Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
ewYjhndHg2.exe

Overview

General Information

Sample name:ewYjhndHg2.exe
renamed because original name is a hash value
Original sample name:23699ad43e832923b83bc820adb52b17eb5bee5720129720d51a386fe9d59cac.exe
Analysis ID:1588614
MD5:85b9ba2dd4f28ba913277e6a47fdbda4
SHA1:ab40621227145b3e32043fdaf96218f2b3088915
SHA256:23699ad43e832923b83bc820adb52b17eb5bee5720129720d51a386fe9d59cac
Tags:AgentTeslaexeuser-adrian__luca
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
Yara detected AntiVM3
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Check if machine is in data center or colocation facility
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Machine Learning detection for sample
Maps a DLL or memory area into another process
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Yara detected Generic Downloader
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
May check the online IP address of the machine
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • ewYjhndHg2.exe (PID: 3716 cmdline: "C:\Users\user\Desktop\ewYjhndHg2.exe" MD5: 85B9BA2DD4F28BA913277E6A47FDBDA4)
    • RegSvcs.exe (PID: 6240 cmdline: "C:\Users\user\Desktop\ewYjhndHg2.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "FTP", "Host": "ftp://ftp.stingatoareincendii.ro", "Username": "mojooooofileeeee@stingatoareincendii.ro", "Password": "3.*RYhlG)lkA"}
SourceRuleDescriptionAuthorStrings
00000002.00000002.2666039852.0000000002CD5000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000002.00000002.2665049475.0000000000402000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000002.00000002.2665049475.0000000000402000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000000.00000002.1461042753.0000000003370000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          00000000.00000002.1461042753.0000000003370000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
            Click to see the 8 entries
            SourceRuleDescriptionAuthorStrings
            2.2.RegSvcs.exe.400000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              2.2.RegSvcs.exe.400000.0.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                2.2.RegSvcs.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                  2.2.RegSvcs.exe.400000.0.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
                  • 0x34441:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                  • 0x344b3:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
                  • 0x3453d:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
                  • 0x345cf:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                  • 0x34639:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                  • 0x346ab:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                  • 0x34741:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                  • 0x347d1:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                  2.2.RegSvcs.exe.400000.0.unpackMALWARE_Win_AgentTeslaV2AgenetTesla Type 2 Keylogger payloadditekSHen
                  • 0x315d3:$s2: GetPrivateProfileString
                  • 0x30ca1:$s3: get_OSFullName
                  • 0x322d3:$s5: remove_Key
                  • 0x324aa:$s5: remove_Key
                  • 0x333db:$s6: FtpWebRequest
                  • 0x34423:$s7: logins
                  • 0x34995:$s7: logins
                  • 0x376a6:$s7: logins
                  • 0x37758:$s7: logins
                  • 0x390ad:$s7: logins
                  • 0x382f2:$s9: 1.85 (Hash, version 2, native byte-order)
                  Click to see the 9 entries
                  No Sigma rule has matched
                  No Suricata rule has matched

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: 0.2.ewYjhndHg2.exe.3370000.1.raw.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "FTP", "Host": "ftp://ftp.stingatoareincendii.ro", "Username": "mojooooofileeeee@stingatoareincendii.ro", "Password": "3.*RYhlG)lkA"}
                  Source: ewYjhndHg2.exeReversingLabs: Detection: 73%
                  Source: ewYjhndHg2.exeVirustotal: Detection: 66%Perma Link
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                  Source: ewYjhndHg2.exeJoe Sandbox ML: detected
                  Source: ewYjhndHg2.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                  Source: Binary string: wntdll.pdbUGP source: ewYjhndHg2.exe, 00000000.00000003.1457336387.0000000003550000.00000004.00001000.00020000.00000000.sdmp, ewYjhndHg2.exe, 00000000.00000003.1456452739.00000000033B0000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: wntdll.pdb source: ewYjhndHg2.exe, 00000000.00000003.1457336387.0000000003550000.00000004.00001000.00020000.00000000.sdmp, ewYjhndHg2.exe, 00000000.00000003.1456452739.00000000033B0000.00000004.00001000.00020000.00000000.sdmp
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeCode function: 0_2_00A6445A GetFileAttributesW,FindFirstFileW,FindClose,0_2_00A6445A
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeCode function: 0_2_00A6C6D1 FindFirstFileW,FindClose,0_2_00A6C6D1
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeCode function: 0_2_00A6C75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_00A6C75C
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeCode function: 0_2_00A6EF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00A6EF95
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeCode function: 0_2_00A6F0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00A6F0F2
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeCode function: 0_2_00A6F3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00A6F3F3
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeCode function: 0_2_00A637EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00A637EF
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeCode function: 0_2_00A63B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00A63B12
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeCode function: 0_2_00A6BCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00A6BCBC

                  Networking

                  barindex
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.ewYjhndHg2.exe.3370000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.1461042753.0000000003370000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                  Source: Joe Sandbox ViewIP Address: 208.95.112.1 208.95.112.1
                  Source: unknownDNS query: name: ip-api.com
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeCode function: 0_2_00A722EE InternetReadFile,InternetQueryDataAvailable,InternetReadFile,0_2_00A722EE
                  Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                  Source: global trafficDNS traffic detected: DNS query: ip-api.com
                  Source: RegSvcs.exe, 00000002.00000002.2666039852.0000000002D62000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2666039852.0000000002CA1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2666039852.0000000002D7C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com
                  Source: ewYjhndHg2.exe, 00000000.00000002.1461042753.0000000003370000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2666039852.0000000002D62000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2666039852.0000000002CA1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2665049475.0000000000402000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://ip-api.com/line/?fields=hosting
                  Source: RegSvcs.exe, 00000002.00000002.2666039852.0000000002D62000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2666039852.0000000002CA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                  Source: ewYjhndHg2.exe, 00000000.00000002.1461042753.0000000003370000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2665049475.0000000000402000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://account.dyn.com/
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeCode function: 0_2_00A74164 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00A74164
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeCode function: 0_2_00A74164 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00A74164
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeCode function: 0_2_00A73F66 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00A73F66
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeCode function: 0_2_00A6001C GetKeyboardState,SetKeyboardState,GetAsyncKeyState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,0_2_00A6001C
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeCode function: 0_2_00A8CABC DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_00A8CABC

                  System Summary

                  barindex
                  Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 0.2.ewYjhndHg2.exe.3370000.1.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 0.2.ewYjhndHg2.exe.3370000.1.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 0.2.ewYjhndHg2.exe.3370000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 0.2.ewYjhndHg2.exe.3370000.1.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 00000000.00000002.1461042753.0000000003370000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 00000000.00000002.1461042753.0000000003370000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeCode function: This is a third-party compiled AutoIt script.0_2_00A03B3A
                  Source: ewYjhndHg2.exeString found in binary or memory: This is a third-party compiled AutoIt script.
                  Source: ewYjhndHg2.exe, 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_82086919-2
                  Source: ewYjhndHg2.exe, 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_6cecd845-3
                  Source: ewYjhndHg2.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_6f9305ee-9
                  Source: ewYjhndHg2.exeString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_a64f3e24-c
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeCode function: 0_2_00A6A1EF: GetFullPathNameW,__swprintf,CreateDirectoryW,CreateFileW,_memset,_wcsncpy,DeviceIoControl,CloseHandle,RemoveDirectoryW,CloseHandle,0_2_00A6A1EF
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeCode function: 0_2_00A58310 _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00A58310
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeCode function: 0_2_00A651BD ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_00A651BD
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeCode function: 0_2_00A0E6A00_2_00A0E6A0
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeCode function: 0_2_00A2D9750_2_00A2D975
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeCode function: 0_2_00A0FCE00_2_00A0FCE0
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeCode function: 0_2_00A221C50_2_00A221C5
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeCode function: 0_2_00A362D20_2_00A362D2
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeCode function: 0_2_00A803DA0_2_00A803DA
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeCode function: 0_2_00A3242E0_2_00A3242E
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeCode function: 0_2_00A225FA0_2_00A225FA
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeCode function: 0_2_00A166E10_2_00A166E1
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeCode function: 0_2_00A5E6160_2_00A5E616
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeCode function: 0_2_00A3878F0_2_00A3878F
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeCode function: 0_2_00A688890_2_00A68889
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeCode function: 0_2_00A188080_2_00A18808
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeCode function: 0_2_00A368440_2_00A36844
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeCode function: 0_2_00A808570_2_00A80857
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeCode function: 0_2_00A2CB210_2_00A2CB21
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeCode function: 0_2_00A36DB60_2_00A36DB6
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeCode function: 0_2_00A16F9E0_2_00A16F9E
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeCode function: 0_2_00A130300_2_00A13030
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeCode function: 0_2_00A231870_2_00A23187
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeCode function: 0_2_00A2F1D90_2_00A2F1D9
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeCode function: 0_2_00A012870_2_00A01287
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeCode function: 0_2_00A214840_2_00A21484
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeCode function: 0_2_00A155200_2_00A15520
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeCode function: 0_2_00A276960_2_00A27696
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeCode function: 0_2_00A157600_2_00A15760
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeCode function: 0_2_00A219780_2_00A21978
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeCode function: 0_2_00A39AB50_2_00A39AB5
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeCode function: 0_2_00A2BDA60_2_00A2BDA6
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeCode function: 0_2_00A21D900_2_00A21D90
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeCode function: 0_2_00A87DDB0_2_00A87DDB
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeCode function: 0_2_00A13FE00_2_00A13FE0
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeCode function: 0_2_00A0DF000_2_00A0DF00
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeCode function: 0_2_00CDE6600_2_00CDE660
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0115A6202_2_0115A620
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0115DA402_2_0115DA40
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_01154A802_2_01154A80
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_01159E602_2_01159E60
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_01153E682_2_01153E68
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_011541B02_2_011541B0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_065D24382_2_065D2438
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_065D12882_2_065D1288
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_065D3BD82_2_065D3BD8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_065D34F02_2_065D34F0
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeCode function: String function: 00A28900 appears 42 times
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeCode function: String function: 00A07DE1 appears 35 times
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeCode function: String function: 00A20AE3 appears 70 times
                  Source: ewYjhndHg2.exe, 00000000.00000003.1458323041.0000000003523000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs ewYjhndHg2.exe
                  Source: ewYjhndHg2.exe, 00000000.00000003.1458541326.00000000036CD000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs ewYjhndHg2.exe
                  Source: ewYjhndHg2.exe, 00000000.00000002.1461042753.0000000003370000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamee8300309-2878-4eb6-9fa4-d88c99cb9494.exe4 vs ewYjhndHg2.exe
                  Source: ewYjhndHg2.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                  Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 0.2.ewYjhndHg2.exe.3370000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 0.2.ewYjhndHg2.exe.3370000.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 0.2.ewYjhndHg2.exe.3370000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 0.2.ewYjhndHg2.exe.3370000.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 00000000.00000002.1461042753.0000000003370000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 00000000.00000002.1461042753.0000000003370000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/2@1/1
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeCode function: 0_2_00A6A06A GetLastError,FormatMessageW,0_2_00A6A06A
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeCode function: 0_2_00A581CB AdjustTokenPrivileges,CloseHandle,0_2_00A581CB
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeCode function: 0_2_00A587E1 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_00A587E1
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeCode function: 0_2_00A6B3FB SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_00A6B3FB
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeCode function: 0_2_00A7EE0D CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_00A7EE0D
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeCode function: 0_2_00A783BB CoInitialize,CoUninitialize,CoCreateInstance,IIDFromString,VariantInit,VariantClear,0_2_00A783BB
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeCode function: 0_2_00A04E89 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_00A04E89
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeFile created: C:\Users\user\AppData\Local\Temp\aut6BCF.tmpJump to behavior
                  Source: ewYjhndHg2.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: RegSvcs.exe, 00000002.00000002.2666039852.0000000002DAC000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2666039852.0000000002D9A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                  Source: ewYjhndHg2.exeReversingLabs: Detection: 73%
                  Source: ewYjhndHg2.exeVirustotal: Detection: 66%
                  Source: unknownProcess created: C:\Users\user\Desktop\ewYjhndHg2.exe "C:\Users\user\Desktop\ewYjhndHg2.exe"
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\ewYjhndHg2.exe"
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\ewYjhndHg2.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeSection loaded: wsock32.dllJump to behavior
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                  Source: ewYjhndHg2.exeStatic file information: File size 1088000 > 1048576
                  Source: ewYjhndHg2.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                  Source: ewYjhndHg2.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                  Source: ewYjhndHg2.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                  Source: ewYjhndHg2.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: ewYjhndHg2.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                  Source: ewYjhndHg2.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                  Source: ewYjhndHg2.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: Binary string: wntdll.pdbUGP source: ewYjhndHg2.exe, 00000000.00000003.1457336387.0000000003550000.00000004.00001000.00020000.00000000.sdmp, ewYjhndHg2.exe, 00000000.00000003.1456452739.00000000033B0000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: wntdll.pdb source: ewYjhndHg2.exe, 00000000.00000003.1457336387.0000000003550000.00000004.00001000.00020000.00000000.sdmp, ewYjhndHg2.exe, 00000000.00000003.1456452739.00000000033B0000.00000004.00001000.00020000.00000000.sdmp
                  Source: ewYjhndHg2.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                  Source: ewYjhndHg2.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                  Source: ewYjhndHg2.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                  Source: ewYjhndHg2.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                  Source: ewYjhndHg2.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeCode function: 0_2_00A04B37 LoadLibraryA,GetProcAddress,0_2_00A04B37
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeCode function: 0_2_00A28945 push ecx; ret 0_2_00A28958
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_065DCB60 push es; ret 2_2_065DCB70
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeCode function: 0_2_00A048D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00A048D7
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeCode function: 0_2_00A85376 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_00A85376
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeCode function: 0_2_00A23187 EncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00A23187
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: Yara matchFile source: Process Memory Space: ewYjhndHg2.exe PID: 3716, type: MEMORYSTR
                  Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeAPI/Special instruction interceptor: Address: CDE284
                  Source: ewYjhndHg2.exe, 00000000.00000002.1461042753.0000000003370000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2666039852.0000000002CD5000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2666039852.0000000002D7C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2665049475.0000000000402000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-106518
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeAPI coverage: 5.1 %
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeCode function: 0_2_00A6445A GetFileAttributesW,FindFirstFileW,FindClose,0_2_00A6445A
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeCode function: 0_2_00A6C6D1 FindFirstFileW,FindClose,0_2_00A6C6D1
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeCode function: 0_2_00A6C75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_00A6C75C
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeCode function: 0_2_00A6EF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00A6EF95
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeCode function: 0_2_00A6F0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00A6F0F2
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeCode function: 0_2_00A6F3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00A6F3F3
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeCode function: 0_2_00A637EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00A637EF
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeCode function: 0_2_00A63B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00A63B12
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeCode function: 0_2_00A6BCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00A6BCBC
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeCode function: 0_2_00A049A0 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00A049A0
                  Source: RegSvcs.exe, 00000002.00000002.2666039852.0000000002D7C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware
                  Source: RegSvcs.exe, 00000002.00000002.2665049475.0000000000402000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: vmware
                  Source: RegSvcs.exe, 00000002.00000002.2665049475.0000000000402000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: VMwareVBoxESelect * from Win32_ComputerSystem
                  Source: RegSvcs.exe, 00000002.00000002.2667634738.000000000603A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeAPI call chain: ExitProcess graph end nodegraph_0-104434

                  Anti Debugging

                  barindex
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_01157068 CheckRemoteDebuggerPresent,2_2_01157068
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess queried: DebugPortJump to behavior
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeCode function: 0_2_00A73F09 BlockInput,0_2_00A73F09
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeCode function: 0_2_00A03B3A GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00A03B3A
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeCode function: 0_2_00A35A7C EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_00A35A7C
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeCode function: 0_2_00A04B37 LoadLibraryA,GetProcAddress,0_2_00A04B37
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeCode function: 0_2_00CDE4F0 mov eax, dword ptr fs:[00000030h]0_2_00CDE4F0
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeCode function: 0_2_00CDE550 mov eax, dword ptr fs:[00000030h]0_2_00CDE550
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeCode function: 0_2_00CDCEB0 mov eax, dword ptr fs:[00000030h]0_2_00CDCEB0
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeCode function: 0_2_00A580A9 GetTokenInformation,GetLastError,GetProcessHeap,HeapAlloc,GetTokenInformation,0_2_00A580A9
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeCode function: 0_2_00A2A124 SetUnhandledExceptionFilter,0_2_00A2A124
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeCode function: 0_2_00A2A155 SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00A2A155
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: CFF008Jump to behavior
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeCode function: 0_2_00A587B1 LogonUserW,0_2_00A587B1
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeCode function: 0_2_00A03B3A GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00A03B3A
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeCode function: 0_2_00A048D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00A048D7
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeCode function: 0_2_00A64C27 mouse_event,0_2_00A64C27
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\ewYjhndHg2.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeCode function: 0_2_00A57CAF GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00A57CAF
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeCode function: 0_2_00A5874B AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_00A5874B
                  Source: ewYjhndHg2.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
                  Source: ewYjhndHg2.exeBinary or memory string: Shell_TrayWnd
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeCode function: 0_2_00A2862B cpuid 0_2_00A2862B
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeCode function: 0_2_00A34E87 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00A34E87
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeCode function: 0_2_00A41E06 GetUserNameW,0_2_00A41E06
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeCode function: 0_2_00A33F3A __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_00A33F3A
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeCode function: 0_2_00A049A0 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00A049A0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.ewYjhndHg2.exe.3370000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.ewYjhndHg2.exe.3370000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000002.00000002.2665049475.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1461042753.0000000003370000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: ewYjhndHg2.exe PID: 3716, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6240, type: MEMORYSTR
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                  Source: ewYjhndHg2.exeBinary or memory string: WIN_81
                  Source: ewYjhndHg2.exeBinary or memory string: WIN_XP
                  Source: ewYjhndHg2.exeBinary or memory string: WIN_XPe
                  Source: ewYjhndHg2.exeBinary or memory string: WIN_VISTA
                  Source: ewYjhndHg2.exeBinary or memory string: WIN_7
                  Source: ewYjhndHg2.exeBinary or memory string: WIN_8
                  Source: ewYjhndHg2.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 0USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.ewYjhndHg2.exe.3370000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.ewYjhndHg2.exe.3370000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000002.00000002.2666039852.0000000002CD5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.2665049475.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1461042753.0000000003370000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: ewYjhndHg2.exe PID: 3716, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6240, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.ewYjhndHg2.exe.3370000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.ewYjhndHg2.exe.3370000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000002.00000002.2665049475.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1461042753.0000000003370000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: ewYjhndHg2.exe PID: 3716, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6240, type: MEMORYSTR
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeCode function: 0_2_00A76283 socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,0_2_00A76283
                  Source: C:\Users\user\Desktop\ewYjhndHg2.exeCode function: 0_2_00A76747 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00A76747
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire Infrastructure2
                  Valid Accounts
                  221
                  Windows Management Instrumentation
                  1
                  DLL Side-Loading
                  1
                  Exploitation for Privilege Escalation
                  11
                  Disable or Modify Tools
                  1
                  OS Credential Dumping
                  2
                  System Time Discovery
                  Remote Services1
                  Archive Collected Data
                  2
                  Ingress Tool Transfer
                  Exfiltration Over Other Network Medium1
                  System Shutdown/Reboot
                  CredentialsDomainsDefault Accounts2
                  Native API
                  2
                  Valid Accounts
                  1
                  DLL Side-Loading
                  1
                  Deobfuscate/Decode Files or Information
                  21
                  Input Capture
                  1
                  Account Discovery
                  Remote Desktop Protocol1
                  Data from Local System
                  1
                  Encrypted Channel
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
                  Valid Accounts
                  2
                  Obfuscated Files or Information
                  Security Account Manager2
                  File and Directory Discovery
                  SMB/Windows Admin Shares1
                  Email Collection
                  2
                  Non-Application Layer Protocol
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
                  Access Token Manipulation
                  1
                  DLL Side-Loading
                  NTDS138
                  System Information Discovery
                  Distributed Component Object Model21
                  Input Capture
                  2
                  Application Layer Protocol
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
                  Process Injection
                  2
                  Valid Accounts
                  LSA Secrets651
                  Security Software Discovery
                  SSH3
                  Clipboard Data
                  Fallback ChannelsScheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts22
                  Virtualization/Sandbox Evasion
                  Cached Domain Credentials22
                  Virtualization/Sandbox Evasion
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items21
                  Access Token Manipulation
                  DCSync2
                  Process Discovery
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job212
                  Process Injection
                  Proc Filesystem1
                  Application Window Discovery
                  Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                  Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
                  System Owner/User Discovery
                  Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                  IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
                  System Network Configuration Discovery
                  Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  ewYjhndHg2.exe74%ReversingLabsWin32.Trojan.AutoitInject
                  ewYjhndHg2.exe67%VirustotalBrowse
                  ewYjhndHg2.exe100%Joe Sandbox ML
                  No Antivirus matches
                  No Antivirus matches
                  No Antivirus matches
                  No Antivirus matches
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  ip-api.com
                  208.95.112.1
                  truefalse
                    high
                    NameMaliciousAntivirus DetectionReputation
                    http://ip-api.com/line/?fields=hostingfalse
                      high
                      NameSourceMaliciousAntivirus DetectionReputation
                      https://account.dyn.com/ewYjhndHg2.exe, 00000000.00000002.1461042753.0000000003370000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2665049475.0000000000402000.00000040.80000000.00040000.00000000.sdmpfalse
                        high
                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegSvcs.exe, 00000002.00000002.2666039852.0000000002D62000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2666039852.0000000002CA1000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://ip-api.comRegSvcs.exe, 00000002.00000002.2666039852.0000000002D62000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2666039852.0000000002CA1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2666039852.0000000002D7C000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs
                            IPDomainCountryFlagASNASN NameMalicious
                            208.95.112.1
                            ip-api.comUnited States
                            53334TUT-ASUSfalse
                            Joe Sandbox version:42.0.0 Malachite
                            Analysis ID:1588614
                            Start date and time:2025-01-11 03:08:40 +01:00
                            Joe Sandbox product:CloudBasic
                            Overall analysis duration:0h 5m 52s
                            Hypervisor based Inspection enabled:false
                            Report type:full
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                            Number of analysed new started processes analysed:7
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Sample name:ewYjhndHg2.exe
                            renamed because original name is a hash value
                            Original Sample Name:23699ad43e832923b83bc820adb52b17eb5bee5720129720d51a386fe9d59cac.exe
                            Detection:MAL
                            Classification:mal100.troj.spyw.evad.winEXE@3/2@1/1
                            EGA Information:
                            • Successful, ratio: 100%
                            HCA Information:
                            • Successful, ratio: 100%
                            • Number of executed functions: 54
                            • Number of non-executed functions: 277
                            Cookbook Comments:
                            • Found application associated with file extension: .exe
                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                            • Excluded IPs from analysis (whitelisted): 20.109.210.53, 4.175.87.197
                            • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, fe3cr.delivery.mp.microsoft.com
                            • Not all processes where analyzed, report is missing behavior information
                            • Report size exceeded maximum capacity and may have missing disassembly code.
                            • Report size getting too big, too many NtQueryValueKey calls found.
                            No simulations
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            208.95.112.1uEuTtkxAqq.exeGet hashmaliciousAgentTeslaBrowse
                            • ip-api.com/line/?fields=hosting
                            0I9GLRSiy0.exeGet hashmaliciousAgentTeslaBrowse
                            • ip-api.com/line/?fields=hosting
                            NUGMrDcg4v.exeGet hashmaliciousAgentTeslaBrowse
                            • ip-api.com/line/?fields=hosting
                            LMxd0gpIxe.exeGet hashmaliciousAgentTeslaBrowse
                            • ip-api.com/line/?fields=hosting
                            rComprobante_swift_8676534657698632.exeGet hashmaliciousAgentTeslaBrowse
                            • ip-api.com/line/?fields=hosting
                            28uMwHvbTD.exeGet hashmaliciousAgentTeslaBrowse
                            • ip-api.com/line/?fields=hosting
                            e4Iw3lwFJ5.exeGet hashmaliciousAgentTeslaBrowse
                            • ip-api.com/line/?fields=hosting
                            uOCavrYu1y.exeGet hashmaliciousAgentTeslaBrowse
                            • ip-api.com/line/?fields=hosting
                            XoRPyi5s1i.exeGet hashmaliciousAgentTeslaBrowse
                            • ip-api.com/line/?fields=hosting
                            NX8j2O83Wu.exeGet hashmaliciousAgentTeslaBrowse
                            • ip-api.com/line/?fields=hosting
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            ip-api.comuEuTtkxAqq.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            0I9GLRSiy0.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            NUGMrDcg4v.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            LMxd0gpIxe.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            rComprobante_swift_8676534657698632.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            28uMwHvbTD.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            e4Iw3lwFJ5.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            uOCavrYu1y.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            XoRPyi5s1i.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            NX8j2O83Wu.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            TUT-ASUSuEuTtkxAqq.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            0I9GLRSiy0.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            NUGMrDcg4v.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            LMxd0gpIxe.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            rComprobante_swift_8676534657698632.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            28uMwHvbTD.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            e4Iw3lwFJ5.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            uOCavrYu1y.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            XoRPyi5s1i.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            NX8j2O83Wu.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            No context
                            No context
                            Process:C:\Users\user\Desktop\ewYjhndHg2.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):150952
                            Entropy (8bit):7.937797990144525
                            Encrypted:false
                            SSDEEP:3072:bBtBf0MaAVR3aubjdPkjX/i4e7Jp12HgZNWNNalysEBWR8FtwbWDl9mXV9dV:DMAPjbRcjXm9KA7nqK4G6DT2V9j
                            MD5:B2E25F46CB41C339AD073774BAC40D0E
                            SHA1:BE9AFEC414145727C2335FDB0E113545297A499C
                            SHA-256:8C72C3F9C7763CD82752C5497ECEB6287D5CF194A5128AE204EBBAE99215D52D
                            SHA-512:6E3F908C4CA72620C5AABDEC1C3302D96EB8DE761D9B02226F13E0A6F28528D089785E8325B3C35A395F4BB1241DD03D94B3B975D33E3B1647C002E7770B1FB3
                            Malicious:false
                            Reputation:low
                            Preview:EA06........)...6.Mj...U...Z..P.R..JeZ.U....l.#..@.J.s.O.xi....z.. ri,..%..fSy.V.3..s..i&...s.,.a.^cqY.Q3..).K..&l.*u25B.Ps.}....Z...J...,E..6..;.w...h. .#.K..!.j... ...P...&ua.M..p..P..^.JqQ.M...M..U..]....n*.8..";zm2!F....4Z.....#..@...#V.........5vs$.3$~.x.f>...........k5.I<....zX.....)..G.....E....O$.N..).4.".S*...#.F... 4......@..D.>."Pj.Jt..P.al.zD......p....Gu..m....l".W.d.[.'R.........G.P.sz.?a..V0..6_o.....zf*.e..5..'....g.).7i......-f.O.Yg..uK.....E.Mx.yf.l......l...N...~..t[U......[].u..:.76.O'Rk.J_3.H*?..2..2..yl.....Tg1.e.mX.^(.......Y.S.6w...L.3...a7..& ..@.0..n....~..R.....q...!....T....P..X..mf.......I.........{.>.....x.L.:a..D......'......AN.~'.h.'k.....X..j.U..kmB.J.Q..jUZ.o.B....R.J.T.5*-6.x.\......q..-.\wN...m-s.-(........n85.H...u.}^......z.m....U....s .S%..$..8.N.v8.V5...R.@..*.....]...Tv.N.W-=y.b.E.q..f..Q..U..:.A.Nh5....W.R/....OU..(.0D.o...*...aS...y..aQ..j.:...W.Ig...r.7.L.`.,..5.N)w.."iW...*............r.j...cWD.\
                            Process:C:\Users\user\Desktop\ewYjhndHg2.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):244224
                            Entropy (8bit):6.691330721634711
                            Encrypted:false
                            SSDEEP:6144:yoWjc7vFIRaZxm4OTVUBZw0ovC97DpCbC3Jk+dTHNiBVgv6DDHy4J:/IRCxmavystfTHNk2mG4J
                            MD5:5B570ADBC0DD00AF116DB47548B7E464
                            SHA1:DF95682BDFE128D7EF72BE8892F135F2770FE96D
                            SHA-256:E0146C37FDA68183D21752991FE744A4216EAFA53B242FF2BA96F5BA19F1B3C1
                            SHA-512:B345F78A7524187BE240E4E48598CE7F09394882874D77D300CCE916C17CC5DB2FBE01C73F99F70C737900E00490FE5880D7DCB37F1D5E65D6C453DE5B54B121
                            Malicious:false
                            Reputation:low
                            Preview:...R;AP6L5WN..CU.NUER8APvH5WNLVCUANUER8AP6H5WNLVCUANUER8AP6H.WNLX\.ON.L...Qz...&%%c%3!273Ua3W&[8:l4&u3;;e;Va.y..:!(3mXLDqER8AP6He.NL.BVA...78AP6H5WN.VATJO^ER.BP6@5WNLVC;.MUEr8AP.K5WN.VCuANUGR8EP6H5WNLRCUANUER8aT6H7WNLVCUCN..R8QP6X5WNLFCUQNUER8A@6H5WNLVCUANM.Q8.P6H5.ML.FUANUER8AP6H5WNLVCUANQE^8AP6H5WNLVCUANUER8AP6H5WNLVCUANUER8AP6H5WNLVCUANUER8aP6@5WNLVCUANUEZ.AP~H5WNLVCUANUk&]9$6H5#.OVCuANU.Q8AR6H5WNLVCUANUER.APVfG$</VCU.KUER.BP6N5WN.UCUANUER8AP6H5.NL.m'$":&R8MP6H5WJLVAUAN.FR8AP6H5WNLVCU.NU.R8AP6H5WNLVCUANU..;AP6H5.NLVAUDN..P8.e7H6WNLWCUGNUER8AP6H5WNLVCUANUER8AP6H5WNLVCUANUER8AP6H5WNLV^......-.BWP.j.$.B..V..8.yGtB.7B...X.....=3..L.Le..L...C.=R7M....m%YIO8e?.X/.K....hd&x..0&.-...=g. Sa.....n.....L!....&..3Y%.6><:&{./3$ Q.R.I5WNL........Q9.le6XPxD;....f*9....0LVC1ANU7R8A16H5.NLV,UAN;ER8?P6HKWNL.CUA.UER.AP6m5WN!VCUeNUE,8AP.5:X...*&.UER8Ae....#.....y....0.H.Wo...'....@..N8.?v....M.%..Ej*V..mPOJRFWFJVIo6....UJHSAREMYx\s...i.q.o..?...k;.JH5WNLV.UA.UER..P.H5W.L.C..NUE..A.6.5...V
                            File type:PE32 executable (GUI) Intel 80386, for MS Windows
                            Entropy (8bit):7.045686454020704
                            TrID:
                            • Win32 Executable (generic) a (10002005/4) 99.96%
                            • Generic Win/DOS Executable (2004/3) 0.02%
                            • DOS Executable Generic (2002/1) 0.02%
                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                            File name:ewYjhndHg2.exe
                            File size:1'088'000 bytes
                            MD5:85b9ba2dd4f28ba913277e6a47fdbda4
                            SHA1:ab40621227145b3e32043fdaf96218f2b3088915
                            SHA256:23699ad43e832923b83bc820adb52b17eb5bee5720129720d51a386fe9d59cac
                            SHA512:b323f172ea0d00bbc14efe67fbce98657ae6aef2c1cec15ad4afcaaffc0334a9ba46fc11457883ab616ccd88ce3f6450111eccab04c8adecf137ba50f3d372e2
                            SSDEEP:24576:Zu6J33O0c+JY5UZ+XC0kGso6Fa85Us7nYE71gaQLuWY:bu0c++OCvkGs9Fa82sTcpY
                            TLSH:3935BE2273DDC370CB669173BF29B7016EBF78614630B85B2F980D7DA950162262D7A3
                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......6...r}..r}..r}..4,".p}......s}.../..A}.../#..}.../".G}..{.@.{}..{.P.W}..r}..R.....)."}......s}.../..s}..r}T.s}......s}..Richr}.
                            Icon Hash:aaf3e3e3938382a0
                            Entrypoint:0x427dcd
                            Entrypoint Section:.text
                            Digitally signed:false
                            Imagebase:0x400000
                            Subsystem:windows gui
                            Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                            DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                            Time Stamp:0x67503BEE [Wed Dec 4 11:24:30 2024 UTC]
                            TLS Callbacks:
                            CLR (.Net) Version:
                            OS Version Major:5
                            OS Version Minor:1
                            File Version Major:5
                            File Version Minor:1
                            Subsystem Version Major:5
                            Subsystem Version Minor:1
                            Import Hash:afcdf79be1557326c854b6e20cb900a7
                            Instruction
                            call 00007F7B70D40ABAh
                            jmp 00007F7B70D33884h
                            int3
                            int3
                            int3
                            int3
                            int3
                            int3
                            int3
                            int3
                            int3
                            push edi
                            push esi
                            mov esi, dword ptr [esp+10h]
                            mov ecx, dword ptr [esp+14h]
                            mov edi, dword ptr [esp+0Ch]
                            mov eax, ecx
                            mov edx, ecx
                            add eax, esi
                            cmp edi, esi
                            jbe 00007F7B70D33A0Ah
                            cmp edi, eax
                            jc 00007F7B70D33D6Eh
                            bt dword ptr [004C31FCh], 01h
                            jnc 00007F7B70D33A09h
                            rep movsb
                            jmp 00007F7B70D33D1Ch
                            cmp ecx, 00000080h
                            jc 00007F7B70D33BD4h
                            mov eax, edi
                            xor eax, esi
                            test eax, 0000000Fh
                            jne 00007F7B70D33A10h
                            bt dword ptr [004BE324h], 01h
                            jc 00007F7B70D33EE0h
                            bt dword ptr [004C31FCh], 00000000h
                            jnc 00007F7B70D33BADh
                            test edi, 00000003h
                            jne 00007F7B70D33BBEh
                            test esi, 00000003h
                            jne 00007F7B70D33B9Dh
                            bt edi, 02h
                            jnc 00007F7B70D33A0Fh
                            mov eax, dword ptr [esi]
                            sub ecx, 04h
                            lea esi, dword ptr [esi+04h]
                            mov dword ptr [edi], eax
                            lea edi, dword ptr [edi+04h]
                            bt edi, 03h
                            jnc 00007F7B70D33A13h
                            movq xmm1, qword ptr [esi]
                            sub ecx, 08h
                            lea esi, dword ptr [esi+08h]
                            movq qword ptr [edi], xmm1
                            lea edi, dword ptr [edi+08h]
                            test esi, 00000007h
                            je 00007F7B70D33A65h
                            bt esi, 03h
                            jnc 00007F7B70D33AB8h
                            Programming Language:
                            • [ASM] VS2013 build 21005
                            • [ C ] VS2013 build 21005
                            • [C++] VS2013 build 21005
                            • [ C ] VS2008 SP1 build 30729
                            • [IMP] VS2008 SP1 build 30729
                            • [ASM] VS2013 UPD4 build 31101
                            • [RES] VS2013 build 21005
                            • [LNK] VS2013 UPD4 build 31101
                            NameVirtual AddressVirtual Size Is in Section
                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IMPORT0xba44c0x17c.rdata
                            IMAGE_DIRECTORY_ENTRY_RESOURCE0xc70000x411cc.rsrc
                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x1090000x711c.reloc
                            IMAGE_DIRECTORY_ENTRY_DEBUG0x92bc00x1c.rdata
                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xa48700x40.rdata
                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IAT0x8f0000x884.rdata
                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                            .text0x10000x8dcc40x8de00d28a820a1d9ff26cda02d12b888ba4b4False0.5728679102422908data6.676118058520316IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                            .rdata0x8f0000x2e10e0x2e20079b14b254506b0dbc8cd0ad67fb70ad9False0.33535526761517614OpenPGP Public Key5.76010872795207IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .data0xbe0000x8f740x52009f9d6f746f1a415a63de45f8b7983d33False0.1017530487804878data1.198745897703538IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            .rsrc0xc70000x411cc0x41200b35784b009fe7dca064196f130e522bbFalse0.8996858505278311data7.826924941322476IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .reloc0x1090000x711c0x72006fcae3cbbf6bfbabf5ec5bbe7cf612c3False0.7650767543859649data6.779031650454199IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                            NameRVASizeTypeLanguageCountryZLIB Complexity
                            RT_ICON0xc75a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                            RT_ICON0xc76d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                            RT_ICON0xc77f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                            RT_ICON0xc79200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                            RT_ICON0xc7c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                            RT_ICON0xc7d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                            RT_ICON0xc8bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                            RT_ICON0xc94800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                            RT_ICON0xc99e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                            RT_ICON0xcbf900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                            RT_ICON0xcd0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                            RT_MENU0xcd4a00x50dataEnglishGreat Britain0.9
                            RT_STRING0xcd4f00x594dataEnglishGreat Britain0.3333333333333333
                            RT_STRING0xcda840x68adataEnglishGreat Britain0.2747909199522103
                            RT_STRING0xce1100x490dataEnglishGreat Britain0.3715753424657534
                            RT_STRING0xce5a00x5fcdataEnglishGreat Britain0.3087467362924282
                            RT_STRING0xceb9c0x65cdataEnglishGreat Britain0.34336609336609336
                            RT_STRING0xcf1f80x466dataEnglishGreat Britain0.3605683836589698
                            RT_STRING0xcf6600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                            RT_RCDATA0xcf7b80x38493data1.0003513383388203
                            RT_GROUP_ICON0x107c4c0x76dataEnglishGreat Britain0.6610169491525424
                            RT_GROUP_ICON0x107cc40x14dataEnglishGreat Britain1.25
                            RT_GROUP_ICON0x107cd80x14dataEnglishGreat Britain1.15
                            RT_GROUP_ICON0x107cec0x14dataEnglishGreat Britain1.25
                            RT_VERSION0x107d000xdcdataEnglishGreat Britain0.6181818181818182
                            RT_MANIFEST0x107ddc0x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                            DLLImport
                            WSOCK32.dllWSACleanup, socket, inet_ntoa, setsockopt, ntohs, recvfrom, ioctlsocket, htons, WSAStartup, __WSAFDIsSet, select, accept, listen, bind, closesocket, WSAGetLastError, recv, sendto, send, inet_addr, gethostbyname, gethostname, connect
                            VERSION.dllGetFileVersionInfoW, GetFileVersionInfoSizeW, VerQueryValueW
                            WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                            COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                            MPR.dllWNetUseConnectionW, WNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W
                            WININET.dllInternetQueryDataAvailable, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetConnectW
                            PSAPI.DLLGetProcessMemoryInfo
                            IPHLPAPI.DLLIcmpCreateFile, IcmpCloseHandle, IcmpSendEcho
                            USERENV.dllDestroyEnvironmentBlock, UnloadUserProfile, CreateEnvironmentBlock, LoadUserProfileW
                            UxTheme.dllIsThemeActive
                            KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, SetCurrentDirectoryW, GetLongPathNameW, GetShortPathNameW, DeleteFileW, FindNextFileW, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, GetLocalTime, CompareStringW, GetCurrentProcess, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, LoadLibraryW, VirtualAlloc, IsDebuggerPresent, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, GetCurrentThread, CloseHandle, GetFullPathNameW, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetCommandLineW, IsProcessorFeaturePresent, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetStartupInfoW, GetStringTypeW, SetStdHandle, GetFileType, GetConsoleCP, GetConsoleMode, RtlUnwind, ReadConsoleW, GetTimeZoneInformation, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetEnvironmentStringsW, FreeEnvironmentStringsW, WriteConsoleW, FindClose, SetEnvironmentVariableA
                            USER32.dllAdjustWindowRectEx, CopyImage, SetWindowPos, GetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, SetRect, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, MonitorFromRect, keybd_event, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, DispatchMessageW, TranslateMessage, PeekMessageW, UnregisterHotKey, CheckMenuRadioItem, CharLowerBuffW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, SystemParametersInfoW, LoadImageW, GetClassNameW
                            GDI32.dllStrokePath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, GetDeviceCaps, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, LineTo, AngleArc, MoveToEx, Ellipse, DeleteDC, GetPixel, CreateDCW, GetStockObject, GetTextFaceW, CreateFontW, SetTextColor, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, StrokeAndFillPath
                            COMDLG32.dllGetOpenFileNameW, GetSaveFileNameW
                            ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, RegCreateKeyExW, FreeSid, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, AddAce, SetSecurityDescriptorDacl, GetUserNameW, InitiateSystemShutdownExW
                            SHELL32.dllDragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                            ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoSetProxyBlanket, CoCreateInstanceEx, CoInitializeSecurity
                            OLEAUT32.dllLoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, RegisterTypeLib, CreateStdDispatch, DispCallFunc, VariantChangeType, SysStringLen, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, VariantCopy, VariantClear, OleLoadPicture, QueryPathOfRegTypeLib, RegisterTypeLibForUser, UnRegisterTypeLibForUser, UnRegisterTypeLib, CreateDispTypeInfo, SysAllocString, VariantInit
                            Language of compilation systemCountry where language is spokenMap
                            EnglishGreat Britain
                            TimestampSource PortDest PortSource IPDest IP
                            Jan 11, 2025 03:09:46.223186970 CET4970880192.168.2.9208.95.112.1
                            Jan 11, 2025 03:09:46.419579029 CET8049708208.95.112.1192.168.2.9
                            Jan 11, 2025 03:09:46.419657946 CET4970880192.168.2.9208.95.112.1
                            Jan 11, 2025 03:09:46.480153084 CET4970880192.168.2.9208.95.112.1
                            Jan 11, 2025 03:09:46.487288952 CET8049708208.95.112.1192.168.2.9
                            Jan 11, 2025 03:09:46.903521061 CET8049708208.95.112.1192.168.2.9
                            Jan 11, 2025 03:09:46.947943926 CET4970880192.168.2.9208.95.112.1
                            Jan 11, 2025 03:10:29.034212112 CET8049708208.95.112.1192.168.2.9
                            Jan 11, 2025 03:10:29.034293890 CET4970880192.168.2.9208.95.112.1
                            Jan 11, 2025 03:11:26.918354988 CET4970880192.168.2.9208.95.112.1
                            Jan 11, 2025 03:11:26.923166037 CET8049708208.95.112.1192.168.2.9
                            TimestampSource PortDest PortSource IPDest IP
                            Jan 11, 2025 03:09:46.210097075 CET5847753192.168.2.91.1.1.1
                            Jan 11, 2025 03:09:46.217175007 CET53584771.1.1.1192.168.2.9
                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                            Jan 11, 2025 03:09:46.210097075 CET192.168.2.91.1.1.10xb0d4Standard query (0)ip-api.comA (IP address)IN (0x0001)false
                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                            Jan 11, 2025 03:09:46.217175007 CET1.1.1.1192.168.2.90xb0d4No error (0)ip-api.com208.95.112.1A (IP address)IN (0x0001)false
                            • ip-api.com
                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            0192.168.2.949708208.95.112.1806240C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 03:09:46.480153084 CET80OUTGET /line/?fields=hosting HTTP/1.1
                            Host: ip-api.com
                            Connection: Keep-Alive
                            Jan 11, 2025 03:09:46.903521061 CET175INHTTP/1.1 200 OK
                            Date: Sat, 11 Jan 2025 02:09:45 GMT
                            Content-Type: text/plain; charset=utf-8
                            Content-Length: 6
                            Access-Control-Allow-Origin: *
                            X-Ttl: 60
                            X-Rl: 44
                            Data Raw: 66 61 6c 73 65 0a
                            Data Ascii: false


