF689C49FAB77A8EF55731F20474EFDA0972D0EBB59A50C795
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID:
                              • String ID: SysAnimate32
                              • API String ID: 0-1011021900
                              • Opcode ID: 8caf53187f6e77aecacb49307b2e697766faa1bc511b1160dce697a174d3407c
                              • Instruction ID: b1a10ecfd0a3fc3d2af2854cd73c9de1262d8b9fd4b2252518a975ef6c54cff1
                              • Opcode Fuzzy Hash: 8caf53187f6e77aecacb49307b2e697766faa1bc511b1160dce697a174d3407c
                              • Instruction Fuzzy Hash: 0D21C975600205ABFB149EA9EC81FAB73DCEB95324F20471BF711972C0D279EC518768
                              APIs
                                • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                • Part of subcall function 0043646A: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00436489
                                • Part of subcall function 0043646A: GetWindowThreadProcessId.USER32(?,00000000), ref: 0043649C
                                • Part of subcall function 0043646A: GetCurrentThreadId.KERNEL32 ref: 004364A3
                                • Part of subcall function 0043646A: AttachThreadInput.USER32(00000000), ref: 004364AA
                              • GetFocus.USER32 ref: 0046157B
                                • Part of subcall function 004364B5: GetParent.USER32(?), ref: 004364C3
                                • Part of subcall function 004364B5: GetParent.USER32(?), ref: 004364CF
                              • GetClassNameW.USER32(?,?,00000100), ref: 004615C4
                              • 73A36A70.USER32(?,Function_00045B98,?), ref: 004615EF
                              • __swprintf.LIBCMT ref: 00461608
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: Thread$Parent$AttachClassCurrentFocusInputMessageNameProcessSendTimeoutWindow__swprintf_memmove_wcslen
                              • String ID: %s%d
                              • API String ID: 2260874675-1110647743
                              • Opcode ID: 964dbc2a73d3b51658c129c0940897b8911b785c40af9afe88b96a44e5c449bd
                              • Instruction ID: 8eac61321038dbd32bfe14263504560db7c98c8fbeeeb2eb49a46d34c9d63f73
                              • Opcode Fuzzy Hash: 964dbc2a73d3b51658c129c0940897b8911b785c40af9afe88b96a44e5c449bd
                              • Instruction Fuzzy Hash: 272180756007096BD610AF69DC89FAF73A8FB88704F00841FF918A7241DAB8A9418B69
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 0beeaaa579c9339ee211e6c40176bce708d39a94b7630d2852c1f2343b6e5e4f
                              • Instruction ID: b0f148a0463f8e77612455c4d0488571574065cadd758f34d18f988e9301810f
                              • Opcode Fuzzy Hash: 0beeaaa579c9339ee211e6c40176bce708d39a94b7630d2852c1f2343b6e5e4f
                              • Instruction Fuzzy Hash: 2A819F74600604BFEB24CF95C994FBB7B68EF59350F10804EF8959B341E6B8AC45CB6A
                              APIs
                                • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B5B5
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: ConnectRegistry_memmove_wcslen
                              • String ID:
                              • API String ID: 15295421-0
                              • Opcode ID: d8d3d6a2cecaed762a510ed52f320a3b4f5546c74b9e94ec6e10ba7928b5d5b3
                              • Instruction ID: 481e56be03c4cee60d8ca92471cfa4b3875eab78bcfcbf7fb961631f720e0f99
                              • Opcode Fuzzy Hash: d8d3d6a2cecaed762a510ed52f320a3b4f5546c74b9e94ec6e10ba7928b5d5b3
                              • Instruction Fuzzy Hash: 7D515F71208301ABD304EF65C885E5BB7A8FF88704F10892EB54597291D774E945CBA6
                              APIs
                              • GetCursorPos.USER32(?), ref: 004563A6
                              • ScreenToClient.USER32(?,?), ref: 004563C3
                              • GetAsyncKeyState.USER32(?), ref: 00456400
                              • GetAsyncKeyState.USER32(?), ref: 00456410
                              • 73A345F0.USER32(?,000000F0), ref: 00456466
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: AsyncState$A345ClientCursorScreen
                              • String ID:
                              • API String ID: 2223540227-0
                              • Opcode ID: 47775ca2c9d3ed855d965de7f9cc13cd0d0477b61ed95063c4b58fcc2d2fd159
                              • Instruction ID: 60090bce41a6de58f2ab96a8453d1e3558661e38fd0c916b19f374a884add038
                              • Opcode Fuzzy Hash: 47775ca2c9d3ed855d965de7f9cc13cd0d0477b61ed95063c4b58fcc2d2fd159
                              • Instruction Fuzzy Hash: 49414C74504204BBDB24CF65C884EEFBBB8EB46326F60464EFC6593281CB34A944CB68
                              APIs
                              • InterlockedIncrement.KERNEL32(004A7F04), ref: 0047D438
                              • InterlockedDecrement.KERNEL32(004A7F04), ref: 0047D44D
                              • Sleep.KERNEL32(0000000A), ref: 0047D455
                              • InterlockedIncrement.KERNEL32(004A7F04), ref: 0047D460
                              • InterlockedDecrement.KERNEL32(004A7F04), ref: 0047D56A
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: Interlocked$DecrementIncrement$Sleep
                              • String ID:
                              • API String ID: 327565842-0
                              • Opcode ID: a05157aca8d30d558f467c32ec822d8ac937f36e77973d55cccdaa836f381863
                              • Instruction ID: e00c67d4cb89bf1d5311357fb713975cbca1e0cfcee7190b0451066ade77f289
                              • Opcode Fuzzy Hash: a05157aca8d30d558f467c32ec822d8ac937f36e77973d55cccdaa836f381863
                              • Instruction Fuzzy Hash: CC412571A002055FEB10DF65CD84AEE7774EF45304B10852EF609A7351E738EE46CB99
                              APIs
                              • GetPrivateProfileSectionW.KERNEL32(00000000,?,?,00007FFF), ref: 0045C44F
                              • GetPrivateProfileSectionW.KERNEL32(00000000,00000003,?,00000003), ref: 0045C477
                              • WritePrivateProfileSectionW.KERNEL32(00000000,00000003,?), ref: 0045C4C3
                              • WritePrivateProfileStringW.KERNEL32(00000000,?,00000000,00000000), ref: 0045C4E7
                              • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 0045C4F6
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: PrivateProfile$SectionWrite$String
                              • String ID:
                              • API String ID: 2832842796-0
                              • Opcode ID: a5613791a7b7745f301c2db32c82459f4eb77f00fff265897707edd8741bbf57
                              • Instruction ID: 1eb5009190fa999c36a74edd43b7bd9b51adbc8f8691a9c3f5840d50e9073e8b
                              • Opcode Fuzzy Hash: a5613791a7b7745f301c2db32c82459f4eb77f00fff265897707edd8741bbf57
                              • Instruction Fuzzy Hash: D1413075A00209BFDB10EFA1DC85FAAB7A8BF44305F10855EF9049B292DA79EE44CB54
                              APIs
                              • RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,?), ref: 00441CA9
                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00441CDD
                              • RegCloseKey.ADVAPI32(?), ref: 00441CFE
                              • RegDeleteKeyW.ADVAPI32(?,?), ref: 00441D40
                              • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00441D6E
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: Enum$CloseDeleteOpen
                              • String ID:
                              • API String ID: 2095303065-0
                              • Opcode ID: d2ce045a3c5b7a9f88abc7d1956311aab30076c6419bcb4202e5cbde6d6cad15
                              • Instruction ID: 7ca4c7ada97503ad9332fce322fe5d5fc03c2789ff93db080e75f28165cdf273
                              • Opcode Fuzzy Hash: d2ce045a3c5b7a9f88abc7d1956311aab30076c6419bcb4202e5cbde6d6cad15
                              • Instruction Fuzzy Hash: 69317CB2940108BAEB10DBD4DC85FFEB77CEB49304F04456EF605A7241D774AA858BA8
                              APIs
                              • GetWindowRect.USER32(?,?), ref: 00436A24
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: RectWindow
                              • String ID:
                              • API String ID: 861336768-0
                              • Opcode ID: d215e6d8dffd18d1ffc2da0b67cce38d66530bec6329dda4924901d83a0034d3
                              • Instruction ID: 0a42da3bb0701689e96ef39581243ed39d97d4ba46bd7cd8c1f057aae640e0d3
                              • Opcode Fuzzy Hash: d215e6d8dffd18d1ffc2da0b67cce38d66530bec6329dda4924901d83a0034d3
                              • Instruction Fuzzy Hash: E531EA7160021EAFDB00DF68D988AAE77A5EB49324F11C62AFD24E7380D774EC11CB90
                              APIs
                              • SendMessageW.USER32 ref: 00449598
                                • Part of subcall function 00430626: _wcspbrk.LIBCMT ref: 00430636
                              • SendMessageW.USER32(?,00001074,?,?), ref: 004495F8
                              • _wcslen.LIBCMT ref: 0044960D
                              • _wcslen.LIBCMT ref: 0044961A
                              • SendMessageW.USER32(?,00001074,?,?), ref: 0044964E
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: MessageSend$_wcslen$_wcspbrk
                              • String ID:
                              • API String ID: 1856069659-0
                              • Opcode ID: eb2345d78995945919f1fca8909d98cd083db74a4e9b61e28a7ea2bcab757230
                              • Instruction ID: 683be220b4a5e9d86ccbf412c3bd2f13dbb60120779f28b1c577ab6eeef24407
                              • Opcode Fuzzy Hash: eb2345d78995945919f1fca8909d98cd083db74a4e9b61e28a7ea2bcab757230
                              • Instruction Fuzzy Hash: 77318F71A00218ABEB20DF59DC80BDFB374FF94314F10466AFA0497280E7B59D958B94
                              APIs
                              • GetWindowRect.USER32(?,?), ref: 00447C5D
                              • ScreenToClient.USER32(?,?), ref: 00447C7B
                              • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00447C8E
                              • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00447CD5
                              • EndPaint.USER32(?,?), ref: 00447D13
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: ClientPaintRectRectangleScreenViewportWindow
                              • String ID:
                              • API String ID: 659298297-0
                              • Opcode ID: 9df24dda7700d3462e91b7be9c0077b8f1985bebde9900174ed076ebcab1caeb
                              • Instruction ID: 3c0582d8bc81ba5dadaaf244cb1f1d3939805113443e317e1f98b5bdeebaec33
                              • Opcode Fuzzy Hash: 9df24dda7700d3462e91b7be9c0077b8f1985bebde9900174ed076ebcab1caeb
                              • Instruction Fuzzy Hash: C33161706043019FE310CF25D8C8F7B7BE8EB86724F144A6EF9A5872A1C774A845DB69
                              APIs
                              • EnableWindow.USER32(?,00000000), ref: 00448B5C
                              • EnableWindow.USER32(?,00000001), ref: 00448B72
                              • ShowWindow.USER32(?,00000000), ref: 00448BE8
                              • ShowWindow.USER32(?,00000004), ref: 00448BF4
                              • EnableWindow.USER32(?,00000001), ref: 00448C09
                                • Part of subcall function 00440D98: SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 00440DB8
                                • Part of subcall function 00440D98: 73A345F0.USER32(?,000000F0,?,?,000000F0,00000000,00000000), ref: 00440DFA
                                • Part of subcall function 00440D98: 73A345F0.USER32(?,000000F0,?,?,000000F0,00000000,00000000), ref: 00440E3A
                                • Part of subcall function 00440D98: SendMessageW.USER32(02F81A48,000000F1,00000000,00000000), ref: 00440E6E
                                • Part of subcall function 00440D98: SendMessageW.USER32(02F81A48,000000F1,00000001,00000000), ref: 00440E9A
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: Window$EnableMessageSend$A345Show