                            Click to jump to process

                            Click to jump to process

                            Click to dive into process behavior distribution

                            Click to jump to process

                            Target ID:0
                            Start time:21:09:40
                            Start date:10/01/2025
                            Path:C:\Users\user\Desktop\ewYjhndHg2.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\Desktop\ewYjhndHg2.exe"
                            Imagebase:0xa00000
                            File size:1'088'000 bytes
                            MD5 hash:85B9BA2DD4F28BA913277E6A47FDBDA4
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1461042753.0000000003370000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: 00000000.00000002.1461042753.0000000003370000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.1461042753.0000000003370000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID, Description: Detects executables referencing Windows vault credential objects. Observed in infostealers, Source: 00000000.00000002.1461042753.0000000003370000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                            • Rule: MALWARE_Win_AgentTeslaV2, Description: AgenetTesla Type 2 Keylogger payload, Source: 00000000.00000002.1461042753.0000000003370000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                            Reputation:low
                            Has exited:true

                            Target ID:2
                            Start time:21:09:45
                            Start date:10/01/2025
                            Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\Desktop\ewYjhndHg2.exe"
                            Imagebase:0xa30000
                            File size:45'984 bytes
                            MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.2666039852.0000000002CD5000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.2665049475.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.2665049475.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                            Reputation:high
                            Has exited:false

                            Reset < >

                              Execution Graph

                              Execution Coverage:3.8%
                              Dynamic/Decrypted Code Coverage:0.4%
                              Signature Coverage:8.9%
                              Total number of Nodes:2000
                              Total number of Limit Nodes:53
                              execution_graph 104271 a03633 104272 a0366a 104271->104272 104273 a036e7 104272->104273 104274 a03688 104272->104274 104310 a036e5 104272->104310 104278 a036ed 104273->104278 104279 a3d0cc 104273->104279 104275 a03695 104274->104275 104276 a0374b PostQuitMessage 104274->104276 104281 a036a0 104275->104281 104282 a3d154 104275->104282 104303 a036d8 104276->104303 104277 a036ca DefWindowProcW 104277->104303 104283 a036f2 104278->104283 104284 a03715 SetTimer RegisterWindowMessageW 104278->104284 104326 a11070 10 API calls Mailbox 104279->104326 104286 a03755 104281->104286 104287 a036a8 104281->104287 104342 a62527 71 API calls _memset 104282->104342 104290 a036f9 KillTimer 104283->104290 104291 a3d06f 104283->104291 104288 a0373e CreatePopupMenu 104284->104288 104284->104303 104285 a3d0f3 104327 a11093 331 API calls Mailbox 104285->104327 104316 a044a0 104286->104316 104293 a036b3 104287->104293 104294 a3d139 104287->104294 104288->104303 104323 a0443a Shell_NotifyIconW _memset 104290->104323 104296 a3d074 104291->104296 104297 a3d0a8 MoveWindow 104291->104297 104300 a036be 104293->104300 104301 a3d124 104293->104301 104294->104277 104341 a57c36 59 API calls Mailbox 104294->104341 104304 a3d097 SetFocus 104296->104304 104305 a3d078 104296->104305 104297->104303 104299 a0370c 104324 a03114 DeleteObject DestroyWindow Mailbox 104299->104324 104300->104277 104328 a0443a Shell_NotifyIconW _memset 104300->104328 104340 a62d36 81 API calls _memset 104301->104340 104302 a3d166 104302->104277 104302->104303 104304->104303 104305->104300 104308 a3d081 104305->104308 104325 a11070 10 API calls Mailbox 104308->104325 104310->104277 104312 a3d134 104312->104303 104314 a3d118 104329 a0434a 104314->104329 104317 a044b7 _memset 104316->104317 104318 a04539 104316->104318 104343 a0407c 104317->104343 104318->104303 104320 a04522 KillTimer SetTimer 104320->104318 104321 a044de 104321->104320 104322 a3d4ab Shell_NotifyIconW 104321->104322 104322->104320 104323->104299 104324->104303 104325->104303 104326->104285 104327->104300 104328->104314 104330 a04375 _memset 104329->104330 104462 a04182 104330->104462 104333 a043fa 104335 a04430 Shell_NotifyIconW 104333->104335 104336 a04414 Shell_NotifyIconW 104333->104336 104337 a04422 104335->104337 104336->104337 104338 a0407c 61 API calls 104337->104338 104339 a04429 104338->104339 104339->104310 104340->104312 104341->104310 104342->104302 104344 a04098 104343->104344 104345 a0416f Mailbox 104343->104345 104365 a07a16 104344->104365 104345->104321 104348 a040b3 104370 a07bcc 104348->104370 104349 a3d3c8 LoadStringW 104352 a3d3e2 104349->104352 104351 a040c8 104351->104352 104353 a040d9 104351->104353 104354 a07b2e 59 API calls 104352->104354 104355 a040e3 104353->104355 104356 a04174 104353->104356 104359 a3d3ec 104354->104359 104379 a07b2e 104355->104379 104388 a08047 104356->104388 104362 a040ed _memset _wcscpy 104359->104362 104392 a07cab 104359->104392 104361 a3d40e 104364 a07cab 59 API calls 104361->104364 104363 a04155 Shell_NotifyIconW 104362->104363 104363->104345 104364->104362 104399 a20db6 104365->104399 104367 a07a3b 104409 a08029 104367->104409 104371 a07c45 104370->104371 104372 a07bd8 __NMSG_WRITE 104370->104372 104441 a07d2c 104371->104441 104374 a07c13 104372->104374 104375 a07bee 104372->104375 104376 a08029 59 API calls 104374->104376 104440 a07f27 59 API calls Mailbox 104375->104440 104378 a07bf6 _memmove 104376->104378 104378->104351 104380 a07b40 104379->104380 104381 a3ec6b 104379->104381 104449 a07a51 104380->104449 104455 a57bdb 59 API calls _memmove 104381->104455 104384 a07b4c 104384->104362 104385 a3ec75 104386 a08047 59 API calls 104385->104386 104387 a3ec7d Mailbox 104386->104387 104389 a08052 104388->104389 104390 a0805a 104388->104390 104456 a07f77 59 API calls 2 library calls 104389->104456 104390->104362 104393 a3ed4a 104392->104393 104394 a07cbf 104392->104394 104395 a08029 59 API calls 104393->104395 104457 a07c50 104394->104457 104398 a3ed55 __NMSG_WRITE _memmove 104395->104398 104397 a07cca 104397->104361 104402 a20dbe 104399->104402 104401 a20dd8 104401->104367 104402->104401 104404 a20ddc std::exception::exception 104402->104404 104412 a2571c 104402->104412 104429 a233a1 DecodePointer 104402->104429 104430 a2859b RaiseException 104404->104430 104406 a20e06 104431 a284d1 58 API calls _free 104406->104431 104408 a20e18 104408->104367 104410 a20db6 Mailbox 59 API calls 104409->104410 104411 a040a6 104410->104411 104411->104348 104411->104349 104413 a25797 104412->104413 104424 a25728 104412->104424 104438 a233a1 DecodePointer 104413->104438 104415 a2579d 104439 a28b28 58 API calls __getptd_noexit 104415->104439 104418 a2575b RtlAllocateHeap 104418->104424 104428 a2578f 104418->104428 104420 a25783 104436 a28b28 58 API calls __getptd_noexit 104420->104436 104424->104418 104424->104420 104425 a25781 104424->104425 104426 a25733 104424->104426 104435 a233a1 DecodePointer 104424->104435 104437 a28b28 58 API calls __getptd_noexit 104425->104437 104426->104424 104432 a2a16b 58 API calls __NMSG_WRITE 104426->104432 104433 a2a1c8 58 API calls 5 library calls 104426->104433 104434 a2309f GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 104426->104434 104428->104402 104429->104402 104430->104406 104431->104408 104432->104426 104433->104426 104435->104424 104436->104425 104437->104428 104438->104415 104439->104428 104440->104378 104442 a07d43 _memmove 104441->104442 104443 a07d3a 104441->104443 104442->104378 104443->104442 104445 a07e4f 104443->104445 104446 a07e62 104445->104446 104448 a07e5f _memmove 104445->104448 104447 a20db6 Mailbox 59 API calls 104446->104447 104447->104448 104448->104442 104450 a07a5f 104449->104450 104454 a07a85 _memmove 104449->104454 104451 a20db6 Mailbox 59 API calls 104450->104451 104450->104454 104452 a07ad4 104451->104452 104453 a20db6 Mailbox 59 API calls 104452->104453 104453->104454 104454->104384 104455->104385 104456->104390 104458 a07c5f __NMSG_WRITE 104457->104458 104459 a08029 59 API calls 104458->104459 104460 a07c70 _memmove 104458->104460 104461 a3ed07 _memmove 104459->104461 104460->104397 104463 a3d423 104462->104463 104464 a04196 104462->104464 104463->104464 104465 a3d42c DestroyIcon 104463->104465 104464->104333 104466 a62f94 62 API calls _W_store_winword 104464->104466 104465->104464 104466->104333 104467 a3fe27 104480 a1f944 104467->104480 104469 a3fe3d 104470 a3fe53 104469->104470 104471 a3febe 104469->104471 104569 a09e5d 60 API calls 104470->104569 104489 a0fce0 104471->104489 104473 a3fe92 104475 a4089c 104473->104475 104476 a3fe9a 104473->104476 104571 a69e4a 89 API calls 4 library calls 104475->104571 104570 a6834f 59 API calls Mailbox 104476->104570 104479 a3feb2 Mailbox 104481 a1f950 104480->104481 104482 a1f962 104480->104482 104572 a09d3c 104481->104572 104484 a1f991 104482->104484 104485 a1f968 104482->104485 104487 a09d3c 60 API calls 104484->104487 104486 a20db6 Mailbox 59 API calls 104485->104486 104488 a1f95a 104486->104488 104487->104488 104488->104469 104587 a08180 104489->104587 104491 a0fd3d 104492 a4472d 104491->104492 104538 a106f6 104491->104538 104592 a0f234 104491->104592 104723 a69e4a 89 API calls 4 library calls 104492->104723 104496 a44742 104497 a4488d 104497->104496 104500 a0fe4c 104497->104500 104729 a7a2d9 85 API calls Mailbox 104497->104729 104498 a0fe3e 104498->104497 104498->104500 104727 a566ec 59 API calls 2 library calls 104498->104727 104499 a10517 104507 a20db6 Mailbox 59 API calls 104499->104507 104509 a448f9 104500->104509 104555 a44b53 104500->104555 104596 a0837c 104500->104596 104501 a447d7 104501->104496 104725 a69e4a 89 API calls 4 library calls 104501->104725 104504 a20db6 59 API calls Mailbox 104530 a0fdd3 104504->104530 104514 a10545 _memmove 104507->104514 104508 a44848 104728 a560ef 59 API calls 2 library calls 104508->104728 104515 a44917 104509->104515 104731 a085c0 104509->104731 104512 a44755 104512->104501 104724 a0f6a3 331 API calls 104512->104724 104526 a20db6 Mailbox 59 API calls 104514->104526 104522 a44928 104515->104522 104523 a085c0 59 API calls 104515->104523 104516 a0fea4 104524 a44ad6 104516->104524 104525 a0ff32 104516->104525 104561 a10179 Mailbox _memmove 104516->104561 104517 a4486b 104520 a09ea0 331 API calls 104517->104520 104518 a448b2 Mailbox 104518->104500 104730 a566ec 59 API calls 2 library calls 104518->104730 104520->104497 104522->104561 104739 a560ab 59 API calls Mailbox 104522->104739 104523->104522 104747 a69ae7 60 API calls 104524->104747 104529 a20db6 Mailbox 59 API calls 104525->104529 104567 a10106 _memmove 104526->104567 104532 a0ff39 104529->104532 104530->104496 104530->104498 104530->104499 104530->104504 104530->104512 104530->104514 104542 a4480c 104530->104542 104693 a09ea0 104530->104693 104532->104538 104603 a109d0 104532->104603 104534 a44a4d 104535 a09ea0 331 API calls 104534->104535 104537 a44a87 104535->104537 104537->104496 104742 a084c0 104537->104742 104722 a69e4a 89 API calls 4 library calls 104538->104722 104540 a0ffb2 104540->104514 104540->104538 104547 a0ffe6 104540->104547 104726 a69e4a 89 API calls 4 library calls 104542->104726 104546 a44ab2 104746 a69e4a 89 API calls 4 library calls 104546->104746 104552 a08047 59 API calls 104547->104552 104553 a10007 104547->104553 104550 a09d3c 60 API calls 104550->104561 104551 a20db6 59 API calls Mailbox 104551->104561 104552->104553 104553->104538 104556 a44b24 104553->104556 104558 a1004c 104553->104558 104554 a10398 104554->104479 104555->104496 104748 a69e4a 89 API calls 4 library calls 104555->104748 104557 a09d3c 60 API calls 104556->104557 104557->104555 104558->104538 104558->104555 104559 a100d8 104558->104559 104560 a09d3c 60 API calls 104559->104560 104563 a100eb 104560->104563 104561->104534 104561->104538 104561->104546 104561->104550 104561->104551 104561->104554 104562 a44a1c 104561->104562 104691 a08740 68 API calls __cinit 104561->104691 104692 a08660 68 API calls 104561->104692 104740 a65937 68 API calls 104561->104740 104741 a089b3 69 API calls Mailbox 104561->104741 104565 a20db6 Mailbox 59 API calls 104562->104565 104563->104538 104680 a082df 104563->104680 104565->104534 104567->104561 104568 a10162 104567->104568 104717 a09c90 104567->104717 104568->104479 104569->104473 104570->104479 104571->104479 104573 a09d4a 104572->104573 104583 a09d78 Mailbox 104572->104583 104574 a09d9d 104573->104574 104577 a09d50 Mailbox 104573->104577 104575 a08047 59 API calls 104574->104575 104575->104583 104576 a09d64 104578 a09dcc 104576->104578 104579 a09d6f 104576->104579 104576->104583 104577->104576 104580 a3fa0f 104577->104580 104578->104583 104585 a08cd4 59 API calls Mailbox 104578->104585 104581 a3f9e6 VariantClear 104579->104581 104579->104583 104580->104583 104586 a56e8f 59 API calls 104580->104586 104581->104583 104583->104488 104585->104583 104586->104583 104588 a0818f 104587->104588 104591 a081aa 104587->104591 104589 a07e4f 59 API calls 104588->104589 104590 a08197 CharUpperBuffW 104589->104590 104590->104591 104591->104491 104593 a0f251 104592->104593 104594 a0f272 104593->104594 104749 a69e4a 89 API calls 4 library calls 104593->104749 104594->104530 104597 a0838d 104596->104597 104598 a3edbd 104596->104598 104599 a20db6 Mailbox 59 API calls 104597->104599 104601 a08394 104599->104601 104600 a083b5 104600->104509 104600->104516 104601->104600 104750 a08634 59 API calls Mailbox 104601->104750 104604 a44cc3 104603->104604 104618 a109f5 104603->104618 104816 a69e4a 89 API calls 4 library calls 104604->104816 104606 a10cfa 104606->104540 104609 a10ee4 104609->104606 104611 a10ef1 104609->104611 104610 a10a4b PeekMessageW 104679 a10a05 Mailbox 104610->104679 104814 a11093 331 API calls Mailbox 104611->104814 104613 a10ef8 LockWindowUpdate DestroyWindow GetMessageW 104613->104606 104616 a10f2a 104613->104616 104615 a44e81 Sleep 104615->104679 104619 a45c58 TranslateMessage DispatchMessageW GetMessageW 104616->104619 104617 a10ce4 104617->104606 104813 a11070 10 API calls Mailbox 104617->104813 104618->104679 104817 a09e5d 60 API calls 104618->104817 104818 a56349 331 API calls 104618->104818 104619->104619 104621 a45c88 104619->104621 104621->104606 104622 a44d50 TranslateAcceleratorW 104624 a10e43 PeekMessageW 104622->104624 104622->104679 104623 a09e5d 60 API calls 104623->104679 104624->104679 104625 a10ea5 TranslateMessage DispatchMessageW 104625->104624 104626 a4581f WaitForSingleObject 104630 a4583c GetExitCodeProcess CloseHandle 104626->104630 104626->104679 104628 a20db6 59 API calls Mailbox 104628->104679 104629 a10d13 timeGetTime 104629->104679 104662 a10f95 104630->104662 104631 a10e5f Sleep 104663 a10e70 Mailbox 104631->104663 104632 a08047 59 API calls 104632->104679 104634 a45af8 Sleep 104634->104663 104636 a2049f timeGetTime 104636->104663 104638 a10f4e timeGetTime 104815 a09e5d 60 API calls 104638->104815 104641 a45b8f GetExitCodeProcess 104644 a45ba5 WaitForSingleObject 104641->104644 104645 a45bbb CloseHandle 104641->104645 104643 a0b7dd 109 API calls 104643->104663 104644->104645 104644->104679 104645->104663 104648 a85f25 110 API calls 104648->104663 104649 a45874 104649->104662 104650 a45078 Sleep 104650->104679 104651 a45c17 Sleep 104651->104679 104659 a0fce0 304 API calls 104659->104679 104662->104540 104663->104636 104663->104641 104663->104643 104663->104648 104663->104649 104663->104650 104663->104651 104663->104662 104663->104679 104842 a07667 104663->104842 104847 a62408 60 API calls 104663->104847 104848 a09e5d 60 API calls 104663->104848 104849 a07de1 104663->104849 104853 a089b3 69 API calls Mailbox 104663->104853 104854 a0b73c 331 API calls 104663->104854 104855 a564da 60 API calls 104663->104855 104856 a65244 QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 104663->104856 104857 a63c55 66 API calls Mailbox 104663->104857 104664 a69e4a 89 API calls 104664->104679 104666 a084c0 69 API calls 104666->104679 104667 a09c90 59 API calls Mailbox 104667->104679 104668 a09ea0 304 API calls 104668->104679 104669 a0b73c 304 API calls 104669->104679 104670 a082df 59 API calls 104670->104679 104671 a5617e 59 API calls Mailbox 104671->104679 104672 a089b3 69 API calls 104672->104679 104673 a455d5 VariantClear 104673->104679 104674 a56e8f 59 API calls 104674->104679 104675 a4566b VariantClear 104675->104679 104676 a08cd4 59 API calls Mailbox 104676->104679 104677 a45419 VariantClear 104677->104679 104678 a07de1 59 API calls 104678->104679 104679->104610 104679->104615 104679->104617 104679->104622 104679->104623 104679->104624 104679->104625 104679->104626 104679->104628 104679->104629 104679->104631 104679->104632 104679->104634 104679->104638 104679->104659 104679->104662 104679->104663 104679->104664 104679->104666 104679->104667 104679->104668 104679->104669 104679->104670 104679->104671 104679->104672 104679->104673 104679->104674 104679->104675 104679->104676 104679->104677 104679->104678 104751 a0e420 104679->104751 104758 a0e6a0 104679->104758 104789 a0f460 104679->104789 104808 a031ce 104679->104808 104819 a86018 59 API calls 104679->104819 104820 a69a15 59 API calls Mailbox 104679->104820 104821 a5d4f2 59 API calls 104679->104821 104822 a09837 104679->104822 104840 a560ef 59 API calls 2 library calls 104679->104840 104841 a08401 59 API calls 104679->104841 104681 a3eda1 104680->104681 104682 a082f2 104680->104682 104683 a3edb1 104681->104683 106058 a561a4 59 API calls 104681->106058 104684 a08339 Mailbox 104682->104684 104686 a0831c 104682->104686 104687 a085c0 59 API calls 104682->104687 104684->104567 104688 a08322 104686->104688 104689 a085c0 59 API calls 104686->104689 104687->104686 104688->104684 104690 a09c90 Mailbox 59 API calls 104688->104690 104689->104688 104690->104684 104691->104561 104692->104561 104694 a09ebf 104693->104694 104712 a09eed Mailbox 104693->104712 104695 a20db6 Mailbox 59 API calls 104694->104695 104695->104712 104696 a0b475 104697 a08047 59 API calls 104696->104697 104711 a0a057 104697->104711 104698 a0b47a 104700 a40055 104698->104700 104715 a409e5 104698->104715 104699 a56e8f 59 API calls 104699->104712 106061 a69e4a 89 API calls 4 library calls 104700->106061 104701 a07667 59 API calls 104701->104712 104705 a20db6 59 API calls Mailbox 104705->104712 104706 a40064 104706->104530 104707 a22d40 67 API calls __cinit 104707->104712 104710 a08047 59 API calls 104710->104712 104711->104530 104712->104696 104712->104698 104712->104699 104712->104700 104712->104701 104712->104705 104712->104707 104712->104710 104712->104711 104713 a409d6 104712->104713 104716 a0a55a 104712->104716 106059 a0c8c0 331 API calls 2 library calls 104712->106059 106060 a0b900 60 API calls Mailbox 104712->106060 106063 a69e4a 89 API calls 4 library calls 104713->106063 106064 a69e4a 89 API calls 4 library calls 104715->106064 106062 a69e4a 89 API calls 4 library calls 104716->106062 104719 a09c9b 104717->104719 104718 a09cd2 104718->104567 104719->104718 106065 a08cd4 59 API calls Mailbox 104719->106065 104721 a09cfd 104721->104567 104722->104492 104723->104496 104724->104501 104725->104496 104726->104496 104727->104508 104728->104517 104729->104518 104730->104518 104732 a085f6 104731->104732 104733 a085ce 104731->104733 104732->104515 104734 a085dc 104733->104734 104735 a085c0 59 API calls 104733->104735 104736 a085e2 104734->104736 104737 a085c0 59 API calls 104734->104737 104735->104734 104736->104732 104738 a09c90 Mailbox 59 API calls 104736->104738 104737->104736 104738->104732 104739->104561 104740->104561 104741->104561 104743 a084cb 104742->104743 104745 a084f2 104743->104745 106066 a089b3 69 API calls Mailbox 104743->106066 104745->104546 104746->104496 104747->104547 104748->104496 104749->104594 104750->104600 104752 a0e451 104751->104752 104753 a0e43d 104751->104753 104859 a69e4a 89 API calls 4 library calls 104752->104859 104858 a0df00 331 API calls 2 library calls 104753->104858 104755 a0e448 104755->104679 104757 a43aa4 104757->104757 104759 a0e6d5 104758->104759 104760 a43aa9 104759->104760 104763 a0e73f 104759->104763 104772 a0e799 104759->104772 104761 a09ea0 331 API calls 104760->104761 104762 a43abe 104761->104762 104775 a0e970 Mailbox 104762->104775 104861 a69e4a 89 API calls 4 library calls 104762->104861 104766 a07667 59 API calls 104763->104766 104763->104772 104764 a07667 59 API calls 104764->104772 104768 a43b04 104766->104768 104767 a22d40 __cinit 67 API calls 104767->104772 104862 a22d40 104768->104862 104769 a43b26 104769->104679 104771 a084c0 69 API calls 104771->104775 104772->104764 104772->104767 104772->104769 104774 a0e95a 104772->104774 104772->104775 104773 a09ea0 331 API calls 104773->104775 104774->104775 104865 a69e4a 89 API calls 4 library calls 104774->104865 104775->104771 104775->104773 104777 a08d40 59 API calls 104775->104777 104779 a09c90 Mailbox 59 API calls 104775->104779 104781 a0f195 104775->104781 104785 a69e4a 89 API calls 104775->104785 104788 a0ea78 104775->104788 104860 a07f77 59 API calls 2 library calls 104775->104860 104866 a56e8f 59 API calls 104775->104866 104867 a7c5c3 331 API calls 104775->104867 104868 a7b53c 331 API calls Mailbox 104775->104868 104870 a793c6 331 API calls Mailbox 104775->104870 104777->104775 104779->104775 104869 a69e4a 89 API calls 4 library calls 104781->104869 104785->104775 104787 a43e25 104787->104679 104788->104679 104790 a0f650 104789->104790 104791 a0f4ba 104789->104791 104794 a07de1 59 API calls 104790->104794 104792 a0f4c6 104791->104792 104793 a4441e 104791->104793 105047 a0f290 331 API calls 2 library calls 104792->105047 105048 a7bc6b 104793->105048 104797 a0f58c Mailbox 104794->104797 104949 a04e4a 104797->104949 104955 a63c37 104797->104955 104958 a7445a 104797->104958 104967 a6cb7a 104797->104967 104798 a0f4fd 104798->104797 104799 a0f630 104798->104799 104800 a4442c 104798->104800 104799->104679 104800->104799 105088 a69e4a 89 API calls 4 library calls 104800->105088 104802 a09c90 Mailbox 59 API calls 104803 a0f5e3 104802->104803 104803->104799 104803->104802 104809 a03212 104808->104809 104812 a031e0 104808->104812 104809->104679 104810 a03205 IsDialogMessageW 104810->104809 104810->104812 104811 a3cf32 GetClassLongW 104811->104810 104811->104812 104812->104809 104812->104810 104812->104811 104813->104609 104814->104613 104815->104679 104816->104618 104817->104618 104818->104618 104819->104679 104820->104679 104821->104679 104823 a09851 104822->104823 104824 a0984b 104822->104824 104825 a3f5d3 __i64tow 104823->104825 104826 a09899 104823->104826 104828 a09857 __itow 104823->104828 104831 a3f4da 104823->104831 104824->104679 106056 a23698 83 API calls 3 library calls 104826->106056 104830 a20db6 Mailbox 59 API calls 104828->104830 104832 a09871 104830->104832 104833 a20db6 Mailbox 59 API calls 104831->104833 104835 a3f552 Mailbox _wcscpy 104831->104835 104832->104824 104834 a07de1 59 API calls 104832->104834 104836 a3f51f 104833->104836 104834->104824 106057 a23698 83 API calls 3 library calls 104835->106057 104837 a20db6 Mailbox 59 API calls 104836->104837 104838 a3f545 104837->104838 104838->104835 104839 a07de1 59 API calls 104838->104839 104839->104835 104840->104679 104841->104679 104843 a20db6 Mailbox 59 API calls 104842->104843 104844 a07688 104843->104844 104845 a20db6 Mailbox 59 API calls 104844->104845 104846 a07696 104845->104846 104846->104663 104847->104663 104848->104663 104850 a07df0 __NMSG_WRITE _memmove 104849->104850 104851 a20db6 Mailbox 59 API calls 104850->104851 104852 a07e2e 104851->104852 104852->104663 104853->104663 104854->104663 104855->104663 104856->104663 104857->104663 104858->104755 104859->104757 104860->104775 104861->104775 104871 a22c44 104862->104871 104864 a22d4b 104864->104772 104865->104775 104866->104775 104867->104775 104868->104775 104869->104787 104870->104775 104872 a22c50 __write 104871->104872 104879 a23217 104872->104879 104878 a22c77 __write 104878->104864 104896 a29c0b 104879->104896 104881 a22c59 104882 a22c88 DecodePointer DecodePointer 104881->104882 104883 a22c65 104882->104883 104884 a22cb5 104882->104884 104893 a22c82 104883->104893 104884->104883 104942 a287a4 59 API calls __gmtime64_s 104884->104942 104886 a22d18 EncodePointer EncodePointer 104886->104883 104887 a22cec 104887->104883 104891 a22d06 EncodePointer 104887->104891 104944 a28864 61 API calls __realloc_crt 104887->104944 104888 a22cc7 104888->104886 104888->104887 104943 a28864 61 API calls __realloc_crt 104888->104943 104891->104886 104892 a22d00 104892->104883 104892->104891 104945 a23220 104893->104945 104897 a29c2f EnterCriticalSection 104896->104897 104898 a29c1c 104896->104898 104897->104881 104903 a29c93 104898->104903 104900 a29c22 104900->104897 104927 a230b5 58 API calls 3 library calls 104900->104927 104904 a29c9f __write 104903->104904 104905 a29cc0 104904->104905 104906 a29ca8 104904->104906 104910 a29ce1 __write 104905->104910 104931 a2881d 58 API calls 2 library calls 104905->104931 104928 a2a16b 58 API calls __NMSG_WRITE 104906->104928 104908 a29cad 104929 a2a1c8 58 API calls 5 library calls 104908->104929 104910->104900 104912 a29cd5 104914 a29ceb 104912->104914 104915 a29cdc 104912->104915 104913 a29cb4 104930 a2309f GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 104913->104930 104917 a29c0b __lock 58 API calls 104914->104917 104932 a28b28 58 API calls __getptd_noexit 104915->104932 104919 a29cf2 104917->104919 104921 a29d17 104919->104921 104922 a29cff 104919->104922 104934 a22d55 104921->104934 104933 a29e2b InitializeCriticalSectionAndSpinCount 104922->104933 104925 a29d0b 104940 a29d33 LeaveCriticalSection _doexit 104925->104940 104928->104908 104929->104913 104931->104912 104932->104910 104933->104925 104935 a22d5e RtlFreeHeap 104934->104935 104939 a22d87 _free 104934->104939 104936 a22d73 104935->104936 104935->104939 104941 a28b28 58 API calls __getptd_noexit 104936->104941 104938 a22d79 GetLastError 104938->104939 104939->104925 104940->104910 104941->104938 104942->104888 104943->104887 104944->104892 104948 a29d75 LeaveCriticalSection 104945->104948 104947 a22c87 104947->104878 104948->104947 104950 a04e54 104949->104950 104951 a04e5b 104949->104951 105089 a253a6 104950->105089 104953 a04e6a 104951->104953 104954 a04e7b FreeLibrary 104951->104954 104953->104803 104954->104953 105359 a6445a GetFileAttributesW 104955->105359 104959 a09837 84 API calls 104958->104959 104960 a74494 104959->104960 105363 a06240 104960->105363 104962 a744a4 104963 a744c9 104962->104963 104964 a09ea0 331 API calls 104962->104964 104966 a744cd 104963->104966 105388 a09a98 59 API calls Mailbox 104963->105388 104964->104963 104966->104803 104968 a07667 59 API calls 104967->104968 104969 a6cbaf 104968->104969 104970 a07667 59 API calls 104969->104970 104971 a6cbb8 104970->104971 104972 a6cbcc 104971->104972 105590 a09b3c 59 API calls 104971->105590 104974 a09837 84 API calls 104972->104974 104975 a6cbe9 104974->104975 104976 a6ccea 104975->104976 104977 a6cc0b 104975->104977 104983 a6cd1a Mailbox 104975->104983 105403 a04ddd 104976->105403 104978 a09837 84 API calls 104977->104978 104980 a6cc17 104978->104980 104984 a08047 59 API calls 104980->104984 104982 a6cd16 104982->104983 104986 a07667 59 API calls 104982->104986 104983->104803 104987 a6cc23 104984->104987 104985 a04ddd 136 API calls 104985->104982 104988 a6cd4b 104986->104988 104990 a6cc37 104987->104990 104991 a6cc69 104987->104991 104989 a07667 59 API calls 104988->104989 104992 a6cd54 104989->104992 104993 a08047 59 API calls 104990->104993 104994 a09837 84 API calls 104991->104994 104995 a07667 59 API calls 104992->104995 104996 a6cc47 104993->104996 104997 a6cc76 104994->104997 104998 a6cd5d 104995->104998 104999 a07cab 59 API calls 104996->104999 105000 a08047 59 API calls 104997->105000 105001 a07667 59 API calls 104998->105001 105003 a6cc51 104999->105003 105004 a6cc82 105000->105004 105002 a6cd66 105001->105002 105005 a09837 84 API calls 105002->105005 105006 a09837 84 API calls 105003->105006 105591 a64a31 GetFileAttributesW 105004->105591 105009 a6cd73 105005->105009 105010 a6cc5d 105006->105010 105008 a6cc8b 105011 a6cc9e 105008->105011 105014 a079f2 59 API calls 105008->105014 105427 a0459b 105009->105427 105013 a07b2e 59 API calls 105010->105013 105016 a09837 84 API calls 105011->105016 105022 a6cca4 105011->105022 105013->104991 105014->105011 105015 a6cd8e 105478 a079f2 105015->105478 105018 a6cccb 105016->105018 105592 a637ef 75 API calls Mailbox 105018->105592 105021 a6cdd1 105024 a08047 59 API calls 105021->105024 105022->104983 105023 a079f2 59 API calls 105026 a6cdae 105023->105026 105025 a6cddf 105024->105025 105027 a07b2e 59 API calls 105025->105027 105026->105021 105029 a07bcc 59 API calls 105026->105029 105028 a6cded 105027->105028 105030 a07b2e 59 API calls 105028->105030 105031 a6cdc3 105029->105031 105032 a6cdfb 105030->105032 105033 a07bcc 59 API calls 105031->105033 105034 a07b2e 59 API calls 105032->105034 105033->105021 105035 a6ce09 105034->105035 105036 a09837 84 API calls 105035->105036 105037 a6ce15 105036->105037 105481 a64071 105037->105481 105039 a6ce26 105040 a63c37 3 API calls 105039->105040 105047->104798 105049 a7bc96 105048->105049 105050 a7bcb0 105048->105050 106048 a69e4a 89 API calls 4 library calls 105049->106048 106049 a7a213 59 API calls Mailbox 105050->106049 105053 a7bcbb 105054 a09ea0 330 API calls 105053->105054 105055 a7bd1c 105054->105055 105056 a7bdae 105055->105056 105059 a7bd5d 105055->105059 105081 a7bca8 Mailbox 105055->105081 105057 a7be04 105056->105057 105058 a7bdb4 105056->105058 105060 a09837 84 API calls 105057->105060 105057->105081 106051 a6791a 59 API calls 105058->106051 106050 a672df 59 API calls Mailbox 105059->106050 105061 a7be16 105060->105061 105063 a07e4f 59 API calls 105061->105063 105066 a7be3a CharUpperBuffW 105063->105066 105064 a7bdd7 106052 a05d41 59 API calls Mailbox 105064->106052 105071 a7be54 105066->105071 105068 a7bd8d 105070 a0f460 330 API calls 105068->105070 105069 a7bddf Mailbox 105074 a0fce0 330 API calls 105069->105074 105070->105081 105072 a7bea7 105071->105072 105073 a7be5b 105071->105073 105075 a09837 84 API calls 105072->105075 106053 a672df 59 API calls Mailbox 105073->106053 105074->105081 105076 a7beaf 105075->105076 106054 a09e5d 60 API calls 105076->106054 105079 a7be89 105080 a0f460 330 API calls 105079->105080 105080->105081 105081->104800 105082 a7beb9 105082->105081 105083 a09837 84 API calls 105082->105083 105084 a7bed4 105083->105084 106055 a05d41 59 API calls Mailbox 105084->106055 105086 a7bee4 105087 a0fce0 330 API calls 105086->105087 105087->105081 105088->104799 105090 a253b2 __write 105089->105090 105091 a253c6 105090->105091 105092 a253de 105090->105092 105124 a28b28 58 API calls __getptd_noexit 105091->105124 105098 a253d6 __write 105092->105098 105102 a26c11 105092->105102 105094 a253cb 105125 a28db6 9 API calls __gmtime64_s 105094->105125 105098->104951 105103 a26c43 EnterCriticalSection 105102->105103 105104 a26c21 105102->105104 105106 a253f0 105103->105106 105104->105103 105105 a26c29 105104->105105 105107 a29c0b __lock 58 API calls 105105->105107 105108 a2533a 105106->105108 105107->105106 105109 a25349 105108->105109 105110 a2535d 105108->105110 105170 a28b28 58 API calls __getptd_noexit 105109->105170 105122 a25359 105110->105122 105127 a24a3d 105110->105127 105113 a2534e 105171 a28db6 9 API calls __gmtime64_s 105113->105171 105119 a25377 105144 a30a02 105119->105144 105121 a2537d 105121->105122 105123 a22d55 _free 58 API calls 105121->105123 105126 a25415 LeaveCriticalSection LeaveCriticalSection _fprintf 105122->105126 105123->105122 105124->105094 105125->105098 105126->105098 105128 a24a74 105127->105128 105129 a24a50 105127->105129 105133 a30b77 105128->105133 105129->105128 105130 a246e6 __fputwc_nolock 58 API calls 105129->105130 105131 a24a6d 105130->105131 105172 a2d886 105131->105172 105134 a25371 105133->105134 105135 a30b84 105133->105135 105137 a246e6 105134->105137 105135->105134 105136 a22d55 _free 58 API calls 105135->105136 105136->105134 105138 a246f0 105137->105138 105139 a24705 105137->105139 105314 a28b28 58 API calls __getptd_noexit 105138->105314 105139->105119 105141 a246f5 105315 a28db6 9 API calls __gmtime64_s 105141->105315 105143 a24700 105143->105119 105145 a30a0e __write 105144->105145 105146 a30a32 105145->105146 105147 a30a1b 105145->105147 105149 a30abd 105146->105149 105151 a30a42 105146->105151 105331 a28af4 58 API calls __getptd_noexit 105147->105331 105336 a28af4 58 API calls __getptd_noexit 105149->105336 105150 a30a20 105332 a28b28 58 API calls __getptd_noexit 105150->105332 105154 a30a60 105151->105154 105155 a30a6a 105151->105155 105333 a28af4 58 API calls __getptd_noexit 105154->105333 105157 a2d206 ___lock_fhandle 59 API calls 105155->105157 105156 a30a65 105337 a28b28 58 API calls __getptd_noexit 105156->105337 105159 a30a70 105157->105159 105162 a30a83 105159->105162 105163 a30a8e 105159->105163 105161 a30ac9 105338 a28db6 9 API calls __gmtime64_s 105161->105338 105316 a30add 105162->105316 105334 a28b28 58 API calls __getptd_noexit 105163->105334 105166 a30a27 __write 105166->105121 105168 a30a89 105335 a30ab5 LeaveCriticalSection __unlock_fhandle 105168->105335 105170->105113 105171->105122 105173 a2d892 __write 105172->105173 105174 a2d8b6 105173->105174 105175 a2d89f 105173->105175 105176 a2d955 105174->105176 105179 a2d8ca 105174->105179 105273 a28af4 58 API calls __getptd_noexit 105175->105273 105279 a28af4 58 API calls __getptd_noexit 105176->105279 105178 a2d8a4 105274 a28b28 58 API calls __getptd_noexit 105178->105274 105182 a2d8f2 105179->105182 105183 a2d8e8 105179->105183 105200 a2d206 105182->105200 105275 a28af4 58 API calls __getptd_noexit 105183->105275 105184 a2d8ed 105280 a28b28 58 API calls __getptd_noexit 105184->105280 105187 a2d8f8 105189 a2d90b 105187->105189 105190 a2d91e 105187->105190 105209 a2d975 105189->105209 105276 a28b28 58 API calls __getptd_noexit 105190->105276 105191 a2d961 105281 a28db6 9 API calls __gmtime64_s 105191->105281 105193 a2d8ab __write 105193->105128 105196 a2d923 105277 a28af4 58 API calls __getptd_noexit 105196->105277 105197 a2d917 105278 a2d94d LeaveCriticalSection __unlock_fhandle 105197->105278 105201 a2d212 __write 105200->105201 105202 a2d261 EnterCriticalSection 105201->105202 105203 a29c0b __lock 58 API calls 105201->105203 105204 a2d287 __write 105202->105204 105205 a2d237 105203->105205 105204->105187 105208 a2d24f 105205->105208 105282 a29e2b InitializeCriticalSectionAndSpinCount 105205->105282 105283 a2d28b LeaveCriticalSection _doexit 105208->105283 105210 a2d982 __write_nolock 105209->105210 105211 a2d9e0 105210->105211 105212 a2d9c1 105210->105212 105243 a2d9b6 105210->105243 105217 a2da38 105211->105217 105218 a2da1c 105211->105218 105293 a28af4 58 API calls __getptd_noexit 105212->105293 105215 a2e1d6 105215->105197 105216 a2d9c6 105294 a28b28 58 API calls __getptd_noexit 105216->105294 105220 a2da51 105217->105220 105299 a318c1 60 API calls 3 library calls 105217->105299 105296 a28af4 58 API calls __getptd_noexit 105218->105296 105284 a35c6b 105220->105284 105222 a2d9cd 105295 a28db6 9 API calls __gmtime64_s 105222->105295 105225 a2da21 105297 a28b28 58 API calls __getptd_noexit 105225->105297 105227 a2da5f 105230 a2ddb8 105227->105230 105300 a299ac 58 API calls 2 library calls 105227->105300 105229 a2da28 105298 a28db6 9 API calls __gmtime64_s 105229->105298 105232 a2ddd6 105230->105232 105233 a2e14b WriteFile 105230->105233 105235 a2defa 105232->105235 105241 a2ddec 105232->105241 105236 a2ddab GetLastError 105233->105236 105245 a2dd78 105233->105245 105246 a2dfef 105235->105246 105248 a2df05 105235->105248 105236->105245 105237 a2e184 105237->105243 105305 a28b28 58 API calls __getptd_noexit 105237->105305 105238 a2da8b GetConsoleMode 105238->105230 105239 a2daca 105238->105239 105239->105230 105240 a2dada GetConsoleCP 105239->105240 105240->105237 105269 a2db09 105240->105269 105241->105237 105242 a2de5b WriteFile 105241->105242 105242->105236 105247 a2de98 105242->105247 105307 a2c5f6 105243->105307 105245->105237 105245->105243 105250 a2ded8 105245->105250 105246->105237 105251 a2e064 WideCharToMultiByte 105246->105251 105247->105241 105252 a2debc 105247->105252 105248->105237 105253 a2df6a WriteFile 105248->105253 105249 a2e1b2 105306 a28af4 58 API calls __getptd_noexit 105249->105306 105255 a2dee3 105250->105255 105256 a2e17b 105250->105256 105251->105236 105266 a2e0ab 105251->105266 105252->105245 105253->105236 105258 a2dfb9 105253->105258 105302 a28b28 58 API calls __getptd_noexit 105255->105302 105304 a28b07 58 API calls 3 library calls 105256->105304 105258->105245 105258->105248 105258->105252 105260 a2e0b3 WriteFile 105264 a2e106 GetLastError 105260->105264 105260->105266 105261 a2dee8 105303 a28af4 58 API calls __getptd_noexit 105261->105303 105264->105266 105265 a362ba 60 API calls __write_nolock 105265->105269 105266->105245 105266->105246 105266->105252 105266->105260 105267 a2dbf2 WideCharToMultiByte 105267->105245 105268 a2dc2d WriteFile 105267->105268 105268->105236 105270 a2dc5f 105268->105270 105269->105245 105269->105265 105269->105267 105269->105270 105301 a235f5 58 API calls __isleadbyte_l 105269->105301 105270->105236 105270->105245 105270->105269 105271 a37a5e WriteConsoleW CreateFileW __putwch_nolock 105270->105271 105272 a2dc87 WriteFile 105270->105272 105271->105270 105272->105236 105272->105270 105273->105178 105274->105193 105275->105184 105276->105196 105277->105197 105278->105193 105279->105184 105280->105191 105281->105193 105282->105208 105283->105202 105285 a35c83 105284->105285 105286 a35c76 105284->105286 105289 a35c8f 105285->105289 105290 a28b28 __gmtime64_s 58 API calls 105285->105290 105287 a28b28 __gmtime64_s 58 API calls 105286->105287 105288 a35c7b 105287->105288 105288->105227 105289->105227 105291 a35cb0 105290->105291 105292 a28db6 __gmtime64_s 9 API calls 105291->105292 105292->105288 105293->105216 105294->105222 105295->105243 105296->105225 105297->105229 105298->105243 105299->105220 105300->105238 105301->105269 105302->105261 105303->105243 105304->105243 105305->105249 105306->105243 105308 a2c600 IsProcessorFeaturePresent 105307->105308 105309 a2c5fe 105307->105309 105311 a3590a 105308->105311 105309->105215 105312 a358b9 ___raise_securityfailure 5 API calls 105311->105312 105313 a359ed 105312->105313 105313->105215 105314->105141 105315->105143 105339 a2d4c3 105316->105339 105318 a30b41 105352 a2d43d 59 API calls 2 library calls 105318->105352 105320 a30aeb 105320->105318 105322 a2d4c3 __close_nolock 58 API calls 105320->105322 105330 a30b1f 105320->105330 105321 a2d4c3 __close_nolock 58 API calls 105323 a30b2b CloseHandle 105321->105323 105326 a30b16 105322->105326 105323->105318 105327 a30b37 GetLastError 105323->105327 105324 a30b6b 105324->105168 105325 a30b49 105325->105324 105353 a28b07 58 API calls 3 library calls 105325->105353 105329 a2d4c3 __close_nolock 58 API calls 105326->105329 105327->105318 105329->105330 105330->105318 105330->105321 105331->105150 105332->105166 105333->105156 105334->105168 105335->105166 105336->105156 105337->105161 105338->105166 105340 a2d4ce 105339->105340 105341 a2d4e3 105339->105341 105354 a28af4 58 API calls __getptd_noexit 105340->105354 105345 a2d508 105341->105345 105356 a28af4 58 API calls __getptd_noexit 105341->105356 105344 a2d4d3 105355 a28b28 58 API calls __getptd_noexit 105344->105355 105345->105320 105346 a2d512 105357 a28b28 58 API calls __getptd_noexit 105346->105357 105349 a2d4db 105349->105320 105350 a2d51a 105358 a28db6 9 API calls __gmtime64_s 105350->105358 105352->105325 105353->105324 105354->105344 105355->105349 105356->105346 105357->105350 105358->105349 105360 a64475 FindFirstFileW 105359->105360 105361 a63c3e 105359->105361 105360->105361 105362 a6448a FindClose 105360->105362 105361->104803 105362->105361 105364 a07a16 59 API calls 105363->105364 105381 a06265 105364->105381 105365 a0646a 105391 a0750f 105365->105391 105367 a06484 Mailbox 105367->104962 105370 a07d8c 59 API calls 105370->105381 105371 a0750f 59 API calls 105371->105381 105372 a3dff6 105401 a5f8aa 91 API calls 4 library calls 105372->105401 105376 a3e004 105377 a0750f 59 API calls 105376->105377 105379 a3e01a 105377->105379 105378 a06799 _memmove 105402 a5f8aa 91 API calls 4 library calls 105378->105402 105379->105367 105380 a3df92 105382 a08029 59 API calls 105380->105382 105381->105365 105381->105370 105381->105371 105381->105372 105381->105378 105381->105380 105385 a07e4f 59 API calls 105381->105385 105389 a05f6c 60 API calls 105381->105389 105390 a05d41 59 API calls Mailbox 105381->105390 105399 a05e72 60 API calls 105381->105399 105400 a07924 59 API calls 2 library calls 105381->105400 105384 a3df9d 105382->105384 105387 a20db6 Mailbox 59 API calls 105384->105387 105386 a0643b CharUpperBuffW 105385->105386 105386->105381 105387->105378 105388->104966 105389->105381 105390->105381 105392 a075af 105391->105392 105396 a07522 _memmove 105391->105396 105394 a20db6 Mailbox 59 API calls 105392->105394 105393 a20db6 Mailbox 59 API calls 105395 a07529 105393->105395 105394->105396 105397 a20db6 Mailbox 59 API calls 105395->105397 105398 a07552 105395->105398 105396->105393 105397->105398 105398->105367 105399->105381 105400->105381 105401->105376 105402->105367 105593 a04bb5 105403->105593 105408 a3d8e6 105410 a04e4a 84 API calls 105408->105410 105409 a04e08 LoadLibraryExW 105603 a04b6a 105409->105603 105412 a3d8ed 105410->105412 105414 a04b6a 3 API calls 105412->105414 105416 a3d8f5 105414->105416 105629 a04f0b 105416->105629 105417 a04e2f 105417->105416 105418 a04e3b 105417->105418 105420 a04e4a 84 API calls 105418->105420 105422 a04e40 105420->105422 105422->104982 105422->104985 105424 a3d91c 105637 a04ec7 105424->105637 105428 a07667 59 API calls 105427->105428 105429 a045b1 105428->105429 105430 a07667 59 API calls 105429->105430 105431 a045b9 105430->105431 105432 a07667 59 API calls 105431->105432 105433 a045c1 105432->105433 105434 a07667 59 API calls 105433->105434 105435 a045c9 105434->105435 105436 a3d4d2 105435->105436 105437 a045fd 105435->105437 105438 a08047 59 API calls 105436->105438 105439 a0784b 59 API calls 105437->105439 105440 a3d4db 105438->105440 105441 a0460b 105439->105441 105924 a07d8c 105440->105924 105443 a07d2c 59 API calls 105441->105443 105444 a04615 105443->105444 105445 a04640 105444->105445 105446 a0784b 59 API calls 105444->105446 105448 a0465f 105445->105448 105463 a04680 105445->105463 105466 a3d4fb 105445->105466 105449 a04636 105446->105449 105453 a079f2 59 API calls 105448->105453 105452 a07d2c 59 API calls 105449->105452 105450 a04691 105454 a046a3 105450->105454 105457 a08047 59 API calls 105450->105457 105451 a3d5cb 105455 a07bcc 59 API calls 105451->105455 105452->105445 105456 a04669 105453->105456 105458 a046b3 105454->105458 105459 a08047 59 API calls 105454->105459 105473 a3d588 105455->105473 105460 a0784b 59 API calls 105456->105460 105456->105463 105457->105454 105461 a08047 59 API calls 105458->105461 105462 a046ba 105458->105462 105459->105458 105460->105463 105461->105462 105465 a08047 59 API calls 105462->105465 105475 a046c1 Mailbox 105462->105475 105911 a0784b 105463->105911 105464 a3d5b4 105464->105451 105468 a3d59f 105464->105468 105465->105475 105466->105451 105466->105464 105472 a3d532 105466->105472 105467 a079f2 59 API calls 105467->105473 105471 a07bcc 59 API calls 105468->105471 105469 a3d590 105470 a07bcc 59 API calls 105469->105470 105470->105473 105471->105473 105472->105469 105476 a3d57b 105472->105476 105473->105463 105473->105467 105928 a07924 59 API calls 2 library calls 105473->105928 105475->105015 105477 a07bcc 59 API calls 105476->105477 105477->105473 105479 a07e4f 59 API calls 105478->105479 105480 a079fd 105479->105480 105480->105021 105480->105023 105482 a6408d 105481->105482 105483 a64092 105482->105483 105484 a640a0 105482->105484 105485 a08047 59 API calls 105483->105485 105486 a07667 59 API calls 105484->105486 105487 a6409b Mailbox 105485->105487 105488 a640a8 105486->105488 105487->105039 105489 a07667 59 API calls 105488->105489 105490 a640b0 105489->105490 105590->104972 105591->105008 105592->105022 105642 a04c03 105593->105642 105596 a04bf5 105600 a2525b 105596->105600 105597 a04bec FreeLibrary 105597->105596 105598 a04c03 2 API calls 105599 a04bdc 105598->105599 105599->105596 105599->105597 105646 a25270 105600->105646 105602 a04dfc 105602->105408 105602->105409 105727 a04c36 105603->105727 105606 a04b8f 105607 a04ba1 FreeLibrary 105606->105607 105608 a04baa 105606->105608 105607->105608 105610 a04c70 105608->105610 105609 a04c36 2 API calls 105609->105606 105611 a20db6 Mailbox 59 API calls 105610->105611 105612 a04c85 105611->105612 105731 a0522e 105612->105731 105614 