                              • String ID:
                              • API String ID: 2563595985-0
                              • Opcode ID: 426854c6b9cbeb660193a9c091743316caa306963ba13d8f93245475b3a006f2
                              • Instruction ID: c941ec4e4e3d0536419715940b2668e48b64c275bb9f23e9dd6fd7b29375311a
                              • Opcode Fuzzy Hash: 426854c6b9cbeb660193a9c091743316caa306963ba13d8f93245475b3a006f2
                              • Instruction Fuzzy Hash: DE21F7B17443805BF7258E24CCC4BAFB7D0EF56345F08482EF98196391DBACA885C75A
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: cfa96c7b92ceffa4878489be5d10f88277f639196488ca8149908940c9a32487
                              • Instruction ID: af34b986bc09d21a6a739d25b45c5a22770885c200d938a8bd6fc5fff5094107
                              • Opcode Fuzzy Hash: cfa96c7b92ceffa4878489be5d10f88277f639196488ca8149908940c9a32487
                              • Instruction Fuzzy Hash: 5921AE75200600DBC710EF29E9D496B77B9EF49362B00466EFE5197392DB34EC09CB69
                              APIs
                              • IsWindowVisible.USER32(?), ref: 00445879
                              • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00445893
                              • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 004458CD
                              • _wcslen.LIBCMT ref: 004458FB
                              • CharUpperBuffW.USER32(00000000,00000000), ref: 00445905
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen
                              • String ID:
                              • API String ID: 3087257052-0
                              • Opcode ID: 622372a4a32610ce73fb3647056b26e365a1681bd10d6cc102ac189a3bd4553b
                              • Instruction ID: ced771b0f23340e5f55e8fdbc4e1763ce6d97a07fd0b425722e47bce61cb145a
                              • Opcode Fuzzy Hash: 622372a4a32610ce73fb3647056b26e365a1681bd10d6cc102ac189a3bd4553b
                              • Instruction Fuzzy Hash: F51136726009017BFB10AB25DC06F9FB78CAF65360F04403AF909D7241EB69ED5983A9
                              APIs
                                • Part of subcall function 00465225: inet_addr.WSOCK32(?), ref: 00465249
                              • socket.WSOCK32(00000002,00000001,00000006,00000000), ref: 004653FE
                              • WSAGetLastError.WSOCK32(00000000), ref: 0046540D
                              • connect.WSOCK32(00000000,?,00000010), ref: 00465446
                              • WSAGetLastError.WSOCK32(00000000), ref: 0046546D
                              • closesocket.WSOCK32(00000000,00000000), ref: 00465481
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: ErrorLast$closesocketconnectinet_addrsocket
                              • String ID:
                              • API String ID: 245547762-0
                              • Opcode ID: 4a364c3b246f50765ea579ebeb5236c2c367babb38bf5793ee33ccca847a6907
                              • Instruction ID: 0a95abeaf907522bb910ccff47ca5b8cdb65f95d12881c86cce1eb50970c9d0a
                              • Opcode Fuzzy Hash: 4a364c3b246f50765ea579ebeb5236c2c367babb38bf5793ee33ccca847a6907
                              • Instruction Fuzzy Hash: E921F032200510ABD310EF29DC49F6EB7E8EF44725F008A6FF844E72D1DBB4A8418B99
                              APIs
                              • DeleteObject.GDI32(00000000), ref: 004471D8
                              • ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
                              • SelectObject.GDI32(?,00000000), ref: 00447228
                              • BeginPath.GDI32(?), ref: 0044723D
                              • SelectObject.GDI32(?,00000000), ref: 00447266
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: Object$Select$BeginCreateDeletePath
                              • String ID:
                              • API String ID: 2338827641-0
                              • Opcode ID: 2b4904aa023ab9776d85036867689c5727337e5a2013c968bceed19ab76b7b02
                              • Instruction ID: fd3aca4fc88a528095528039be3f852d236b7ebb9f74560e76bd8f11b15fbd2f
                              • Opcode Fuzzy Hash: 2b4904aa023ab9776d85036867689c5727337e5a2013c968bceed19ab76b7b02
                              • Instruction Fuzzy Hash: 92214F71905204AFEB10DF689D48A9E7FACFB16310F14466BF910D32A1DBB49C85CBAD
                              APIs
                              • Sleep.KERNEL32(00000000), ref: 00434598
                              • QueryPerformanceCounter.KERNEL32(?), ref: 004345B5
                              • Sleep.KERNEL32(00000000), ref: 004345D4
                              • QueryPerformanceCounter.KERNEL32(?), ref: 004345DE
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: CounterPerformanceQuerySleep
                              • String ID:
                              • API String ID: 2875609808-0
                              • Opcode ID: e7bcee6603ab5961272028a34fb999977f673cbbb9fa03059816f244ade9b228
                              • Instruction ID: a92d15520113c221d818f77e193bed66bb4dcccdbbd961c90b57f37ba003579f
                              • Opcode Fuzzy Hash: e7bcee6603ab5961272028a34fb999977f673cbbb9fa03059816f244ade9b228
                              • Instruction Fuzzy Hash: 37118232D0011DA7CF00EF99DD49AEEBB78FF99721F00456AEE4473240DA3465618BE9
                              APIs
                              • GetDlgItem.USER32(?,000003E9), ref: 00460C17
                              • GetWindowTextW.USER32(00000000,?,00000100), ref: 00460C2E
                              • MessageBeep.USER32(00000000), ref: 00460C46
                              • KillTimer.USER32(?,0000040A), ref: 00460C68
                              • EndDialog.USER32(?,00000001), ref: 00460C83
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: BeepDialogItemKillMessageTextTimerWindow
                              • String ID:
                              • API String ID: 3741023627-0
                              • Opcode ID: 1f18e2cfcdf944224a2d79a82bd846e8569cbd7b4094970ae8d1428a0e6a4617
                              • Instruction ID: 069ac2582a8c3c153a507cef710a9e07e91c6f457c78871e3a9641c65eda6ae6
                              • Opcode Fuzzy Hash: 1f18e2cfcdf944224a2d79a82bd846e8569cbd7b4094970ae8d1428a0e6a4617
                              • Instruction Fuzzy Hash: AB01DD315403086BE7349B54EE8DBDB737CFB14705F00465FB645921C0E7F4A9948B95
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: DeleteObject$CursorDestroy
                              • String ID:
                              • API String ID: 2592789088-0
                              • Opcode ID: 3835efce57e2eefc6c6d584a426a71e2dd3a2f260109f85cc330253665e7d223
                              • Instruction ID: b4c4dbb9b59ba1bd7f08d964dfa6937d7ad9fb038e30cf105cf785d591c64ca0
                              • Opcode Fuzzy Hash: 3835efce57e2eefc6c6d584a426a71e2dd3a2f260109f85cc330253665e7d223
                              • Instruction Fuzzy Hash: D5014870301A01DBDB10EF65E9D8A2B77A8BF48762F10462AFD04D7352D739D849CBA9
                              APIs
                              • SendMessageW.USER32(?,00001101,00000000,?), ref: 004555FC
                              • DeleteObject.GDI32(?), ref: 00455736
                              • DeleteObject.GDI32(?), ref: 00455744
                              • DestroyCursor.USER32(?), ref: 00455752
                              • 73A35CF0.USER32(?), ref: 00455760
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: DeleteObject$CursorDestroyMessageSend
                              • String ID:
                              • API String ID: 2743624342-0
                              • Opcode ID: 7dd20da83386a23a1814408c1199d2c33e99a8c26f67204b6fd348d50f61361a
                              • Instruction ID: 3262712e9a8127eed33bb9eb3d9864066e7dde5d47db0d590f2b6463dd6d37f9
                              • Opcode Fuzzy Hash: 7dd20da83386a23a1814408c1199d2c33e99a8c26f67204b6fd348d50f61361a
                              • Instruction Fuzzy Hash: 07017C74300601DBCB10EF25EEC8A2A73A8BF48712F004569FE019B286D778DC49CB68
                              APIs
                                • Part of subcall function 00430003: InvalidateRect.USER32(?,00000000,00000001), ref: 00430091
                              • 73A35CF0.USER32(?), ref: 00455728
                              • DeleteObject.GDI32(?), ref: 00455736
                              • DeleteObject.GDI32(?), ref: 00455744
                              • DestroyCursor.USER32(?), ref: 00455752
                              • 73A35CF0.USER32(?), ref: 00455760
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: DeleteObject$CursorDestroyInvalidateRect
                              • String ID:
                              • API String ID: 3523150457-0
                              • Opcode ID: 9df849479103f2de49514c9ec76f9cef1897402069f9b01ba3cc14c1fa4130bc
                              • Instruction ID: 2016740d4609c4bbd0e5f1cf6dc7522ca00853e433b5032f7809eda0dc31aff9
                              • Opcode Fuzzy Hash: 9df849479103f2de49514c9ec76f9cef1897402069f9b01ba3cc14c1fa4130bc
                              • Instruction Fuzzy Hash: 3701F670200601DBCB10EF69E9D8A2B37ACAF49762B00466AFD01D7256D769DC498B69
                              APIs
                              • __getptd.LIBCMT ref: 0041780F
                                • Part of subcall function 00417A69: __getptd_noexit.LIBCMT ref: 00417A6C
                                • Part of subcall function 00417A69: __amsg_exit.LIBCMT ref: 00417A79
                              • __getptd.LIBCMT ref: 00417826
                              • __amsg_exit.LIBCMT ref: 00417834
                              • __lock.LIBCMT ref: 00417844
                              • __updatetlocinfoEx_nolock.LIBCMT ref: 00417858
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                              • String ID:
                              • API String ID: 938513278-0
                              • Opcode ID: 82c9f3bbc84dc287df7640515fd49376d4ae64643407e313ceafc36016311655
                              • Instruction ID: 276dd8d19a6a3be70f37c916a71154ef36d62806621923b96dbf7b6e4fe89171
                              • Opcode Fuzzy Hash: 82c9f3bbc84dc287df7640515fd49376d4ae64643407e313ceafc36016311655
                              • Instruction Fuzzy Hash: 6DF09632A4C7009AD721BBA6940B7DD33B0AF10768F11415FF541572D2CB6C59C1CB9D
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID:
                              • String ID: )$U$\
                              • API String ID: 0-3705770531
                              • Opcode ID: 028001eb2bff774db3903015b7fa80ce6d69291786b8857f67b928b721b55690
                              • Instruction ID: d0f1885598f34d5f764b4f2a5794ec4e3d7857f6dac93f6e146ba8491093b400
                              • Opcode Fuzzy Hash: 028001eb2bff774db3903015b7fa80ce6d69291786b8857f67b928b721b55690
                              • Instruction Fuzzy Hash: 83C1C074A00249CFEB24CF69C5806AEBBF2FF85304F2481ABD8569B351D739994ACF15
                              APIs
                                • Part of subcall function 004426CD: _wcslen.LIBCMT ref: 004426F9
                              • CoInitialize.OLE32(00000000), ref: 0046E505
                              • CoCreateInstance.OLE32(00482A08,00000000,00000001,004828A8,?), ref: 0046E51E
                              • CoUninitialize.OLE32 ref: 0046E53D
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: CreateInitializeInstanceUninitialize_wcslen
                              • String ID: .lnk
                              • API String ID: 886957087-24824748
                              • Opcode ID: 275befd32e5b5cb51e2fc879a9ecc6bbb724afd33f596a1e549e31a6ffdfd8c7
                              • Instruction ID: 2644725dabb75134900838bfbf7f9974cf5b6b8c274c659ea1b0544ab4b4cf98
                              • Opcode Fuzzy Hash: 275befd32e5b5cb51e2fc879a9ecc6bbb724afd33f596a1e549e31a6ffdfd8c7
                              • Instruction Fuzzy Hash: A6A1CB756042019FC700EF65C980E5BB7E9AFC8308F108A5EF9859B392DB35EC45CBA6
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: _memmove
                              • String ID: \
                              • API String ID: 4104443479-2967466578