a04c91 _memmove 105615 a04ccc 105614->105615 105616 a04dc1 105614->105616 105617 a04d89 105614->105617 105618 a04ec7 69 API calls 105615->105618 105745 a6991b 95 API calls 105616->105745 105734 a04e89 CreateStreamOnHGlobal 105617->105734 105622 a04cd5 105618->105622 105621 a04f0b 74 API calls 105621->105622 105622->105621 105624 a04d69 105622->105624 105625 a3d8a7 105622->105625 105740 a04ee5 105622->105740 105624->105417 105626 a04ee5 85 API calls 105625->105626 105627 a3d8bb 105626->105627 105628 a04f0b 74 API calls 105627->105628 105628->105624 105630 a04f1d 105629->105630 105631 a3d9cd 105629->105631 105763 a255e2 105630->105763 105634 a69109 105888 a68f5f 105634->105888 105636 a6911f 105636->105424 105638 a04ed6 105637->105638 105641 a3d990 105637->105641 105893 a25c60 105638->105893 105640 a04ede 105643 a04bd0 105642->105643 105644 a04c0c LoadLibraryA 105642->105644 105643->105598 105643->105599 105644->105643 105645 a04c1d GetProcAddress 105644->105645 105645->105643 105647 a2527c __write 105646->105647 105648 a2528f 105647->105648 105650 a252c0 105647->105650 105695 a28b28 58 API calls __getptd_noexit 105648->105695 105665 a304e8 105650->105665 105651 a25294 105696 a28db6 9 API calls __gmtime64_s 105651->105696 105654 a252c5 105655 a252db 105654->105655 105656 a252ce 105654->105656 105658 a25305 105655->105658 105659 a252e5 105655->105659 105697 a28b28 58 API calls __getptd_noexit 105656->105697 105680 a30607 105658->105680 105698 a28b28 58 API calls __getptd_noexit 105659->105698 105661 a2529f __write @_EH4_CallFilterFunc@8 105661->105602 105666 a304f4 __write 105665->105666 105667 a29c0b __lock 58 API calls 105666->105667 105678 a30502 105667->105678 105668 a30576 105700 a305fe 105668->105700 105669 a3057d 105705 a2881d 58 API calls 2 library calls 105669->105705 105672 a30584 105672->105668 105706 a29e2b InitializeCriticalSectionAndSpinCount 105672->105706 105673 a305f3 __write 105673->105654 105675 a29c93 __mtinitlocknum 58 API calls 105675->105678 105677 a305aa EnterCriticalSection 105677->105668 105678->105668 105678->105669 105678->105675 105703 a26c50 59 API calls __lock 105678->105703 105704 a26cba LeaveCriticalSection LeaveCriticalSection _doexit 105678->105704 105681 a30627 __wopenfile 105680->105681 105682 a30641 105681->105682 105694 a307fc 105681->105694 105713 a237cb 60 API calls 2 library calls 105681->105713 105711 a28b28 58 API calls __getptd_noexit 105682->105711 105684 a30646 105712 a28db6 9 API calls __gmtime64_s 105684->105712 105686 a25310 105699 a25332 LeaveCriticalSection LeaveCriticalSection _fprintf 105686->105699 105687 a3085f 105708 a385a1 105687->105708 105690 a307f5 105690->105694 105714 a237cb 60 API calls 2 library calls 105690->105714 105692 a30814 105692->105694 105715 a237cb 60 API calls 2 library calls 105692->105715 105694->105682 105694->105687 105695->105651 105696->105661 105697->105661 105698->105661 105699->105661 105707 a29d75 LeaveCriticalSection 105700->105707 105702 a30605 105702->105673 105703->105678 105704->105678 105705->105672 105706->105677 105707->105702 105716 a37d85 105708->105716 105710 a385ba 105710->105686 105711->105684 105712->105686 105713->105690 105714->105692 105715->105694 105719 a37d91 __write 105716->105719 105717 a37da7 105718 a28b28 __gmtime64_s 58 API calls 105717->105718 105720 a37dac 105718->105720 105719->105717 105721 a37ddd 105719->105721 105723 a28db6 __gmtime64_s 9 API calls 105720->105723 105722 a37e4e __wsopen_nolock 109 API calls 105721->105722 105724 a37df9 105722->105724 105726 a37db6 __write 105723->105726 105725 a37e22 __wsopen_helper LeaveCriticalSection 105724->105725 105725->105726 105726->105710 105728 a04b83 105727->105728 105729 a04c3f LoadLibraryA 105727->105729 105728->105606 105728->105609 105729->105728 105730 a04c50 GetProcAddress 105729->105730 105730->105728 105732 a20db6 Mailbox 59 API calls 105731->105732 105733 a05240 105732->105733 105733->105614 105735 a04ea3 FindResourceExW 105734->105735 105737 a04ec0 105734->105737 105736 a3d933 LoadResource 105735->105736 105735->105737 105736->105737 105738 a3d948 SizeofResource 105736->105738 105737->105615 105738->105737 105739 a3d95c LockResource 105738->105739 105739->105737 105741 a04ef4 105740->105741 105742 a3d9ab 105740->105742 105746 a2584d 105741->105746 105744 a04f02 105744->105622 105745->105615 105747 a25859 __write 105746->105747 105748 a2586b 105747->105748 105749 a25891 105747->105749 105759 a28b28 58 API calls __getptd_noexit 105748->105759 105751 a26c11 __lock_file 59 API calls 105749->105751 105753 a25897 105751->105753 105752 a25870 105760 a28db6 9 API calls __gmtime64_s 105752->105760 105761 a257be 83 API calls 5 library calls 105753->105761 105756 a258a6 105762 a258c8 LeaveCriticalSection LeaveCriticalSection _fprintf 105756->105762 105758 a2587b __write 105758->105744 105759->105752 105760->105758 105761->105756 105762->105758 105766 a255fd 105763->105766 105765 a04f2e 105765->105634 105767 a25609 __write 105766->105767 105768 a2561f _memset 105767->105768 105769 a2564c 105767->105769 105770 a25644 __write 105767->105770 105793 a28b28 58 API calls __getptd_noexit 105768->105793 105771 a26c11 __lock_file 59 API calls 105769->105771 105770->105765 105773 a25652 105771->105773 105779 a2541d 105773->105779 105774 a25639 105794 a28db6 9 API calls __gmtime64_s 105774->105794 105783 a25438 _memset 105779->105783 105786 a25453 105779->105786 105780 a25443 105884 a28b28 58 API calls __getptd_noexit 105780->105884 105782 a25448 105885 a28db6 9 API calls __gmtime64_s 105782->105885 105783->105780 105783->105786 105790 a25493 105783->105790 105795 a25686 LeaveCriticalSection LeaveCriticalSection _fprintf 105786->105795 105787 a255a4 _memset 105887 a28b28 58 API calls __getptd_noexit 105787->105887 105788 a246e6 __fputwc_nolock 58 API calls 105788->105790 105790->105786 105790->105787 105790->105788 105796 a30e5b 105790->105796 105864 a30ba7 105790->105864 105886 a30cc8 58 API calls 3 library calls 105790->105886 105793->105774 105794->105770 105795->105770 105797 a30e93 105796->105797 105798 a30e7c 105796->105798 105800 a315cb 105797->105800 105805 a30ecd 105797->105805 105799 a28af4 __write_nolock 58 API calls 105798->105799 105802 a30e81 105799->105802 105801 a28af4 __write_nolock 58 API calls 105800->105801 105803 a315d0 105801->105803 105804 a28b28 __gmtime64_s 58 API calls 105802->105804 105806 a28b28 __gmtime64_s 58 API calls 105803->105806 105809 a30e88 105804->105809 105807 a30ed5 105805->105807 105814 a30eec 105805->105814 105808 a30ee1 105806->105808 105810 a28af4 __write_nolock 58 API calls 105807->105810 105812 a28db6 __gmtime64_s 9 API calls 105808->105812 105809->105790 105811 a30eda 105810->105811 105815 a28b28 __gmtime64_s 58 API calls 105811->105815 105812->105809 105813 a30f01 105816 a28af4 __write_nolock 58 API calls 105813->105816 105814->105809 105814->105813 105817 a30f1b 105814->105817 105818 a30f39 105814->105818 105815->105808 105816->105811 105817->105813 105831 a30f26 105817->105831 105819 a2881d __malloc_crt 58 API calls 105818->105819 105820 a30f49 105819->105820 105822 a30f51 105820->105822 105823 a30f6c 105820->105823 105821 a35c6b __write_nolock 58 API calls 105824 a3103a 105821->105824 105825 a28b28 __gmtime64_s 58 API calls 105822->105825 105827 a318c1 __lseeki64_nolock 60 API calls 105823->105827 105826 a310b3 ReadFile 105824->105826 105830 a31050 GetConsoleMode 105824->105830 105828 a30f56 105825->105828 105829 a31593 GetLastError 105826->105829 105835 a310d5 105826->105835 105827->105831 105832 a28af4 __write_nolock 58 API calls 105828->105832 105833 a315a0 105829->105833 105834 a31093 105829->105834 105836 a310b0 105830->105836 105837 a31064 105830->105837 105831->105821 105832->105809 105838 a28b28 __gmtime64_s 58 API calls 105833->105838 105843 a28b07 __dosmaperr 58 API calls 105834->105843 105846 a31099 105834->105846 105835->105829 105839 a310a5 105835->105839 105836->105826 105837->105836 105840 a3106a ReadConsoleW 105837->105840 105841 a315a5 105838->105841 105839->105846 105847 a3110a 105839->105847 105848 a31377 105839->105848 105840->105839 105842 a3108d GetLastError 105840->105842 105844 a28af4 __write_nolock 58 API calls 105841->105844 105842->105834 105843->105846 105844->105846 105845 a22d55 _free 58 API calls 105845->105809 105846->105809 105846->105845 105850 a31176 ReadFile 105847->105850 105855 a311f7 105847->105855 105848->105846 105854 a3147d ReadFile 105848->105854 105851 a31197 GetLastError 105850->105851 105862 a311a1 105850->105862 105851->105862 105852 a312b4 105858 a31264 MultiByteToWideChar 105852->105858 105859 a318c1 __lseeki64_nolock 60 API calls 105852->105859 105853 a312a4 105856 a28b28 __gmtime64_s 58 API calls 105853->105856 105857 a314a0 GetLastError 105854->105857 105863 a314ae 105854->105863 105855->105846 105855->105852 105855->105853 105855->105858 105856->105846 105857->105863 105858->105842 105858->105846 105859->105858 105860 a318c1 __lseeki64_nolock 60 API calls 105860->105862 105861 a318c1 __lseeki64_nolock 60 API calls 105861->105863 105862->105847 105862->105860 105863->105848 105863->105861 105865 a30bb2 105864->105865 105869 a30bc7 105864->105869 105866 a28b28 __gmtime64_s 58 API calls 105865->105866 105867 a30bb7 105866->105867 105868 a28db6 __gmtime64_s 9 API calls 105867->105868 105877 a30bc2 105868->105877 105870 a30bfc 105869->105870 105871 a35fe4 __getbuf 58 API calls 105869->105871 105869->105877 105872 a246e6 __fputwc_nolock 58 API calls 105870->105872 105871->105870 105873 a30c10 105872->105873 105874 a30d47 __read 72 API calls 105873->105874 105875 a30c17 105874->105875 105876 a246e6 __fputwc_nolock 58 API calls 105875->105876 105875->105877 105878 a30c3a 105876->105878 105877->105790 105878->105877 105879 a246e6 __fputwc_nolock 58 API calls 105878->105879 105880 a30c46 105879->105880 105880->105877 105881 a246e6 __fputwc_nolock 58 API calls 105880->105881 105882 a30c53 105881->105882 105883 a246e6 __fputwc_nolock 58 API calls 105882->105883 105883->105877 105884->105782 105885->105786 105886->105790 105887->105782 105891 a2520a GetSystemTimeAsFileTime 105888->105891 105890 a68f6e 105890->105636 105892 a25238 __aulldiv 105891->105892 105892->105890 105894 a25c6c __write 105893->105894 105895 a25c93 105894->105895 105896 a25c7e 105894->105896 105898 a26c11 __lock_file 59 API calls 105895->105898 105907 a28b28 58 API calls __getptd_noexit 105896->105907 105900 a25c99 105898->105900 105899 a25c83 105908 a28db6 9 API calls __gmtime64_s 105899->105908 105909 a258d0 67 API calls 5 library calls 105900->105909 105903 a25ca4 105910 a25cc4 LeaveCriticalSection LeaveCriticalSection _fprintf 105903->105910 105905 a25cb6 105906 a25c8e __write 105905->105906 105906->105640 105907->105899 105908->105906 105909->105903 105910->105905 105912 a078b7 105911->105912 105913 a0785a 105911->105913 105914 a07d2c 59 API calls 105912->105914 105913->105912 105915 a07865 105913->105915 105920 a07888 _memmove 105914->105920 105916 a07880 105915->105916 105917 a3eb09 105915->105917 105929 a07f27 59 API calls Mailbox 105916->105929 105919 a08029 59 API calls 105917->105919 105921 a3eb13 105919->105921 105920->105450 105922 a20db6 Mailbox 59 API calls 105921->105922 105923 a3eb33 105922->105923 105925 a07da6 105924->105925 105927 a07d99 105924->105927 105926 a20db6 Mailbox 59 API calls 105925->105926 105926->105927 105927->105445 105928->105473 105929->105920 106048->105081 106049->105053 106050->105068 106051->105064 106052->105069 106053->105079 106054->105082 106055->105086 106056->104828 106057->104825 106058->104683 106059->104712 106060->104712 106061->104706 106062->104711 106063->104715 106064->104711 106065->104721 106066->104745 106067 a27c56 106068 a27c62 __write 106067->106068 106104 a29e08 GetStartupInfoW 106068->106104 106071 a27c67 106106 a28b7c GetProcessHeap 106071->106106 106072 a27cbf 106073 a27cca 106072->106073 106189 a27da6 58 API calls 3 library calls 106072->106189 106107 a29ae6 106073->106107 106076 a27cd0 106078 a27cdb __RTC_Initialize 106076->106078 106190 a27da6 58 API calls 3 library calls 106076->106190 106128 a2d5d2 106078->106128 106080 a27cea 106081 a27cf6 GetCommandLineW 106080->106081 106191 a27da6 58 API calls 3 library calls 106080->106191 106147 a34f23 GetEnvironmentStringsW 106081->106147 106085 a27cf5 106085->106081 106087 a27d10 106088 a27d1b 106087->106088 106192 a230b5 58 API calls 3 library calls 106087->106192 106157 a34d58 106088->106157 106091 a27d21 106092 a27d2c 106091->106092 106193 a230b5 58 API calls 3 library calls 106091->106193 106171 a230ef 106092->106171 106095 a27d34 106096 a27d3f __wwincmdln 106095->106096 106194 a230b5 58 API calls 3 library calls 106095->106194 106177 a047d0 106096->106177 106099 a27d53 106100 a27d62 106099->106100 106195 a23358 58 API calls _doexit 106099->106195 106196 a230e0 58 API calls _doexit 106100->106196 106103 a27d67 __write 106105 a29e1e 106104->106105 106105->106071 106106->106072 106197 a23187 36 API calls 2 library calls 106107->106197 106109 a29aeb 106198 a29d3c InitializeCriticalSectionAndSpinCount __ioinit 106109->106198 106111 a29af0 106112 a29af4 106111->106112 106200 a29d8a TlsAlloc 106111->106200 106199 a29b5c 61 API calls 2 library calls 106112->106199 106115 a29b06 106115->106112 106117 a29b11 106115->106117 106116 a29af9 106116->106076 106201 a287d5 106117->106201 106120 a29b53 106209 a29b5c 61 API calls 2 library calls 106120->106209 106123 a29b32 106123->106120 106125 a29b38 106123->106125 106124 a29b58 106124->106076 106208 a29a33 58 API calls 4 library calls 106125->106208 106127 a29b40 GetCurrentThreadId 106127->106076 106129 a2d5de __write 106128->106129 106130 a29c0b __lock 58 API calls 106129->106130 106131 a2d5e5 106130->106131 106132 a287d5 __calloc_crt 58 API calls 106131->106132 106133 a2d5f6 106132->106133 106134 a2d661 GetStartupInfoW 106133->106134 106135 a2d601 __write @_EH4_CallFilterFunc@8 106133->106135 106136 a2d676 106134->106136 106137 a2d7a5 106134->106137 106135->106080 106136->106137 106140 a287d5 __calloc_crt 58 API calls 106136->106140 106143 a2d6c4 106136->106143 106138 a2d86d 106137->106138 106141 a2d7f2 GetStdHandle 106137->106141 106142 a2d805 GetFileType 106137->106142 106222 a29e2b InitializeCriticalSectionAndSpinCount 106137->106222 106223 a2d87d LeaveCriticalSection _doexit 106138->106223 106140->106136 106141->106137 106142->106137 106143->106137 106144 a2d6f8 GetFileType 106143->106144 106221 a29e2b InitializeCriticalSectionAndSpinCount 106143->106221 106144->106143 106148 a34f34 106147->106148 106149 a27d06 106147->106149 106224 a2881d 58 API calls 2 library calls 106148->106224 106153 a34b1b GetModuleFileNameW 106149->106153 106151 a34f5a _memmove 106152 a34f70 FreeEnvironmentStringsW 106151->106152 106152->106149 106154 a34b4f _wparse_cmdline 106153->106154 106156 a34b8f _wparse_cmdline 106154->106156 106225 a2881d 58 API calls 2 library calls 106154->106225 106156->106087 106158 a34d71 __NMSG_WRITE 106157->106158 106162 a34d69 106157->106162 106159 a287d5 __calloc_crt 58 API calls 106158->106159 106167 a34d9a __NMSG_WRITE 106159->106167 106160 a34df1 106161 a22d55 _free 58 API calls 106160->106161 106161->106162 106162->106091 106163 a287d5 __calloc_crt 58 API calls 106163->106167 106164 a34e16 106165 a22d55 _free 58 API calls 106164->106165 106165->106162 106167->106160 106167->106162 106167->106163 106167->106164 106168 a34e2d 106167->106168 106226 a34607 58 API calls __gmtime64_s 106167->106226 106227 a28dc6 IsProcessorFeaturePresent 106168->106227 106170 a34e39 106170->106091 106173 a230fb __IsNonwritableInCurrentImage 106171->106173 106242 a2a4d1 106173->106242 106174 a23119 __initterm_e 106175 a22d40 __cinit 67 API calls 106174->106175 106176 a23138 _doexit __IsNonwritableInCurrentImage 106174->106176 106175->106176 106176->106095 106178 a047ea 106177->106178 106188 a04889 106177->106188 106179 a04824 IsThemeActive 106178->106179 106245 a2336c 106179->106245 106183 a04850 106257 a048fd SystemParametersInfoW SystemParametersInfoW 106183->106257 106185 a0485c 106258 a03b3a 106185->106258 106187 a04864 SystemParametersInfoW 106187->106188 106188->106099 106189->106073 106190->106078 106191->106085 106195->106100 106196->106103 106197->106109 106198->106111 106199->106116 106200->106115 106203 a287dc 106201->106203 106204 a28817 106203->106204 106206 a287fa 106203->106206 106210 a351f6 106203->106210 106204->106120 106207 a29de6 TlsSetValue 106204->106207 106206->106203 106206->106204 106218 a2a132 Sleep 106206->106218 106207->106123 106208->106127 106209->106124 106211 a35201 106210->106211 106212 a3521c 106210->106212 106211->106212 106213 a3520d 106211->106213 106215 a3522c RtlAllocateHeap 106212->106215 106216 a35212 106212->106216 106220 a233a1 DecodePointer 106212->106220 106219 a28b28 58 API calls __getptd_noexit 106213->106219 106215->106212 106215->106216 106216->106203 106218->106206 106219->106216 106220->106212 106221->106143 106222->106137 106223->106135 106224->106151 106225->106156 106226->106167 106228 a28dd1 106227->106228 106233 a28c59 106228->106233 106232 a28dec 106232->106170 106234 a28c73 _memset __call_reportfault 106233->106234 106235 a28c93 IsDebuggerPresent 106234->106235 106241 a2a155 SetUnhandledExceptionFilter UnhandledExceptionFilter 106235->106241 106237 a28d57 __call_reportfault 106238 a2c5f6 __fputwc_nolock 6 API calls 106237->106238 106239 a28d7a 106238->106239 106240 a2a140 GetCurrentProcess TerminateProcess 106239->106240 106240->106232 106241->106237 106243 a2a4d4 EncodePointer 106242->106243 106243->106243 106244 a2a4ee 106243->106244 106244->106174 106246 a29c0b __lock 58 API calls 106245->106246 106247 a23377 DecodePointer EncodePointer 106246->106247 106310 a29d75 LeaveCriticalSection 106247->106310 106249 a04849 106250 a233d4 106249->106250 106251 a233f8 106250->106251 106252 a233de 106250->106252 106251->106183 106252->106251 106311 a28b28 58 API calls __getptd_noexit 106252->106311 106254 a233e8 106312 a28db6 9 API calls __gmtime64_s 106254->106312 106256 a233f3 106256->106183 106257->106185 106259 a03b47 __write_nolock 106258->106259 106260 a07667 59 API calls 106259->106260 106261 a03b51 GetCurrentDirectoryW 106260->106261 106313 a03766 106261->106313 106263 a03b7a IsDebuggerPresent 106264 a3d272 MessageBoxA 106263->106264 106265 a03b88 106263->106265 106268 a3d28c 106264->106268 106266 a03c61 106265->106266 106265->106268 106269 a03ba5 106265->106269 106267 a03c68 SetCurrentDirectoryW 106266->106267 106270 a03c75 Mailbox 106267->106270 106435 a07213 59 API calls Mailbox 106268->106435 106394 a07285 106269->106394 106270->106187 106273 a3d29c 106278 a3d2b2 SetCurrentDirectoryW 106273->106278 106278->106270 106310->106249 106311->106254 106312->106256 106314 a07667 59 API calls 106313->106314 106315 a0377c 106314->106315 106444 a03d31 106315->106444 106317 a0379a 106318 a04706 61 API calls 106317->106318 106319 a037ae 106318->106319 106320 a07de1 59 API calls 106319->106320 106321 a037bb 106320->106321 106322 a04ddd 136 API calls 106321->106322 106323 a037d4 106322->106323 106324 a3d173 106323->106324 106325 a037dc Mailbox 106323->106325 106497 a6955b 106324->106497 106329 a08047 59 API calls 106325->106329 106328 a3d192 106331 a22d55 _free 58 API calls 106328->106331 106332 a037ef 106329->106332 106330 a04e4a 84 API calls 106330->106328 106334 a3d19f 106331->106334 106458 a0928a 106332->106458 106335 a04e4a 84 API calls 106334->106335 106337 a3d1a8 106335->106337 106341 a03ed0 59 API calls 106337->106341 106338 a07de1 59 API calls 106339 a03808 106338->106339 106340 a084c0 69 API calls 106339->106340 106342 a0381a Mailbox 106340->106342 106343 a3d1c3 106341->106343 106344 a07de1 59 API calls 106342->106344 106345 a03ed0 59 API calls 106343->106345 106346 a03840 106344->106346 106347 a3d1df 106345->106347 106348 a084c0 69 API calls 106346->106348 106349 a04706 61 API calls 106347->106349 106351 a0384f Mailbox 106348->106351 106350 a3d204 106349->106350 106352 a03ed0 59 API calls 106350->106352 106353 a07667 59 API calls 106351->106353 106354 a3d210 106352->106354 106356 a0386d 106353->106356 106355 a08047 59 API calls 106354->106355 106357 a3d21e 106355->106357 106461 a03ed0 106356->106461 106359 a03ed0 59 API calls 106357->106359 106361 a3d22d 106359->106361 106367 a08047 59 API calls 106361->106367 106363 a03887 106363->106337 106364 a03891 106363->106364 106365 a22efd _W_store_winword 60 API calls 106364->106365 106366 a0389c 106365->106366 106366->106343 106368 a038a6 106366->106368 106369 a3d24f 106367->106369 106370 a22efd _W_store_winword 60 API calls 106368->106370 106371 a03ed0 59 API calls 106369->106371 106372 a038b1 106370->106372 106373 a3d25c 106371->106373 106372->106347 106374 a038bb 106372->106374 106373->106373 106375 a22efd _W_store_winword 60 API calls 106374->106375 106376 a038c6 106375->106376 106376->106361 106377 a03907 106376->106377 106379 a03ed0 59 API calls 106376->106379 106377->106361 106378 a03914 106377->106378 106477 a092ce 106378->106477 106380 a038ea 106379->106380 106382 a08047 59 API calls 106380->106382 106384 a038f8 106382->106384 106386 a03ed0 59 API calls 106384->106386 106386->106377 106389 a0928a 59 API calls 106390 a0394f 106389->106390 106390->106389 106391 a08ee0 60 API calls 106390->106391 106392 a03ed0 59 API calls 106390->106392 106393 a03995 Mailbox 106390->106393 106391->106390 106392->106390 106393->106263 106395 a07292 __write_nolock 106394->106395 106396 a3ea22 _memset 106395->106396 106397 a072ab 106395->106397 106400 a3ea3e GetOpenFileNameW 106396->106400 106553 a04750 106397->106553 106402 a3ea8d 106400->106402 106435->106273 106445 a03d3e __write_nolock 106444->106445 106446 a07bcc 59 API calls 106445->106446 106451 a03ea4 Mailbox 106445->106451 106447 a03d70 106446->106447 106448 a079f2 59 API calls 106447->106448 106456 a03da6 Mailbox 106447->106456 106448->106447 106449 a03e77 106450 a07de1 59 API calls 106449->106450 106449->106451 106453 a03e98 106450->106453 106451->106317 106452 a07de1 59 API calls 106452->106456 106454 a03f74 59 API calls 106453->106454 106454->106451 106456->106449 106456->106451 106456->106452 106457 a079f2 59 API calls 106456->106457 106532 a03f74 106456->106532 106457->106456 106459 a20db6 Mailbox 59 API calls 106458->106459 106460 a037fb 106459->106460 106460->106338 106462 a03ef3 106461->106462 106463 a03eda 106461->106463 106465 a07bcc 59 API calls 106462->106465 106464 a08047 59 API calls 106463->106464 106466 a03879 106464->106466 106465->106466 106467 a22efd 106466->106467 106468 a22f09 106467->106468 106469 a22f7e 106467->106469 106476 a22f2e 106468->106476 106538 a28b28 58 API calls __getptd_noexit 106468->106538 106540 a22f90 60 API calls 3 library calls 106469->106540 106472 a22f8b 106472->106363 106473 a22f15 106539 a28db6 9 API calls __gmtime64_s 106473->106539 106475 a22f20 106475->106363 106476->106363 106478 a092d6 106477->106478 106479 a20db6 Mailbox 59 API calls 106478->106479 106480 a092e4 106479->106480 106481 a03924 106480->106481 106541 a091fc 106480->106541 106483 a09050 106481->106483 106544 a09160 106483->106544 106485 a0905f 106486 a20db6 Mailbox 59 API calls 106485->106486 106487 a03932 106485->106487 106486->106487 106488 a08ee0 106487->106488 106489 a3f17c 106488->106489 106493 a08ef7 106488->106493 106489->106493 106552 a08bdb 59 API calls Mailbox 106489->106552 106491 a09040 106495 a09d3c 60 API calls 106491->106495 106492 a08ff8 106494 a20db6 Mailbox 59 API calls 106492->106494 106493->106491 106493->106492 106496 a08fff 106493->106496 106494->106496 106495->106496 106496->106390 106498 a04ee5 85 API calls 106497->106498 106499 a695ca 106498->106499 106500 a69734 96 API calls 106499->106500 106501 a695dc 106500->106501 106502 a04f0b 74 API calls 106501->106502 106530 a3d186 106501->106530 106503 a695f7 106502->106503 106504 a04f0b 74 API calls 106503->106504 106505 a69607 106504->106505 106506 a04f0b 74 API calls 106505->106506 106507 a69622 106506->106507 106508 a04f0b 74 API calls 106507->106508 106509 a6963d 106508->106509 106510 a04ee5 85 API calls 106509->106510 106511 a69654 106510->106511 106512 a2571c __crtGetStringTypeA_stat 58 API calls 106511->106512 106513 a6965b 106512->106513 106514 a2571c __crtGetStringTypeA_stat 58 API calls 106513->106514 106515 a69665 106514->106515 106516 a04f0b 74 API calls 106515->106516 106517 a69679 106516->106517 106518 a69109 GetSystemTimeAsFileTime 106517->106518 106519 a6968c 106518->106519 106520 a696b6 106519->106520 106521 a696a1 106519->106521 106523 a696bc 106520->106523 106524 a6971b 106520->106524 106522 a22d55 _free 58 API calls 106521->106522 106525 a696a7 106522->106525 106526 a68b06 116 API calls 106523->106526 106527 a22d55 _free 58 API calls 106524->106527 106528 a22d55 _free 58 API calls 106525->106528 106529 a69713 106526->106529 106527->106530 106528->106530 106531 a22d55 _free 58 API calls 106529->106531 106530->106328 106530->106330 106531->106530 106533 a03f82 106532->106533 106537 a03fa4 _memmove 106532->106537 106536 a20db6 Mailbox 59 API calls 106533->106536 106534 a20db6 Mailbox 59 API calls 106535 a03fb8 106534->106535 106535->106456 106536->106537 106537->106534 106538->106473 106539->106475 106540->106472 106542 a20db6 Mailbox 59 API calls 106541->106542 106543 a09209 106542->106543 106543->106481 106545 a09169 Mailbox 106544->106545 106546 a3f19f 106545->106546 106551 a09173 106545->106551 106547 a20db6 Mailbox 59 API calls 106546->106547 106549 a3f1ab 106547->106549 106548 a0917a 106548->106485 106550 a09c90 Mailbox 59 API calls 106550->106551 106551->106548 106551->106550 106552->106493 106777 a01055 106782 a02649 106777->106782 106780 a22d40 __cinit 67 API calls 106781 a01064 106780->106781 106783 a07667 59 API calls 106782->106783 106784 a026b7 106783->106784 106789 a03582 106784->106789 106786 a02754 106787 a0105a 106786->106787 106792 a03416 59 API calls 2 library calls 106786->106792 106787->106780 106793 a035b0 106789->106793 106792->106786 106794 a035bd 106793->106794 106795 a035a1 106793->106795 106794->106795 106796 a035c4 RegOpenKeyExW 106794->106796 106795->106786 106796->106795 106797 a035de RegQueryValueExW 106796->106797 106798 a03614 RegCloseKey 106797->106798 106799 a035ff 106797->106799 106798->106795 106799->106798 106800 a01016 106805 a04974 106800->106805 106803 a22d40 __cinit 67 API calls 106804 a01025 106803->106804 106806 a20db6 Mailbox 59 API calls 106805->106806 106807 a0497c 106806->106807 106808 a0101b 106807->106808 106812 a04936 106807->106812 106808->106803 106813 a04951 106812->106813 106814 a0493f 106812->106814 106816 a049a0 106813->106816 106815 a22d40 __cinit 67 API calls 106814->106815 106815->106813 106817 a07667 59 API calls 106816->106817 106818 a049b8 GetVersionExW 106817->106818 106819 a07bcc 59 API calls 106818->106819 106820 a049fb 106819->106820 106821 a07d2c 59 API calls 106820->106821 106824 a04a28 106820->106824 106822 a04a1c 106821->106822 106823 a07726 59 API calls 106822->106823 106823->106824 106825 a3d864 106824->106825 106826 a04a93 GetCurrentProcess IsWow64Process 106824->106826 106827 a04aac 106826->106827 106828 a04ac2 106827->106828 106829 a04b2b GetSystemInfo 106827->106829 106840 a04b37 106828->106840 106830 a04af8 106829->106830 106830->106808 106833 a04ad4 106836 a04b37 2 API calls 106833->106836 106834 a04b1f GetSystemInfo 106835 a04ae9 106834->106835 106835->106830 106837 a04aef FreeLibrary 106835->106837 106838 a04adc GetNativeSystemInfo 106836->106838 106837->106830 106838->106835 106841 a04ad0 106840->106841 106842 a04b40 LoadLibraryA 106840->106842 106841->106833 106841->106834 106842->106841 106843 a04b51 GetProcAddress 106842->106843 106843->106841 106844 a01066 106849 a0f76f 106844->106849 106846 a0106c 106847 a22d40 __cinit 67 API calls 106846->106847 106848 a01076 106847->106848 106850 a0f790 106849->106850 106882 a1ff03 106850->106882 106854 a0f7d7 106855 a07667 59 API calls 106854->106855 106856 a0f7e1 106855->106856 106857 a07667 59 API calls 106856->106857 106858 a0f7eb 106857->106858 106859 a07667 59 API calls 106858->106859 106860 a0f7f5 106859->106860 106861 a07667 59 API calls 106860->106861 106862 a0f833 106861->106862 106863 a07667 59 API calls 106862->106863 106864 a0f8fe 106863->106864 106892 a15f87 106864->106892 106868 a0f930 106869 a07667 59 API calls 106868->106869 106870 a0f93a 106869->106870 106920 a1fd9e 106870->106920 106872 a0f981 106873 a0f991 GetStdHandle 106872->106873 106874 a0f9dd 106873->106874 106875 a445ab 106873->106875 106876 a0f9e5 OleInitialize 106874->106876 106875->106874 106877 a445b4 106875->106877 106876->106846 106927 a66b38 64 API calls Mailbox 106877->106927 106879 a445bb 106928 a67207 CreateThread 106879->106928 106881 a445c7 CloseHandle 106881->106876 106929 a1ffdc 106882->106929 106885 a1ffdc 59 API calls 106886 a1ff45 106885->106886 106887 a07667 59 API calls 106886->106887 106888 a1ff51 106887->106888 106889 a07bcc 59 API calls 106888->106889 106890 a0f796 106889->106890 106891 a20162 6 API calls 106890->106891 106891->106854 106893 a07667 59 API calls 106892->106893 106894 a15f97 106893->106894 106895 a07667 59 API calls 106894->106895 106896 a15f9f 106895->106896 106936 a15a9d 106896->106936 106899 a15a9d 59 API calls 106900 a15faf 106899->106900 106901 a07667 59 API calls 106900->106901 106902 a15fba 106901->106902 106903 a20db6 Mailbox 59 API calls 106902->106903 106904 a0f908 106903->106904 106905 a160f9 106904->106905 106906 a16107 106905->106906 106907 a07667 59 API calls 106906->106907 106908 a16112 106907->106908 106909 a07667 59 API calls 106908->106909 106910 a1611d 106909->106910 106911 a07667 59 API calls 106910->106911 106912 a16128 106911->106912 106913 a07667 59 API calls 106912->106913 106914 a16133 106913->106914 106915 a15a9d 59 API calls 106914->106915 106916 a1613e 106915->106916 106917 a20db6 Mailbox 59 API calls 106916->106917 106918 a16145 RegisterWindowMessageW 106917->106918 106918->106868 106921 a5576f 106920->106921 106922 a1fdae 106920->106922 106939 a69ae7 60 API calls 106921->106939 106923 a20db6 Mailbox 59 API calls 106922->106923 106926 a1fdb6 106923->106926 106925 a5577a 106926->106872 106927->106879 106928->106881 106940 a671ed 65 API calls 106928->106940 106930 a07667 59 API calls 106929->106930 106931 a1ffe7 106930->106931 106932 a07667 59 API calls 106931->106932 106933 a1ffef 106932->106933 106934 a07667 59 API calls 106933->106934 106935 a1ff3b 106934->106935 106935->106885 106937 a07667 59 API calls 106936->106937 106938 a15aa5 106937->106938 106938->106899 106939->106925 106941 a0e5ab 106944 a0d100 106941->106944 106943 a0e5b9 106945 a0d11d 106944->106945 106972 a0d37d 106944->106972 106946 a426e0 106945->106946 106947 a42691 106945->106947 106971 a0d144 106945->106971 106988 a7a3e6 331 API calls __cinit 106946->106988 106949 a42694 106947->106949 106958 a426af 106947->106958 106951 a426a0 106949->106951 106949->106971 106986 a7a9fa 331 API calls 106951->106986 106954 a22d40 __cinit 67 API calls 106954->106971 106955 a0d434 106980 a08a52 68 API calls 106955->106980 106956 a428b5 106956->106956 106957 a0d54b 106957->106943 106958->106972 106987 a7aea2 331 API calls 3 library calls 106958->106987 106962 a427fc 106991 a7a751 89 API calls 106962->106991 106963 a0d443 106963->106943 106966 a084c0 69 API calls 106966->106971 106971->106954 106971->106955 106971->106957 106971->106962 106971->106966 106971->106972 106973 a09d3c 60 API calls 106971->106973 106975 a09ea0 331 API calls 106971->106975 106976 a08047 59 API calls 106971->106976 106978 a08740 68 API calls __cinit 106971->106978 106979 a08542 68 API calls 106971->106979 106981 a0843a 68 API calls 106971->106981 106982 a0cf7c 331 API calls 106971->106982 106983 a09dda 59 API calls Mailbox 106971->106983 106984 a0cf00 89 API calls 106971->106984 106985 a0cd7d 331 API calls 106971->106985 106989 a08a52 68 API calls 106971->106989 106990 a5678d 60 API calls 106971->106990 106972->106957 106992 a69e4a 89 API calls 4 library calls 106972->106992 106973->106971 106975->106971 106976->106971 106978->106971 106979->106971 106980->106963 106981->106971 106982->106971 106983->106971 106984->106971 106985->106971 106986->106957 106987->106972 106988->106971 106989->106971 106990->106971 106991->106972 106992->106956 106993 a4416f 106997 a55fe6 106993->106997 106995 a4417a 106996 a55fe6 85 API calls 106995->106996 106996->106995 107003 a56020 106997->107003 107005 a55ff3 106997->107005 106998 a56022 107009 a09328 84 API calls Mailbox 106998->107009 107000 a56027 107001 a09837 84 API calls 107000->107001 107002 a5602e 107001->107002 107004 a07b2e 59 API calls 107002->107004 107003->106995 107004->107003 107005->106998 107005->107000 107005->107003 107006 a5601a 107005->107006 107008 a095a0 59 API calls _wcsstr 107006->107008 107008->107003 107009->107000 107010 a0107d 107015 a0708b 107010->107015 107012 a0108c 107013 a22d40 __cinit 67 API calls 107012->107013 107014 a01096 107013->107014 107016 a0709b __write_nolock 107015->107016 107017 a07667 59 API calls 107016->107017 107018 a07151 107017->107018 107019 a04706 61 API calls 107018->107019 107020 a0715a 107019->107020 107046 a2050b 107020->107046 107023 a07cab 59 API calls 107024 a07173 107023->107024 107025 a03f74 59 API calls 107024->107025 107026 a07182 107025->107026 107027 a07667 59 API calls 107026->107027 107028 a0718b 107027->107028 107029 a07d8c 59 API calls 107028->107029 107030 a07194 RegOpenKeyExW 107029->107030 107031 a3e8b1 RegQueryValueExW 107030->107031 107035 a071b6 Mailbox 107030->107035 107032 a3e943 RegCloseKey 107031->107032 107033 a3e8ce 107031->107033 107032->107035 107044 a3e955 _wcscat Mailbox __NMSG_WRITE 107032->107044 107034 a20db6 Mailbox 59 API calls 107033->107034 107036 a3e8e7 107034->107036 107035->107012 107037 a0522e 59 API calls 107036->107037 107038 a3e8f2 RegQueryValueExW 107037->107038 107039 a3e90f 107038->107039 107041 a3e929 107038->107041 107040 a07bcc 59 API calls 107039->107040 107040->107041 107041->107032 107042 a07de1 59 API calls 107042->107044 107043 a03f74 59 API calls 107043->107044 107044->107035 107044->107042 107044->107043 107045 a079f2 59 API calls 107044->107045 107045->107044 107047 a31940 __write_nolock 107046->107047 107048 a20518 GetFullPathNameW 107047->107048 107049 a2053a 107048->107049 107050 a07bcc 59 API calls 107049->107050 107051 a07165 107050->107051 107051->107023 107052 cdd3f0 107066 cdb040 107052->107066 107054 cdd4c4 107069 cdd2e0 107054->107069 107072 cde4f0 GetPEB 107066->107072 107068 cdb6cb 107068->107054 107070 cdd2e9 Sleep 107069->107070 107071 cdd2f7 107070->107071 107073 cde51a 107072->107073 107073->107068 107074 a3fdfc 107112 a0ab30 Mailbox _memmove 107074->107112 107076 a5617e Mailbox 59 API calls 107096 a0a057 107076->107096 107077 a09c90 Mailbox 59 API calls 107077->107112 107078 a20db6 59 API calls Mailbox 107078->107112 107080 a0b525 107181 a69e4a 89 API calls 4 library calls 107080->107181 107082 a20db6 59 API calls Mailbox 107100 a09f37 Mailbox 107082->107100 107083 a40055 107180 a69e4a 89 API calls 4 library calls 107083->107180 107087 a0b475 107089 a08047 59 API calls 107087->107089 107088 a40064 107089->107096 107091 a0b47a 107091->107083 107103 a409e5 107091->107103 107094 a08047 59 API calls 107094->107100 107095 a07667 59 API calls 107095->107100 107097 a22d40 67 API calls __cinit 107097->107100 107098 a07de1 59 API calls 107098->107112 107099 a56e8f 59 API calls 107099->107100 107100->107082 107100->107083 107100->107087 107100->107091 107100->107094 107100->107095 107100->107096 107100->107097 107100->107099 107101 a409d6 107100->107101 107104 a0a55a 107100->107104 107176 a0c8c0 331 API calls 2 library calls 107100->107176 107177 a0b900 60 API calls Mailbox 107100->107177 107184 a69e4a 89 API calls 4 library calls 107101->107184 107185 a69e4a 89 API calls 4 library calls 107103->107185 107183 a69e4a 89 API calls 4 library calls 107104->107183 107105 a7bc6b 331 API calls 107105->107112 107107 a0b2b6 107178 a0f6a3 331 API calls 107107->107178 107109 a09ea0 331 API calls 107109->107112 107110 a4086a 107111 a09c90 Mailbox 59 API calls 107110->107111 107115 a4085c 107111->107115 107112->107077 107112->107078 107112->107080 107112->107096 107112->107098 107112->107100 107112->107105 107112->107107 107112->107109 107112->107110 107113 a40878 107112->107113 107112->107115 107116 a0b21c 107112->107116 107119 a56e8f 59 API calls 107112->107119 107124 a7445a 331 API calls 107112->107124 107125 a7df37 107112->107125 107128 a7df23 107112->107128 107131 a68715 107112->107131 107135 a7c2e0 107112->107135 107167 a67956 107112->107167 107173 a5617e 107112->107173 107179 a7c193 85 API calls 2 library calls 107112->107179 107182 a69e4a 89 API calls 4 library calls 107113->107182 107115->107076 107115->107096 107117 a09d3c 60 API calls 107116->107117 107118 a0b22d 107117->107118 107120 a09d3c 60 API calls 107118->107120 107119->107112 107120->107107 107124->107112 107186 a7cadd 107125->107186 107127 a7df47 107127->107112 107129 a7cadd 130 API calls 107128->107129 107130 a7df33 107129->107130 107130->107112 107132 a6871e 107131->107132 107134 a68723 107131->107134 107275 a677b3 107132->107275 107134->107112 107136 a07667 59 API calls 107135->107136 107137 a7c2f4 107136->107137 107138 a07667 59 API calls 107137->107138 107139 a7c2fc 107138->107139 107140 a07667 59 API calls 107139->107140 107141 a7c304 107140->107141 107142 a09837 84 API calls 107141->107142 107154 a7c312 107142->107154 107143 a7c528 Mailbox 107143->107112 107144 a07bcc 59 API calls 107144->107154 107145 a07924 59 API calls 107145->107154 107147 a7c4e2 107150 a07cab 59 API calls 107147->107150 107148 a7c4fd 107151 a07cab 59 API calls 107148->107151 107149 a08047 59 API calls 107149->107154 107152 a7c4ef 107150->107152 107153 a7c50c 107151->107153 107156 a07b2e 59 API calls 107152->107156 107157 a07b2e 59 API calls 107153->107157 107154->107143 107154->107144 107154->107145 107154->107147 107154->107148 107154->107149 107155 a07e4f 59 API calls 107154->107155 107158 a07e4f 59 API calls 107154->107158 107160 a7c4fb 107154->107160 107164 a07cab 59 API calls 107154->107164 107165 a09837 84 API calls 107154->107165 107166 a07b2e 59 API calls 107154->107166 107159 a7c3a9 CharUpperBuffW 107155->107159 107156->107160 107157->107160 107161 a7c469 CharUpperBuffW 107158->107161 107298 a0843a 68 API calls 107159->107298 107160->107143 107300 a09a3c 59 API calls Mailbox 107160->107300 107299 a0c5a7 69 API calls 2 library calls 107161->107299 107164->107154 107165->107154 107166->107154 107168 a67962 107167->107168 107169 a20db6 Mailbox 59 API calls 107168->107169 107170 a67970 107169->107170 107171 a6797e 107170->107171 107172 a07667 59 API calls 107170->107172 107171->107112 107172->107171 107301 a560c0 107173->107301 107175 a5618c 107175->107112 107176->107100 107177->107100 107178->107080 107179->107112 107180->107088 107181->107115 107182->107115 107183->107096 107184->107103 107185->107096 107187 a09837 84 API calls 107186->107187 107188 a7cb1a 107187->107188 107209 a7cb61 Mailbox 107188->107209 107224 a7d7a5 107188->107224 107190 a7cdb9 107191 a7cf2e 107190->107191 107195 a7cdc7 107190->107195 107262 a7d8c8 92 API calls Mailbox 107191->107262 107194 a7cf3d 107194->107195 107196 a7cf49 107194->107196 107237 a7c96e 107195->107237 107196->107209 107197 a09837 84 API calls 107207 a7cbb2 Mailbox 107197->107207 107202 a7ce00 107252 a20c08 107202->107252 107205 a7ce33 107208 a092ce 59 API calls 107205->107208 107206 a7ce1a 107258 a69e4a 89 API calls 4 library calls 107206->107258 107207->107190 107207->107197 107207->107209 107256 a7fbce 59 API calls 2 library calls 107207->107256 107257 a7cfdf 61 API calls 2 library calls 107207->107257 107211 a7ce3f 107208->107211 107209->107127 107213 a09050 59 API calls 107211->107213 107212 a7ce25 GetCurrentProcess TerminateProcess 107212->107205 107214 a7ce55 107213->107214 107223 a7ce7c 107214->107223 107259 a08d40 59 API calls Mailbox 107214->107259 107216 a7cfa4 107216->107209 107220 a7cfb8 FreeLibrary 107216->107220 107217 a7ce6b 107260 a7d649 107 API calls _free 107217->107260 107220->107209 107222 a09d3c 60 API calls 107222->107223 107223->107216 107223->107222 107261 a08d40 59 API calls Mailbox 107223->107261 107263 a7d649 107 API calls _free 107223->107263 107225 a07e4f 59 API calls 107224->107225 107226 a7d7c0 CharLowerBuffW 107225->107226 107264 a5f167 107226->107264 107230 a07667 59 API calls 107231 a7d7f9 107230->107231 107232 a0784b 59 API calls 107231->107232 107233 a7d810 107232->107233 107234 a07d2c 59 API calls 107233->107234 107235 a7d81c Mailbox 107234->107235 107236 a7d858 Mailbox 107235->107236 107271 a7cfdf 61 API calls 2 library calls 107235->107271 107236->107207 107238 a7c9de 107237->107238 107239 a7c989 107237->107239 107243 a7da50 107238->107243 107240 a20db6 Mailbox 59 API calls 107239->107240 107242 a7c9ab 107240->107242 107241 a20db6 Mailbox 59 API calls 107241->107242 107242->107238 107242->107241 107244 a7dc79 Mailbox 107243->107244 107248 a7da73 _strcat _wcscpy __NMSG_WRITE 107243->107248 107244->107202 107245 a09be6 59 API calls 107245->107248 107246 a09b3c 59 API calls 107246->107248 107247 a09b98 59 API calls 107247->107248 107248->107244 107248->107245 107248->107246 107248->107247 107249 a2571c 58 API calls __crtGetStringTypeA_stat 107248->107249 107250 a09837 84 API calls 107248->107250 107274 a65887 61 API calls 2 library calls 107248->107274 107249->107248 107250->107248 107254 a20c1d 107252->107254 107253 a20cb5 VirtualProtect 107255 a20c83 107253->107255 107254->107253 107254->107255 107255->107205 107255->107206 107256->107207 107257->107207 107258->107212 107259->107217 107260->107223 107261->107223 107262->107194 107263->107223 107265 a5f192 __NMSG_WRITE 107264->107265 107266 a5f278 107265->107266 107267 a5f1c7 107265->107267 107270 a5f1d1 107265->107270 107266->107270 107273 a078c4 61 API calls 107266->107273 107267->107270 107272 a078c4 61 API calls 107267->107272 107270->107230 107270->107235 107271->107236 107272->107267 107273->107266 107274->107248 107276 a677ca 107275->107276 107291 a678ea 107275->107291 107277 a6780a 107276->107277 107278 a677e2 107276->107278 107281 a67821 107276->107281 107279 a20db6 Mailbox 59 API calls 107277->107279 107278->107277 107280 a677f2 107278->107280 107295 a67800 Mailbox _memmove 107279->107295 107287 a20db6 Mailbox 59 API calls 107280->107287 107284 a20db6 Mailbox 59 API calls 107281->107284 107292 a6783e 107281->107292 107282 a67877 107286 a20db6 Mailbox 59 API calls 107282->107286 107283 a67869 107285 a20db6 Mailbox 59 API calls 107283->107285 107284->107292 107285->107295 107288 a6787d 107286->107288 107287->107295 107296 a6746b 59 API calls Mailbox 107288->107296 107289 a20db6 Mailbox 59 API calls 107289->107291 107291->107134 107292->107282 107292->107283 107292->107295 107293 a67889 107297 a05a15 61 API calls Mailbox 107293->107297 107295->107289 107296->107293 107297->107295 107298->107154 107299->107154 107300->107143 107302 a560e8 107301->107302 107303 a560cb 107301->107303 107302->107175 107303->107302 107305 a560ab 59 API calls Mailbox 107303->107305 107305->107303