                              • Opcode ID: 236e1e21dc65edc907fd0526d8e82b29cd887e6a6cae6abce2d2318f267918b8
                              • Instruction ID: 90b25fc4546a2c21e21e7939c456fa175a28996bec6c3309f7edcf8d77039fcb
                              • Opcode Fuzzy Hash: 236e1e21dc65edc907fd0526d8e82b29cd887e6a6cae6abce2d2318f267918b8
                              • Instruction Fuzzy Hash: 8AB1C270D04289CFEF15CFA9C8807AEBBB2BF55308F28419ED451AB381D7795946CB1A
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: _memmove
                              • String ID: \
                              • API String ID: 4104443479-2967466578
                              • Opcode ID: aaea77048b6460e77790bc9063151364371e311f89c51572a31744d174c5d814
                              • Instruction ID: 47d8400a167da4587eb122393216330e55bf30386b581c043e0675457d4a745f
                              • Opcode Fuzzy Hash: aaea77048b6460e77790bc9063151364371e311f89c51572a31744d174c5d814
                              • Instruction Fuzzy Hash: F1B1C270D04289CFEF15CFA9C8807AEBBB2BF55308F28419ED451AB381D7795946CB1A
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: _memmove
                              • String ID: \
                              • API String ID: 4104443479-2967466578
                              • Opcode ID: 51371dbcd6d614fdce5bfd4d2520a50a5cfc61004088100711ab8bbb78939718
                              • Instruction ID: 4d1558bed40bbae7f26d93592334ac0d2c658ca85fbb7fec499742c135aa7d63
                              • Opcode Fuzzy Hash: 51371dbcd6d614fdce5bfd4d2520a50a5cfc61004088100711ab8bbb78939718
                              • Instruction Fuzzy Hash: E5A1C270D04289CFEF15CFA9C8807AEBBB2BF55308F28419ED441AB381D7795946CB1A
                              Strings
                              • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 0046A75B
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: _memmovestd::exception::exception$Exception@8Throw_malloc_wcslen
                              • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                              • API String ID: 708495834-557222456
                              • Opcode ID: 0835c6591df01f69715f5e8aca6b92cd03353c77de4b2b2244ddd74c7a14709d
                              • Instruction ID: 9c514e09f8cb76db8ae150367893d7536957bb5c5403f45e3580b17af89e858a
                              • Opcode Fuzzy Hash: 0835c6591df01f69715f5e8aca6b92cd03353c77de4b2b2244ddd74c7a14709d
                              • Instruction Fuzzy Hash: 7C917F711087009FC310EF65C88186BB7E8AF89314F148D2FF595672A2E778E919CB9B
                              APIs
                                • Part of subcall function 00434319: WriteProcessMemory.KERNEL32(?,?,?,?,00000000), ref: 0043434A
                              • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 004365EF
                                • Part of subcall function 004342DD: ReadProcessMemory.KERNEL32(?,?,?,?,00000000), ref: 0043430E
                                • Part of subcall function 004343AD: GetWindowThreadProcessId.USER32(?,?), ref: 004343E0
                                • Part of subcall function 004343AD: OpenProcess.KERNEL32(00000438,00000000,?), ref: 004343F1
                                • Part of subcall function 004343AD: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004), ref: 00434408
                              • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 0043665F
                              • SendMessageW.USER32(00000000,00001111,00000000,00000000), ref: 004366DF
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                              • String ID: @
                              • API String ID: 4150878124-2766056989
                              • Opcode ID: 6104cbe5d4ae3c4c99a3306f76968d572a7f9f5d55716afa725ed0ba86ca2a2d
                              • Instruction ID: 60a9f40d71a87185ad744a771aacdfc79ad0a16393efc777ae91d2f205fac39b
                              • Opcode Fuzzy Hash: 6104cbe5d4ae3c4c99a3306f76968d572a7f9f5d55716afa725ed0ba86ca2a2d
                              • Instruction Fuzzy Hash: 0D51B972A00218ABCB10DFA5DD42FDEB778EFC9304F00459AFA05EB180D6B4BA45CB65
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: _memmove
                              • String ID: \$]$h
                              • API String ID: 4104443479-3262404753
                              • Opcode ID: 176a597a96dcd2a70b70cc410daef71b144e937b03d0c11d284d361abdce2453
                              • Instruction ID: f8aecd1968ad4f88b1990a67d2c0a139cd5c037738d7fdf96801fcbc28408ccb
                              • Opcode Fuzzy Hash: 176a597a96dcd2a70b70cc410daef71b144e937b03d0c11d284d361abdce2453
                              • Instruction Fuzzy Hash: 97518470E00209DFDF18CFA5C980AAEB7F2BF85304F29826AD405AB355D7385D45CB55
                              APIs
                              • ShellExecuteExW.SHELL32(0000003C), ref: 00457D67
                                • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                                • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                              • CloseHandle.KERNEL32(?), ref: 00457E09
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: CloseExecuteHandleShell_wcscpy_wcslen
                              • String ID: <$@
                              • API String ID: 2417854910-1426351568
                              • Opcode ID: 024707e8d0be736fd9aee974053134abdf34597ecb22147b7e98c4ffc578353a
                              • Instruction ID: b88a15a70aa0ad5f6f29005b2a8070d35214d1ef645994392ec84fe4d9ca6df0
                              • Opcode Fuzzy Hash: 024707e8d0be736fd9aee974053134abdf34597ecb22147b7e98c4ffc578353a
                              • Instruction Fuzzy Hash: C751D3719002089BDB10EFA1D985AAFB7B4EF44309F10446EED05AB352DB79ED49CB94
                              APIs
                              • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0044A87A
                              • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0044A8C9
                              • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 0044A901
                                • Part of subcall function 004422CB: GetLastError.KERNEL32 ref: 004422E1
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: Http$ErrorInfoInternetLastOpenQueryRequestSend
                              • String ID:
                              • API String ID: 3705125965-3916222277
                              • Opcode ID: 0ee13e9a60eb6ba6c748d714ed0ce9e8e081c7518857538375ec5b6ad63af0be
                              • Instruction ID: d28fa13b4dde737238ce5dcfaacd3c540a76458eeabd88e5a6b3f8614e5f537b
                              • Opcode Fuzzy Hash: 0ee13e9a60eb6ba6c748d714ed0ce9e8e081c7518857538375ec5b6ad63af0be
                              • Instruction Fuzzy Hash: DB310B76A802047AE720EF56DC42FDFB7A8EBD9710F00851FFA0097281D6B5550987AC
                              APIs
                              • GetMenuItemInfoW.USER32 ref: 0045FAC4
                              • DeleteMenu.USER32(?,?,00000000), ref: 0045FB15
                              • DeleteMenu.USER32(00000000,?,00000000), ref: 0045FB68
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: Menu$Delete$InfoItem
                              • String ID: 0
                              • API String ID: 135850232-4108050209
                              • Opcode ID: 44596b6c283006d3404d95c3e5e16104138b05286e513df4f299336d423ce3c8
                              • Instruction ID: 2caf7e1b7ae413ca61a5456c92b2eab9e90ede26a48057f627e29f4096114103
                              • Opcode Fuzzy Hash: 44596b6c283006d3404d95c3e5e16104138b05286e513df4f299336d423ce3c8
                              • Instruction Fuzzy Hash: CC41D2B1604201ABD710CF25CC45F17B7A9AF84315F148A2EFDA49B2C2D378E849CBA6
                              APIs
                              • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013), ref: 0045085F
                              • 73A345F0.USER32(?,000000F0), ref: 0045087D
                              • 73A359E0.USER32(?,000000F0,00000000,?,000000F0), ref: 0045088E
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: A345A359Window
                              • String ID: SysTreeView32
                              • API String ID: 1379169501-1698111956
                              • Opcode ID: 6654344cdbbec2ecb5663208c63790126aca218b871aedcbee15bef271784643
                              • Instruction ID: 2f6c96d6d770cdd7f6b01965cae739f5ffbb06f7b8c4bfc7c6bf121f6b9a1f40
                              • Opcode Fuzzy Hash: 6654344cdbbec2ecb5663208c63790126aca218b871aedcbee15bef271784643
                              • Instruction Fuzzy Hash: 34418D75500205ABEB10DF29DC84FEB33A8FB49325F20471AF865972D1D778E895CBA8
                              APIs
                              • 73A35CF0.USER32(00000000), ref: 00450A2F
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID:
                              • String ID: msctls_updown32
                              • API String ID: 0-2298589950
                              • Opcode ID: ede3ba3c4388c74c76a3cd747824982d62f6d25d37162a4df1ebcaa7ffb6df4e
                              • Instruction ID: fccd3fcc05e4e2aaf5990a1cc96ccc3c6d01ef6560d5fec67e6c7c3c5f699695
                              • Opcode Fuzzy Hash: ede3ba3c4388c74c76a3cd747824982d62f6d25d37162a4df1ebcaa7ffb6df4e
                              • Instruction Fuzzy Hash: 213182767402056FE710DF58EC81FAB3368FF99710F10411AFA009B282C7B5AC96C7A8
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: _memmove
                              • String ID: $<
                              • API String ID: 4104443479-428540627
                              • Opcode ID: 6c7976b20de454da7fe1266d8cf8ce191b2ccd068f9cf911d6d19d23786630cd
                              • Instruction ID: e8c4ca86f7ae52158d8313b00b6d431508e51e3fea12eaab667d4a9530e7d8b8
                              • Opcode Fuzzy Hash: 6c7976b20de454da7fe1266d8cf8ce191b2ccd068f9cf911d6d19d23786630cd
                              • Instruction Fuzzy Hash: A331EF30D04258DEFF25CFAAC9847EEBBB1AF11310F18419AD455A7382D7789E48CB25
                              APIs
                              • SetErrorMode.KERNEL32(00000001), ref: 0045D79D
                              • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?,?), ref: 0045D812
                              • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D85C
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: ErrorMode$DiskFreeSpace
                              • String ID: \VH
                              • API String ID: 1682464887-234962358
                              • Opcode ID: e9044521b94c7a2fd6e775d53faddef87f956e6addecf71534c1072a2e4d61eb
                              • Instruction ID: 72795a51c8fd7a71edb0939b11d44c3a5eb04741920228a3d2c34b8a4a3992bf
                              • Opcode Fuzzy Hash: e9044521b94c7a2fd6e775d53faddef87f956e6addecf71534c1072a2e4d61eb
                              • Instruction Fuzzy Hash: B5217171D002089FCB00EFA5D98499EBBB8FF48314F1184AAE805AB351D7349E05CB64
                              APIs
                              • SetErrorMode.KERNEL32(00000001), ref: 0045D79D
                              • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?,?), ref: 0045D812
                              • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D85C
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: ErrorMode$DiskFreeSpace
                              • String ID: \VH
                              • API String ID: 1682464887-234962358
                              • Opcode ID: 02922531bbe1fdf38ecd1c48401d7894eac39f8171a3426d51aa67f0eafe79b3
                              • Instruction ID: ae55674c87016058c86dc8d4ad6f5a536cd264dc70ae423c542bf2f5a0a67e7a
                              • Opcode Fuzzy Hash: 02922531bbe1fdf38ecd1c48401d7894eac39f8171a3426d51aa67f0eafe79b3
                              • Instruction Fuzzy Hash: C9316F75E002089FCB00EFA5D985A9DBBB4FF48314F1080AAE904AB351CB75EE05CB94
                              APIs
                              • SetErrorMode.KERNEL32(00000001), ref: 0045D87B
                              • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?,?), ref: 0045D8F0