                              Control-flow Graph

                              APIs
                              • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00A03B68
                              • IsDebuggerPresent.KERNEL32 ref: 00A03B7A
                              • GetFullPathNameW.KERNEL32(00007FFF,?,?,00AC52F8,00AC52E0,?,?), ref: 00A03BEB
                                • Part of subcall function 00A07BCC: _memmove.LIBCMT ref: 00A07C06
                                • Part of subcall function 00A1092D: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,00A03C14,00AC52F8,?,?,?), ref: 00A1096E
                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00A03C6F
                              • MessageBoxA.USER32(00000000,This is a third-party compiled AutoIt script.,00AB7770,00000010), ref: 00A3D281
                              • SetCurrentDirectoryW.KERNEL32(?,00AC52F8,?,?,?), ref: 00A3D2B9
                              • GetForegroundWindow.USER32(runas,?,?,?,00000001,?,00AB4260,00AC52F8,?,?,?), ref: 00A3D33F
                              • ShellExecuteW.SHELL32(00000000,?,?), ref: 00A3D346
                                • Part of subcall function 00A03A46: GetSysColorBrush.USER32(0000000F), ref: 00A03A50
                                • Part of subcall function 00A03A46: LoadCursorW.USER32(00000000,00007F00), ref: 00A03A5F
                                • Part of subcall function 00A03A46: LoadIconW.USER32(00000063), ref: 00A03A76
                                • Part of subcall function 00A03A46: LoadIconW.USER32(000000A4), ref: 00A03A88
                                • Part of subcall function 00A03A46: LoadIconW.USER32(000000A2), ref: 00A03A9A
                                • Part of subcall function 00A03A46: LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00A03AC0
                                • Part of subcall function 00A03A46: RegisterClassExW.USER32(?), ref: 00A03B16
                                • Part of subcall function 00A039D5: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00A03A03
                                • Part of subcall function 00A039D5: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00A03A24
                                • Part of subcall function 00A039D5: ShowWindow.USER32(00000000,?,?), ref: 00A03A38
                                • Part of subcall function 00A039D5: ShowWindow.USER32(00000000,?,?), ref: 00A03A41
                                • Part of subcall function 00A0434A: _memset.LIBCMT ref: 00A04370
                                • Part of subcall function 00A0434A: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00A04415
                              Strings
                              • This is a third-party compiled AutoIt script., xrefs: 00A3D279
                              • runas, xrefs: 00A3D33A
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: LoadWindow$Icon$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__memmove_memset
                              • String ID: This is a third-party compiled AutoIt script.$runas
                              • API String ID: 529118366-3287110873
                              • Opcode ID: 4ac4dabf4da4f6ff2c4deb22e36a17e40fd0901a8e1309046e54c4a23809897a
                              • Instruction ID: 5c4cd4ebda6093fe2f08ad5d3ab072ff75c10f3819e3843d22a7e92c8e56250a
                              • Opcode Fuzzy Hash: 4ac4dabf4da4f6ff2c4deb22e36a17e40fd0901a8e1309046e54c4a23809897a
                              • Instruction Fuzzy Hash: 7451B371D0814DAEDF11EBF5FD05EED7BBCAB49740F014069F421A61E2DAB06A86CB21

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 996 a049a0-a04a00 call a07667 GetVersionExW call a07bcc 1001 a04a06 996->1001 1002 a04b0b-a04b0d 996->1002 1004 a04a09-a04a0e 1001->1004 1003 a3d767-a3d773 1002->1003 1005 a3d774-a3d778 1003->1005 1006 a04b12-a04b13 1004->1006 1007 a04a14 1004->1007 1009 a3d77b-a3d787 1005->1009 1010 a3d77a 1005->1010 1008 a04a15-a04a4c call a07d2c call a07726 1006->1008 1007->1008 1018 a04a52-a04a53 1008->1018 1019 a3d864-a3d867 1008->1019 1009->1005 1012 a3d789-a3d78e 1009->1012 1010->1009 1012->1004 1014 a3d794-a3d79b 1012->1014 1014->1003 1016 a3d79d 1014->1016 1020 a3d7a2-a3d7a5 1016->1020 1018->1020 1021 a04a59-a04a64 1018->1021 1022 a3d880-a3d884 1019->1022 1023 a3d869 1019->1023 1024 a04a93-a04aaa GetCurrentProcess IsWow64Process 1020->1024 1025 a3d7ab-a3d7c9 1020->1025 1026 a3d7ea-a3d7f0 1021->1026 1027 a04a6a-a04a6c 1021->1027 1030 a3d886-a3d88f 1022->1030 1031 a3d86f-a3d878 1022->1031 1028 a3d86c 1023->1028 1032 a04aac 1024->1032 1033 a04aaf-a04ac0 1024->1033 1025->1024 1029 a3d7cf-a3d7d5 1025->1029 1038 a3d7f2-a3d7f5 1026->1038 1039 a3d7fa-a3d800 1026->1039 1034 a04a72-a04a75 1027->1034 1035 a3d805-a3d811 1027->1035 1028->1031 1036 a3d7d7-a3d7da 1029->1036 1037 a3d7df-a3d7e5 1029->1037 1030->1028 1040 a3d891-a3d894 1030->1040 1031->1022 1032->1033 1041 a04ac2-a04ad2 call a04b37 1033->1041 1042 a04b2b-a04b35 GetSystemInfo 1033->1042 1043 a3d831-a3d834 1034->1043 1044 a04a7b-a04a8a 1034->1044 1046 a3d813-a3d816 1035->1046 1047 a3d81b-a3d821 1035->1047 1036->1024 1037->1024 1038->1024 1039->1024 1040->1031 1053 a04ad4-a04ae1 call a04b37 1041->1053 1054 a04b1f-a04b29 GetSystemInfo 1041->1054 1045 a04af8-a04b08 1042->1045 1043->1024 1052 a3d83a-a3d84f 1043->1052 1049 a04a90 1044->1049 1050 a3d826-a3d82c 1044->1050 1046->1024 1047->1024 1049->1024 1050->1024 1055 a3d851-a3d854 1052->1055 1056 a3d859-a3d85f 1052->1056 1061 a04ae3-a04ae7 GetNativeSystemInfo 1053->1061 1062 a04b18-a04b1d 1053->1062 1057 a04ae9-a04aed 1054->1057 1055->1024 1056->1024 1057->1045 1059 a04aef-a04af2 FreeLibrary 1057->1059 1059->1045 1061->1057 1062->1061
                              APIs
                              • GetVersionExW.KERNEL32(?), ref: 00A049CD
                                • Part of subcall function 00A07BCC: _memmove.LIBCMT ref: 00A07C06
                              • GetCurrentProcess.KERNEL32(?,00A8FAEC,00000000,00000000,?), ref: 00A04A9A
                              • IsWow64Process.KERNEL32(00000000), ref: 00A04AA1
                              • GetNativeSystemInfo.KERNELBASE(00000000), ref: 00A04AE7
                              • FreeLibrary.KERNEL32(00000000), ref: 00A04AF2
                              • GetSystemInfo.KERNEL32(00000000), ref: 00A04B23
                              • GetSystemInfo.KERNEL32(00000000), ref: 00A04B2F
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: InfoSystem$Process$CurrentFreeLibraryNativeVersionWow64_memmove
                              • String ID:
                              • API String ID: 1986165174-0
                              • Opcode ID: d9f002a5a512c25739e6d3780ef5b572c8bcb9eef38e19fdf8e9f20b1443991e
                              • Instruction ID: 1b7d83f0adf59246f1420253b85e82f956f41e42cf76c33545d930c1450201ce
                              • Opcode Fuzzy Hash: d9f002a5a512c25739e6d3780ef5b572c8bcb9eef38e19fdf8e9f20b1443991e
                              • Instruction Fuzzy Hash: CC91A4719897C5DECB31DB68A5501AAFFF5BF2A300F4449ADE1C793A81D220B908C769

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1063 a04e89-a04ea1 CreateStreamOnHGlobal 1064 a04ec1-a04ec6 1063->1064 1065 a04ea3-a04eba FindResourceExW 1063->1065 1066 a3d933-a3d942 LoadResource 1065->1066 1067 a04ec0 1065->1067 1066->1067 1068 a3d948-a3d956 SizeofResource 1066->1068 1067->1064 1068->1067 1069 a3d95c-a3d967 LockResource 1068->1069 1069->1067 1070 a3d96d-a3d975 1069->1070 1071 a3d979-a3d98b 1070->1071 1071->1067
                              APIs
                              • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?,?,?,?,?,00A04D8E,?,?,00000000,00000000), ref: 00A04E99
                              • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,00A04D8E,?,?,00000000,00000000), ref: 00A04EB0
                              • LoadResource.KERNEL32(?,00000000,?,?,00A04D8E,?,?,00000000,00000000,?,?,?,?,?,?,00A04E2F), ref: 00A3D937
                              • SizeofResource.KERNEL32(?,00000000,?,?,00A04D8E,?,?,00000000,00000000,?,?,?,?,?,?,00A04E2F), ref: 00A3D94C
                              • LockResource.KERNEL32(00A04D8E,?,?,00A04D8E,?,?,00000000,00000000,?,?,?,?,?,?,00A04E2F,00000000), ref: 00A3D95F
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                              • String ID: SCRIPT
                              • API String ID: 3051347437-3967369404
                              • Opcode ID: 1ce7e4dbc41b7f900acd284fe3673e96845466b6e738093468496ec7c2777848
                              • Instruction ID: 53c77deb2e3f1e86f0519803955772b9db592a34d55cea4556950439c374dda1
                              • Opcode Fuzzy Hash: 1ce7e4dbc41b7f900acd284fe3673e96845466b6e738093468496ec7c2777848
                              • Instruction Fuzzy Hash: 12115EB5240705BFD7218BA5EC48FA77BBAFBC9B51F204268F505C62A0DB71E8028660
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: BuffCharUpper
                              • String ID:
                              • API String ID: 3964851224-0
                              • Opcode ID: d4cd3b073bd3da0563ec709172d0bc467246acf25060961f7d30ab35c4d3276e
                              • Instruction ID: 52c09fd0841652770406807361f945a3bd926edb485dcf4b67ef71c211b48abd
                              • Opcode Fuzzy Hash: d4cd3b073bd3da0563ec709172d0bc467246acf25060961f7d30ab35c4d3276e
                              • Instruction Fuzzy Hash: 6E926A746083419FD720DF18C580B6AB7F1BF89304F14896DE89A9B392D7B5EC85CB92
                              APIs
                              • GetFileAttributesW.KERNELBASE(?,00A3E398), ref: 00A6446A
                              • FindFirstFileW.KERNELBASE(?,?), ref: 00A6447B
                              • FindClose.KERNEL32(00000000), ref: 00A6448B
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: FileFind$AttributesCloseFirst
                              • String ID:
                              • API String ID: 48322524-0
                              • Opcode ID: 20b886469cd33c98d9bd76870f3736f82f1d47ef9c0e5156179ac0c409a8fb7c
                              • Instruction ID: 9610ae129add7d75de9d28a709a28fb800b5bafd3edd2eae89ab440a02e0ec81
                              • Opcode Fuzzy Hash: 20b886469cd33c98d9bd76870f3736f82f1d47ef9c0e5156179ac0c409a8fb7c
                              • Instruction Fuzzy Hash: 69E0DF328109026F8210AB78EC0E8EA77AC9E49336F204726F835C20E0FBB499009696
                              Strings
                              • Variable must be of type 'Object'., xrefs: 00A43E62
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID:
                              • String ID: Variable must be of type 'Object'.
                              • API String ID: 0-109567571
                              • Opcode ID: 8b67c1b61b0b7c7592677befeaefd29ad0bca7967f1cf25c6d00e62723667981
                              • Instruction ID: 22ea5ce162d0ebb1416a08758e3078cf4118b2edf2533c792c1e5f71802ef98a
                              • Opcode Fuzzy Hash: 8b67c1b61b0b7c7592677befeaefd29ad0bca7967f1cf25c6d00e62723667981
                              • Instruction Fuzzy Hash: BEA29F75A00209CFCF24CF98E580AAEB7B1FF59314F248969E905AB391D735ED42DB90
                              APIs
                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00A10A5B
                              • timeGetTime.WINMM ref: 00A10D16
                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00A10E53
                              • Sleep.KERNEL32(0000000A), ref: 00A10E61
                              • LockWindowUpdate.USER32(00000000,?,?), ref: 00A10EFA
                              • DestroyWindow.USER32 ref: 00A10F06
                              • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00A10F20
                              • Sleep.KERNEL32(0000000A,?,?), ref: 00A44E83
                              • TranslateMessage.USER32(?), ref: 00A45C60
                              • DispatchMessageW.USER32(?), ref: 00A45C6E
                              • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00A45C82
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: Message$PeekSleepWindow$DestroyDispatchLockTimeTranslateUpdatetime
                              • String ID: @COM_EVENTOBJ$@GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE$@TRAY_ID
                              • API String ID: 4212290369-3242690629
                              • Opcode ID: 0b4d6a9705bd130cce3f0723ca72ce14398b1bf462eafd273276c3d7524f0c6d
                              • Instruction ID: 7569b071fa880ba1bd8e62d7ca3e3a2aab9bbfae228497e0a8b260c8d1ecebf4
                              • Opcode Fuzzy Hash: 0b4d6a9705bd130cce3f0723ca72ce14398b1bf462eafd273276c3d7524f0c6d
                              • Instruction Fuzzy Hash: 76B2BF74A08741DFD728DF24C984FAAB7E5BF84304F14491DF589972A2DBB1E885CB82

                              Control-flow Graph

                              APIs
                                • Part of subcall function 00A68F5F: __time64.LIBCMT ref: 00A68F69
                                • Part of subcall function 00A04EE5: _fseek.LIBCMT ref: 00A04EFD
                              • __wsplitpath.LIBCMT ref: 00A69234
                                • Part of subcall function 00A240FB: __wsplitpath_helper.LIBCMT ref: 00A2413B
                              • _wcscpy.LIBCMT ref: 00A69247
                              • _wcscat.LIBCMT ref: 00A6925A
                              • __wsplitpath.LIBCMT ref: 00A6927F
                              • _wcscat.LIBCMT ref: 00A69295
                              • _wcscat.LIBCMT ref: 00A692A8
                                • Part of subcall function 00A68FA5: _memmove.LIBCMT ref: 00A68FDE
                                • Part of subcall function 00A68FA5: _memmove.LIBCMT ref: 00A68FED
                              • _wcscmp.LIBCMT ref: 00A691EF
                                • Part of subcall function 00A69734: _wcscmp.LIBCMT ref: 00A69824
                                • Part of subcall function 00A69734: _wcscmp.LIBCMT ref: 00A69837
                              • DeleteFileW.KERNEL32(?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 00A69452
                              • _wcsncpy.LIBCMT ref: 00A694C5
                              • DeleteFileW.KERNEL32(?,?), ref: 00A694FB
                              • CopyFileW.KERNEL32(?,?,00000000,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00A69511
                              • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00A69522
                              • DeleteFileW.KERNELBASE(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00A69534
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: File$Delete$_wcscat_wcscmp$__wsplitpath_memmove$Copy__time64__wsplitpath_helper_fseek_wcscpy_wcsncpy
                              • String ID:
                              • API String ID: 1500180987-0
                              • Opcode ID: 306adaf90e2634146c8ab534f3a8217864b3dc7666462dccde902085b3e9303f
                              • Instruction ID: 560de522628e57e720cc0b412ed6107eec252b3e8c3384e1de83a043ad2892f5
                              • Opcode Fuzzy Hash: 306adaf90e2634146c8ab534f3a8217864b3dc7666462dccde902085b3e9303f
                              • Instruction Fuzzy Hash: AAC14EB1D00229AADF11DFA5DD85ADFBBBDEF49310F0040AAF609E7151EB309A458F61

                              Control-flow Graph

                              APIs
                              • GetSysColorBrush.USER32(0000000F), ref: 00A03074
                              • RegisterClassExW.USER32(00000030), ref: 00A0309E
                              • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00A030AF
                              • InitCommonControlsEx.COMCTL32(?), ref: 00A030CC
                              • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00A030DC
                              • LoadIconW.USER32(000000A9), ref: 00A030F2
                              • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00A03101
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                              • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                              • API String ID: 2914291525-1005189915
                              • Opcode ID: 71716c731823221074342d4eeb08e6efa3f8443a4d0ed3d1f9137c683575f23c
                              • Instruction ID: a18b395584e1f85331e03e4a82c532f80bd658ef3f71db56469d79bab2f8ae25
                              • Opcode Fuzzy Hash: 71716c731823221074342d4eeb08e6efa3f8443a4d0ed3d1f9137c683575f23c
                              • Instruction Fuzzy Hash: 6B31E7B1D4020AEFDB10DFE4E889AC9BBF0FB08310F15452AF581E62A0E7B91596CF51

                              Control-flow Graph

                              APIs
                              • GetSysColorBrush.USER32(0000000F), ref: 00A03074
                              • RegisterClassExW.USER32(00000030), ref: 00A0309E
                              • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00A030AF
                              • InitCommonControlsEx.COMCTL32(?), ref: 00A030CC
                              • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00A030DC
                              • LoadIconW.USER32(000000A9), ref: 00A030F2
                              • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00A03101
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                              • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                              • API String ID: 2914291525-1005189915
                              • Opcode ID: 2c6d7c24e7ad0b82bccb334ef455115a9acb90ab7c3cc595adee64ea92a42c94
                              • Instruction ID: 01a0d6abcf213f32fc8404e60b71afd029a97db0ffed508369ce62610d1732e9
                              • Opcode Fuzzy Hash: 2c6d7c24e7ad0b82bccb334ef455115a9acb90ab7c3cc595adee64ea92a42c94
                              • Instruction Fuzzy Hash: D521C2B1D11219AFEB00DFE4EC89BDDBBF4FB08710F10412AF911A62A0D7B155969F91

                              Control-flow Graph

                              APIs
                                • Part of subcall function 00A04706: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00AC52F8,?,00A037AE,?), ref: 00A04724
                                • Part of subcall function 00A2050B: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,00A07165), ref: 00A2052D
                              • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 00A071A8
                              • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 00A3E8C8
                              • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 00A3E909
                              • RegCloseKey.ADVAPI32(?), ref: 00A3E947
                              • _wcscat.LIBCMT ref: 00A3E9A0
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: NameQueryValue$CloseFileFullModuleOpenPath_wcscat
                              • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                              • API String ID: 2673923337-2727554177
                              • Opcode ID: 44c78365983bd414e20d2694de71c313ec50e5da207761e19b06c021d50ea8e9
                              • Instruction ID: 9df4156661238d80e8709d7bbbc26bbc0d866ad5c9d5ff89bdd4152df2994039
                              • Opcode Fuzzy Hash: 44c78365983bd414e20d2694de71c313ec50e5da207761e19b06c021d50ea8e9
                              • Instruction Fuzzy Hash: DF718E71908305AEC700EFA9ED81DAFBBE8FF84350F41092EF445871A1EB71A949CB52

                              Control-flow Graph

                              APIs
                              • GetSysColorBrush.USER32(0000000F), ref: 00A03A50
                              • LoadCursorW.USER32(00000000,00007F00), ref: 00A03A5F
                              • LoadIconW.USER32(00000063), ref: 00A03A76
                              • LoadIconW.USER32(000000A4), ref: 00A03A88
                              • LoadIconW.USER32(000000A2), ref: 00A03A9A
                              • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00A03AC0
                              • RegisterClassExW.USER32(?), ref: 00A03B16
                                • Part of subcall function 00A03041: GetSysColorBrush.USER32(0000000F), ref: 00A03074
                                • Part of subcall function 00A03041: RegisterClassExW.USER32(00000030), ref: 00A0309E
                                • Part of subcall function 00A03041: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00A030AF
                                • Part of subcall function 00A03041: InitCommonControlsEx.COMCTL32(?), ref: 00A030CC
                                • Part of subcall function 00A03041: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00A030DC
                                • Part of subcall function 00A03041: LoadIconW.USER32(000000A9), ref: 00A030F2
                                • Part of subcall function 00A03041: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00A03101
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                              • String ID: #$0$AutoIt v3
                              • API String ID: 423443420-4155596026
                              • Opcode ID: 90ce6ea9f0feb32287fb3052363aa4631224639c329d4ab8210e420a3d93cd5a
                              • Instruction ID: 423b359d360777f7b7c441237913403469dfbb60d30f6482e1718131637e8768
                              • Opcode Fuzzy Hash: 90ce6ea9f0feb32287fb3052363aa4631224639c329d4ab8210e420a3d93cd5a
                              • Instruction Fuzzy Hash: C121F3B1D00309AFEB10DFF4ED49B9D7BF4EB08711F11012AF504AA2A1D3B666928B94

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 767 a03633-a03681 769 a036e1-a036e3 767->769 770 a03683-a03686 767->770 769->770 773 a036e5 769->773 771 a036e7 770->771 772 a03688-a0368f 770->772 777 a036ed-a036f0 771->777 778 a3d0cc-a3d0fa call a11070 call a11093 771->778 774 a03695-a0369a 772->774 775 a0374b-a03753 PostQuitMessage 772->775 776 a036ca-a036d2 DefWindowProcW 773->776 780 a036a0-a036a2 774->780 781 a3d154-a3d168 call a62527 774->781 782 a03711-a03713 775->782 783 a036d8-a036de 776->783 784 a036f2-a036f3 777->784 785 a03715-a0373c SetTimer RegisterWindowMessageW 777->785 812 a3d0ff-a3d106 778->812 787 a03755-a0375f call a044a0 780->787 788 a036a8-a036ad 780->788 781->782 806 a3d16e 781->806 782->783 791 a036f9-a0370c KillTimer call a0443a call a03114 784->791 792 a3d06f-a3d072 784->792 785->782 789 a0373e-a03749 CreatePopupMenu 785->789 807 a03764 787->807 794 a036b3-a036b8 788->794 795 a3d139-a3d140 788->795 789->782 791->782 798 a3d074-a3d076 792->798 799 a3d0a8-a3d0c7 MoveWindow 792->799 804 a3d124-a3d134 call a62d36 794->804 805 a036be-a036c4 794->805 795->776 802 a3d146-a3d14f call a57c36 795->802 808 a3d097-a3d0a3 SetFocus 798->808 809 a3d078-a3d07b 798->809 799->782 802->776 804->782 805->776 805->812 806->776 807->782 808->782 809->805 813 a3d081-a3d092 call a11070 809->813 812->776 816 a3d10c-a3d11f call a0443a call a0434a 812->816 813->782 816->776
                              APIs
                              • DefWindowProcW.USER32(?,?,?,?), ref: 00A036D2
                              • KillTimer.USER32(?,00000001), ref: 00A036FC
                              • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00A0371F
                              • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00A0372A
                              • CreatePopupMenu.USER32 ref: 00A0373E
                              • PostQuitMessage.USER32(00000000), ref: 00A0374D
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                              • String ID: TaskbarCreated
                              • API String ID: 129472671-2362178303
                              • Opcode ID: 1d7049d39f62d7fd4f02d6a748a98d3a6a48f9ba53547ade1c9bdf399ad81d3c
                              • Instruction ID: 0fe016369f7248649dd5b13cded1cd21518c37c2380000b95e9d2b7b137d7a00
                              • Opcode Fuzzy Hash: 1d7049d39f62d7fd4f02d6a748a98d3a6a48f9ba53547ade1c9bdf399ad81d3c
                              • Instruction Fuzzy Hash: 9441C5B391050DABDF14DFB8FD09FBA37ADEB05300F500129F602962E1DA62A9929761

                              Control-flow Graph

                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: FileLibraryLoadModuleName__wcsicmp_l_memmove
                              • String ID: /AutoIt3ExecuteLine$/AutoIt3ExecuteScript$/AutoIt3OutputDebug$/ErrorStdOut$>>>AUTOIT NO CMDEXECUTE<<<$CMDLINE$CMDLINERAW
                              • API String ID: 1825951767-3513169116
                              • Opcode ID: ce60aba65fc3fde3e281075e92ca5a328ca650f56e3ee640544e847517099f15
                              • Instruction ID: 5b81afb684919cc7530d4b263ed5ea3ad36357c247e768a607e8cd927eac652b
                              • Opcode Fuzzy Hash: ce60aba65fc3fde3e281075e92ca5a328ca650f56e3ee640544e847517099f15
                              • Instruction Fuzzy Hash: 71A12972D1022DAACF05EBA4ED91EEEB7B8BF14310F440529F416A71D1EB746A48CB60

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 942 cdd640-cdd6ee call cdb040 945 cdd6f5-cdd71b call cde550 CreateFileW 942->945 948 cdd71d 945->948 949 cdd722-cdd732 945->949 950 cdd86d-cdd871 948->950 956 cdd739-cdd753 VirtualAlloc 949->956 957 cdd734 949->957 951 cdd8b3-cdd8b6 950->951 952 cdd873-cdd877 950->952 958 cdd8b9-cdd8c0 951->958 954 cdd879-cdd87c 952->954 955 cdd883-cdd887 952->955 954->955 961 cdd889-cdd893 955->961 962 cdd897-cdd89b 955->962 963 cdd75a-cdd771 ReadFile 956->963 964 cdd755 956->964 957->950 959 cdd915-cdd92a 958->959 960 cdd8c2-cdd8cd 958->960 967 cdd92c-cdd937 VirtualFree 959->967 968 cdd93a-cdd942 959->968 965 cdd8cf 960->965 966 cdd8d1-cdd8dd 960->966 961->962 969 cdd89d-cdd8a7 962->969 970 cdd8ab 962->970 971 cdd778-cdd7b8 VirtualAlloc 963->971 972 cdd773 963->972 964->950 965->959 975 cdd8df-cdd8ef 966->975 976 cdd8f1-cdd8fd 966->976 967->968 969->970 970->951 973 cdd7bf-cdd7da call cde7a0 971->973 974 cdd7ba 971->974 972->950 982 cdd7e5-cdd7ef 973->982 974->950 978 cdd913 975->978 979 cdd8ff-cdd908 976->979 980 cdd90a-cdd910 976->980 978->958 979->978 980->978 983 cdd7f1-cdd820 call cde7a0 982->983 984 cdd822-cdd836 call cde5b0 982->984 983->982 990 cdd838 984->990 991 cdd83a-cdd83e 984->991 990->950 992 cdd84a-cdd84e 991->992 993 cdd840-cdd844 CloseHandle 991->993 994 cdd85e-cdd867 992->994 995 cdd850-cdd85b VirtualFree 992->995 993->992 994->945 994->950 995->994
                              APIs
                              • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 00CDD711
                              • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 00CDD937
                              Memory Dump Source
                              • Source File: 00000000.00000002.1460615264.0000000000CDB000.00000040.00000020.00020000.00000000.sdmp, Offset: 00CDB000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cdb000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: CreateFileFreeVirtual
                              • String ID:
                              • API String ID: 204039940-0
                              • Opcode ID: c604c45430315f2d7ac9edfc96fa3ed3524b16f7139e20e6f85f26396c7b052c
                              • Instruction ID: b8572f427b54b8c9271515550420ca9153a96c68c5afd6408029b355824816dd
                              • Opcode Fuzzy Hash: c604c45430315f2d7ac9edfc96fa3ed3524b16f7139e20e6f85f26396c7b052c
                              • Instruction Fuzzy Hash: F4A11874E00209EBDB14DFA5C894BEEBBB5FF48304F20855AE216BB380D7759A41DB94

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1073 a039d5-a03a45 CreateWindowExW * 2 ShowWindow * 2
                              APIs
                              • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00A03A03
                              • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00A03A24
                              • ShowWindow.USER32(00000000,?,?), ref: 00A03A38
                              • ShowWindow.USER32(00000000,?,?), ref: 00A03A41
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: Window$CreateShow
                              • String ID: AutoIt v3$edit
                              • API String ID: 1584632944-3779509399
                              • Opcode ID: dbea388424b5f9b28e3991a3665d2ee4760623595f94e6c515cbd077d842e646
                              • Instruction ID: 48d39f7478ec2a00f218db581cf354c44016106f107c26fbfff199d12bb3886f
                              • Opcode Fuzzy Hash: dbea388424b5f9b28e3991a3665d2ee4760623595f94e6c515cbd077d842e646
                              • Instruction Fuzzy Hash: 7BF03070900290BEEB3097A3AC48EA73EBDD7C6F50B010029B900B2170C2716882CA70

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1074 cdd3f0-cdd53a call cdb040 call cdd2e0 CreateFileW 1081 cdd53c 1074->1081 1082 cdd541-cdd551 1074->1082 1083 cdd5f1-cdd5f6 1081->1083 1085 cdd558-cdd572 VirtualAlloc 1082->1085 1086 cdd553 1082->1086 1087 cdd574 1085->1087 1088 cdd576-cdd58d ReadFile 1085->1088 1086->1083 1087->1083 1089 cdd58f 1088->1089 1090 cdd591-cdd5cb call cdd320 call cdc2e0 1088->1090 1089->1083 1095 cdd5cd-cdd5e2 call cdd370 1090->1095 1096 cdd5e7-cdd5ef ExitProcess 1090->1096 1095->1096 1096->1083
                              APIs
                                • Part of subcall function 00CDD2E0: Sleep.KERNELBASE(000001F4), ref: 00CDD2F1
                              • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 00CDD530
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1460615264.0000000000CDB000.00000040.00000020.00020000.00000000.sdmp, Offset: 00CDB000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cdb000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: CreateFileSleep
                              • String ID: NUER8AP6H5WNLVCUA
                              • API String ID: 2694422964-261232502
                              • Opcode ID: 340a37b9395223b628bacb60eb2df7803c1de40519dac5b87e949483112ada40
                              • Instruction ID: edbcba4c7d25971247ae852bbda65ba84a305542a48f8dd459b8e8b63f7b547b
                              • Opcode Fuzzy Hash: 340a37b9395223b628bacb60eb2df7803c1de40519dac5b87e949483112ada40
                              • Instruction Fuzzy Hash: 4B517070D14248DBEF11DBB4D854BEEBBB9AF18304F104199E209BB2C1D7BA5B44CB66

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1098 a0407c-a04092 1099 a04098-a040ad call a07a16 1098->1099 1100 a0416f-a04173 1098->1100 1103 a040b3-a040d3 call a07bcc 1099->1103 1104 a3d3c8-a3d3d7 LoadStringW 1099->1104 1107 a3d3e2-a3d3fa call a07b2e call a06fe3 1103->1107 1108 a040d9-a040dd 1103->1108 1104->1107 1117 a040ed-a0416a call a22de0 call a0454e call a22dbc Shell_NotifyIconW call a05904 1107->1117 1120 a3d400-a3d41e call a07cab call a06fe3 call a07cab 1107->1120 1110 a040e3-a040e8 call a07b2e 1108->1110 1111 a04174-a0417d call a08047 1108->1111 1110->1117 1111->1117 1117->1100 1120->1117
                              APIs
                              • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 00A3D3D7
                                • Part of subcall function 00A07BCC: _memmove.LIBCMT ref: 00A07C06
                              • _memset.LIBCMT ref: 00A040FC
                              • _wcscpy.LIBCMT ref: 00A04150
                              • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00A04160
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: IconLoadNotifyShell_String_memmove_memset_wcscpy
                              • String ID: Line:
                              • API String ID: 3942752672-1585850449
                              • Opcode ID: 53ff2de8d829289ec5edd93cf426f0b4bb403d464cda39b4d4aaec0ef6d87a28
                              • Instruction ID: 5d2d572f6a5a4914cac6baa874256a09fa208bef03f1bd20c27e969c035d62dc
                              • Opcode Fuzzy Hash: 53ff2de8d829289ec5edd93cf426f0b4bb403d464cda39b4d4aaec0ef6d87a28
                              • Instruction Fuzzy Hash: 4D31B2B1808309AED320EFA0FD45FDB77E8AF44304F10491AF685920D1DB74A649CB92