                              • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D93A
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: ErrorMode$DiskFreeSpace
                              • String ID: \VH
                              • API String ID: 1682464887-234962358
                              • Opcode ID: 657bf3a7bf4e4b0879eb54f11f0d4a47d1274a72e537d3786cc0042974389a76
                              • Instruction ID: e5212c229d9c2069cdfe567d9572a18bb695f81ecf44ad0a977260396f8f3e20
                              • Opcode Fuzzy Hash: 657bf3a7bf4e4b0879eb54f11f0d4a47d1274a72e537d3786cc0042974389a76
                              • Instruction Fuzzy Hash: E6316D75E002089FCB00EFA5D984A9EBBB4FF48314F1084AAE904AB351CB35DE05CB94
                              APIs
                              • SetErrorMode.KERNEL32(00000001), ref: 0045D37E
                              • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D3F4
                              • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D437
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: ErrorMode$InformationVolume
                              • String ID: \VH
                              • API String ID: 2507767853-234962358
                              • Opcode ID: 3e53e890434f9ea80ffb8b8b8863db28d9ef5c2317443d22617d365319ccab8e
                              • Instruction ID: 9072e4f9bd6fffdf4d5f5b526d3ef1379cf95bcdbb04681c41660468616ecd75
                              • Opcode Fuzzy Hash: 3e53e890434f9ea80ffb8b8b8863db28d9ef5c2317443d22617d365319ccab8e
                              • Instruction Fuzzy Hash: E5213075A002099FC714EF95CD85EAEB7B8FF88300F1084AAE905A73A1D774EA45CB54
                              APIs
                              • SetErrorMode.KERNEL32(00000001), ref: 0045D55C
                              • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D5D2
                              • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D608
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: ErrorMode$InformationVolume
                              • String ID: \VH
                              • API String ID: 2507767853-234962358
                              • Opcode ID: d1fa58eff2fbb7cc6c51b85e489fdb3630b63cb8eb333212ecdab13a3ad88969
                              • Instruction ID: 5d1496e5fec29648c5677f840c6a5ff7f703137340fc9510fe584f3610dc7e3a
                              • Opcode Fuzzy Hash: d1fa58eff2fbb7cc6c51b85e489fdb3630b63cb8eb333212ecdab13a3ad88969
                              • Instruction Fuzzy Hash: 88218271A00209AFC714EF95C885EAEB7B4FF48300F0084AEF505A72A1D774E905CB58
                              APIs
                              • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00450B3B
                              • SendMessageW.USER32(00000000,00000406,00000000,00640000), ref: 00450B51
                              • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00450B5F
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: MessageSend
                              • String ID: msctls_trackbar32
                              • API String ID: 3850602802-1010561917
                              • Opcode ID: b7bd052b599063d2228b5cfe26d5df8f76e43bb35df486dd72efd91b953fbf0c
                              • Instruction ID: cc80dcb7cd3031ad5716ab9229ca2671b5dcb2452333e47e40e099fef7a03d8b
                              • Opcode Fuzzy Hash: b7bd052b599063d2228b5cfe26d5df8f76e43bb35df486dd72efd91b953fbf0c
                              • Instruction Fuzzy Hash: 301196757403197BEB109EA8DC81FDB339CAB58B64F204216FA10A72C1D6B4FC5187A8
                              APIs
                                • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                              • CLSIDFromString.OLE32(?,00000000), ref: 00435236
                              • SafeArrayAccessData.OLEAUT32(?,?), ref: 00435285
                              • SafeArrayUnaccessData.OLEAUT32(?), ref: 004352B4
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: ArrayDataSafe$AccessFromStringUnaccess_malloc
                              • String ID: crts
                              • API String ID: 943502515-3724388283
                              • Opcode ID: 529e37b86e0cb06f9ed43835dc92f00344189a4a835cae890eb44c126e03fe94
                              • Instruction ID: ec3ec3aa447b477297a9cb7ebc6a7fbeb91602aa87849f29064a6671b92f781e
                              • Opcode Fuzzy Hash: 529e37b86e0cb06f9ed43835dc92f00344189a4a835cae890eb44c126e03fe94
                              • Instruction Fuzzy Hash: EC213876600A009FC714CF8AE444D97FBE8EF98760714C46AEA49CB721D334E851CB94
                              APIs
                              • SetErrorMode.KERNEL32(00000001), ref: 0045D2D2
                              • SetVolumeLabelW.KERNEL32(?,00000000), ref: 0045D331
                              • SetErrorMode.KERNEL32(?), ref: 0045D35C
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: ErrorMode$LabelVolume
                              • String ID: \VH
                              • API String ID: 2006950084-234962358
                              • Opcode ID: 06ec5ceac71ab965c19bbe619e509a4f86e9865fc889b709aa917be6b1aab059
                              • Instruction ID: 93ef07912bcba266d24f4400c0aa25f887f93b2782b8649f9ae8f5902fc9f078
                              • Opcode Fuzzy Hash: 06ec5ceac71ab965c19bbe619e509a4f86e9865fc889b709aa917be6b1aab059
                              • Instruction Fuzzy Hash: 10115175900105DFCB00EFA5D94499EBBB4FF48315B1084AAEC09AB352D774ED45CBA5
                              APIs
                                • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                              • GetMenuItemInfoW.USER32 ref: 00449727
                              • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00449751
                              • DrawMenuBar.USER32 ref: 00449761
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: Menu$InfoItem$Draw_malloc
                              • String ID: 0
                              • API String ID: 772068139-4108050209
                              • Opcode ID: 15a76c8cdafcabc0d330a2bd3afc87876622b04de3c231e264bb1fcb70d0c272
                              • Instruction ID: eb12e692e9d899ed3776fa10421b592e4983edb38958d2313c52402e3f8558b6
                              • Opcode Fuzzy Hash: 15a76c8cdafcabc0d330a2bd3afc87876622b04de3c231e264bb1fcb70d0c272
                              • Instruction Fuzzy Hash: 7711A3B1A10208AFEB10DF55DC49BAFB774EF85314F0041AEFA098B250DB759944DFA5
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: _wcslen$_wcscpy
                              • String ID: 3, 3, 8, 1
                              • API String ID: 3469035223-357260408
                              • Opcode ID: 12b73319f7521ef091ea4856e2d9fc07411b991347f193140c1b9c5819a8a9d6
                              • Instruction ID: 583e1dd4926d5dc430cd1974fab242c37593855fc3f83b6d902887b8cb8118b3
                              • Opcode Fuzzy Hash: 12b73319f7521ef091ea4856e2d9fc07411b991347f193140c1b9c5819a8a9d6
                              • Instruction Fuzzy Hash: 44F06D61510655E2CB34A791AD917FF72546F44341F00947BD90ED2190F368CB85CF99
                              APIs
                              • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 004312DE
                              • GetProcAddress.KERNEL32(00000000,IcmpCloseHandle), ref: 004312F0
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: AddressLibraryLoadProc
                              • String ID: ICMP.DLL$IcmpCloseHandle
                              • API String ID: 2574300362-3530519716
                              • Opcode ID: 21a2acdac0ba1e2d746e72dbff1012e7ad80fb0484e1fffebf05da08cb8a0c44
                              • Instruction ID: fe30dd6f995ef3e52e92cf139519288d45b371df6a06e7fbbc01cfddaae6e452
                              • Opcode Fuzzy Hash: 21a2acdac0ba1e2d746e72dbff1012e7ad80fb0484e1fffebf05da08cb8a0c44
                              • Instruction Fuzzy Hash: 89E01275500316DFDB105F66D80564B77DCDB14751F10482AFD45E2A51DBB8D48087E8
                              APIs
                              • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 00431310
                              • GetProcAddress.KERNEL32(00000000,IcmpCreateFile), ref: 00431322
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: AddressLibraryLoadProc
                              • String ID: ICMP.DLL$IcmpCreateFile
                              • API String ID: 2574300362-275556492
                              • Opcode ID: c8e81b458e49d693ad0b98c25d1a2273645c6015ec642ff3830cff94addfde50
                              • Instruction ID: 95e0d00128142f820e0a83de5ed484af687323a382b0c693d148963e73e99334
                              • Opcode Fuzzy Hash: c8e81b458e49d693ad0b98c25d1a2273645c6015ec642ff3830cff94addfde50
                              • Instruction Fuzzy Hash: E3E0C270400306EFD7107FA5D81464A77E8DB08310F104C2AFC40A2650C7B8D48087A8
                              APIs
                              • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 004312AC
                              • GetProcAddress.KERNEL32(00000000,IcmpSendEcho), ref: 004312BE
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: AddressLibraryLoadProc
                              • String ID: ICMP.DLL$IcmpSendEcho
                              • API String ID: 2574300362-58917771
                              • Opcode ID: 8463976e88658be12d547e53f001863c36b7eb8c5d8a0eb88088b9b0d7e59d79
                              • Instruction ID: f6e067919a3be2c94262fb81e38fb1c28335358536499f04279aa6303c0198c7
                              • Opcode Fuzzy Hash: 8463976e88658be12d547e53f001863c36b7eb8c5d8a0eb88088b9b0d7e59d79
                              • Instruction Fuzzy Hash: ADE0C2B0400706DFC7105F65D80465B77D8DB04321F10482BFD80E2610C7B8E48087A8
                              APIs
                              • LoadLibraryA.KERNEL32(advapi32.dll), ref: 00430C91
                              • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00430CA3
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: AddressLibraryLoadProc
                              • String ID: RegDeleteKeyExW$advapi32.dll
                              • API String ID: 2574300362-4033151799
                              • Opcode ID: d4a2309a593705586ca0189df29ebf11fe16cb5b9b4952fb03c76dd6ffec2ddb
                              • Instruction ID: e1e112c22781e886f83f7ab60c8bc672304d94c0271b2a691c2b6ddb7eb549cd
                              • Opcode Fuzzy Hash: d4a2309a593705586ca0189df29ebf11fe16cb5b9b4952fb03c76dd6ffec2ddb
                              • Instruction Fuzzy Hash: 3FE0C2B0440315AFCB106F6AD95460B7BD89B14321F10583BF980E2600C7B8E88087B8
                              APIs
                              • VariantInit.OLEAUT32(?), ref: 0047950F
                              • SysAllocString.OLEAUT32(00000000), ref: 004795D8
                              • VariantCopy.OLEAUT32(?,?), ref: 0047960F
                              • VariantClear.OLEAUT32(?), ref: 00479650
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: Variant$AllocClearCopyInitString
                              • String ID:
                              • API String ID: 2808897238-0
                              • Opcode ID: d4078b498bd58c38c4ff211c6799319bb2158b2b01decc8b4cd966ad5c1122ff
                              • Instruction ID: 372c40b5ecffa4d340e825e49f449287305c7189bb1404562c27c74c4f1437f4
                              • Opcode Fuzzy Hash: d4078b498bd58c38c4ff211c6799319bb2158b2b01decc8b4cd966ad5c1122ff
                              • Instruction Fuzzy Hash: 8251C436600209A6C700FF3AD8815DAB764EF84315F50863FFD0897252DB78DA1997EA
                              APIs
                              • SendMessageW.USER32(00000000,0000110A,00000004,?), ref: 00469990
                              • __itow.LIBCMT ref: 004699CD
                                • Part of subcall function 00461C4A: SendMessageW.USER32(?,0000113E,00000000,00000000), ref: 00461CC2
                              • SendMessageW.USER32(00000000,0000110A,00000001,?), ref: 00469A3D
                              • __itow.LIBCMT ref: 00469A97
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: MessageSend$__itow
                              • String ID:
                              • API String ID: 3379773720-0
                              • Opcode ID: f450223117ea95bfee34014d9d84978b58918b7dbb146b9b64e9adf8c20a5af9
                              • Instruction ID: c5a9f548720e127460bbd30f9c4a1142764b372a0404ca0a71d180b9b8c9b2b0
                              • Opcode Fuzzy Hash: f450223117ea95bfee34014d9d84978b58918b7dbb146b9b64e9adf8c20a5af9
                              • Instruction Fuzzy Hash: E8415671A002096BDB14EF95D981AEF77BC9F58314F00405EFA0567281E7789E46CBE9
                              APIs
                              • GetWindowRect.USER32(?,?), ref: 00449A4A
                              • ScreenToClient.USER32(?,?), ref: 00449A80
                              • MoveWindow.USER32(?,?,?,?,?,00000001), ref: 00449AEC
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: Window$ClientMoveRectScreen
                              • String ID:
                              • API String ID: 3880355969-0
                              • Opcode ID: d0f348dd6b8999688d199205b3412f9258e7834e979bdc0e5f61431c3cd0f715
                              • Instruction ID: 772f2e9a8c44c8b90650fefa000f178a1b73e5e444e4323f54854131c67d2362
                              • Opcode Fuzzy Hash: d0f348dd6b8999688d199205b3412f9258e7834e979bdc0e5f61431c3cd0f715
                              • Instruction Fuzzy Hash: 5A517C70A00249AFEB14CF68D8C1AAB77B6FF58314F10822EF91597390D774AD90DB98
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                              • String ID:
                              • API String ID: 2782032738-0
                              • Opcode ID: b31e9d6d4fc57bcba7966bec51b765adca5e1eea9d7940e8138ef5a4af09ff03
                              • Instruction ID: 72632960f292c6e9309c64fc9b7016af72cb639159fa0dd3c9cf05ee08d0b78d
                              • Opcode Fuzzy Hash: b31e9d6d4fc57bcba7966bec51b765adca5e1eea9d7940e8138ef5a4af09ff03
                              • Instruction Fuzzy Hash: CB41D531A00715ABDB248FA5C8486DFBBB5AFD0364F24856EF42597680D778DDC1CB48
                              APIs
                              • ClientToScreen.USER32(00000000,?), ref: 0044169A
                              • GetWindowRect.USER32(?,?), ref: 00441722
                              • PtInRect.USER32(?,?,?), ref: 00441734
                              • MessageBeep.USER32(00000000), ref: 004417AD
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: Rect$BeepClientMessageScreenWindow
                              • String ID:
                              • API String ID: 1352109105-0
                              • Opcode ID: efc75fb8ed246b6ad65f2e8b456486d9870e0f063911f7aa846460c85c9d1d50
                              • Instruction ID: 3e4d0a9d31bb6386801ef6381a7f0d6bf168684d8964ff5a195b0ca439f55e04
                              • Opcode Fuzzy Hash: efc75fb8ed246b6ad65f2e8b456486d9870e0f063911f7aa846460c85c9d1d50
                              • Instruction Fuzzy Hash: 5141A539A002049FE714DF54D884E6AB7B5FF95721F1482AED9158B360DB34AC81CB94
                              APIs
                              • CreateHardLinkW.KERNEL32(00000000,?,00000000,?,00000000), ref: 0045D248
                              • GetLastError.KERNEL32(?,00000000), ref: 0045D26C
                              • DeleteFileW.KERNEL32(00000000,?,?,00000000), ref: 0045D28C
                              • CreateHardLinkW.KERNEL32(00000000,?,00000000,00000000,00000000,?,00000000), ref: 0045D2AA
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: CreateHardLink$DeleteErrorFileLast
                              • String ID:
                              • API String ID: 3321077145-0
                              • Opcode ID: 49223ed515fb619a5bee3fab41eec0f0b951464039ac7af7222e30fa4423140a
                              • Instruction ID: 6818256dd78c2cb29ac0ce267de24fb792dca3a41353b59757f5ace631f71379
                              • Opcode Fuzzy Hash: 49223ed515fb619a5bee3fab41eec0f0b951464039ac7af7222e30fa4423140a
                              • Instruction Fuzzy Hash: DC318DB1A00201EBDB10EFB5C945A1ABBE8AF45319F10885EFC44AB343CB79ED45CB94
                              APIs
                              • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00420873
                              • __isleadbyte_l.LIBCMT ref: 004208A6
                              • MultiByteToWideChar.KERNEL32(BBDAE900,00000009,?,000001AC,00000000,00000000,?,?,?,0042D7C1,?,00000000), ref: 004208D7
                              • MultiByteToWideChar.KERNEL32(BBDAE900,00000009,?,00000001,00000000,00000000,?,?,?,0042D7C1,?,00000000), ref: 00420945
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                              • String ID:
                              • API String ID: 3058430110-0
                              • Opcode ID: 6122c04dd5dc57efc0e5b6c0779ec963bae9ccf891294cd495d8fd5d7cdcec1f
                              • Instruction ID: f6550d230e50e909e13d2a99824cc28569674f7a7b9e5ef0daa2e7ce22e82e6e
                              • Opcode Fuzzy Hash: 6122c04dd5dc57efc0e5b6c0779ec963bae9ccf891294cd495d8fd5d7cdcec1f
                              • Instruction Fuzzy Hash: D731E231B00265EFDB20EF65E884AAF3BE5BF00310F55496AE4658B292D734CD80DB98
                              APIs
                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00442AC9
                              • TranslateMessage.USER32(?), ref: 00442B01
                              • DispatchMessageW.USER32(?), ref: 00442B0B
                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00442B21
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: Message$Peek$DispatchTranslate
                              • String ID:
                              • API String ID: 1795658109-0
                              • Opcode ID: 36eab9d42bd73f6f728abf92f57c3db94032fb3fd80da71d70c6aa8f6f72699a
                              • Instruction ID: 5e5183f3b0572ad37d893cec5a7cf9421d6c1ddc4b80b1975d6d8daaa3c1acd1
                              • Opcode Fuzzy Hash: 36eab9d42bd73f6f728abf92f57c3db94032fb3fd80da71d70c6aa8f6f72699a
                              • Instruction Fuzzy Hash: 012126719583469AFB30DF649D85FB7BBA8CB24314F40407BF91097281EAB86848C769
                              APIs
                              • GetForegroundWindow.USER32(?,?,?), ref: 0047439C
                                • Part of subcall function 004439C1: GetWindowThreadProcessId.USER32(?,00000000), ref: 004439E4
                                • Part of subcall function 004439C1: GetCurrentThreadId.KERNEL32 ref: 004439EB
                                • Part of subcall function 004439C1: AttachThreadInput.USER32(00000000), ref: 004439F2
                              • GetCaretPos.USER32(?), ref: 004743B2
                              • ClientToScreen.USER32(00000000,?), ref: 004743E8
                              • GetForegroundWindow.USER32 ref: 004743EE
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                              • String ID:
                              • API String ID: 2759813231-0
                              • Opcode ID: f13b499454a1a1822ca13fc8ae6b328d463f7326d10c65fcbffa9176c03fd335
                              • Instruction ID: 29594bdffde582d62cf8cb535202cb0f6e37f5c0e74140e0e8dac686a3932322
                              • Opcode Fuzzy Hash: f13b499454a1a1822ca13fc8ae6b328d463f7326d10c65fcbffa9176c03fd335
                              • Instruction Fuzzy Hash: 2F21AC71A00305ABD710EF75CC86B9E77B9AF44708F14446EF644BB2C2DBF9A9408BA5
                              APIs
                                • Part of subcall function 00430626: _wcspbrk.LIBCMT ref: 00430636
                              • SendMessageW.USER32(?,00001002,00000000,?), ref: 00449477
                              • SendMessageW.USER32(?,00001060,00000000,00000004), ref: 00449507
                              • _wcslen.LIBCMT ref: 00449519
                              • _wcslen.LIBCMT ref: 00449526
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: MessageSend_wcslen$_wcspbrk
                              • String ID:
                              • API String ID: 2886238975-0
                              • Opcode ID: cda1f7e16000b3d6f1552df2769fac91363fb93f1f54a3f578086acf89ecf69d
                              • Instruction ID: 7d4d19c59aaf55394df3596c947b25f6969e765268ec3300c5285dc4bbf20b28
                              • Opcode Fuzzy Hash: cda1f7e16000b3d6f1552df2769fac91363fb93f1f54a3f578086acf89ecf69d
                              • Instruction Fuzzy Hash: F7213A76B00208A6E730DF55ED81BEFB368EBA0310F10416FFF0896240E6794D55C799
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: __setmode$DebugOutputString_fprintf
                              • String ID:
                              • API String ID: 1792727568-0
                              • Opcode ID: 01580405df331f4a09227751ba67227c0781ee584fffe640c61a9ab7dbe43ce0
                              • Instruction ID: 94d91137fd77379d51e6296772f15362c7f2cf1f8b16651245aa9cc134f84072
                              • Opcode Fuzzy Hash: 01580405df331f4a09227751ba67227c0781ee584fffe640c61a9ab7dbe43ce0
                              • Instruction Fuzzy Hash: 5411A1B2D0020477DB107BB69C469AF7B2C8B55728F04416EF91573243E97C6A4947AB
                              APIs
                                • Part of subcall function 0046F3C1: IsWindow.USER32(00000000), ref: 0046F3F1
                              • 73A345F0.USER32(?,000000EC,?,00000001), ref: 0047A2DF
                              • 73A359E0.USER32(?,000000EC,00000000,?,000000EC,?,00000001), ref: 0047A2FA
                              • 73A359E0.USER32(?,000000EC,00000000,?,000000EC,?,00000001), ref: 0047A312
                              • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002,?,000000EC,00000000,?,000000EC,?,00000001), ref: 0047A321
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: A359Window$A345AttributesLayered
                              • String ID:
                              • API String ID: 3217048194-0
                              • Opcode ID: 53dc7990cfeb01f65bcc542d15cac6368a2c86d5c8ae23ecc65d9f578e391a7a
                              • Instruction ID: 4b457c036b32d13d4d6aa44b7b333d7b15c6210fa1ac615a770d46c951a2b689
                              • Opcode Fuzzy Hash: 53dc7990cfeb01f65bcc542d15cac6368a2c86d5c8ae23ecc65d9f578e391a7a
                              • Instruction Fuzzy Hash: E321C3322045146BD310AB19EC45F9BB798EF81334F20862BF859E72D1C779A855C7AC
                              APIs
                                • Part of subcall function 00434C09: lstrlenW.KERNEL32(?), ref: 00434C1C
                                • Part of subcall function 00434C09: lstrcpyW.KERNEL32(00000000,?), ref: 00434C44
                                • Part of subcall function 00434C09: lstrcmpiW.KERNEL32(00000000,00000000), ref: 00434C78
                              • lstrlenW.KERNEL32(?), ref: 00434CF6
                                • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                              • lstrcpyW.KERNEL32(00000000,?), ref: 00434D1E
                              • lstrcmpiW.KERNEL32(00000002,cdecl), ref: 00434D64
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: lstrcmpilstrcpylstrlen$_malloc
                              • String ID: cdecl
                              • API String ID: 3850814276-3896280584
                              • Opcode ID: c1d0e3fd88ced86f6f3832065c3908be80ab03c979ff4d6bcf24e5a7885ffd19
                              • Instruction ID: b4b7f9d7485e9dcc41445171e378d0673d7e4b3d8a31a27b28546bfa00bfc119
                              • Opcode Fuzzy Hash: c1d0e3fd88ced86f6f3832065c3908be80ab03c979ff4d6bcf24e5a7885ffd19
                              • Instruction Fuzzy Hash: 1521D276200301ABD710AF25DC45AEBB3A9FF99354F10583FF90687250EB39E945C7A9
                              APIs
                                • Part of subcall function 0045F645: WideCharToMultiByte.KERNEL32(00000000,00000000,5004C483,D29EE858,00000000,00000000,00000000,00000000,?,?,?,00467B75,?,00473BB8,00473BB8,?), ref: 0045F661
                              • gethostbyname.WSOCK32(?,00000000,?,?), ref: 0046D42D
                              • WSAGetLastError.WSOCK32(00000000), ref: 0046D439
                              • _memmove.LIBCMT ref: 0046D475
                              • inet_ntoa.WSOCK32(?), ref: 0046D481