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1133 a2541d-a25436 1134 a25453 1133->1134 1135 a25438-a2543d 1133->1135 1137 a25455-a2545b 1134->1137 1135->1134 1136 a2543f-a25441 1135->1136 1138 a25443-a25448 call a28b28 1136->1138 1139 a2545c-a25461 1136->1139 1150 a2544e call a28db6 1138->1150 1141 a25463-a2546d 1139->1141 1142 a2546f-a25473 1139->1142 1141->1142 1144 a25493-a254a2 1141->1144 1145 a25483-a25485 1142->1145 1146 a25475-a25480 call a22de0 1142->1146 1148 a254a4-a254a7 1144->1148 1149 a254a9 1144->1149 1145->1138 1147 a25487-a25491 1145->1147 1146->1145 1147->1138 1147->1144 1152 a254ae-a254b3 1148->1152 1149->1152 1150->1134 1155 a254b9-a254c0 1152->1155 1156 a2559c-a2559f 1152->1156 1157 a254c2-a254ca 1155->1157 1158 a25501-a25503 1155->1158 1156->1137 1157->1158 1161 a254cc 1157->1161 1159 a25505-a25507 1158->1159 1160 a2556d-a2556e call a30ba7 1158->1160 1162 a2552b-a25536 1159->1162 1163 a25509-a25511 1159->1163 1169 a25573-a25577 1160->1169 1165 a254d2-a254d4 1161->1165 1166 a255ca 1161->1166 1170 a2553a-a2553d 1162->1170 1171 a25538 1162->1171 1167 a25513-a2551f 1163->1167 1168 a25521-a25525 1163->1168 1172 a254d6-a254d8 1165->1172 1173 a254db-a254e0 1165->1173 1174 a255ce-a255d7 1166->1174 1175 a25527-a25529 1167->1175 1168->1175 1169->1174 1176 a25579-a2557e 1169->1176 1177 a255a4-a255a8 1170->1177 1178 a2553f-a2554b call a246e6 call a30e5b 1170->1178 1171->1170 1172->1173 1173->1177 1179 a254e6-a254ff call a30cc8 1173->1179 1174->1137 1175->1170 1176->1177 1180 a25580-a25591 1176->1180 1181 a255ba-a255c5 call a28b28 1177->1181 1182 a255aa-a255b7 call a22de0 1177->1182 1194 a25550-a25555 1178->1194 1193 a25562-a2556b 1179->1193 1185 a25594-a25596 1180->1185 1181->1150 1182->1181 1185->1155 1185->1156 1193->1185 1195 a2555b-a2555e 1194->1195 1196 a255dc-a255e0 1194->1196 1195->1166 1197 a25560 1195->1197 1196->1174 1197->1193
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: _memset$__filbuf__getptd_noexit__read_nolock_memcpy_s
                              • String ID:
                              • API String ID: 1559183368-0
                              • Opcode ID: dfdd2df0ab245b9716d30a375d324e0946404ce6e082d96a71c3349c3dbc91e5
                              • Instruction ID: 243849ee16fc0ca7cbc6cc89d67c08ad07340be8490ee83058a82653c32e3566
                              • Opcode Fuzzy Hash: dfdd2df0ab245b9716d30a375d324e0946404ce6e082d96a71c3349c3dbc91e5
                              • Instruction Fuzzy Hash: 64518070E00B259BDB249F7DE98066EB7B6BF41325F248739F825962D1D770DD908B40
                              APIs
                                • Part of subcall function 00A04DDD: LoadLibraryExW.KERNEL32(?,00000000,00000002,?,00AC52F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00A04E0F
                              • _free.LIBCMT ref: 00A3E263
                              • _free.LIBCMT ref: 00A3E2AA
                                • Part of subcall function 00A06A8C: SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00A06BAD
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: _free$CurrentDirectoryLibraryLoad
                              • String ID: >>>AUTOIT SCRIPT<<<$Bad directive syntax error
                              • API String ID: 2861923089-1757145024
                              • Opcode ID: c6f3c6bef8fd8ba6f6db6ad086f3219da9d9f86640d1b9c68a69bca816f38362
                              • Instruction ID: d12c71afcfc9f2460ae0a3420ab221248a0adb8bfd6cc569c98335a5e1627537
                              • Opcode Fuzzy Hash: c6f3c6bef8fd8ba6f6db6ad086f3219da9d9f86640d1b9c68a69bca816f38362
                              • Instruction Fuzzy Hash: 0091587191021DAFCF08EFA4D9919EEB7B8BF19314F10442AF816AB2E1DB70A955CB50
                              APIs
                              • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,00000003,00000000,80000001,80000001,?,00A035A1,SwapMouseButtons,00000004,?), ref: 00A035D4
                              • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,00A035A1,SwapMouseButtons,00000004,?,?,?,?,00A02754), ref: 00A035F5
                              • RegCloseKey.KERNELBASE(00000000,?,?,00A035A1,SwapMouseButtons,00000004,?,?,?,?,00A02754), ref: 00A03617
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: CloseOpenQueryValue
                              • String ID: Control Panel\Mouse
                              • API String ID: 3677997916-824357125
                              • Opcode ID: 82820fbec06cc50554a3c5ef331f9379a87717c2e0cc4718ea6e129890f23f35
                              • Instruction ID: e9bb3728142f2580b82504a26eebd4b613c4e003612d1f0c79fdc42064dc20dd
                              • Opcode Fuzzy Hash: 82820fbec06cc50554a3c5ef331f9379a87717c2e0cc4718ea6e129890f23f35
                              • Instruction Fuzzy Hash: DE11487251020CBFDF20CFA4EC409AFB7BCEF04740F108469E805D7250E6729E419760
                              APIs
                              • CreateProcessW.KERNELBASE(?,00000000), ref: 00CDCB0D
                              • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 00CDCB31
                              • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 00CDCB53
                              Memory Dump Source
                              • Source File: 00000000.00000002.1460615264.0000000000CDB000.00000040.00000020.00020000.00000000.sdmp, Offset: 00CDB000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cdb000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: Process$ContextCreateMemoryReadThreadWow64
                              • String ID:
                              • API String ID: 2438371351-0
                              • Opcode ID: e8e7a77c1c38f92167ec50984bffac71589908538948dc0fdf133907e09ee162
                              • Instruction ID: 5743b45b547c3a4f75f1d6dd9f5ff7446326728304d3bb67a41d2c21e9669e46
                              • Opcode Fuzzy Hash: e8e7a77c1c38f92167ec50984bffac71589908538948dc0fdf133907e09ee162
                              • Instruction Fuzzy Hash: A7621E70A14259DBEB24CFA4C881BDEB376EF58300F1091A9D21DEB390E7759E81CB59
                              APIs
                                • Part of subcall function 00A04EE5: _fseek.LIBCMT ref: 00A04EFD
                                • Part of subcall function 00A69734: _wcscmp.LIBCMT ref: 00A69824
                                • Part of subcall function 00A69734: _wcscmp.LIBCMT ref: 00A69837
                              • _free.LIBCMT ref: 00A696A2
                              • _free.LIBCMT ref: 00A696A9
                              • _free.LIBCMT ref: 00A69714
                                • Part of subcall function 00A22D55: RtlFreeHeap.NTDLL(00000000,00000000,?,00A29A24), ref: 00A22D69
                                • Part of subcall function 00A22D55: GetLastError.KERNEL32(00000000,?,00A29A24), ref: 00A22D7B
                              • _free.LIBCMT ref: 00A6971C
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: _free$_wcscmp$ErrorFreeHeapLast_fseek
                              • String ID:
                              • API String ID: 1552873950-0
                              • Opcode ID: 57d0d2f04a8deae04fb8388104c663c78e861137db03f429770e89b5c3a69279
                              • Instruction ID: f2be66cb9a3ab9175e7ae186302d808eb31b3a63c76aab107c26c6fe75af58e4
                              • Opcode Fuzzy Hash: 57d0d2f04a8deae04fb8388104c663c78e861137db03f429770e89b5c3a69279
                              • Instruction Fuzzy Hash: FC514DB1D04259AFDF249F64DC81A9EBBB9FF48300F1045AEF609A3241DB715A90CF58
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                              • String ID:
                              • API String ID: 2782032738-0
                              • Opcode ID: 998aeda2236a74d80706e5f9a46343bd1135ee917ddd04e378ba6ed458c3dace
                              • Instruction ID: b23306783b40eaca12b45ac89fd486af644d8b33294e1e35aa105e0005e12a04
                              • Opcode Fuzzy Hash: 998aeda2236a74d80706e5f9a46343bd1135ee917ddd04e378ba6ed458c3dace
                              • Instruction Fuzzy Hash: 3341D775B00B659FDB18CF6DE9809AE7BB6EF49360B24813DE825C7640D770DD408B40
                              APIs
                              • _memset.LIBCMT ref: 00A044CF
                                • Part of subcall function 00A0407C: _memset.LIBCMT ref: 00A040FC
                                • Part of subcall function 00A0407C: _wcscpy.LIBCMT ref: 00A04150
                                • Part of subcall function 00A0407C: Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00A04160
                              • KillTimer.USER32(?,00000001,?,?), ref: 00A04524
                              • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00A04533
                              • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00A3D4B9
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: IconNotifyShell_Timer_memset$Kill_wcscpy
                              • String ID:
                              • API String ID: 1378193009-0
                              • Opcode ID: b79205f6f999ed4222e950f6edba84619579d667140909ca85079272dc692ea6
                              • Instruction ID: 43e5ad1fb00a480a3be48dcc5b9e55e228cf06d6bdacd76fa335fda5c426210b
                              • Opcode Fuzzy Hash: b79205f6f999ed4222e950f6edba84619579d667140909ca85079272dc692ea6
                              • Instruction Fuzzy Hash: 5521C5B0904798AFE732CB64AC55BE6BBECAB05318F04009DF79A5A181C3742D85CB51
                              APIs
                              • _memset.LIBCMT ref: 00A3EA39
                              • GetOpenFileNameW.COMDLG32(?), ref: 00A3EA83
                                • Part of subcall function 00A04750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00A04743,?,?,00A037AE,?), ref: 00A04770
                                • Part of subcall function 00A20791: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00A207B0
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: Name$Path$FileFullLongOpen_memset
                              • String ID: X
                              • API String ID: 3777226403-3081909835
                              • Opcode ID: 7c8c290a296ca843265ba7ffa7c999c968cccd5004d8131b8e56f78b64d50916
                              • Instruction ID: bcaab4be8f974a2ef1ee84ef39c1a762ef6efdd27996ad07c7af4deb0df08999
                              • Opcode Fuzzy Hash: 7c8c290a296ca843265ba7ffa7c999c968cccd5004d8131b8e56f78b64d50916
                              • Instruction Fuzzy Hash: 3C219371E0025C9BDB41DF98D845BEE7BFCAF49714F004059F508AB282DBB45989CFA1
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: __fread_nolock_memmove
                              • String ID: EA06
                              • API String ID: 1988441806-3962188686
                              • Opcode ID: 9a01e92bad6019a411709813fe0a097185793ccfc60f3338ab6b4c96b56ab772
                              • Instruction ID: d18bd9fd2b385161d51bd7f9a2f2d27032bf5630cd7f836a2552aaf2cf5cf4b7
                              • Opcode Fuzzy Hash: 9a01e92bad6019a411709813fe0a097185793ccfc60f3338ab6b4c96b56ab772
                              • Instruction Fuzzy Hash: CB01B971D042287EDB18CBA8D856EFE7BFCDB15311F0045AAF552D2181E979E6048760
                              APIs
                              • GetTempPathW.KERNEL32(00000104,?), ref: 00A698F8
                              • GetTempFileNameW.KERNELBASE(?,aut,00000000,?), ref: 00A6990F
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: Temp$FileNamePath
                              • String ID: aut
                              • API String ID: 3285503233-3010740371
                              • Opcode ID: 9ca06543492ba8c28657594f30638d61ee8ff5d22168eaa94c37ab91932afff8
                              • Instruction ID: 72a000a23c4ab35520007ead8eca490a3655984f07467dd422a0284bbacc6097
                              • Opcode Fuzzy Hash: 9ca06543492ba8c28657594f30638d61ee8ff5d22168eaa94c37ab91932afff8
                              • Instruction Fuzzy Hash: 33D05E7954030EBFDB50DBE4DC0EFDA773CE704700F0006B1BA54D10A2EAB095998B91
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: c16e93b708e1fcb84866c172936ad5c8ac1bfb9533ff6a4f2472e380577b9316
                              • Instruction ID: c9087cb03793e5bf561c0390a32d8846e5229079d83e075d2ffe0b9c2344ccb4
                              • Opcode Fuzzy Hash: c16e93b708e1fcb84866c172936ad5c8ac1bfb9533ff6a4f2472e380577b9316
                              • Instruction Fuzzy Hash: 78F118716083059FC714DF28C984A6ABBE5FF88324F54C92EF8999B252D731E945CF82
                              APIs
                                • Part of subcall function 00A20162: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00A20193
                                • Part of subcall function 00A20162: MapVirtualKeyW.USER32(00000010,00000000), ref: 00A2019B
                                • Part of subcall function 00A20162: MapVirtualKeyW.USER32(000000A0,00000000), ref: 00A201A6
                                • Part of subcall function 00A20162: MapVirtualKeyW.USER32(000000A1,00000000), ref: 00A201B1
                                • Part of subcall function 00A20162: MapVirtualKeyW.USER32(00000011,00000000), ref: 00A201B9
                                • Part of subcall function 00A20162: MapVirtualKeyW.USER32(00000012,00000000), ref: 00A201C1
                                • Part of subcall function 00A160F9: RegisterWindowMessageW.USER32(WM_GETCONTROLNAME,?,00A0F930), ref: 00A16154
                              • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 00A0F9CD
                              • OleInitialize.OLE32(00000000), ref: 00A0FA4A
                              • CloseHandle.KERNEL32(00000000), ref: 00A445C8
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                              • String ID:
                              • API String ID: 1986988660-0
                              • Opcode ID: 4b1a7fab80215492a698a9c2dadfd99a215163ba28bdbb5a320921129e551015
                              • Instruction ID: 20bfca6a5b21239f111d57ad509bce3ed80e358d8f4fcb1070cef4a0db75d1ac
                              • Opcode Fuzzy Hash: 4b1a7fab80215492a698a9c2dadfd99a215163ba28bdbb5a320921129e551015
                              • Instruction Fuzzy Hash: 6781C3B0D01A40CFC788DFB9EA54E197BE6EB98306752852AF019CB361E77464C6CF10
                              APIs
                              • _memset.LIBCMT ref: 00A04370
                              • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00A04415
                              • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00A04432
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: IconNotifyShell_$_memset
                              • String ID:
                              • API String ID: 1505330794-0
                              • Opcode ID: 3af1b16c8b4d9a64df2040a7cd48a06bfad1b0df140ccc521101b59d3394a64d
                              • Instruction ID: adf03851d8dad3704b9ecc5f27be1a8cf39d76e05e823198131c1b11f8e37569
                              • Opcode Fuzzy Hash: 3af1b16c8b4d9a64df2040a7cd48a06bfad1b0df140ccc521101b59d3394a64d
                              • Instruction Fuzzy Hash: EC3181B09047058FD720DF74E884A9BBBF8FB59309F00092EF69A86291D771A944CB52
                              APIs
                              • __FF_MSGBANNER.LIBCMT ref: 00A25733
                                • Part of subcall function 00A2A16B: __NMSG_WRITE.LIBCMT ref: 00A2A192
                                • Part of subcall function 00A2A16B: __NMSG_WRITE.LIBCMT ref: 00A2A19C
                              • __NMSG_WRITE.LIBCMT ref: 00A2573A
                                • Part of subcall function 00A2A1C8: GetModuleFileNameW.KERNEL32(00000000,00AC33BA,00000104,?,00000001,00000000), ref: 00A2A25A
                                • Part of subcall function 00A2A1C8: ___crtMessageBoxW.LIBCMT ref: 00A2A308
                                • Part of subcall function 00A2309F: ___crtCorExitProcess.LIBCMT ref: 00A230A5
                                • Part of subcall function 00A2309F: ExitProcess.KERNEL32 ref: 00A230AE
                                • Part of subcall function 00A28B28: __getptd_noexit.LIBCMT ref: 00A28B28
                              • RtlAllocateHeap.NTDLL(00C90000,00000000,00000001,00000000,?,?,?,00A20DD3,?), ref: 00A2575F
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: ExitProcess___crt$AllocateFileHeapMessageModuleName__getptd_noexit
                              • String ID:
                              • API String ID: 1372826849-0
                              • Opcode ID: 6e40573312b6dae124acc0233b08a86e6ab6eb35810fe16298ba4254f59455bf
                              • Instruction ID: a7d19e035d8eb0063f3f2bddae785ff332ea057143d2322b36f732e2ec59c0c8
                              • Opcode Fuzzy Hash: 6e40573312b6dae124acc0233b08a86e6ab6eb35810fe16298ba4254f59455bf
                              • Instruction Fuzzy Hash: 8D01F132A80B32DFEE14677CFD82A2E7398AB92761F110939F9059A181DE748D014661
                              APIs
                              • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000,?,?,00A69548,?,?,?,?,?,00000004), ref: 00A698BB
                              • SetFileTime.KERNELBASE(00000000,?,00000000,?,?,00A69548,?,?,?,?,?,00000004,00000001,?,?,00000004), ref: 00A698D1
                              • CloseHandle.KERNEL32(00000000,?,00A69548,?,?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 00A698D8
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: File$CloseCreateHandleTime
                              • String ID:
                              • API String ID: 3397143404-0
                              • Opcode ID: ceedd15fe8d6de0c1587e7f8b992de6071d88bc030ea9799396b6b90b8f58cf3
                              • Instruction ID: 18f93426011647cb0d80d8e1403a0c2f6758110a7ccb786994a7ccc9ca2f7464
                              • Opcode Fuzzy Hash: ceedd15fe8d6de0c1587e7f8b992de6071d88bc030ea9799396b6b90b8f58cf3
                              • Instruction Fuzzy Hash: A7E08632141215BBD7216B94EC0DFDA7F69EB06760F104220FB24A90E087B115229798
                              APIs
                              • _free.LIBCMT ref: 00A68D1B
                                • Part of subcall function 00A22D55: RtlFreeHeap.NTDLL(00000000,00000000,?,00A29A24), ref: 00A22D69
                                • Part of subcall function 00A22D55: GetLastError.KERNEL32(00000000,?,00A29A24), ref: 00A22D7B
                              • _free.LIBCMT ref: 00A68D2C
                              • _free.LIBCMT ref: 00A68D3E
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: _free$ErrorFreeHeapLast
                              • String ID:
                              • API String ID: 776569668-0
                              • Opcode ID: 625e2a9df38ff8793e00647abbe9ccf0d6414545c555b0c4696158d27d9f7751
                              • Instruction ID: 2a4d16a065b6d2a8658ef79c645ff31b9163ff674b7bbadfd7b04d14a228d245
                              • Opcode Fuzzy Hash: 625e2a9df38ff8793e00647abbe9ccf0d6414545c555b0c4696158d27d9f7751
                              • Instruction Fuzzy Hash: 7CE012B160161197CB24A77CBA40B9313EC4F5C7527140A2DB50DD71C6CE68F8528274
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID:
                              • String ID: CALL
                              • API String ID: 0-4196123274
                              • Opcode ID: 4c279ce0dd77bbd6c4eca5cbb2a4b4ca3e69003bb2fdb2e4350028ebd73e1867
                              • Instruction ID: 4737e5cda5ec764d55ba49ba95efed01e24c787a695e45b97e1462c5d8a66e7c
                              • Opcode Fuzzy Hash: 4c279ce0dd77bbd6c4eca5cbb2a4b4ca3e69003bb2fdb2e4350028ebd73e1867
                              • Instruction Fuzzy Hash: CE226874A08305DFDB24DF14D594A6ABBF1BF94304F15896DE88A8B3A2D731EC45CB82
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: _memmove
                              • String ID: EA06
                              • API String ID: 4104443479-3962188686
                              • Opcode ID: 7c58f70b6a4ff018bfeea51595764902baced1b4776e65ac5911caa8d1bcbe19
                              • Instruction ID: 2cb3b60e29ce19d38c85fee90edf7c9f0392cbf8e00b4dd35d3817d0ca1ec9e2
                              • Opcode Fuzzy Hash: 7c58f70b6a4ff018bfeea51595764902baced1b4776e65ac5911caa8d1bcbe19
                              • Instruction Fuzzy Hash: 034159B1A0425C6BDF219B64F9617BE7FB2BB5D300F284475EE829B2C2D6209D4483A1
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: _memmove
                              • String ID:
                              • API String ID: 4104443479-0
                              • Opcode ID: 452a2a0dc8edaf10d23459951c12264ff77a11f8be43493a104b7cc7f73b7af0
                              • Instruction ID: 5623e87c455d44bda41c5c94b82b55466839cbee7a43ec3c8d38b91a212f3e8a
                              • Opcode Fuzzy Hash: 452a2a0dc8edaf10d23459951c12264ff77a11f8be43493a104b7cc7f73b7af0
                              • Instruction Fuzzy Hash: A841F4729182099FDB10EFA8E985DBEB7B9EF09304F244469E18597382DF359C45CB60
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: _memmove
                              • String ID:
                              • API String ID: 4104443479-0
                              • Opcode ID: 436c5e9091f1787ffda7db2698e9d0fff12385a901a55d8bd6dbacd160c43149
                              • Instruction ID: bca7b7334fb109a55cd48c05b61990d5440e9d0b7809684dbcdfd2197bdc6def
                              • Opcode Fuzzy Hash: 436c5e9091f1787ffda7db2698e9d0fff12385a901a55d8bd6dbacd160c43149
                              • Instruction Fuzzy Hash: F83184B1B0450AAFC704DF68E8D1E6DB3A5FF493507158629E519CB2D1EB30F950CB90
                              APIs
                              • IsThemeActive.UXTHEME ref: 00A04834
                                • Part of subcall function 00A2336C: __lock.LIBCMT ref: 00A23372
                                • Part of subcall function 00A2336C: DecodePointer.KERNEL32(00000001,?,00A04849,00A57C74), ref: 00A2337E
                                • Part of subcall function 00A2336C: EncodePointer.KERNEL32(?,?,00A04849,00A57C74), ref: 00A23389
                                • Part of subcall function 00A048FD: SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 00A04915
                                • Part of subcall function 00A048FD: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00A0492A
                                • Part of subcall function 00A03B3A: GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00A03B68
                                • Part of subcall function 00A03B3A: IsDebuggerPresent.KERNEL32 ref: 00A03B7A
                                • Part of subcall function 00A03B3A: GetFullPathNameW.KERNEL32(00007FFF,?,?,00AC52F8,00AC52E0,?,?), ref: 00A03BEB
                                • Part of subcall function 00A03B3A: SetCurrentDirectoryW.KERNEL32(?), ref: 00A03C6F
                              • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00A04874
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: InfoParametersSystem$CurrentDirectoryPointer$ActiveDebuggerDecodeEncodeFullNamePathPresentTheme__lock
                              • String ID:
                              • API String ID: 1438897964-0
                              • Opcode ID: 280f4324c461ab8ba7ecc6a353d23f7a4b6e7376817db485e20620cc3ba2bf7e
                              • Instruction ID: afcdc1ad78e248dbde8f433fde0603ea63b83ff8a10b004a5629f963c6b8b2c2
                              • Opcode Fuzzy Hash: 280f4324c461ab8ba7ecc6a353d23f7a4b6e7376817db485e20620cc3ba2bf7e
                              • Instruction Fuzzy Hash: A51190B29043059FC700DFB9E90594ABBE8FF99750F11891EF440972B1DB70964ACB91
                              APIs
                                • Part of subcall function 00A2571C: __FF_MSGBANNER.LIBCMT ref: 00A25733
                                • Part of subcall function 00A2571C: __NMSG_WRITE.LIBCMT ref: 00A2573A
                                • Part of subcall function 00A2571C: RtlAllocateHeap.NTDLL(00C90000,00000000,00000001,00000000,?,?,?,00A20DD3,?), ref: 00A2575F
                              • std::exception::exception.LIBCMT ref: 00A20DEC
                              • __CxxThrowException@8.LIBCMT ref: 00A20E01
                                • Part of subcall function 00A2859B: RaiseException.KERNEL32(?,?,?,00AB9E78,00000000,?,?,?,?,00A20E06,?,00AB9E78,?,00000001), ref: 00A285F0
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: AllocateExceptionException@8HeapRaiseThrowstd::exception::exception
                              • String ID:
                              • API String ID: 3902256705-0
                              • Opcode ID: 58b300ce2513e006a7158ccefe689f5bb60113abd453039398a03bfaa9818f4c
                              • Instruction ID: 49288c1829e7ecf484e1661f7598e4807fca76acbf2e339bc6730a8480f6167d
                              • Opcode Fuzzy Hash: 58b300ce2513e006a7158ccefe689f5bb60113abd453039398a03bfaa9818f4c
                              • Instruction Fuzzy Hash: 02F081359422297ADB10BBACFE01ADEB7ACAF01311F104835F90496182EF709A8092D1
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: __lock_file_memset
                              • String ID:
                              • API String ID: 26237723-0
                              • Opcode ID: 0ecf6c5bfeea4e8657bb78787fe742c66d5f5a54ebda4af1e7b8d0c315809e1f
                              • Instruction ID: 46b7e86802fe24a9e085820aea679c27f99a66dc1d70b23551fe12d47760ade9
                              • Opcode Fuzzy Hash: 0ecf6c5bfeea4e8657bb78787fe742c66d5f5a54ebda4af1e7b8d0c315809e1f
                              • Instruction Fuzzy Hash: 07018471C01628ABCF22AF7CBD0649E7B61BF51361F584135F8141B191EB358A51DF91
                              APIs
                                • Part of subcall function 00A28B28: __getptd_noexit.LIBCMT ref: 00A28B28
                              • __lock_file.LIBCMT ref: 00A253EB
                                • Part of subcall function 00A26C11: __lock.LIBCMT ref: 00A26C34
                              • __fclose_nolock.LIBCMT ref: 00A253F6
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                              • String ID:
                              • API String ID: 2800547568-0
                              • Opcode ID: 872d297a23a9bc47723b2303f124ab39a1786934a7bed41ab59710360f9b1c00
                              • Instruction ID: 291966fd953d28a5a5478059381203b655a62701f1ac57534b89b8acb0db5508
                              • Opcode Fuzzy Hash: 872d297a23a9bc47723b2303f124ab39a1786934a7bed41ab59710360f9b1c00
                              • Instruction Fuzzy Hash: 3CF09031C02A249ADB10BB7DB9027AD66E07F41374F209268F424AF1C1CBBCC941AF92
                              APIs
                              • CreateProcessW.KERNELBASE(?,00000000), ref: 00CDCB0D
                              • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 00CDCB31
                              • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 00CDCB53
                              Memory Dump Source
                              • Source File: 00000000.00000002.1460615264.0000000000CDB000.00000040.00000020.00020000.00000000.sdmp, Offset: 00CDB000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cdb000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: Process$ContextCreateMemoryReadThreadWow64
                              • String ID:
                              • API String ID: 2438371351-0
                              • Opcode ID: 45c0bcdfd50c24934144be52d4489c8f4aeee23b26077383fd0484b0fd6f3e51
                              • Instruction ID: 815cebe14ef8f7a9cd116735b799d8bf0477d467186bb3d30052b7e9e05377a9
                              • Opcode Fuzzy Hash: 45c0bcdfd50c24934144be52d4489c8f4aeee23b26077383fd0484b0fd6f3e51
                              • Instruction Fuzzy Hash: 1C12CD24E24658C6EB24DF64D8507DEB232EF68300F1094E9910DEB7A5E77A4F81CF5A
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: _memmove
                              • String ID:
                              • API String ID: 4104443479-0
                              • Opcode ID: eafeb1dff6952b68bfd55240a36f31d3ff5341a31d81c5201ab65e604fd0d92f
                              • Instruction ID: 9c43f3d3f46eed27af8770d64aac660794e56a90114c0e8d392bfb81f3e61158
                              • Opcode Fuzzy Hash: eafeb1dff6952b68bfd55240a36f31d3ff5341a31d81c5201ab65e604fd0d92f
                              • Instruction Fuzzy Hash: B731C279A08A169FC714DF18E990966F7B0FF09310B14C569E98A8B391D730F881CB80
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: ProtectVirtual
                              • String ID:
                              • API String ID: 544645111-0
                              • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                              • Instruction ID: c78b2afb5153848c07000f5714b9b0b21083dbdb90e87cb7f9b9a2ef506280f3
                              • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                              • Instruction Fuzzy Hash: 3F31AEB0A001169BC718DF5DE484A69FBB6FB59300B6486A5E84ACB356DA31EDC1DB80
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: ClearVariant
                              • String ID:
                              • API String ID: 1473721057-0
                              • Opcode ID: 58a15a5ca230a75a8aa036f847e06fb4641a7882d9c970e53182480e6cdf99fe
                              • Instruction ID: e64034269cf3de203542821e066133f88076ec544dfdeb501430a3ebab687515
                              • Opcode Fuzzy Hash: 58a15a5ca230a75a8aa036f847e06fb4641a7882d9c970e53182480e6cdf99fe
                              • Instruction Fuzzy Hash: 614118745043559FDB14DF18D548B1ABBE1BF45318F0988ACE8998B3A2C731EC45CF52
                              APIs
                                • Part of subcall function 00A04BB5: FreeLibrary.KERNEL32(00000000,?), ref: 00A04BEF
                                • Part of subcall function 00A2525B: __wfsopen.LIBCMT ref: 00A25266
                              • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,00AC52F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00A04E0F
                                • Part of subcall function 00A04B6A: FreeLibrary.KERNEL32(00000000), ref: 00A04BA4
                                • Part of subcall function 00A04C70: _memmove.LIBCMT ref: 00A04CBA
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: Library$Free$Load__wfsopen_memmove
                              • String ID:
                              • API String ID: 1396898556-0
                              • Opcode ID: 1b7f8c4e1d656a231c43b38cac1a991694dc6dcff2228e18418de8663ea477c2
                              • Instruction ID: 653f83153d3d8574b82a55a6226e3bcad5b5b3dc070845c5297b47e0af431829
                              • Opcode Fuzzy Hash: 1b7f8c4e1d656a231c43b38cac1a991694dc6dcff2228e18418de8663ea477c2
                              • Instruction Fuzzy Hash: A211E37164020AEBCF14FF70E916FAE77A8BF88710F108829F641A71C1EA719A019B50
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: ClearVariant
                              • String ID:
                              • API String ID: 1473721057-0
                              • Opcode ID: 3271c1c401e043fd7890c229c4d019d15a4b258bfebebfc95f4e73ec4816a7ec
                              • Instruction ID: 36977664b76902c7b81b0a67bca63a062c4650aa3fd235793cfad5e20f161f5e
                              • Opcode Fuzzy Hash: 3271c1c401e043fd7890c229c4d019d15a4b258bfebebfc95f4e73ec4816a7ec
                              • Instruction Fuzzy Hash: 672130B4908305DFDB14DF64D844B1ABBE0BF88314F05886CF88A977A2D731E805CB92
                              APIs
                              • __lock_file.LIBCMT ref: 00A248A6
                                • Part of subcall function 00A28B28: __getptd_noexit.LIBCMT ref: 00A28B28
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: __getptd_noexit__lock_file
                              • String ID:
                              • API String ID: 2597487223-0
                              • Opcode ID: 206740293e18ca66c466c63819cb97fdfb34c76914a0ee3d4ecafe2e8a34ac08
                              • Instruction ID: 1455bf1312e6d48a06a0874bdc37ea0370c25af1ce021765ccef613bd1d4fb59
                              • Opcode Fuzzy Hash: 206740293e18ca66c466c63819cb97fdfb34c76914a0ee3d4ecafe2e8a34ac08
                              • Instruction Fuzzy Hash: 75F02231812628EBDF11AFBCAE063EE36A0AF05320F008434F4209B282DB7C8950DB41
                              APIs
                              • FreeLibrary.KERNEL32(?,?,00AC52F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00A04E7E
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: FreeLibrary
                              • String ID:
                              • API String ID: 3664257935-0
                              • Opcode ID: 48e331e91c66fa0780bae3c55939a40f87ae581521861cb7c814031193903bb0
                              • Instruction ID: dc60591b41e40b944f574af04066addfb5c68e5420b93a53420dfb0027589462
                              • Opcode Fuzzy Hash: 48e331e91c66fa0780bae3c55939a40f87ae581521861cb7c814031193903bb0
                              • Instruction Fuzzy Hash: 8EF039B1501716CFDB349F64F494892BBF1BF183693208A3EE2D682660C732A840DF40
                              APIs
                              • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00A207B0
                                • Part of subcall function 00A07BCC: _memmove.LIBCMT ref: 00A07C06
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: LongNamePath_memmove
                              • String ID:
                              • API String ID: 2514874351-0
                              • Opcode ID: 70f6be6b69f2143ae58c7c84e4d9bb048471436425ef91644fbc8253c0598e1f
                              • Instruction ID: 0d45549d095aafdcb2333835874a03cbec6f9a9869b569a019d419cc5c12a335
                              • Opcode Fuzzy Hash: 70f6be6b69f2143ae58c7c84e4d9bb048471436425ef91644fbc8253c0598e1f
                              • Instruction Fuzzy Hash: 37E08636A041285BC720D6989C06FEA779DDB897A0F0541B5FC0CD7244E960AC8086D0
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: __fread_nolock
                              • String ID:
                              • API String ID: 2638373210-0
                              • Opcode ID: 36e66934677415102e9643fee0822ecf6e22e0db5db5ed1a6e3653ba213ae753
                              • Instruction ID: 656f391a09484efea2d2e96a81ae6d0e2e7d1bd3caad1b6211c4a17215a0992c
                              • Opcode Fuzzy Hash: 36e66934677415102e9643fee0822ecf6e22e0db5db5ed1a6e3653ba213ae753
                              • Instruction Fuzzy Hash: D8E092B0504B005BD7388B24D800BA373E5AB05304F00091DF2AA83241EB63B8418759
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: __wfsopen
                              • String ID:
                              • API String ID: 197181222-0
                              • Opcode ID: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                              • Instruction ID: 8218024f2292eaf6f1526d619068c98a9c91e7f761203792b0aebcfb5e241e77
                              • Opcode Fuzzy Hash: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                              • Instruction Fuzzy Hash: 80B092B684020CB7CE012A96FC02A993B19AB41764F408020FB0C181A2A673A6649A89
                              APIs
                              • Sleep.KERNELBASE(000001F4), ref: 00CDD2F1
                              Memory Dump Source
                              • Source File: 00000000.00000002.1460615264.0000000000CDB000.00000040.00000020.00020000.00000000.sdmp, Offset: 00CDB000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cdb000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: Sleep
                              • String ID:
                              • API String ID: 3472027048-0
                              • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                              • Instruction ID: 3883fdecc6d9213e3b3a44f55ee9ff023a03c9f64aa83d3b77a5d355e88d4e80
                              • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                              • Instruction Fuzzy Hash: 09E0E67494010DDFDB00EFB8DA496AE7FB4EF04301F100161FD01D2280D6309D508A62
                              APIs
                                • Part of subcall function 00A02612: GetWindowLongW.USER32(?,000000EB), ref: 00A02623
                              • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 00A8CB37
                              • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00A8CB95
                              • GetWindowLongW.USER32(?,000000F0), ref: 00A8CBD6
                              • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00A8CC00
                              • SendMessageW.USER32 ref: 00A8CC29
                              • _wcsncpy.LIBCMT ref: 00A8CC95
                              • GetKeyState.USER32(00000011), ref: 00A8CCB6
                              • GetKeyState.USER32(00000009), ref: 00A8CCC3
                              • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00A8CCD9
                              • GetKeyState.USER32(00000010), ref: 00A8CCE3
                              • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00A8CD0C
                              • SendMessageW.USER32 ref: 00A8CD33
                              • SendMessageW.USER32(?,00001030,?,00A8B348), ref: 00A8CE37
                              • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 00A8CE4D
                              • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 00A8CE60
                              • SetCapture.USER32(?), ref: 00A8CE69
                              • ClientToScreen.USER32(?,?), ref: 00A8CECE
                              • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 00A8CEDB
                              • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00A8CEF5
                              • ReleaseCapture.USER32 ref: 00A8CF00
                              • GetCursorPos.USER32(?), ref: 00A8CF3A
                              • ScreenToClient.USER32(?,?), ref: 00A8CF47
                              • SendMessageW.USER32(?,00001012,00000000,?), ref: 00A8CFA3
                              • SendMessageW.USER32 ref: 00A8CFD1
                              • SendMessageW.USER32(?,00001111,00000000,?), ref: 00A8D00E
                              • SendMessageW.USER32 ref: 00A8D03D
                              • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 00A8D05E
                              • SendMessageW.USER32(?,0000110B,00000009,?), ref: 00A8D06D
                              • GetCursorPos.USER32(?), ref: 00A8D08D
                              • ScreenToClient.USER32(?,?), ref: 00A8D09A
                              • GetParent.USER32(?), ref: 00A8D0BA
                              • SendMessageW.USER32(?,00001012,00000000,?), ref: 00A8D123
                              • SendMessageW.USER32 ref: 00A8D154
                              • ClientToScreen.USER32(?,?), ref: 00A8D1B2
                              • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 00A8D1E2
                              • SendMessageW.USER32(?,00001111,00000000,?), ref: 00A8D20C
                              • SendMessageW.USER32 ref: 00A8D22F
                              • ClientToScreen.USER32(?,?), ref: 00A8D281
                              • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 00A8D2B5
                                • Part of subcall function 00A025DB: GetWindowLongW.USER32(?,000000EB), ref: 00A025EC
                              • GetWindowLongW.USER32(?,000000F0), ref: 00A8D351
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease_wcsncpy
                              • String ID: @GUI_DRAGID$@U=u$F
                              • API String ID: 3977979337-1007936534
                              • Opcode ID: f1065746fef08ad80f086767014a1f529d5f3ff696f582c75dc2b61fd636857c
                              • Instruction ID: f8d21231fb17d9d0f01a89aebf31e982b05aa53a5743e2c0bf815730fb5ee700
                              • Opcode Fuzzy Hash: f1065746fef08ad80f086767014a1f529d5f3ff696f582c75dc2b61fd636857c
                              • Instruction Fuzzy Hash: E542AC74604741AFD724EF68D848FAABBE5FF48320F140A29F5598B2A0D731E851DF62
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: _memmove$_memset
                              • String ID: DEFINE$Q\E$[:<:]]$[:>:]]$\b(?<=\w)$\b(?=\w)
                              • API String ID: 1357608183-1798697756
                              • Opcode ID: 96dd9847458407611a88967e2cfa06784283657646516f8efd0fd253f4044597
                              • Instruction ID: 867063dd62100e8baeeac8b8950a2ce8fdcb6f5f02154184972e5fdaea1c92bb
                              • Opcode Fuzzy Hash: 96dd9847458407611a88967e2cfa06784283657646516f8efd0fd253f4044597
                              • Instruction Fuzzy Hash: A693A176A04219DBDF24CF98C881BEDB7B1FF48351F24816AED55AB281E7709E85CB40
                              APIs
                              • GetForegroundWindow.USER32(00000000,?), ref: 00A048DF
                              • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00A3D665
                              • IsIconic.USER32(?), ref: 00A3D66E
                              • ShowWindow.USER32(?,00000009), ref: 00A3D67B
                              • SetForegroundWindow.USER32(?), ref: 00A3D685
                              • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00A3D69B
                              • GetCurrentThreadId.KERNEL32 ref: 00A3D6A2
                              • GetWindowThreadProcessId.USER32(?,00000000), ref: 00A3D6AE
                              • AttachThreadInput.USER32(?,00000000,00000001), ref: 00A3D6BF
                              • AttachThreadInput.USER32(?,00000000,00000001), ref: 00A3D6C7
                              • AttachThreadInput.USER32(00000000,?,00000001), ref: 00A3D6CF
                              • SetForegroundWindow.USER32(?), ref: 00A3D6D2
                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 00A3D6E7
                              • keybd_event.USER32(00000012,00000000), ref: 00A3D6F2
                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 00A3D6FC
                              • keybd_event.USER32(00000012,00000000), ref: 00A3D701
                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 00A3D70A
                              • keybd_event.USER32(00000012,00000000), ref: 00A3D70F
                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 00A3D719
                              • keybd_event.USER32(00000012,00000000), ref: 00A3D71E
                              • SetForegroundWindow.USER32(?), ref: 00A3D721
                              • AttachThreadInput.USER32(?,?,00000000), ref: 00A3D748
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                              • String ID: Shell_TrayWnd
                              • API String ID: 4125248594-2988720461
                              • Opcode ID: 998e957157891dfbf1e832ff43464e618fcc47629101f2798799a0523fc12294
                              • Instruction ID: eb418855183998edd3dcee93fb5cb4bebc62ccb729ca667957065c6370fa06bb
                              • Opcode Fuzzy Hash: 998e957157891dfbf1e832ff43464e618fcc47629101f2798799a0523fc12294
                              • Instruction Fuzzy Hash: F2315271A40318BEEB206BA19C4AF7F7E6CEB44B50F104035FA04EA1D1D6B05951ABA1
                              APIs
                                • Part of subcall function 00A587E1: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00A5882B
                                • Part of subcall function 00A587E1: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00A58858
                                • Part of subcall function 00A587E1: GetLastError.KERNEL32 ref: 00A58865
                              • _memset.LIBCMT ref: 00A58353
                              • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?,?,?,?,00000001,?,?), ref: 00A583A5
                              • CloseHandle.KERNEL32(?), ref: 00A583B6
                              • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 00A583CD
                              • GetProcessWindowStation.USER32 ref: 00A583E6
                              • SetProcessWindowStation.USER32(00000000), ref: 00A583F0
                              • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00A5840A
                                • Part of subcall function 00A581CB: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00A58309), ref: 00A581E0
                                • Part of subcall function 00A581CB: CloseHandle.KERNEL32(?,?,00A58309), ref: 00A581F2
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLookupPrivilegeValue_memset
                              • String ID: $default$winsta0
                              • API String ID: 2063423040-1027155976
                              • Opcode ID: 522e193fd9f244f63ff4005e8c425c92504bbb808f5630ba98acd6407ff87582
                              • Instruction ID: 01323bdc44d5914776610e4b6bb9592e449c7a96cc412cbe6a2a3abbcb7a7d24
                              • Opcode Fuzzy Hash: 522e193fd9f244f63ff4005e8c425c92504bbb808f5630ba98acd6407ff87582
                              • Instruction Fuzzy Hash: 7B8156B1900249AFDF11DFA4DD45AEEBBB9FF08305F144169FD10B6261EB398A19DB20
                              APIs
                              • FindFirstFileW.KERNEL32(?,?), ref: 00A6C78D
                              • FindClose.KERNEL32(00000000), ref: 00A6C7E1
                              • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00A6C806
                              • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00A6C81D
                              • FileTimeToSystemTime.KERNEL32(?,?), ref: 00A6C844
                              • __swprintf.LIBCMT ref: 00A6C890
                              • __swprintf.LIBCMT ref: 00A6C8D3
                                • Part of subcall function 00A07DE1: _memmove.LIBCMT ref: 00A07E22
                              • __swprintf.LIBCMT ref: 00A6C927
                                • Part of subcall function 00A23698: __woutput_l.LIBCMT ref: 00A236F1
                              • __swprintf.LIBCMT ref: 00A6C975
                                • Part of subcall function 00A23698: __flsbuf.LIBCMT ref: 00A23713
                                • Part of subcall function 00A23698: __flsbuf.LIBCMT ref: 00A2372B
                              • __swprintf.LIBCMT ref: 00A6C9C4
                              • __swprintf.LIBCMT ref: 00A6CA13
                              • __swprintf.LIBCMT ref: 00A6CA62
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem__woutput_l_memmove
                              • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                              • API String ID: 3953360268-2428617273
                              • Opcode ID: bf26cfa50ac55b744ac4a7b03638f65278db42d2a6b63159c41b94a1dc2a4604
                              • Instruction ID: 4a2fb8e249f667d2c835f5664e716c4a06f4e5ef6de59a234f372ab6997fe3e3
                              • Opcode Fuzzy Hash: bf26cfa50ac55b744ac4a7b03638f65278db42d2a6b63159c41b94a1dc2a4604
                              • Instruction Fuzzy Hash: 5CA120B2404309AFC710EFA4D995DAFB7ECFF95700F404929F59587192EA34DA08CB62
                              APIs
                              • FindFirstFileW.KERNEL32(?,?,76F88FB0,?,00000000), ref: 00A6EFB6
                              • _wcscmp.LIBCMT ref: 00A6EFCB
                              • _wcscmp.LIBCMT ref: 00A6EFE2
                              • GetFileAttributesW.KERNEL32(?), ref: 00A6EFF4
                              • SetFileAttributesW.KERNEL32(?,?), ref: 00A6F00E
                              • FindNextFileW.KERNEL32(00000000,?), ref: 00A6F026
                              • FindClose.KERNEL32(00000000), ref: 00A6F031
                              • FindFirstFileW.KERNEL32(*.*,?), ref: 00A6F04D
                              • _wcscmp.LIBCMT ref: 00A6F074
                              • _wcscmp.LIBCMT ref: 00A6F08B
                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00A6F09D
                              • SetCurrentDirectoryW.KERNEL32(00AB8920), ref: 00A6F0BB
                              • FindNextFileW.KERNEL32(00000000,00000010), ref: 00A6F0C5
                              • FindClose.KERNEL32(00000000), ref: 00A6F0D2
                              • FindClose.KERNEL32(00000000), ref: 00A6F0E4
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: Find$File$_wcscmp$Close$AttributesCurrentDirectoryFirstNext
                              • String ID: *.*
                              • API String ID: 1803514871-438819550
                              • Opcode ID: fd7fe1378d6ee365c2f8adf81ab0a70b3d9ef42ebf68bde360d6da17511bba66
                              • Instruction ID: 0f6e0e59dd39db372b5944892537618ea2c5527d0b3fc30d2c9225f07b3d1971
                              • Opcode Fuzzy Hash: fd7fe1378d6ee365c2f8adf81ab0a70b3d9ef42ebf68bde360d6da17511bba66
                              • Instruction Fuzzy Hash: 2731AF3250121A7EDF14EFA4EC49AEE77BCAF49360F114176E904E30A1EB74DA85CB61
                              APIs
                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00A80953
                              • RegCreateKeyExW.ADVAPI32(?,?,00000000,00A8F910,00000000,?,00000000,?,?), ref: 00A809C1
                              • RegCloseKey.ADVAPI32(00000000,00000001,00000000,00000000,00000000), ref: 00A80A09
                              • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000002,?), ref: 00A80A92
                              • RegCloseKey.ADVAPI32(?), ref: 00A80DB2
                              • RegCloseKey.ADVAPI32(00000000), ref: 00A80DBF
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: Close$ConnectCreateRegistryValue
                              • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                              • API String ID: 536824911-966354055
                              • Opcode ID: 8d40bbab588b5cb244055cc475f2367f7db5997fe5dcaf4c005ece1a22220cb4
                              • Instruction ID: 55fee705de4f1002ad405c22edeb78cb09c60b687371e414ab5469ab23d18e78
                              • Opcode Fuzzy Hash: 8d40bbab588b5cb244055cc475f2367f7db5997fe5dcaf4c005ece1a22220cb4
                              • Instruction Fuzzy Hash: 43024B756006159FCB54EF28D941E2AB7E5FF89314F04895CF89A9B3A2DB30EC49CB81
                              APIs
                              • FindFirstFileW.KERNEL32(?,?,76F88FB0,?,00000000), ref: 00A6F113
                              • _wcscmp.LIBCMT ref: 00A6F128
                              • _wcscmp.LIBCMT ref: 00A6F13F
                                • Part of subcall function 00A64385: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00A643A0
                              • FindNextFileW.KERNEL32(00000000,?), ref: 00A6F16E
                              • FindClose.KERNEL32(00000000), ref: 00A6F179
                              • FindFirstFileW.KERNEL32(*.*,?), ref: 00A6F195
                              • _wcscmp.LIBCMT ref: 00A6F1BC
                              • _wcscmp.LIBCMT ref: 00A6F1D3
                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00A6F1E5
                              • SetCurrentDirectoryW.KERNEL32(00AB8920), ref: 00A6F203
                              • FindNextFileW.KERNEL32(00000000,00000010), ref: 00A6F20D
                              • FindClose.KERNEL32(00000000), ref: 00A6F21A
                              • FindClose.KERNEL32(00000000), ref: 00A6F22C
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: Find$File$_wcscmp$Close$CurrentDirectoryFirstNext$Create
                              • String ID: *.*
                              • API String ID: 1824444939-438819550
                              • Opcode ID: 0028526011558c4885482da6b396f2585df7a7315a69432f3f471e487dd2fb1a
                              • Instruction ID: 0a777c350a96dfa94dedf85f8075b84b50e7a41d6e176eb9022fc091d6d0e8c3
                              • Opcode Fuzzy Hash: 0028526011558c4885482da6b396f2585df7a7315a69432f3f471e487dd2fb1a
                              • Instruction Fuzzy Hash: FB31703650021A7EDF10EFB4FC59AEE77BC9F46360F100175E914A21A1EA34DA45CA64
                              APIs
                              • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00A6A20F
                              • __swprintf.LIBCMT ref: 00A6A231
                              • CreateDirectoryW.KERNEL32(?,00000000), ref: 00A6A26E
                              • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 00A6A293
                              • _memset.LIBCMT ref: 00A6A2B2
                              • _wcsncpy.LIBCMT ref: 00A6A2EE
                              • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 00A6A323
                              • CloseHandle.KERNEL32(00000000), ref: 00A6A32E
                              • RemoveDirectoryW.KERNEL32(?), ref: 00A6A337
                              • CloseHandle.KERNEL32(00000000), ref: 00A6A341
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove__swprintf_memset_wcsncpy
                              • String ID: :$\$\??\%s
                              • API String ID: 2733774712-3457252023
                              • Opcode ID: 0344da21ff4f5fca7f0af5938e6753f507b131690a92f77322cf2cb427871e14
                              • Instruction ID: 1ed63783ec047ec346f99706fcc41009399e65cd0a51ad20d774a507a4e30123
                              • Opcode Fuzzy Hash: 0344da21ff4f5fca7f0af5938e6753f507b131690a92f77322cf2cb427871e14
                              • Instruction Fuzzy Hash: CB31E4B590011AABDB20DFA4DC49FEB77BCEF88700F1041B6F508E6160EB7496458F25
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID:
                              • String ID: ANY)$ANYCRLF)$BSR_ANYCRLF)$BSR_UNICODE)$CR)$CRLF)$LF)$LIMIT_MATCH=$LIMIT_RECURSION=$NO_AUTO_POSSESS)$NO_START_OPT)$UCP)$UTF)$UTF16)
                              • API String ID: 0-4052911093
                              • Opcode ID: b7032571e27c48ae86aa27a512b0634588b8174c3c0ef78c4cb9ef0d6ba0aef1
                              • Instruction ID: 677362369a26a451a7b89099b507e0ca19b99e5d237514fc853fc4bdc6453e34
                              • Opcode Fuzzy Hash: b7032571e27c48ae86aa27a512b0634588b8174c3c0ef78c4cb9ef0d6ba0aef1
                              • Instruction Fuzzy Hash: 82726D75E002199BDB14CF59C8907FEB7B5FF48311F14816AE809EB291EB749E85CB90
                              APIs
                              • GetKeyboardState.USER32(?), ref: 00A60097
                              • SetKeyboardState.USER32(?), ref: 00A60102
                              • GetAsyncKeyState.USER32(000000A0), ref: 00A60122
                              • GetKeyState.USER32(000000A0), ref: 00A60139
                              • GetAsyncKeyState.USER32(000000A1), ref: 00A60168
                              • GetKeyState.USER32(000000A1), ref: 00A60179
                              • GetAsyncKeyState.USER32(00000011), ref: 00A601A5
                              • GetKeyState.USER32(00000011), ref: 00A601B3
                              • GetAsyncKeyState.USER32(00000012), ref: 00A601DC
                              • GetKeyState.USER32(00000012), ref: 00A601EA
                              • GetAsyncKeyState.USER32(0000005B), ref: 00A60213
                              • GetKeyState.USER32(0000005B), ref: 00A60221
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: State$Async$Keyboard
                              • String ID:
                              • API String ID: 541375521-0
                              • Opcode ID: 2ba1c613b3c381b8c1b2567811b01d226e25d18a7e61a8e7c71b472545dfcb6e
                              • Instruction ID: aa036b476340c9de0aa37271512203cdb69a4af4f7f9db79e25e5ed3997455cb
                              • Opcode Fuzzy Hash: 2ba1c613b3c381b8c1b2567811b01d226e25d18a7e61a8e7c71b472545dfcb6e
                              • Instruction Fuzzy Hash: 1551D93090478829FB35DBB08954FEBBFB49F12380F08469ED5C65A5C2DAA49BCCC761
                              APIs
                                • Part of subcall function 00A80E1A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00A7FDAD,?,?), ref: 00A80E31
                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00A804AC
                                • Part of subcall function 00A09837: __itow.LIBCMT ref: 00A09862
                                • Part of subcall function 00A09837: __swprintf.LIBCMT ref: 00A098AC
                              • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 00A8054B
                              • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 00A805E3
                              • RegCloseKey.ADVAPI32(000000FE,000000FE,00000000,?,00000000), ref: 00A80822
                              • RegCloseKey.ADVAPI32(00000000), ref: 00A8082F
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: CloseQueryValue$BuffCharConnectRegistryUpper__itow__swprintf
                              • String ID:
                              • API String ID: 1240663315-0
                              • Opcode ID: f368278bd6dd31863cb01f39053cf39421b288d34a6632adee3bf66ae9140693
                              • Instruction ID: b87e91905dfc69a9cb0d13224ea78dfb238132a2b5d0fad9eb40251a1584b063
                              • Opcode Fuzzy Hash: f368278bd6dd31863cb01f39053cf39421b288d34a6632adee3bf66ae9140693
                              • Instruction Fuzzy Hash: 6FE14D71604204AFCB54EF28C991D6BBBF8FF89314F04856DF84ADB2A2D630E945CB91
                              APIs
                                • Part of subcall function 00A09837: __itow.LIBCMT ref: 00A09862
                                • Part of subcall function 00A09837: __swprintf.LIBCMT ref: 00A098AC
                              • CoInitialize.OLE32 ref: 00A78403
                              • CoUninitialize.OLE32 ref: 00A7840E
                              • CoCreateInstance.OLE32(?,00000000,00000017,00A92BEC,?), ref: 00A7846E
                              • IIDFromString.OLE32(?,?), ref: 00A784E1
                              • VariantInit.OLEAUT32(?), ref: 00A7857B
                              • VariantClear.OLEAUT32(?), ref: 00A785DC
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize__itow__swprintf
                              • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                              • API String ID: 834269672-1287834457
                              • Opcode ID: ed7947336f716fdfe7324ee943511b1c9fb24c3f5f02ca52c05af9fdceeccaf9
                              • Instruction ID: 2507adeefbf2e47ad60bbfd662f0e54b4d9355eb94fab6142f66607867399e04
                              • Opcode Fuzzy Hash: ed7947336f716fdfe7324ee943511b1c9fb24c3f5f02ca52c05af9fdceeccaf9
                              • Instruction Fuzzy Hash: 9861AE70648312AFC710DF64D948F6AB7E8AF49754F00C819F9899B291CB78ED48CB92
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                              • String ID:
                              • API String ID: 1737998785-0
                              • Opcode ID: d1bb22a305eee6aef4d40991e8c6b83a33788d4a6e487bea99566314f7427fe6
                              • Instruction ID: c7c145b2f3da99aa1917ede59c8091077dd06208c932c9a3a2f3ff21b7b519f3
                              • Opcode Fuzzy Hash: d1bb22a305eee6aef4d40991e8c6b83a33788d4a6e487bea99566314f7427fe6
                              • Instruction Fuzzy Hash: 4B21B5752012159FDB10EFA4EC09B6E7BA8FF04711F10C125F949DB2A2EB30AC42CB94
                              APIs
                                • Part of subcall function 00A04750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00A04743,?,?,00A037AE,?), ref: 00A04770
                                • Part of subcall function 00A64A31: GetFileAttributesW.KERNEL32(?,00A6370B), ref: 00A64A32
                              • FindFirstFileW.KERNEL32(?,?), ref: 00A638A3
                              • DeleteFileW.KERNEL32(?,?,00000000,?,?,?,?), ref: 00A6394B
                              • MoveFileW.KERNEL32(?,?), ref: 00A6395E
                              • DeleteFileW.KERNEL32(?,?,?,?,?), ref: 00A6397B
                              • FindNextFileW.KERNEL32(00000000,00000010), ref: 00A6399D
                              • FindClose.KERNEL32(00000000,?,?,?,?), ref: 00A639B9
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: File$Find$Delete$AttributesCloseFirstFullMoveNameNextPath
                              • String ID: \*.*
                              • API String ID: 4002782344-1173974218
                              • Opcode ID: 8ec35d00fc28fd8ba1f5af411ac67fd5b3a8ea144712b9da2bc57a17510eb33d
                              • Instruction ID: 44d8c878e5f6dac92f68cbb72c1f820acbeb0e51b6a9fad734e1df4d4ffbee4c
                              • Opcode Fuzzy Hash: 8ec35d00fc28fd8ba1f5af411ac67fd5b3a8ea144712b9da2bc57a17510eb33d
                              • Instruction Fuzzy Hash: D8514F72C0514DAACF05EBE0EA929EDB779AF15304F600069E406B7191EB716F0ACB61
                              APIs
                                • Part of subcall function 00A07DE1: _memmove.LIBCMT ref: 00A07E22
                              • FindFirstFileW.KERNEL32(?,?,*.*,?,?,00000000,00000000), ref: 00A6F440
                              • Sleep.KERNEL32(0000000A), ref: 00A6F470
                              • _wcscmp.LIBCMT ref: 00A6F484
                              • _wcscmp.LIBCMT ref: 00A6F49F
                              • FindNextFileW.KERNEL32(?,?), ref: 00A6F53D
                              • FindClose.KERNEL32(00000000), ref: 00A6F553
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: Find$File_wcscmp$CloseFirstNextSleep_memmove
                              • String ID: *.*
                              • API String ID: 713712311-438819550
                              • Opcode ID: cf35354279bd934dcac6fe6b8566ade7a701e016cae70ac0cc41a36fda2affc0
                              • Instruction ID: 875492f975906582ebdbd2bf6ec8b1b304003336b682d331f734295736207b31
                              • Opcode Fuzzy Hash: cf35354279bd934dcac6fe6b8566ade7a701e016cae70ac0cc41a36fda2affc0
                              • Instruction Fuzzy Hash: 5E415D7294421AAFDF14EFA4EC49AEEBBB8FF05310F144466E815A7191EB309E45CF50
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: _memmove
                              • String ID:
                              • API String ID: 4104443479-0
                              • Opcode ID: 3ff9bdbc6c9ba43f94b81f186594401c8b915fc13d653bc8d2a5d9d16dfdacd8
                              • Instruction ID: c243c8f9872a036ade3805ceee55ed1ca87b45ba6c92387cb6e106c0d9ef6e57
                              • Opcode Fuzzy Hash: 3ff9bdbc6c9ba43f94b81f186594401c8b915fc13d653bc8d2a5d9d16dfdacd8
                              • Instruction Fuzzy Hash: 45129A70E00A09DFDF04DFA5DA81AEEB7F5FF88300F104529E846A7291EB36A955CB51
                              APIs
                                • Part of subcall function 00A587E1: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00A5882B
                                • Part of subcall function 00A587E1: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00A58858
                                • Part of subcall function 00A587E1: GetLastError.KERNEL32 ref: 00A58865
                              • ExitWindowsEx.USER32(?,00000000), ref: 00A651F9
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                              • String ID: $@$SeShutdownPrivilege
                              • API String ID: 2234035333-194228
                              • Opcode ID: e99c0047ad415d5efad38c368d43f94c972aafae3e95430861baf897a8d0d6bf
                              • Instruction ID: 8f4d4efdbcd9cf106ee9670219945a56d2e41686fa680a90fa1be90083a6862e
                              • Opcode Fuzzy Hash: e99c0047ad415d5efad38c368d43f94c972aafae3e95430861baf897a8d0d6bf
                              • Instruction Fuzzy Hash: F801F731F916126FF7286378ACAAFFA73B8EB05341F200521FD13E20D2E9611C418690
                              APIs
                              • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 00A762DC
                              • WSAGetLastError.WSOCK32(00000000), ref: 00A762EB
                              • bind.WSOCK32(00000000,?,00000010), ref: 00A76307
                              • listen.WSOCK32(00000000,00000005), ref: 00A76316
                              • WSAGetLastError.WSOCK32(00000000), ref: 00A76330
                              • closesocket.WSOCK32(00000000,00000000), ref: 00A76344
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: ErrorLast$bindclosesocketlistensocket
                              • String ID:
                              • API String ID: 1279440585-0
                              • Opcode ID: 1657d7861de487241767ac1a4cbb45295673f34a2539deb61c419b67cb383cf2
                              • Instruction ID: 2c84f6e359fbbd9fb9f170f0590a74706d21938ef7642c28affface5d1fdeda7
                              • Opcode Fuzzy Hash: 1657d7861de487241767ac1a4cbb45295673f34a2539deb61c419b67cb383cf2
                              • Instruction Fuzzy Hash: 1D21CE716006059FCB10EF64DD45B6EB7A9EF49320F14C168F85AAB3D2C770AD05CB51
                              APIs
                                • Part of subcall function 00A20DB6: std::exception::exception.LIBCMT ref: 00A20DEC
                                • Part of subcall function 00A20DB6: __CxxThrowException@8.LIBCMT ref: 00A20E01
                              • _memmove.LIBCMT ref: 00A50258