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: ByteCharErrorLastMultiWide_memmovegethostbynameinet_ntoa
                              • String ID:
                              • API String ID: 2502553879-0
                              • Opcode ID: c217391507a75a633327f3eae623a7fb2dd57c89b178c2547ebfa016f7fa05d4
                              • Instruction ID: 24c3f219ec43f49587972b4c28f02db1d16d05b11a5808876a7c02c26e676da9
                              • Opcode Fuzzy Hash: c217391507a75a633327f3eae623a7fb2dd57c89b178c2547ebfa016f7fa05d4
                              • Instruction Fuzzy Hash: A7216F769001046BC700FBA6DD85C9FB7BCEF48318B10486BFC01B7241DA39EE058BA5
                              APIs
                              • SendMessageW.USER32 ref: 00448C69
                              • 73A345F0.USER32(?,000000EC), ref: 00448C91
                              • SendMessageW.USER32(?,0000104C,00000000,?), ref: 00448CCA
                              • SendMessageW.USER32(?,0000102B,00000000,?), ref: 00448D13
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: MessageSend$A345
                              • String ID:
                              • API String ID: 2444598715-0
                              • Opcode ID: aa9ba785652a5e2d68973233cc9ee5be9ec2ae113b50a66827928a68bf1dc890
                              • Instruction ID: 9d65767971b32091eca868ce8e4b461936feaca2c152e776436a997c982fc1ac
                              • Opcode Fuzzy Hash: aa9ba785652a5e2d68973233cc9ee5be9ec2ae113b50a66827928a68bf1dc890
                              • Instruction Fuzzy Hash: 782186711193009BE3209F18DD88B9FB7E4FBD5325F140B1EF994962D0DBB58448C755
                              APIs
                              • select.WSOCK32(00000000,?,00000000,00000000,?), ref: 00458ABD
                              • __WSAFDIsSet.WSOCK32(00000000,00000001), ref: 00458ACF
                              • accept.WSOCK32(00000000,00000000,00000000), ref: 00458ADE
                              • WSAGetLastError.WSOCK32(00000000), ref: 00458B03
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: ErrorLastacceptselect
                              • String ID:
                              • API String ID: 385091864-0
                              • Opcode ID: feb2d603c895e760471213290e220df4c8c9e23c071c6cdae6f1f3a6ceb811dc
                              • Instruction ID: 6dce411450cb473f00463c700f03c36a20fe0f69cdcaeecb298670ce0bdbd9a3
                              • Opcode Fuzzy Hash: feb2d603c895e760471213290e220df4c8c9e23c071c6cdae6f1f3a6ceb811dc
                              • Instruction Fuzzy Hash: 032192716002049FD714EF69DD45BAAB7E8EB94310F10866EF988DB380DBB4A9808B94
                              APIs
                              • SendMessageW.USER32(?,000000B0,?,?), ref: 004368C2
                              • SendMessageW.USER32(?,000000C9,?,00000000), ref: 004368D5
                              • SendMessageW.USER32(?,000000C9,?,00000000), ref: 004368EC
                              • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00436904
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: MessageSend
                              • String ID:
                              • API String ID: 3850602802-0
                              • Opcode ID: 236e71af2ab5509716104e28957e7b962cfbcf4ba6a1ba9531cfd5eb7baefe48
                              • Instruction ID: 15055718653181d31d708d6839b45d2b231db9ad4f5f2f8f789da6f3b04ac486
                              • Opcode Fuzzy Hash: 236e71af2ab5509716104e28957e7b962cfbcf4ba6a1ba9531cfd5eb7baefe48
                              • Instruction Fuzzy Hash: A7111275640208BFDB10DF68DC85F9AB7E8EF98750F11815AFD48DB340D6B1A9418FA0
                              APIs
                              • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00400000,00000000), ref: 00430242
                              • GetStockObject.GDI32(00000011), ref: 00430258
                              • SendMessageW.USER32(00000000,00000030,00000000), ref: 00430262
                              • ShowWindow.USER32(00000000,00000000), ref: 0043027D
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: Window$CreateMessageObjectSendShowStock
                              • String ID:
                              • API String ID: 1358664141-0
                              • Opcode ID: ad6f98361a8c00dabf9f53bae98ff29a7c8ddeda354316ac2ad0817ad8c48d31
                              • Instruction ID: 87b955557270564ac2446a75def7de819d41fbc8528d619d8765837e6f615a12
                              • Opcode Fuzzy Hash: ad6f98361a8c00dabf9f53bae98ff29a7c8ddeda354316ac2ad0817ad8c48d31
                              • Instruction Fuzzy Hash: BD115172600504ABD755CF99DC59FDBB769AF8DB10F148319BA08932A0D774EC41CBA8
                              APIs
                              • GetCurrentThreadId.KERNEL32 ref: 00443CA6
                              • MessageBoxW.USER32(?,?,?,?), ref: 00443CDC
                              • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00443CF2
                              • CloseHandle.KERNEL32(00000000), ref: 00443CF9
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                              • String ID:
                              • API String ID: 2880819207-0
                              • Opcode ID: 229c650092e78496607f1920186e21dd31435e443465a7f1ce6d350790d3a3c2
                              • Instruction ID: e6f874550e00e623fb34483f391c95d80eb5f5bc6ce026338450b862d26ff76c
                              • Opcode Fuzzy Hash: 229c650092e78496607f1920186e21dd31435e443465a7f1ce6d350790d3a3c2
                              • Instruction Fuzzy Hash: 48112572804114ABD710CF68ED08ADF3FACDF99721F10026AFC0493381D6B09A1083E9
                              APIs
                              • GetWindowRect.USER32(?,?), ref: 00430BA2
                              • ScreenToClient.USER32(?,?), ref: 00430BC1
                              • ScreenToClient.USER32(?,?), ref: 00430BE2
                              • InvalidateRect.USER32(?,?,?,?,?), ref: 00430BFB
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: ClientRectScreen$InvalidateWindow
                              • String ID:
                              • API String ID: 357397906-0
                              • Opcode ID: ae0d0d06dcef6ed583fb9704f0ef5e529f18a40629d10526419e4a4e3dd97404
                              • Instruction ID: ace0395ef2957b48f9d17fb026497d1a369c9e3160b5fb36bd9a4683c33ce433
                              • Opcode Fuzzy Hash: ae0d0d06dcef6ed583fb9704f0ef5e529f18a40629d10526419e4a4e3dd97404
                              • Instruction Fuzzy Hash: 561174B9D00209AFCB14DF98C8849AEFBB9FF98310F10855EE855A3304D774AA41CFA0
                              APIs
                              • __wsplitpath.LIBCMT ref: 0043392E
                                • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
                              • __wsplitpath.LIBCMT ref: 00433950
                              • __wcsicoll.LIBCMT ref: 00433974
                              • __wcsicoll.LIBCMT ref: 0043398A
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: __wcsicoll__wsplitpath$__wsplitpath_helper
                              • String ID:
                              • API String ID: 1187119602-0
                              • Opcode ID: 68e3b32a9464b28f7030a0941ccdc911afb24839bc46986435f1213a6174ca5b
                              • Instruction ID: cee1712abd0eced5cc96ea34974ed2185298bb9760f8079e64959bf12be8e646
                              • Opcode Fuzzy Hash: 68e3b32a9464b28f7030a0941ccdc911afb24839bc46986435f1213a6174ca5b
                              • Instruction Fuzzy Hash: 650121B2C0011DAACB14DF95DC41DEEB37CAB48314F04869EA60956040EA759BD88FE4
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: _wcslen$_malloc_wcscat_wcscpy
                              • String ID:
                              • API String ID: 1597257046-0
                              • Opcode ID: 15947565afd9da0c51d6b39d986381e9b8142da2aa4972dda906e7c054fe1a7b
                              • Instruction ID: 3a313011a65081929a098f39c1c59cfda42f2cbb237f2651e2b7e76e77134880
                              • Opcode Fuzzy Hash: 15947565afd9da0c51d6b39d986381e9b8142da2aa4972dda906e7c054fe1a7b
                              • Instruction Fuzzy Hash: 40016271200604BFC714EB66D885EABF3EDEFC9354B00852EFA168B651DB39E841C764
                              APIs
                              • GetEnvironmentStringsW.KERNEL32(00000000,00416513), ref: 0041F587
                              • __malloc_crt.LIBCMT ref: 0041F5B6
                              • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0041F5C3
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: EnvironmentStrings$Free__malloc_crt
                              • String ID:
                              • API String ID: 237123855-0
                              • Opcode ID: 07fe547740a9b68c76983245d8bba65816afc234b1fe2171e551a8e4c438482c
                              • Instruction ID: d6a98a4ee5591e13f27bf8bfb2f7094eea62761642478a01f8f101a8eeefaa10
                              • Opcode Fuzzy Hash: 07fe547740a9b68c76983245d8bba65816afc234b1fe2171e551a8e4c438482c
                              • Instruction Fuzzy Hash: D1F08277505220BB8A25BF35BC458DB277ADAD536531A443BF407C3206F66C8ECB82B9
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: DeleteObject$CursorDestroy
                              • String ID:
                              • API String ID: 2592789088-0
                              • Opcode ID: 7c154be5abaa40db753a7e31a7690d619ba9064fd0fbdb090dba25900d6c1ce3
                              • Instruction ID: b40ecd1d224a0eee13877c21127d2214a34fa415f2bf64fab3c1d23e87691ec4
                              • Opcode Fuzzy Hash: 7c154be5abaa40db753a7e31a7690d619ba9064fd0fbdb090dba25900d6c1ce3
                              • Instruction Fuzzy Hash: 60F03C74200601DBC720EF66EDD892B77ACEF49762B00452AFD01D7256D738DC49CB69
                              APIs
                              • RtlEnterCriticalSection.KERNEL32(?), ref: 0044B5F5
                              • InterlockedExchange.KERNEL32(?,?), ref: 0044B603
                              • RtlLeaveCriticalSection.KERNEL32(?), ref: 0044B61A
                              • RtlLeaveCriticalSection.KERNEL32(?), ref: 0044B62C
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: CriticalSection$Leave$EnterExchangeInterlocked
                              • String ID:
                              • API String ID: 2223660684-0
                              • Opcode ID: f874c154f8023f3ba0c2945d1949571bb5db8163ed48ea6956c7f1527a392a8b
                              • Instruction ID: 403f3527bf09fa8cde02bf077099102ce48e3ba47acdf7e4c6f4aa39df9fcef1
                              • Opcode Fuzzy Hash: f874c154f8023f3ba0c2945d1949571bb5db8163ed48ea6956c7f1527a392a8b
                              • Instruction Fuzzy Hash: 78F05E36241104AF96145F59FD488EBB3ACEBE96317005A3FE5418361087A6E845CBB5
                              APIs
                                • Part of subcall function 0044719B: DeleteObject.GDI32(00000000), ref: 004471D8
                                • Part of subcall function 0044719B: ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
                                • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447228
                                • Part of subcall function 0044719B: BeginPath.GDI32(?), ref: 0044723D
                                • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447266
                              • MoveToEx.GDI32(?,?,?,00000000), ref: 00447317
                              • LineTo.GDI32(?,?,?), ref: 00447326
                              • EndPath.GDI32(?), ref: 00447336
                              • StrokePath.GDI32(?), ref: 00447344
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: ObjectPath$Select$BeginCreateDeleteLineMoveStroke
                              • String ID:
                              • API String ID: 2783949968-0
                              • Opcode ID: 4ed419099ee229fcfe9d8e0d6407f17218ff084d459cc4b150d2894610f6bb04
                              • Instruction ID: af9b10de2b5e1f20f757a647655db97b0f5a8bbb123370319d9b3a4020b10ea9
                              • Opcode Fuzzy Hash: 4ed419099ee229fcfe9d8e0d6407f17218ff084d459cc4b150d2894610f6bb04
                              • Instruction Fuzzy Hash: EBF06770105258BBE721AF54ED4EFAF3B9CAB06310F108119FE01622D1C7B86A02CBA9
                              APIs
                              • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00436489
                              • GetWindowThreadProcessId.USER32(?,00000000), ref: 0043649C
                              • GetCurrentThreadId.KERNEL32 ref: 004364A3
                              • AttachThreadInput.USER32(00000000), ref: 004364AA
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                              • String ID:
                              • API String ID: 2710830443-0
                              • Opcode ID: 1738b650cb43453f600e53b83a6833ccb1a076b1e6f33d9371cddf7c9876f8ab
                              • Instruction ID: 8dfc3faa83ebd232c18032ab1719f084f6ac8c8028b438e2b3a9de4cfe148046
                              • Opcode Fuzzy Hash: 1738b650cb43453f600e53b83a6833ccb1a076b1e6f33d9371cddf7c9876f8ab
                              • Instruction Fuzzy Hash: 61F06D7168470477EB209BA09D0EFDF379CAB18B11F10C41ABB04BA0C0C6F8B50087AD
                              APIs
                              • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00436C38
                              • 746E5030.USERENV(?,?,?,000000FF), ref: 00436C46
                              • CloseHandle.KERNEL32(?,?,000000FF), ref: 00436C56
                              • CloseHandle.KERNEL32(?,?,000000FF), ref: 00436C5B
                                • Part of subcall function 00436BA9: GetProcessHeap.KERNEL32(00000000,?), ref: 00436BB6
                                • Part of subcall function 00436BA9: HeapFree.KERNEL32(00000000), ref: 00436BBD
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: CloseHandleHeap$E5030FreeObjectProcessSingleWait
                              • String ID:
                              • API String ID: 2568816819-0
                              • Opcode ID: b977b2fe1054b7dcb1d3ac6099765c2a2cefd6419b68de81ef4d64d3a5db7b42
                              • Instruction ID: 8fc8aea04bb3fa9100768a89291620bc24087d812574934f99790ad9b639e1d9
                              • Opcode Fuzzy Hash: b977b2fe1054b7dcb1d3ac6099765c2a2cefd6419b68de81ef4d64d3a5db7b42
                              • Instruction Fuzzy Hash: D9E0C97A510215ABC720EBA6DC48C5BB7ACEF99330311892EFD9683750DA74F840CFA4
                              APIs
                              • GetDesktopWindow.USER32 ref: 00472B63
                              • 73A2A570.USER32(00000000), ref: 00472B6C
                              • 73A34620.GDI32(00000000,0000000C), ref: 00472B78
                              • 73A2A480.USER32(00000000,?), ref: 00472B99
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: A34620A480A570DesktopWindow
                              • String ID:
                              • API String ID: 657696092-0
                              • Opcode ID: 25b4e9c05087b9933bd86976477b7eaa0c4512bf79646aedece74daf711fda7f
                              • Instruction ID: 759e45c534ddacfdadb557a06d932f9b55f62470d77a370046d272fbe6975a9a
                              • Opcode Fuzzy Hash: 25b4e9c05087b9933bd86976477b7eaa0c4512bf79646aedece74daf711fda7f
                              • Instruction Fuzzy Hash: BFF03071900205AFDB00EFB5DA4DA5DB7F4FB44315B10887EFD05D7251EAB59900DB54
                              APIs
                              • GetDesktopWindow.USER32 ref: 00472BB2
                              • 73A2A570.USER32(00000000), ref: 00472BBB
                              • 73A34620.GDI32(00000000,00000074), ref: 00472BC7
                              • 73A2A480.USER32(00000000,?), ref: 00472BE8
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: A34620A480A570DesktopWindow
                              • String ID:
                              • API String ID: 657696092-0
                              • Opcode ID: cc3434de2b8b5abc20458b04240aea2a6e15dc869db4e5eb232345cc1bf11604
                              • Instruction ID: 439663e17c05eb9dd95bc161916493026628bcc8c78d0f5787bb5213a8e6c1b3
                              • Opcode Fuzzy Hash: cc3434de2b8b5abc20458b04240aea2a6e15dc869db4e5eb232345cc1bf11604
                              • Instruction Fuzzy Hash: FAF03075900205AFCB00EFB5DA8856DB7F4FB84315B10887EFD05D7250DB7999019B94
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: _strncmp
                              • String ID: Q\E
                              • API String ID: 909875538-2189900498
                              • Opcode ID: 065ac9b34865f8fc92d580161c5db786cff1d7033ea8ce1a4bef46ec8c054806
                              • Instruction ID: ec78d02982e52cebfc3c5ce94050df53d12509a5c8006a296af1ac46f88178f7
                              • Opcode Fuzzy Hash: 065ac9b34865f8fc92d580161c5db786cff1d7033ea8ce1a4bef46ec8c054806
                              • Instruction Fuzzy Hash: 34C1A070A04279ABDF318E58A4507ABBBB5AF59310FE441BFD8D493341D2784D8ACB89
                              APIs
                              • OleSetContainedObject.OLE32(00000000,00000001), ref: 00460F3E
                                • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                • Part of subcall function 00445660: OleSetContainedObject.OLE32(?,00000000), ref: 004456DD
                                • Part of subcall function 00451B42: GetLastError.KERNEL32(?,?,00000000), ref: 00451BA0
                                • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451BF8
                                • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451C0E
                                • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451C27
                                • Part of subcall function 00451B42: VariantClear.OLEAUT32(?), ref: 00451CA1
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: Variant$Copy$ContainedObject$ClearErrorLast_malloc
                              • String ID: AutoIt3GUI$Container
                              • API String ID: 2652923123-3941886329
                              • Opcode ID: 662e4c56437cfc6d97a34dfd7b47562ea5a254ee8eeedf1ae9933f7f1d1523bc
                              • Instruction ID: 68a0a4eee7c61d0b7a6187be62517e39d581686f9474de6139c94a20f06104f0
                              • Opcode Fuzzy Hash: 662e4c56437cfc6d97a34dfd7b47562ea5a254ee8eeedf1ae9933f7f1d1523bc
                              • Instruction Fuzzy Hash: 68A15D746006059FDB10DF69C881B6BB7E4FF88704F24896AEA09CB351EB75E841CB65
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: _memmove_strncmp
                              • String ID: U$\
                              • API String ID: 2666721431-100911408
                              • Opcode ID: a4fdddafd13fd2658ce45903ac35fff56edfd8920f85f030d52c4513684e2ed7
                              • Instruction ID: d3eef72359a6f1828d14317ef8b56b8bfbdd52bf5bc7584d89ae5f72f5b530e1
                              • Opcode Fuzzy Hash: a4fdddafd13fd2658ce45903ac35fff56edfd8920f85f030d52c4513684e2ed7
                              • Instruction Fuzzy Hash: 13718F70E00245CFEF24CFA9C9906AEFBF2AF99304F24826ED445A7345D778A946CB15
                              APIs
                                • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                                • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                              • __wcsnicmp.LIBCMT ref: 00467288
                              • WNetUseConnectionW.MPR(00000000,?,00000000,?,00000000,?,00000000,?), ref: 0046732E
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: Connection__wcsnicmp_wcscpy_wcslen
                              • String ID: LPT
                              • API String ID: 3035604524-1350329615
                              • Opcode ID: d6ee32a1e65a10be59cd2aee46927f2afb98f966929ec107a83db754813dcd00
                              • Instruction ID: cd88b7ab87c5f5a0ce5478f82160e7cdfa8c7cefd9f65e810a8a3337a25aa570
                              • Opcode Fuzzy Hash: d6ee32a1e65a10be59cd2aee46927f2afb98f966929ec107a83db754813dcd00
                              • Instruction Fuzzy Hash: FB51E675A04204ABDB10DF54CC81FAFB7B5AB84708F10855EF905AB381E778EE85CB99
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: _memmove
                              • String ID: \$h
                              • API String ID: 4104443479-677774858
                              • Opcode ID: a8076df7cf2e4be12816d18a067c44a6d5606508540493043604d0ea2b9ab827
                              • Instruction ID: de34c7bb2fe7d28e42aef252d9636822906cf09101983ade98a7172327fa6e04
                              • Opcode Fuzzy Hash: a8076df7cf2e4be12816d18a067c44a6d5606508540493043604d0ea2b9ab827
                              • Instruction Fuzzy Hash: F551A370E002098FDF18CFA9C980AAEB7F2BFC9304F28826AD405AB345D7389D45CB55
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: _memcmp
                              • String ID: &
                              • API String ID: 2931989736-1010288
                              • Opcode ID: a81d5415846f9cf6a42c700ef8b5aeadd08d018be41d214ef7d3fe054b701e0f
                              • Instruction ID: 5cd53615f07abd051f481cac668b43ae4088e938354b3ed51608dfeeaf990cc9
                              • Opcode Fuzzy Hash: a81d5415846f9cf6a42c700ef8b5aeadd08d018be41d214ef7d3fe054b701e0f
                              • Instruction Fuzzy Hash: EC517BB1A0011A9FDB18CF95D891ABFB7B5FF88300F14915AE815A7344D278AE42CBA4
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: _memmove
                              • String ID: \
                              • API String ID: 4104443479-2967466578
                              • Opcode ID: 59d63d8f709c00c8b633315d640480ed85dcad38184220530ca382b626518ab4
                              • Instruction ID: e0e732097d18f8f10327b86eac3a97b4532b2e4be511d275227a7a0ca48fbcca
                              • Opcode Fuzzy Hash: 59d63d8f709c00c8b633315d640480ed85dcad38184220530ca382b626518ab4
                              • Instruction Fuzzy Hash: 2451C570E002498FEF24CFA9C8902AEFBB2BF95314F28826BD45597385D7395D86CB45
                              APIs
                              • _wcslen.LIBCMT ref: 00466825
                              • InternetCrackUrlW.WININET(?,00000000,?), ref: 0046682F
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: CrackInternet_wcslen
                              • String ID: |
                              • API String ID: 596671847-2343686810
                              • Opcode ID: 629f28f3e202f2691df4b53306abf03f6cbb1f7e83fd6186c7c4399916927608
                              • Instruction ID: c4ea99685e293915e64884ba1c360efc28696701351dc191072b09a6dd262d67
                              • Opcode Fuzzy Hash: 629f28f3e202f2691df4b53306abf03f6cbb1f7e83fd6186c7c4399916927608
                              • Instruction Fuzzy Hash: B1415076E10209ABDB00EFA5D881BEEB7B8FF58314F00002AE604A7291D7757916CBE5
                              APIs
                              • SendMessageW.USER32(?,00001132,00000000,?), ref: 00448446
                              • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 0044845F
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: MessageSend
                              • String ID: '
                              • API String ID: 3850602802-1997036262
                              • Opcode ID: 21874a52306f08f821648492a7afc6200e27140433d35547b734f0a4523aa872
                              • Instruction ID: ddf1801fc3b7a37e921bcadc6f33ff454999d78e89978ed9e0859c1643e2593c
                              • Opcode Fuzzy Hash: 21874a52306f08f821648492a7afc6200e27140433d35547b734f0a4523aa872
                              • Instruction Fuzzy Hash: 46418E71A002099FDB04CF98D880AEEB7B5FF59300F14816EED04AB341DB756952CFA5
                              APIs
                              • _strlen.LIBCMT ref: 0040F858
                                • Part of subcall function 0040F880: _memmove.LIBCMT ref: 0040F8C9
                                • Part of subcall function 0040F880: _memmove.LIBCMT ref: 0040F8E3
                              • _sprintf.LIBCMT ref: 0040F9AE
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: _memmove$_sprintf_strlen
                              • String ID: %02X
                              • API String ID: 1921645428-436463671
                              • Opcode ID: 767cb60b44986bc828a60f9d0ec6f7d4d26665b5612a1b4657e1e4afb2f114d1
                              • Instruction ID: e5a937a20bc973e7022889ba35624413ac66f4a4f80aeb0e2d5e31f1d02bff57
                              • Opcode Fuzzy Hash: 767cb60b44986bc828a60f9d0ec6f7d4d26665b5612a1b4657e1e4afb2f114d1
                              • Instruction Fuzzy Hash: 3E21287270021436D724B66E8C82FDAB39CAF55744F50007FF501A76C1EABCBA1983AD
                              APIs
                              • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 0045109A
                              • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 004510A8
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: MessageSend
                              • String ID: Combobox
                              • API String ID: 3850602802-2096851135
                              • Opcode ID: 1b8a1482498e59a9e674e96fd5fabaeacd2ddbb1f8abcd0cc85bd7074ae773d5
                              • Instruction ID: 528d1b292af097fd122ed4be4541c74d7578eb88e117dd2fe935d7ad7cd5862b
                              • Opcode Fuzzy Hash: 1b8a1482498e59a9e674e96fd5fabaeacd2ddbb1f8abcd0cc85bd7074ae773d5
                              • Instruction Fuzzy Hash: 0A21A5716102096BEB10DE68DC85FDB3398EB59734F20431AFA24A72D1D3B9EC958768
                              APIs
                              • GetWindowTextLengthW.USER32(00000000), ref: 0045134A
                              • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 0045135A
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: LengthMessageSendTextWindow
                              • String ID: edit
                              • API String ID: 2978978980-2167791130
                              • Opcode ID: 458bf78cb5436efb918afa53a1743a3d6784074bbf07c1e17ba5dfdf6e920bd9
                              • Instruction ID: 5a0e340068a0ba28dc4d1c90c86d8b7761b767731f3a1bde811fb9e5560a91dc
                              • Opcode Fuzzy Hash: 458bf78cb5436efb918afa53a1743a3d6784074bbf07c1e17ba5dfdf6e920bd9
                              • Instruction Fuzzy Hash: BB2190761102056BEB108F68D894FEB33ADEB89339F10471AFD64D36E1C279DC458B68
                              APIs
                              • Sleep.KERNEL32(00000000), ref: 00476CB0
                              • GlobalMemoryStatusEx.KERNEL32 ref: 00476CC3
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: GlobalMemorySleepStatus
                              • String ID: @
                              • API String ID: 2783356886-2766056989
                              • Opcode ID: e336f3d3cf010bdb765bf3cd25e4316ec625df5f035adc8ff92848a8f4c166eb
                              • Instruction ID: 7847cb5f82098321599ebf91c79b9dffd15eff11c36c925ad8cec94a5f412430
                              • Opcode Fuzzy Hash: e336f3d3cf010bdb765bf3cd25e4316ec625df5f035adc8ff92848a8f4c166eb
                              • Instruction Fuzzy Hash: 67217130508F0497C211BF6AAC4AB5E7BB8AF84B15F01886DF9C8A14D1DF745528C76F
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: htonsinet_addr
                              • String ID: 255.255.255.255
                              • API String ID: 3832099526-2422070025
                              • Opcode ID: bffbf838f8b6926ef71edb3efae5563a838ccfa537518f0e0f8b175b1623bbd9
                              • Instruction ID: fb726eff09ff94cff080b531f734a3fd27281744828c6f3d0166551fa69e616e
                              • Opcode Fuzzy Hash: bffbf838f8b6926ef71edb3efae5563a838ccfa537518f0e0f8b175b1623bbd9
                              • Instruction Fuzzy Hash: 5211E732600304ABCF10DF69EC85FAA73A8EF45324F04455BF9049B392D635E4518B59
                              APIs
                              • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 004425F8
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: InternetOpen
                              • String ID: <local>
                              • API String ID: 2038078732-4266983199
                              • Opcode ID: 84bf365b150010c194f632228c20f1475d6fe654e04a12f862fc2198fde258ef
                              • Instruction ID: 93d8b03a482712ff69e4757b1f2b0d1c201104d099b6cd2898bf81ba059b6d15
                              • Opcode Fuzzy Hash: 84bf365b150010c194f632228c20f1475d6fe654e04a12f862fc2198fde258ef
                              • Instruction Fuzzy Hash: 9311C270680710BAF720CB548E62FBA77E8BB24B01F50844BF9429B6C0D6F4B944D7A9
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: __fread_nolock_memmove
                              • String ID: EA06
                              • API String ID: 1988441806-3962188686
                              • Opcode ID: e45c56eab20c3bcfe4a359df8a9ba3729120cfe0f4e9d091ae644268b7df8977
                              • Instruction ID: b3ef0f2836274d974f80c1c05754fec17bf4118f678989acdc9742ef3c25ced0
                              • Opcode Fuzzy Hash: e45c56eab20c3bcfe4a359df8a9ba3729120cfe0f4e9d091ae644268b7df8977
                              • Instruction Fuzzy Hash: 7D014971904228ABCF18DB99DC56EFEBBF49F55301F00859EF59793281D578A708CBA0
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: _memmove
                              • String ID: u,D
                              • API String ID: 4104443479-3858472334
                              • Opcode ID: a09dc1741948e98e7df597fac067bc9d4c41fa761799cf9fa5b02ea5b7d8fd51
                              • Instruction ID: 1e149f93898fe9afff494952afced4f728167d7c2cca3c00b97e401526751dc1
                              • Opcode Fuzzy Hash: a09dc1741948e98e7df597fac067bc9d4c41fa761799cf9fa5b02ea5b7d8fd51
                              • Instruction Fuzzy Hash: 4FF04C722007045AE3149E6ADC41FD7B7ECDBD8714F50442EF74997241E1B8A9858764
                              APIs
                              • _wcslen.LIBCMT ref: 00401B11
                                • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                              • _memmove.LIBCMT ref: 00401B57
                                • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                                • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                                • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: std::exception::exception$Exception@8Throw_malloc_memmove_wcslen
                              • String ID: @EXITCODE
                              • API String ID: 2734553683-3436989551
                              • Opcode ID: b6d17f11840b334af4eb2c0dc4703dd6ec7fe6b5974f9b569570c14fa5f7c58b
                              • Instruction ID: 16ac7666fc6b8d0cd4c8082de1062d74cbdf630d8e5b0a9ec9a55ac2b86b5c72
                              • Opcode Fuzzy Hash: b6d17f11840b334af4eb2c0dc4703dd6ec7fe6b5974f9b569570c14fa5f7c58b
                              • Instruction Fuzzy Hash: D5F0CDF2B00641AFD720DB36DC02B6775E49B84308F04883EA24BC6795FA7DE4828B14
                              APIs
                              • SendMessageW.USER32(?,00001001,00000000,?), ref: 004560FE
                                • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                              • wsprintfW.USER32 ref: 0045612A
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: MessageSend_mallocwsprintf
                              • String ID: %d/%02d/%02d
                              • API String ID: 1262938277-328681919
                              • Opcode ID: 0791508f4d5d4d8a4d88f52051df625728301e413c657ab928a68c4181838543
                              • Instruction ID: 953f6dd97ce98099cbba652085d0304866be84a46252058ffc4865c1a62d2123
                              • Opcode Fuzzy Hash: 0791508f4d5d4d8a4d88f52051df625728301e413c657ab928a68c4181838543
                              • Instruction Fuzzy Hash: 9DF0823274022866D7109BD9AD42FBEB3A8DB49762F00416BFE08E9180E6694854C3B9
                              APIs
                              • InternetCloseHandle.WININET(?), ref: 00442663
                              • InternetCloseHandle.WININET ref: 00442668
                                • Part of subcall function 004319AC: WaitForSingleObject.KERNEL32(aeB,?,?,00442688,aeB,00002710,?,?,00426561,?,?,0040F19D), ref: 004319BD
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: CloseHandleInternet$ObjectSingleWait
                              • String ID: aeB
                              • API String ID: 857135153-906807131
                              • Opcode ID: c8224cb77d174d98af0e1b6511dcd9cd22ae279780c4dc09588970c0e039578a
                              • Instruction ID: 0fa74210230a71b56b5a48e3a0e63043fcf8dca502afcbd281d0c2380f7acdeb
                              • Opcode Fuzzy Hash: c8224cb77d174d98af0e1b6511dcd9cd22ae279780c4dc09588970c0e039578a
                              • Instruction Fuzzy Hash: 46E0E67650071467D310AF9ADC00B4BF7DC9F95724F11482FEA4497650C6B5B4408BA4
                              APIs
                              • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00441BFE
                              • PostMessageW.USER32(00000000), ref: 00441C05
                                • Part of subcall function 004331A2: Sleep.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331B9
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: FindMessagePostSleepWindow
                              • String ID: Shell_TrayWnd
                              • API String ID: 529655941-2988720461
                              • Opcode ID: 45e518b183cc50fc9cae19d0f51122c68363ee0c98c893ad2541c3bd761d7025
                              • Instruction ID: aba4e04af0122a293c2d26b46e7c49f9db856b5fc79b6d6ac13cebee95b63d36
                              • Opcode Fuzzy Hash: 45e518b183cc50fc9cae19d0f51122c68363ee0c98c893ad2541c3bd761d7025
                              • Instruction Fuzzy Hash: EFD0A772BC13013BFA6077745D0FF8B66145B14711F000C3A7B42E61C1D4F8E4018758
                              APIs
                              • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00441C2A
                              • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00441C3D
                                • Part of subcall function 004331A2: Sleep.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331B9
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: FindMessagePostSleepWindow
                              • String ID: Shell_TrayWnd
                              • API String ID: 529655941-2988720461
                              • Opcode ID: 2c92ce268d6dea70ed1d9c93ac972332f86dd545b3a9023bb22b3be85c6f7e29
                              • Instruction ID: e91d5bd0f3095d95abf168919443ed1e5ef8457e9bc9ee6dadeb2d3358a759b2
                              • Opcode Fuzzy Hash: 2c92ce268d6dea70ed1d9c93ac972332f86dd545b3a9023bb22b3be85c6f7e29
                              • Instruction Fuzzy Hash: 61D0A772B843017BFA6077745D0FF8B66145B14711F000C3A7B46A61C1D4F8D4018758
                              APIs
                              • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 004370D1
                                • Part of subcall function 004118DA: _doexit.LIBCMT ref: 004118E6
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1347580565.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1347565883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347636488.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347660981.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347674247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347687603.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1347718128.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_2HCwqwLg1G.jbxd
                              Similarity
                              • API ID: Message_doexit
                              • String ID: AutoIt$Error allocating memory.
                              • API String ID: 1993061046-4017498283
                              • Opcode ID: a805162a0f5c9c87f8277766c6d2ca4cce7c6123580b1b409358537ccd51af94
                              • Instruction ID: aa36ec6b1cc278624b5c670a1a0522bf80bf1016c56dd6686bcadf549e8ac499
                              • Opcode Fuzzy Hash: a805162a0f5c9c87f8277766c6d2ca4cce7c6123580b1b409358537ccd51af94
                              • Instruction Fuzzy Hash: F1B092323C030627E50437910D0BF9D26003B64F02F220C067324280D204C90090131D