                              • _memmove.LIBCMT ref: 00A5036D
                              • _memmove.LIBCMT ref: 00A50414
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: _memmove$Exception@8Throwstd::exception::exception
                              • String ID:
                              • API String ID: 1300846289-0
                              • Opcode ID: 2f5fd734368151cf2ee32f058e4308ae39713b0be8cd537eb2dbeb70f0f41a7e
                              • Instruction ID: c3325cebe3128eed9afdcdb5eab4be659958da54c3b55713a40799089a0d7181
                              • Opcode Fuzzy Hash: 2f5fd734368151cf2ee32f058e4308ae39713b0be8cd537eb2dbeb70f0f41a7e
                              • Instruction Fuzzy Hash: 9202B170E00609DFCF04DF68DA81AAEBBB5FF84310F148069E846DB295EB35D955CB91
                              APIs
                                • Part of subcall function 00A02612: GetWindowLongW.USER32(?,000000EB), ref: 00A02623
                              • DefDlgProcW.USER32(?,?,?,?,?), ref: 00A019FA
                              • GetSysColor.USER32(0000000F), ref: 00A01A4E
                              • SetBkColor.GDI32(?,00000000), ref: 00A01A61
                                • Part of subcall function 00A01290: DefDlgProcW.USER32(?,00000020,?), ref: 00A012D8
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: ColorProc$LongWindow
                              • String ID:
                              • API String ID: 3744519093-0
                              • Opcode ID: b6117cf55c031e62e7a937b688b8542ccea9dcf5f7a3d7d8ab4263a9aa475de8
                              • Instruction ID: ea8099fffee0634ee2883de8d66e7ef0f436056a7d6e2e7d936190b777b4fdf2
                              • Opcode Fuzzy Hash: b6117cf55c031e62e7a937b688b8542ccea9dcf5f7a3d7d8ab4263a9aa475de8
                              • Instruction Fuzzy Hash: E4A1587121254CBFE729ABA8AD48EFF35AEDF423C1F14011AF602D61D2CB259D4197B1
                              APIs
                                • Part of subcall function 00A77D8B: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 00A77DB6
                              • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 00A7679E
                              • WSAGetLastError.WSOCK32(00000000), ref: 00A767C7
                              • bind.WSOCK32(00000000,?,00000010), ref: 00A76800
                              • WSAGetLastError.WSOCK32(00000000), ref: 00A7680D
                              • closesocket.WSOCK32(00000000,00000000), ref: 00A76821
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: ErrorLast$bindclosesocketinet_addrsocket
                              • String ID:
                              • API String ID: 99427753-0
                              • Opcode ID: 548e3e7b890f6370dfd1fc34c8eba5ea7a90d21ac40fd388697869ca3a56b239
                              • Instruction ID: 2dad0c85efbd16c6e99a5a92cbdc29c5e4d12bf4622eceef2d78564ca34de5c5
                              • Opcode Fuzzy Hash: 548e3e7b890f6370dfd1fc34c8eba5ea7a90d21ac40fd388697869ca3a56b239
                              • Instruction Fuzzy Hash: 27411471B00604AFEB10BF649D82F2E77A8EF09710F04C158FA49AB3C3CA749D018791
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: Window$EnabledForegroundIconicVisibleZoomed
                              • String ID:
                              • API String ID: 292994002-0
                              • Opcode ID: ac82f3671463cb7687718d01ff397042492ec457b5a6406f79c9acc396c41e31
                              • Instruction ID: f1851a38fde1bbadd972a9839c2373c7e15a2513ebcd03e87cb8cb5f95838b1c
                              • Opcode Fuzzy Hash: ac82f3671463cb7687718d01ff397042492ec457b5a6406f79c9acc396c41e31
                              • Instruction Fuzzy Hash: F611B231B00915AFEB217F76DC54A6A7B99FF447A1B404438FC45D7241DB70DC028BA0
                              APIs
                              • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00A580C0
                              • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00A580CA
                              • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00A580D9
                              • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00A580E0
                              • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00A580F6
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: HeapInformationToken$AllocErrorLastProcess
                              • String ID:
                              • API String ID: 44706859-0
                              • Opcode ID: 705ba2859e061c1618e5b7976947dca5a484a8bb5bb480b4277aeaf509088f55
                              • Instruction ID: 4d0d85f31da9c51d5ba40cf9f79d2001f7196742d25f56ee6757cefa52ab82cf
                              • Opcode Fuzzy Hash: 705ba2859e061c1618e5b7976947dca5a484a8bb5bb480b4277aeaf509088f55
                              • Instruction Fuzzy Hash: 75F04F31240305EFEB108FA5EC8DE673BACFF49755B100125F945D6150DA759C46DB60
                              APIs
                              • LoadLibraryA.KERNEL32(kernel32.dll,?,00A04AD0), ref: 00A04B45
                              • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00A04B57
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: AddressLibraryLoadProc
                              • String ID: GetNativeSystemInfo$kernel32.dll
                              • API String ID: 2574300362-192647395
                              • Opcode ID: d4e7e752917b049239263a9a8d8814ba39485d8b8e96135fc6f6b8f386e38611
                              • Instruction ID: 1f402a52a678154003d622ced1863b48db3ba0f699483900373d27a479c48b2d
                              • Opcode Fuzzy Hash: d4e7e752917b049239263a9a8d8814ba39485d8b8e96135fc6f6b8f386e38611
                              • Instruction Fuzzy Hash: 82D01774A10717DFEB20FF72E82CB0676E4BF4A791B11CC3A9586D6190E674E880CB54
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: __itow__swprintf
                              • String ID:
                              • API String ID: 674341424-0
                              • Opcode ID: 2582645f0d797660f4c348ea72636c8f23386214b01675e3e675107bfe4b23fe
                              • Instruction ID: 7f5d767c25a6d1ddaf72d800012b0ea02a52a53339da0b429d7e4edad245074d
                              • Opcode Fuzzy Hash: 2582645f0d797660f4c348ea72636c8f23386214b01675e3e675107bfe4b23fe
                              • Instruction Fuzzy Hash: 6E22AE766083009FDB24DF24D981BAFB7E4BF85310F14492DF89A97291DB71E984CB92
                              APIs
                              • CreateToolhelp32Snapshot.KERNEL32 ref: 00A7EE3D
                              • Process32FirstW.KERNEL32(00000000,?), ref: 00A7EE4B
                                • Part of subcall function 00A07DE1: _memmove.LIBCMT ref: 00A07E22
                              • Process32NextW.KERNEL32(00000000,?), ref: 00A7EF0B
                              • CloseHandle.KERNEL32(00000000,?,?,?), ref: 00A7EF1A
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32_memmove
                              • String ID:
                              • API String ID: 2576544623-0
                              • Opcode ID: 65284222883f061834a54a326f9cf150e1f24bfd50394b07054ad30749f249b6
                              • Instruction ID: f6cafe11c6b20e4aaf23cd035025ca1895afc072fedce901e074258a3280716a
                              • Opcode Fuzzy Hash: 65284222883f061834a54a326f9cf150e1f24bfd50394b07054ad30749f249b6
                              • Instruction Fuzzy Hash: F5519D71504305AFD310EF24DC85E6BB7E8EF88750F10892DF595972A2EB30A908CB92
                              APIs
                              • lstrlenW.KERNEL32(?,?,?,00000000), ref: 00A5E628
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: lstrlen
                              • String ID: ($|
                              • API String ID: 1659193697-1631851259
                              • Opcode ID: b5df62c950259d00f1fe135c11a55ab895fa2109061fa3264427641f5bea0a9d
                              • Instruction ID: 494e2c35387dafcdca2489d8563febfea6925281a53ba3774d3815631a770f81
                              • Opcode Fuzzy Hash: b5df62c950259d00f1fe135c11a55ab895fa2109061fa3264427641f5bea0a9d
                              • Instruction Fuzzy Hash: 13323575A007059FDB28CF29C48196AB7F1FF48320B15C56EE99ADB7A1E770EA41CB40
                              APIs
                              • InternetQueryDataAvailable.WININET(00000001,?,00000000,00000000,00000000,?,?,?,?,?,?,?,?,00A7180A,00000000), ref: 00A723E1
                              • InternetReadFile.WININET(00000001,00000000,00000001,00000001), ref: 00A72418
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: Internet$AvailableDataFileQueryRead
                              • String ID:
                              • API String ID: 599397726-0
                              • Opcode ID: df402238a747b6152f914db6eef6b4abc8e968e3431dbc668b14a32eb4b32945
                              • Instruction ID: 99efaa3bfc6b1ac72557c84fdb0aa769164c23cf058a7593e0c92e09374ac1af
                              • Opcode Fuzzy Hash: df402238a747b6152f914db6eef6b4abc8e968e3431dbc668b14a32eb4b32945
                              • Instruction Fuzzy Hash: B141D571A04209BFEB20DF95DD85FBBB7BCEB40314F10C06AF649AB241EA759E419760
                              APIs
                              • SetErrorMode.KERNEL32(00000001), ref: 00A6B40B
                              • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 00A6B465
                              • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 00A6B4B2
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: ErrorMode$DiskFreeSpace
                              • String ID:
                              • API String ID: 1682464887-0
                              • Opcode ID: 4aad3954540f6534d33af28b10ae4c0cb1b46e33df9a7d8ea62501b8393810a8
                              • Instruction ID: b51964a099e090f8966e34c5d42eb1c5d261314f5c01a32f8f9fab5d6614cef6
                              • Opcode Fuzzy Hash: 4aad3954540f6534d33af28b10ae4c0cb1b46e33df9a7d8ea62501b8393810a8
                              • Instruction Fuzzy Hash: 47214475A00108DFCB00EFA5D984AEEBBB8FF49314F1481A9E905EB352DB319956CB51
                              APIs
                                • Part of subcall function 00A20DB6: std::exception::exception.LIBCMT ref: 00A20DEC
                                • Part of subcall function 00A20DB6: __CxxThrowException@8.LIBCMT ref: 00A20E01
                              • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00A5882B
                              • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00A58858
                              • GetLastError.KERNEL32 ref: 00A58865
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: AdjustErrorException@8LastLookupPrivilegePrivilegesThrowTokenValuestd::exception::exception
                              • String ID:
                              • API String ID: 1922334811-0
                              • Opcode ID: 73e49a9ac248f7ef5a84893b11bb2030f4f9481f990759f497959cfe5b783eec
                              • Instruction ID: 072e1e6d949b8665c675591e93a4ce1a6d127231235fd3b9c6f6c58c0016562b
                              • Opcode Fuzzy Hash: 73e49a9ac248f7ef5a84893b11bb2030f4f9481f990759f497959cfe5b783eec
                              • Instruction Fuzzy Hash: D111BFB2404205AFE718DFA4EC85D2BB7F9FB04711B20852EF85597211EB30BC418B60
                              APIs
                              • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 00A58774
                              • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 00A5878B
                              • FreeSid.ADVAPI32(?), ref: 00A5879B
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: AllocateCheckFreeInitializeMembershipToken
                              • String ID:
                              • API String ID: 3429775523-0
                              • Opcode ID: fcd0921e3b99274b36d8dc3fba83210fc83316ec1853dcfb24bf9a7b171ca935
                              • Instruction ID: b204c83e963611cb2200ce7bb7550b0b04e44455c37ee972d733ccc91f4f10b6
                              • Opcode Fuzzy Hash: fcd0921e3b99274b36d8dc3fba83210fc83316ec1853dcfb24bf9a7b171ca935
                              • Instruction Fuzzy Hash: C9F04975A1130DBFDF00DFF4DC89AAEBBBCEF08201F1044A9A901E2181E7756A048B50
                              APIs
                              • FindFirstFileW.KERNEL32(?,?), ref: 00A6C6FB
                              • FindClose.KERNEL32(00000000), ref: 00A6C72B
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: Find$CloseFileFirst
                              • String ID:
                              • API String ID: 2295610775-0
                              • Opcode ID: 89cc2202095861a6010628868e5ec5ec2448b557a0093eb5fe22b40266583705
                              • Instruction ID: 37caedfded3dc5e5ce2b22688cc3a568b3599a6849dab0ff5c0adaeb0e828a26
                              • Opcode Fuzzy Hash: 89cc2202095861a6010628868e5ec5ec2448b557a0093eb5fe22b40266583705
                              • Instruction Fuzzy Hash: 6B115E726006049FDB10EF29D845A6AF7E9FF85325F00C51DF9A9D7391DB30A805CB81
                              APIs
                              • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,00000016,?,00A79468,?,00A8FB84,?), ref: 00A6A097
                              • FormatMessageW.KERNEL32(00001000,00000000,000000FF,00000000,?,00000FFF,00000000,00000016,?,00A79468,?,00A8FB84,?), ref: 00A6A0A9
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: ErrorFormatLastMessage
                              • String ID:
                              • API String ID: 3479602957-0
                              • Opcode ID: f0174ccd57318e3f0013ab4c672291057a21e442e2f8e0a56fb0aea439710554
                              • Instruction ID: d4bc41c2efd771b2aabe41eae0c376c75adbe15d8453ad8d829c695d1ee713c1
                              • Opcode Fuzzy Hash: f0174ccd57318e3f0013ab4c672291057a21e442e2f8e0a56fb0aea439710554
                              • Instruction Fuzzy Hash: EEF0823550522DABDB21AFA4DC49FEA776CFF18361F004165F919D6181DA309940CFA1
                              APIs
                              • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00A58309), ref: 00A581E0
                              • CloseHandle.KERNEL32(?,?,00A58309), ref: 00A581F2
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: AdjustCloseHandlePrivilegesToken
                              • String ID:
                              • API String ID: 81990902-0
                              • Opcode ID: 93582cd1cd0d2f7a3730a7ea01bd752b7d0359ba2db418a69058ecd9a31c3af4
                              • Instruction ID: f0cc22e7de36b89779d593aa3bbb5111bb38fa08f132739ca5830e624375c0cd
                              • Opcode Fuzzy Hash: 93582cd1cd0d2f7a3730a7ea01bd752b7d0359ba2db418a69058ecd9a31c3af4
                              • Instruction Fuzzy Hash: 1CE0B672011621AEE7256BA4FC09D777BAAEB043117258929B8A684471DB62AC91DB10
                              APIs
                              • SetUnhandledExceptionFilter.KERNEL32(00000000,?,00A28D57,?,?,?,00000001), ref: 00A2A15A
                              • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 00A2A163
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: ExceptionFilterUnhandled
                              • String ID:
                              • API String ID: 3192549508-0
                              • Opcode ID: 31cb72239b3dc3d549f974b5aff16b6336e1320d4b6e9aecb3a759da0ac17f5d
                              • Instruction ID: 22caca5c2f486c7ea32260c7156a938e7d8be9afed4e1f482f90472f4ff5fe46
                              • Opcode Fuzzy Hash: 31cb72239b3dc3d549f974b5aff16b6336e1320d4b6e9aecb3a759da0ac17f5d
                              • Instruction Fuzzy Hash: 2AB0923125430AAFCA006BD1EC09B883F68EB46AA2F404020F61D88060CB6254528B91
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 1d52cd04561c6143ab6ff8ead6619821955b57fcebe5949a12bd2bdf6863aa29
                              • Instruction ID: e6ea981e62ec860ac104a374850ba1cd1743a63227819859626466fbe1c56387
                              • Opcode Fuzzy Hash: 1d52cd04561c6143ab6ff8ead6619821955b57fcebe5949a12bd2bdf6863aa29
                              • Instruction Fuzzy Hash: 37320421E29F514DD7239639D83233AA299AFB73C4F15D737E81AB5AA5EF28C4C34100
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 4251ba26dec6bcd84ad9c9225a16031c38f7e043c0e5984504e0810d870b30dc
                              • Instruction ID: 6b8c3c62beb732f8846e29e6a512bb12f0744e1bf07a65b3ed876cddbcf6cd03
                              • Opcode Fuzzy Hash: 4251ba26dec6bcd84ad9c9225a16031c38f7e043c0e5984504e0810d870b30dc
                              • Instruction Fuzzy Hash: 5EB1EE30E2AF514DD72396798831336BA9CAFBB2C5F51D71BFC2674D22EB2185834281
                              APIs
                              • __time64.LIBCMT ref: 00A6889B
                                • Part of subcall function 00A2520A: GetSystemTimeAsFileTime.KERNEL32(00000000,?,?,?,00A68F6E,00000000,?,?,?,?,00A6911F,00000000,?), ref: 00A25213
                                • Part of subcall function 00A2520A: __aulldiv.LIBCMT ref: 00A25233
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: Time$FileSystem__aulldiv__time64
                              • String ID:
                              • API String ID: 2893107130-0
                              • Opcode ID: a8ca19be87535616f9a7c683fb54c01486bc44393c3bbe86c84a03751b356038
                              • Instruction ID: d99fbb1d7db16dd1eb5b2661ebc897a7d802d222ebee18cd4c6b0bd0c350c9f3
                              • Opcode Fuzzy Hash: a8ca19be87535616f9a7c683fb54c01486bc44393c3bbe86c84a03751b356038
                              • Instruction Fuzzy Hash: 6921AF726256108BC729CF69D841A92B3E5EBA5311B698F6CD0F6CB2C0CA34A905CB54
                              APIs
                              • mouse_event.USER32(00000002,00000000,00000000,00000000,00000000), ref: 00A64C4A
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: mouse_event
                              • String ID:
                              • API String ID: 2434400541-0
                              • Opcode ID: 9d0066b49cb6526ee735e1c2f37de764327adba06c4ccee3931feed897c64073
                              • Instruction ID: c68d22c21e4ef793cc0a1f9a5e90dbabfeda833d368b1a139a0dd8f64d039daf
                              • Opcode Fuzzy Hash: 9d0066b49cb6526ee735e1c2f37de764327adba06c4ccee3931feed897c64073
                              • Instruction Fuzzy Hash: 67D05EA116521A38FE1C07209E1FFBB0138E308782FD081497101CA2C1EC805C405130
                              APIs
                              • LogonUserW.ADVAPI32(?,00000001,?,?,00000000,00A58389), ref: 00A587D1
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: LogonUser
                              • String ID:
                              • API String ID: 1244722697-0
                              • Opcode ID: 6e7b35bc7365ab8ee2f6b7bfa5618e773b554013a07bb055affb0d6899d08630
                              • Instruction ID: f76a77f4e1d118acf59242c39d05c299a39571aa4e14523c572defaeaa7074e5
                              • Opcode Fuzzy Hash: 6e7b35bc7365ab8ee2f6b7bfa5618e773b554013a07bb055affb0d6899d08630
                              • Instruction Fuzzy Hash: 53D05E3226050EAFEF018EA4DC01EAE3B79EB04B01F408111FE15D50A1C775D835AB60
                              APIs
                              • SetUnhandledExceptionFilter.KERNEL32(?), ref: 00A2A12A
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: ExceptionFilterUnhandled
                              • String ID:
                              • API String ID: 3192549508-0
                              • Opcode ID: c2403dcb90956ec22b1a2be1c3122163547d23c4bc0c984ec319bf87d7332196
                              • Instruction ID: bb559b27c7664074462c2c9a679654fece345ee83831b82ccc01761b7febd847
                              • Opcode Fuzzy Hash: c2403dcb90956ec22b1a2be1c3122163547d23c4bc0c984ec319bf87d7332196
                              • Instruction Fuzzy Hash: 31A0113000020EAB8A002B82EC08888BFACEA022A0B008020F80C880228B32A8228A80
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 5531599e2e9738e052ee299a364ca63d9a2537593381df7aab9de1f0ddebc4b2
                              • Instruction ID: 4808fc293596ccf43b4d9432bf0d2dd9a5c9b6601aec3209e3dcf653edc7d418
                              • Opcode Fuzzy Hash: 5531599e2e9738e052ee299a364ca63d9a2537593381df7aab9de1f0ddebc4b2
                              • Instruction Fuzzy Hash: 74221130E04506CBDF288B74C4A47FCBBB2BF01385F29816ADA568B592DB789DD5CB41
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                              • Instruction ID: 46854c399bc99124b91351dcec89c64c72c16fd3396e4702ac1282e084048fd0
                              • Opcode Fuzzy Hash: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                              • Instruction Fuzzy Hash: AFC182322451B34ADB2D873DA43413EBAA19EA27B131A077DD8B3CB1D4EE24D965D720
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                              • Instruction ID: 1aca0f3d43c28f3659e313fdc069d01a2c355bc11d2218121c400f185e9d439c
                              • Opcode Fuzzy Hash: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                              • Instruction Fuzzy Hash: 29C151322091B34ADF2D473E947423EBAA19EA27B131B077DD4B2DB1D5EE20C965D720
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                              • Instruction ID: 8f33fc9607a0749ba24061f90360cd144717e08dcd4cac4a121de1fc8278c8d9
                              • Opcode Fuzzy Hash: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                              • Instruction Fuzzy Hash: 6BC18F362491B349DF2D473EA47413EBAA19EB27B131B077DD4B2CB1D4EE20C966D620
                              APIs
                              • DeleteObject.GDI32(00000000), ref: 00A7785B
                              • DeleteObject.GDI32(00000000), ref: 00A7786D
                              • DestroyWindow.USER32 ref: 00A7787B
                              • GetDesktopWindow.USER32 ref: 00A77895
                              • GetWindowRect.USER32(00000000), ref: 00A7789C
                              • SetRect.USER32(?,00000000,00000000,000001F4,00000190), ref: 00A779DD
                              • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000002), ref: 00A779ED
                              • CreateWindowExW.USER32(00000002,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00A77A35
                              • GetClientRect.USER32(00000000,?), ref: 00A77A41
                              • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00A77A7B
                              • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00A77A9D
                              • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00A77AB0
                              • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00A77ABB
                              • GlobalLock.KERNEL32(00000000), ref: 00A77AC4
                              • ReadFile.KERNEL32(00000000,00000000,00000000,00000190,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00A77AD3
                              • GlobalUnlock.KERNEL32(00000000), ref: 00A77ADC
                              • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00A77AE3
                              • GlobalFree.KERNEL32(00000000), ref: 00A77AEE
                              • CreateStreamOnHGlobal.OLE32(00000000,00000001,88C00000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00A77B00
                              • OleLoadPicture.OLEAUT32(88C00000,00000000,00000000,00A92CAC,00000000), ref: 00A77B16
                              • GlobalFree.KERNEL32(00000000), ref: 00A77B26
                              • CopyImage.USER32(000001F4,00000000,00000000,00000000,00002000), ref: 00A77B4C
                              • SendMessageW.USER32(?,00000172,00000000,000001F4), ref: 00A77B6B
                              • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00A77B8D
                              • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00A77D7A
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                              • String ID: $@U=u$AutoIt v3$DISPLAY$static
                              • API String ID: 2211948467-3613752883
                              • Opcode ID: bb9fb498b769bf7801c5624837f5030e93da3ab711df23895b530cc7635a0096
                              • Instruction ID: 9e9c334acfa02724b5feed68f38dff41768eed74decfbef2af8be8df57cda572
                              • Opcode Fuzzy Hash: bb9fb498b769bf7801c5624837f5030e93da3ab711df23895b530cc7635a0096
                              • Instruction Fuzzy Hash: 36025B71A00119EFDB14DFA4DD89EAE7BB9FF49310F108168F915AB2A1D730AD42CB60
                              APIs
                              • SetTextColor.GDI32(?,00000000), ref: 00A8A630
                              • GetSysColorBrush.USER32(0000000F), ref: 00A8A661
                              • GetSysColor.USER32(0000000F), ref: 00A8A66D
                              • SetBkColor.GDI32(?,000000FF), ref: 00A8A687
                              • SelectObject.GDI32(?,00000000), ref: 00A8A696
                              • InflateRect.USER32(?,000000FF,000000FF), ref: 00A8A6C1
                              • GetSysColor.USER32(00000010), ref: 00A8A6C9
                              • CreateSolidBrush.GDI32(00000000), ref: 00A8A6D0
                              • FrameRect.USER32(?,?,00000000), ref: 00A8A6DF
                              • DeleteObject.GDI32(00000000), ref: 00A8A6E6
                              • InflateRect.USER32(?,000000FE,000000FE), ref: 00A8A731
                              • FillRect.USER32(?,?,00000000), ref: 00A8A763
                              • GetWindowLongW.USER32(?,000000F0), ref: 00A8A78E
                                • Part of subcall function 00A8A8CA: GetSysColor.USER32(00000012), ref: 00A8A903
                                • Part of subcall function 00A8A8CA: SetTextColor.GDI32(?,?), ref: 00A8A907
                                • Part of subcall function 00A8A8CA: GetSysColorBrush.USER32(0000000F), ref: 00A8A91D
                                • Part of subcall function 00A8A8CA: GetSysColor.USER32(0000000F), ref: 00A8A928
                                • Part of subcall function 00A8A8CA: GetSysColor.USER32(00000011), ref: 00A8A945
                                • Part of subcall function 00A8A8CA: CreatePen.GDI32(00000000,00000001,00743C00), ref: 00A8A953
                                • Part of subcall function 00A8A8CA: SelectObject.GDI32(?,00000000), ref: 00A8A964
                                • Part of subcall function 00A8A8CA: SetBkColor.GDI32(?,00000000), ref: 00A8A96D
                                • Part of subcall function 00A8A8CA: SelectObject.GDI32(?,?), ref: 00A8A97A
                                • Part of subcall function 00A8A8CA: InflateRect.USER32(?,000000FF,000000FF), ref: 00A8A999
                                • Part of subcall function 00A8A8CA: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00A8A9B0
                                • Part of subcall function 00A8A8CA: GetWindowLongW.USER32(00000000,000000F0), ref: 00A8A9C5
                                • Part of subcall function 00A8A8CA: SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00A8A9ED
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameMessageRoundSendSolid
                              • String ID: @U=u
                              • API String ID: 3521893082-2594219639
                              • Opcode ID: bd80c681e6d927377e5420750def21640f7fb95b381bd706c46bcda8018c32cd
                              • Instruction ID: d3bf237628938f45440d3c6ad93c75b8bf68bef81c3ff1f2efc5efd57dbc8334
                              • Opcode Fuzzy Hash: bd80c681e6d927377e5420750def21640f7fb95b381bd706c46bcda8018c32cd
                              • Instruction Fuzzy Hash: 4A915B72408302AFD710EFA4DC08A5B7BB9FB89321F144B2AF962D61A1D771D946CB52
                              APIs
                              • CharUpperBuffW.USER32(?,?,00A8F910), ref: 00A83627
                              • IsWindowVisible.USER32(?), ref: 00A8364B
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: BuffCharUpperVisibleWindow
                              • String ID: @U=u$ADDSTRING$CHECK$CURRENTTAB$DELSTRING$EDITPASTE$FINDSTRING$GETCURRENTCOL$GETCURRENTLINE$GETCURRENTSELECTION$GETLINE$GETLINECOUNT$GETSELECTED$HIDEDROPDOWN$ISCHECKED$ISENABLED$ISVISIBLE$SELECTSTRING$SENDCOMMANDID$SETCURRENTSELECTION$SHOWDROPDOWN$TABLEFT$TABRIGHT$UNCHECK
                              • API String ID: 4105515805-3469695742
                              • Opcode ID: 2f32498c35807407b5ece88785846023d033faaaaf8ede2906f8ea4eb26e4098
                              • Instruction ID: 851bacaf034a7a626d18d76726ce7883304dcefb92b28e419984a854afa9a886
                              • Opcode Fuzzy Hash: 2f32498c35807407b5ece88785846023d033faaaaf8ede2906f8ea4eb26e4098
                              • Instruction Fuzzy Hash: B1D16C712042019FCF04FF14C6A1AAFBBA5AF95794F544468F8825B3A3DB35EE4ACB41
                              APIs
                              • DestroyWindow.USER32(?,?,?), ref: 00A02CA2
                              • DeleteObject.GDI32(00000000), ref: 00A02CE8
                              • DeleteObject.GDI32(00000000), ref: 00A02CF3
                              • DestroyIcon.USER32(00000000,?,?,?), ref: 00A02CFE
                              • DestroyWindow.USER32(00000000,?,?,?), ref: 00A02D09
                              • SendMessageW.USER32(?,00001308,?,00000000), ref: 00A3C43B
                              • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 00A3C474
                              • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 00A3C89D
                                • Part of subcall function 00A01B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00A02036,?,00000000,?,?,?,?,00A016CB,00000000,?), ref: 00A01B9A
                              • SendMessageW.USER32(?,00001053), ref: 00A3C8DA
                              • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 00A3C8F1
                              • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 00A3C907
                              • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 00A3C912
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: Destroy$ImageList_MessageSendWindow$DeleteObject$IconInvalidateMoveRectRemove
                              • String ID: 0$@U=u
                              • API String ID: 464785882-975001249
                              • Opcode ID: c9a0443d99e09d1623d2ad4a1f58ce154aa1a1181bc4aebe82f0b8cf8b33e263
                              • Instruction ID: b66947cd18ea28c833aa53ccf60275202102312e0c9ee85fe70f8ef9d17737d1
                              • Opcode Fuzzy Hash: c9a0443d99e09d1623d2ad4a1f58ce154aa1a1181bc4aebe82f0b8cf8b33e263
                              • Instruction Fuzzy Hash: C9129C30600206EFDB25CF24D988BA9BBE5BF44324F544569F895EB2A2C731EC52CB91
                              APIs
                              • DestroyWindow.USER32(00000000), ref: 00A774DE
                              • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00A7759D
                              • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 00A775DB
                              • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000006), ref: 00A775ED
                              • CreateWindowExW.USER32(00000006,AutoIt v3,?,88C00000,?,?,?,?,00000000,00000000,00000000), ref: 00A77633
                              • GetClientRect.USER32(00000000,?), ref: 00A7763F
                              • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000), ref: 00A77683
                              • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00A77692
                              • GetStockObject.GDI32(00000011), ref: 00A776A2
                              • SelectObject.GDI32(00000000,00000000), ref: 00A776A6
                              • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?), ref: 00A776B6
                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00A776BF
                              • DeleteDC.GDI32(00000000), ref: 00A776C8
                              • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00A776F4
                              • SendMessageW.USER32(00000030,00000000,00000001), ref: 00A7770B
                              • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,00000000,00000000,00000000), ref: 00A77746
                              • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00A7775A
                              • SendMessageW.USER32(00000404,00000001,00000000), ref: 00A7776B
                              • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,00000000,00000000,00000000), ref: 00A7779B
                              • GetStockObject.GDI32(00000011), ref: 00A777A6
                              • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 00A777B1
                              • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?,?,?,?), ref: 00A777BB
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                              • String ID: @U=u$AutoIt v3$DISPLAY$msctls_progress32$static
                              • API String ID: 2910397461-2771358697
                              • Opcode ID: fb74aedb7574074a900b4378963453178b7bc1182b94703d2e9ec415174e307f
                              • Instruction ID: b92b6adc9ec79f1ce673dc67a0ecb992b7e5cb46e658030ff2e4b570e8782603
                              • Opcode Fuzzy Hash: fb74aedb7574074a900b4378963453178b7bc1182b94703d2e9ec415174e307f
                              • Instruction Fuzzy Hash: 5BA18FB1A40609BFEB14DBA4DC4AFAF7BB9EB04710F008214FA15A72E1D770AD41CB64
                              APIs
                              • GetSysColor.USER32(00000012), ref: 00A8A903
                              • SetTextColor.GDI32(?,?), ref: 00A8A907
                              • GetSysColorBrush.USER32(0000000F), ref: 00A8A91D
                              • GetSysColor.USER32(0000000F), ref: 00A8A928
                              • CreateSolidBrush.GDI32(?), ref: 00A8A92D
                              • GetSysColor.USER32(00000011), ref: 00A8A945
                              • CreatePen.GDI32(00000000,00000001,00743C00), ref: 00A8A953
                              • SelectObject.GDI32(?,00000000), ref: 00A8A964
                              • SetBkColor.GDI32(?,00000000), ref: 00A8A96D
                              • SelectObject.GDI32(?,?), ref: 00A8A97A
                              • InflateRect.USER32(?,000000FF,000000FF), ref: 00A8A999
                              • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00A8A9B0
                              • GetWindowLongW.USER32(00000000,000000F0), ref: 00A8A9C5
                              • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00A8A9ED
                              • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 00A8AA14
                              • InflateRect.USER32(?,000000FD,000000FD), ref: 00A8AA32
                              • DrawFocusRect.USER32(?,?), ref: 00A8AA3D
                              • GetSysColor.USER32(00000011), ref: 00A8AA4B
                              • SetTextColor.GDI32(?,00000000), ref: 00A8AA53
                              • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 00A8AA67
                              • SelectObject.GDI32(?,00A8A5FA), ref: 00A8AA7E
                              • DeleteObject.GDI32(?), ref: 00A8AA89
                              • SelectObject.GDI32(?,?), ref: 00A8AA8F
                              • DeleteObject.GDI32(?), ref: 00A8AA94
                              • SetTextColor.GDI32(?,?), ref: 00A8AA9A
                              • SetBkColor.GDI32(?,?), ref: 00A8AAA4
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                              • String ID: @U=u
                              • API String ID: 1996641542-2594219639
                              • Opcode ID: f584cbceed2b1e92f60f93e906738719d342104280b878371ef1db570d921edc
                              • Instruction ID: e621a3bc7de52ccda6f550e29345e46311536fe7eb16d0a242c1df3bb353e359
                              • Opcode Fuzzy Hash: f584cbceed2b1e92f60f93e906738719d342104280b878371ef1db570d921edc
                              • Instruction Fuzzy Hash: 48512D71901209EFDB11EFE4DC48EAE7B79FB08320F214626FA11AB2A1D7759941DB90
                              APIs
                              • SetErrorMode.KERNEL32(00000001), ref: 00A6AD1E
                              • GetDriveTypeW.KERNEL32(?,00A8FAC0,?,\\.\,00A8F910), ref: 00A6ADFB
                              • SetErrorMode.KERNEL32(00000000,00A8FAC0,?,\\.\,00A8F910), ref: 00A6AF59
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: ErrorMode$DriveType
                              • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                              • API String ID: 2907320926-4222207086
                              • Opcode ID: dcb5472039f328c5ba473c3d8058e1ede5ee26c390864bd631abc2e209acea93
                              • Instruction ID: 57a4c67eec487331ef44e300fc5d2e4e8577a903e2e8710972795ed2f3b8dbcf
                              • Opcode Fuzzy Hash: dcb5472039f328c5ba473c3d8058e1ede5ee26c390864bd631abc2e209acea93
                              • Instruction Fuzzy Hash: 395174B0644209EBCB10EB64C992CBD73B9FF29740B20885AE407B72D2DA759D42DF53
                              APIs
                              • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000103,?,?,?), ref: 00A89AD2
                              • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 00A89B8B
                              • SendMessageW.USER32(?,00001102,00000002,?), ref: 00A89BA7
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: MessageSend$Window
                              • String ID: 0$@U=u
                              • API String ID: 2326795674-975001249
                              • Opcode ID: a1b0202905f129c33cd522971f5b1fb9879c496e5621c7703f42dd3635147e1e
                              • Instruction ID: a90728c3bac98d583f5083c6ab719eb57b3635b033480c3d44d983585a41d06a
                              • Opcode Fuzzy Hash: a1b0202905f129c33cd522971f5b1fb9879c496e5621c7703f42dd3635147e1e
                              • Instruction Fuzzy Hash: DE02DB70104301AFE729EF24C888BBBBBE5FF49304F08862DF999962A1D735D945CB52
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: __wcsnicmp
                              • String ID: #OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                              • API String ID: 1038674560-86951937
                              • Opcode ID: 183202759185b85efe8db2cf9a5fc7dd9c857024d3f49b183318c2a2ccee2151
                              • Instruction ID: d0d3df3ec3cce5b1cbec48885d7d229ad9d40feee3b0a92247e788d3bb2f83d0
                              • Opcode Fuzzy Hash: 183202759185b85efe8db2cf9a5fc7dd9c857024d3f49b183318c2a2ccee2151
                              • Instruction Fuzzy Hash: 7381F2B170021ABEDF20FB64FD42FAA37A8AF05744F044424F905AA1D2EB70DA65C6A1
                              APIs
                              • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 00A88AC1
                              • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00A88AD2
                              • CharNextW.USER32(0000014E), ref: 00A88B01
                              • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00A88B42
                              • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00A88B58
                              • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00A88B69
                              • SendMessageW.USER32(?,000000C2,00000001,0000014E), ref: 00A88B86
                              • SetWindowTextW.USER32(?,0000014E), ref: 00A88BD8
                              • SendMessageW.USER32(?,000000B1,000F4240,000F423F), ref: 00A88BEE
                              • SendMessageW.USER32(?,00001002,00000000,?), ref: 00A88C1F
                              • _memset.LIBCMT ref: 00A88C44
                              • SendMessageW.USER32(00000000,00001060,00000001,00000004), ref: 00A88C8D
                              • _memset.LIBCMT ref: 00A88CEC
                              • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00A88D16
                              • SendMessageW.USER32(?,00001074,?,00000001), ref: 00A88D6E
                              • SendMessageW.USER32(?,0000133D,?,?), ref: 00A88E1B
                              • InvalidateRect.USER32(?,00000000,00000001), ref: 00A88E3D
                              • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00A88E87
                              • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00A88EB4
                              • DrawMenuBar.USER32(?), ref: 00A88EC3
                              • SetWindowTextW.USER32(?,0000014E), ref: 00A88EEB
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: MessageSend$Menu$InfoItemTextWindow_memset$CharDrawInvalidateNextRect
                              • String ID: 0$@U=u
                              • API String ID: 1073566785-975001249
                              • Opcode ID: e732149e032dad5efcf957a535b98db2c1b47fc2fdcd848e1a243735ed36c153
                              • Instruction ID: 8e5540bbff7ea9bfdf0d36acf4f217c07c371754e5ed277df3b4bf5b08d12f43
                              • Opcode Fuzzy Hash: e732149e032dad5efcf957a535b98db2c1b47fc2fdcd848e1a243735ed36c153
                              • Instruction Fuzzy Hash: 06E17074900219AFDF20EFA4CC84EEE7BB9EF05750F508166FA15AA190DF789981DF60
                              APIs
                              • GetCursorPos.USER32(?), ref: 00A849CA
                              • GetDesktopWindow.USER32 ref: 00A849DF
                              • GetWindowRect.USER32(00000000), ref: 00A849E6
                              • GetWindowLongW.USER32(?,000000F0), ref: 00A84A48
                              • DestroyWindow.USER32(?), ref: 00A84A74
                              • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00A84A9D
                              • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00A84ABB
                              • SendMessageW.USER32(?,00000439,00000000,00000030), ref: 00A84AE1
                              • SendMessageW.USER32(?,00000421,?,?), ref: 00A84AF6
                              • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 00A84B09
                              • IsWindowVisible.USER32(?), ref: 00A84B29
                              • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 00A84B44
                              • SendMessageW.USER32(?,00000411,00000001,00000030), ref: 00A84B58
                              • GetWindowRect.USER32(?,?), ref: 00A84B70
                              • MonitorFromPoint.USER32(?,?,00000002), ref: 00A84B96
                              • GetMonitorInfoW.USER32(00000000,?), ref: 00A84BB0
                              • CopyRect.USER32(?,?), ref: 00A84BC7
                              • SendMessageW.USER32(?,00000412,00000000), ref: 00A84C32
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                              • String ID: ($0$tooltips_class32
                              • API String ID: 698492251-4156429822
                              • Opcode ID: 5cf9a51b9dedbed8b05783cd22c3f31b0bd40bd4bce7ee9b431576ceb5bb69e4
                              • Instruction ID: 9e8567edc1fe3754780eb6c12abe2369009c63af16779e3571e403785147347f
                              • Opcode Fuzzy Hash: 5cf9a51b9dedbed8b05783cd22c3f31b0bd40bd4bce7ee9b431576ceb5bb69e4
                              • Instruction Fuzzy Hash: FCB16971604342AFDB04EF64D948B6BBBE4FF88314F008A1DF999AB2A1D771E805CB55
                              APIs
                              • GetFileVersionInfoSizeW.VERSION(?,?), ref: 00A644AC
                              • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 00A644D2
                              • _wcscpy.LIBCMT ref: 00A64500
                              • _wcscmp.LIBCMT ref: 00A6450B
                              • _wcscat.LIBCMT ref: 00A64521
                              • _wcsstr.LIBCMT ref: 00A6452C
                              • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 00A64548
                              • _wcscat.LIBCMT ref: 00A64591
                              • _wcscat.LIBCMT ref: 00A64598
                              • _wcsncpy.LIBCMT ref: 00A645C3
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: _wcscat$FileInfoVersion$QuerySizeValue_wcscmp_wcscpy_wcsncpy_wcsstr
                              • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                              • API String ID: 699586101-1459072770
                              • Opcode ID: 9af117fbdc8b78c519344b97d39ce6ce31a53bac499cdb44c58189b0fab2ebb8
                              • Instruction ID: 67b6bb01d95beba233a58d7958d49dd92b3226823119bdcecf5e7b97f10784cf
                              • Opcode Fuzzy Hash: 9af117fbdc8b78c519344b97d39ce6ce31a53bac499cdb44c58189b0fab2ebb8
                              • Instruction Fuzzy Hash: 0F41D4329002157FEB15BB78ED47EBF777CEF46710F04047AF905A6182EA349A0197A5
                              APIs
                              • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00A028BC
                              • GetSystemMetrics.USER32(00000007), ref: 00A028C4
                              • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00A028EF
                              • GetSystemMetrics.USER32(00000008), ref: 00A028F7
                              • GetSystemMetrics.USER32(00000004), ref: 00A0291C
                              • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 00A02939
                              • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 00A02949
                              • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 00A0297C
                              • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00A02990
                              • GetClientRect.USER32(00000000,000000FF), ref: 00A029AE
                              • GetStockObject.GDI32(00000011), ref: 00A029CA
                              • SendMessageW.USER32(00000000,00000030,00000000), ref: 00A029D5
                                • Part of subcall function 00A02344: GetCursorPos.USER32(?), ref: 00A02357
                                • Part of subcall function 00A02344: ScreenToClient.USER32(00AC57B0,?), ref: 00A02374
                                • Part of subcall function 00A02344: GetAsyncKeyState.USER32(00000001), ref: 00A02399
                                • Part of subcall function 00A02344: GetAsyncKeyState.USER32(00000002), ref: 00A023A7
                              • SetTimer.USER32(00000000,00000000,00000028,00A01256), ref: 00A029FC
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                              • String ID: @U=u$AutoIt v3 GUI
                              • API String ID: 1458621304-2077007950
                              • Opcode ID: 2dcb21ba8d463e20c844432d9d246e347da3ec8d6e771c726f737394a021e145
                              • Instruction ID: 1dc179196e32d873084bcb4a556c0f81f2141de2e9f5ba61ba17d5b486a5f1d1
                              • Opcode Fuzzy Hash: 2dcb21ba8d463e20c844432d9d246e347da3ec8d6e771c726f737394a021e145
                              • Instruction Fuzzy Hash: 36B15C75A0020AEFDB14DFA8DD49BAE7BB4FB08314F114229FA15E72E0DB74A851DB50
                              APIs
                              • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,00000000,?), ref: 00A8BA56
                              • GetFileSize.KERNEL32(00000000,00000000), ref: 00A8BA6D
                              • GlobalAlloc.KERNEL32(00000002,00000000), ref: 00A8BA78
                              • CloseHandle.KERNEL32(00000000), ref: 00A8BA85
                              • GlobalLock.KERNEL32(00000000), ref: 00A8BA8E
                              • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00A8BA9D
                              • GlobalUnlock.KERNEL32(00000000), ref: 00A8BAA6
                              • CloseHandle.KERNEL32(00000000), ref: 00A8BAAD
                              • CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 00A8BABE
                              • OleLoadPicture.OLEAUT32(?,00000000,00000000,00A92CAC,?), ref: 00A8BAD7
                              • GlobalFree.KERNEL32(00000000), ref: 00A8BAE7
                              • GetObjectW.GDI32(?,00000018,000000FF), ref: 00A8BB0B
                              • CopyImage.USER32(?,00000000,?,?,00002000), ref: 00A8BB36
                              • DeleteObject.GDI32(00000000), ref: 00A8BB5E
                              • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 00A8BB74
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                              • String ID: @U=u
                              • API String ID: 3840717409-2594219639
                              • Opcode ID: 8bce19f15f503ace7a722eef4112476740436ea632b9c5ff80ccda3131262f04
                              • Instruction ID: 765be562099fa630926d21d091f9a43b89c898e716c793fde97736596746160c
                              • Opcode Fuzzy Hash: 8bce19f15f503ace7a722eef4112476740436ea632b9c5ff80ccda3131262f04
                              • Instruction Fuzzy Hash: 20411775600209EFDB21EFA5DC88EAABBB8FF89711F104169F905D7260D7309E02DB60
                              APIs
                              • GetClassNameW.USER32(?,?,00000100), ref: 00A5A47A
                              • __swprintf.LIBCMT ref: 00A5A51B
                              • _wcscmp.LIBCMT ref: 00A5A52E
                              • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00A5A583
                              • _wcscmp.LIBCMT ref: 00A5A5BF
                              • GetClassNameW.USER32(?,?,00000400), ref: 00A5A5F6
                              • GetDlgCtrlID.USER32(?), ref: 00A5A648
                              • GetWindowRect.USER32(?,?), ref: 00A5A67E
                              • GetParent.USER32(?), ref: 00A5A69C
                              • ScreenToClient.USER32(00000000), ref: 00A5A6A3
                              • GetClassNameW.USER32(?,?,00000100), ref: 00A5A71D
                              • _wcscmp.LIBCMT ref: 00A5A731
                              • GetWindowTextW.USER32(?,?,00000400), ref: 00A5A757
                              • _wcscmp.LIBCMT ref: 00A5A76B
                                • Part of subcall function 00A2362C: _iswctype.LIBCMT ref: 00A23634
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: _wcscmp$ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_iswctype
                              • String ID: %s%u
                              • API String ID: 3744389584-679674701
                              • Opcode ID: 09b3fdbed99e4f416840c3f89d9857c213d0e523484cf007b1980c6653ec60d1
                              • Instruction ID: 782b917b802ed13b3d1a3b7cebee3375d9a43857379f4eefb497cd32ea0cbbfd
                              • Opcode Fuzzy Hash: 09b3fdbed99e4f416840c3f89d9857c213d0e523484cf007b1980c6653ec60d1
                              • Instruction Fuzzy Hash: 4EA1D271304206AFDB14DF64C884FAAB7E8FF58352F048629FD99D2190DB30E959CB92
                              APIs
                              • GetClassNameW.USER32(00000008,?,00000400), ref: 00A5AF18
                              • _wcscmp.LIBCMT ref: 00A5AF29
                              • GetWindowTextW.USER32(00000001,?,00000400), ref: 00A5AF51
                              • CharUpperBuffW.USER32(?,00000000), ref: 00A5AF6E
                              • _wcscmp.LIBCMT ref: 00A5AF8C
                              • _wcsstr.LIBCMT ref: 00A5AF9D
                              • GetClassNameW.USER32(00000018,?,00000400), ref: 00A5AFD5
                              • _wcscmp.LIBCMT ref: 00A5AFE5
                              • GetWindowTextW.USER32(00000002,?,00000400), ref: 00A5B00C
                              • GetClassNameW.USER32(00000018,?,00000400), ref: 00A5B055
                              • _wcscmp.LIBCMT ref: 00A5B065
                              • GetClassNameW.USER32(00000010,?,00000400), ref: 00A5B08D
                              • GetWindowRect.USER32(00000004,?), ref: 00A5B0F6
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: ClassName_wcscmp$Window$Text$BuffCharRectUpper_wcsstr
                              • String ID: @$ThumbnailClass
                              • API String ID: 1788623398-1539354611
                              • Opcode ID: 7e7cfd02f732e4cdd880fdcedb5fcc70b43d9c61616e4f93b926860141484132
                              • Instruction ID: 71859786257627dec76bb798a725db8e8550eabba36ad113d0d493c9cad11986
                              • Opcode Fuzzy Hash: 7e7cfd02f732e4cdd880fdcedb5fcc70b43d9c61616e4f93b926860141484132
                              • Instruction Fuzzy Hash: 4C81E17111820A9FDB04DF14C981FAA77E8FF54316F04866AFD858A092DB34DD4DCBA1
                              APIs
                              • _memset.LIBCMT ref: 00A8A259
                              • DestroyWindow.USER32(?,?), ref: 00A8A2D3
                                • Part of subcall function 00A07BCC: _memmove.LIBCMT ref: 00A07C06
                              • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 00A8A34D
                              • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 00A8A36F
                              • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00A8A382
                              • DestroyWindow.USER32(00000000), ref: 00A8A3A4
                              • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00A00000,00000000), ref: 00A8A3DB
                              • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00A8A3F4
                              • GetDesktopWindow.USER32 ref: 00A8A40D
                              • GetWindowRect.USER32(00000000), ref: 00A8A414
                              • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00A8A42C
                              • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 00A8A444
                                • Part of subcall function 00A025DB: GetWindowLongW.USER32(?,000000EB), ref: 00A025EC
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_memmove_memset
                              • String ID: 0$@U=u$tooltips_class32
                              • API String ID: 1297703922-1130792468
                              • Opcode ID: 9f1f2b1a21187033d7b5af9fe04d86476a12f2608f0645a72e39d4ec20f6ff08
                              • Instruction ID: 5006b1c5239fa8ffe0d264d660de0ab1c03b381d3a0e9e1cd365c1f4c6dbcd2d
                              • Opcode Fuzzy Hash: 9f1f2b1a21187033d7b5af9fe04d86476a12f2608f0645a72e39d4ec20f6ff08
                              • Instruction Fuzzy Hash: 4271DF70541345AFEB21DF68CC48F6A7BE5FB99300F04492EF9868B2A0D770E946DB52
                              APIs
                                • Part of subcall function 00A02612: GetWindowLongW.USER32(?,000000EB), ref: 00A02623
                              • DragQueryPoint.SHELL32(?,?), ref: 00A8C627
                                • Part of subcall function 00A8AB37: ClientToScreen.USER32(?,?), ref: 00A8AB60
                                • Part of subcall function 00A8AB37: GetWindowRect.USER32(?,?), ref: 00A8ABD6
                                • Part of subcall function 00A8AB37: PtInRect.USER32(?,?,00A8C014), ref: 00A8ABE6
                              • SendMessageW.USER32(?,000000B0,?,?), ref: 00A8C690
                              • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 00A8C69B
                              • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 00A8C6BE
                              • _wcscat.LIBCMT ref: 00A8C6EE
                              • SendMessageW.USER32(?,000000C2,00000001,?), ref: 00A8C705
                              • SendMessageW.USER32(?,000000B0,?,?), ref: 00A8C71E
                              • SendMessageW.USER32(?,000000B1,?,?), ref: 00A8C735
                              • SendMessageW.USER32(?,000000B1,?,?), ref: 00A8C757
                              • DragFinish.SHELL32(?), ref: 00A8C75E
                              • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 00A8C851
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen_wcscat
                              • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID$@U=u
                              • API String ID: 169749273-762882726
                              • Opcode ID: d4e3a78a0da2e8503d28db437fbc49db67b54f2d24f748f0219510dce8595949
                              • Instruction ID: f1099980d959d7d17b25a719f352568f09bf9ea5e342f0c0fa4643c3c03b605a
                              • Opcode Fuzzy Hash: d4e3a78a0da2e8503d28db437fbc49db67b54f2d24f748f0219510dce8595949
                              • Instruction Fuzzy Hash: 1C618C71508305AFC701EFA4DD85DAFBBE8FF89350F00092EF591922A1DB30A949CB62
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: __wcsnicmp
                              • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:
                              • API String ID: 1038674560-1810252412
                              • Opcode ID: 12e820b736643fc9f17dacb0d2d6469dd19da14b5ca32942d973096048facae3
                              • Instruction ID: 62231ab05a3f7b70fba5d5d8f4b8e9add19e60702be6646ec8ed2da69ba07e8f
                              • Opcode Fuzzy Hash: 12e820b736643fc9f17dacb0d2d6469dd19da14b5ca32942d973096048facae3
                              • Instruction Fuzzy Hash: 90315871A48209BADB14FBA4EF43EEE77687F20751F600529F846710D2EF716F089652
                              APIs
                              • LoadCursorW.USER32(00000000,00007F8A), ref: 00A75013
                              • LoadCursorW.USER32(00000000,00007F00), ref: 00A7501E
                              • LoadCursorW.USER32(00000000,00007F03), ref: 00A75029
                              • LoadCursorW.USER32(00000000,00007F8B), ref: 00A75034
                              • LoadCursorW.USER32(00000000,00007F01), ref: 00A7503F
                              • LoadCursorW.USER32(00000000,00007F81), ref: 00A7504A
                              • LoadCursorW.USER32(00000000,00007F88), ref: 00A75055
                              • LoadCursorW.USER32(00000000,00007F80), ref: 00A75060
                              • LoadCursorW.USER32(00000000,00007F86), ref: 00A7506B
                              • LoadCursorW.USER32(00000000,00007F83), ref: 00A75076
                              • LoadCursorW.USER32(00000000,00007F85), ref: 00A75081
                              • LoadCursorW.USER32(00000000,00007F82), ref: 00A7508C
                              • LoadCursorW.USER32(00000000,00007F84), ref: 00A75097
                              • LoadCursorW.USER32(00000000,00007F04), ref: 00A750A2
                              • LoadCursorW.USER32(00000000,00007F02), ref: 00A750AD
                              • LoadCursorW.USER32(00000000,00007F89), ref: 00A750B8
                              • GetCursorInfo.USER32(?), ref: 00A750C8
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: Cursor$Load$Info
                              • String ID:
                              • API String ID: 2577412497-0
                              • Opcode ID: 1128ab06e6c255295d71d31644c906a705560959022eb40185993c8a6a2473e4
                              • Instruction ID: f805f165c16045021b479568c918cf0686450f5c23d0e2bc233949502441a8bd
                              • Opcode Fuzzy Hash: 1128ab06e6c255295d71d31644c906a705560959022eb40185993c8a6a2473e4
                              • Instruction Fuzzy Hash: D431F4B1D4831E6ADF109FB69C8995FBFE8FF04750F50852AA50DE7280DA7865018F91
                              APIs
                              • CharUpperBuffW.USER32(?,?), ref: 00A84424
                              • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00A8446F
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: BuffCharMessageSendUpper
                              • String ID: @U=u$CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                              • API String ID: 3974292440-383632319
                              • Opcode ID: e21f13bba303e805c01c7f2283ef3e53467349ce21dec3f2c9f9a836080c93a7
                              • Instruction ID: 2c4b9b226665bb72cc60ce10365bc9d14498856c5694229e2028558e30961b69
                              • Opcode Fuzzy Hash: e21f13bba303e805c01c7f2283ef3e53467349ce21dec3f2c9f9a836080c93a7
                              • Instruction Fuzzy Hash: C0917C712043129FCB04EF24D551A6EB7E5AF99350F448868F8965B3A3DB31ED4ACB81
                              APIs
                              • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 00A8B8B4
                              • LoadLibraryExW.KERNEL32(?,00000000,00000032,?,?,00000001,?,?,?,00A86B11,?), ref: 00A8B910
                              • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00A8B949
                              • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 00A8B98C
                              • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00A8B9C3
                              • FreeLibrary.KERNEL32(?), ref: 00A8B9CF
                              • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00A8B9DF
                              • DestroyIcon.USER32(?), ref: 00A8B9EE
                              • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 00A8BA0B
                              • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 00A8BA17
                                • Part of subcall function 00A22EFD: __wcsicmp_l.LIBCMT ref: 00A22F86
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: Load$Image$IconLibraryMessageSend$DestroyExtractFree__wcsicmp_l
                              • String ID: .dll$.exe$.icl$@U=u
                              • API String ID: 1212759294-1639919054
                              • Opcode ID: 90f06112a2fb7f1dc3a84c90e61e74990a05bad10f534a940539f7727e61c6a1
                              • Instruction ID: b1ef88832b901d8de678656d2f669df7e2405940b8efbeaa8bf799cf998f3add
                              • Opcode Fuzzy Hash: 90f06112a2fb7f1dc3a84c90e61e74990a05bad10f534a940539f7727e61c6a1
                              • Instruction Fuzzy Hash: 92610E71910219BEEB14EFA4DC41FBE7BACFB08720F108215FA11D61C1DB74A991DBA0
                              APIs
                                • Part of subcall function 00A09837: __itow.LIBCMT ref: 00A09862
                                • Part of subcall function 00A09837: __swprintf.LIBCMT ref: 00A098AC
                              • CharLowerBuffW.USER32(?,?), ref: 00A6A3CB
                              • GetDriveTypeW.KERNEL32 ref: 00A6A418
                              • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00A6A460
                              • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00A6A497
                              • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00A6A4C5
                                • Part of subcall function 00A07BCC: _memmove.LIBCMT ref: 00A07C06
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: SendString$BuffCharDriveLowerType__itow__swprintf_memmove
                              • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                              • API String ID: 2698844021-4113822522
                              • Opcode ID: 6e6d5de5f3ff6827862981ffedffafd7089054f3dda77a61c857d4771055e7c6
                              • Instruction ID: 9cc400ae13a1723ab11e2ae7573e864c419e99658ab4e427cb855caf3bc5055f
                              • Opcode Fuzzy Hash: 6e6d5de5f3ff6827862981ffedffafd7089054f3dda77a61c857d4771055e7c6
                              • Instruction Fuzzy Hash: EE512A715042099FC700EF24D99586EB7F8FF94758F10886DF89A672A2DB31AD0ACF52
                              APIs
                              • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000001,00000000,00000000,?,00A3E029,00000001,0000138C,00000001,00000000,00000001,?,00000000,00000000), ref: 00A5F8DF
                              • LoadStringW.USER32(00000000,?,00A3E029,00000001), ref: 00A5F8E8
                                • Part of subcall function 00A07DE1: _memmove.LIBCMT ref: 00A07E22
                              • GetModuleHandleW.KERNEL32(00000000,00AC5310,?,00000FFF,?,?,00A3E029,00000001,0000138C,00000001,00000000,00000001,?,00000000,00000000,00000001), ref: 00A5F90A
                              • LoadStringW.USER32(00000000,?,00A3E029,00000001), ref: 00A5F90D
                              • __swprintf.LIBCMT ref: 00A5F95D
                              • __swprintf.LIBCMT ref: 00A5F96E
                              • _wprintf.LIBCMT ref: 00A5FA17
                              • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00A5FA2E
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: HandleLoadModuleString__swprintf$Message_memmove_wprintf
                              • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                              • API String ID: 984253442-2268648507
                              • Opcode ID: 1a62696a0c98945d8cf794aaf83350d73508469ed9661c1e829436fd80b1f7da
                              • Instruction ID: f3fe904d146e91256d5c225f3f77c77453afe3315956ec1afbd32cf447bd677c
                              • Opcode Fuzzy Hash: 1a62696a0c98945d8cf794aaf83350d73508469ed9661c1e829436fd80b1f7da
                              • Instruction Fuzzy Hash: 2E411972D0411DAACF04FBE4EE96EEEB77CAF14341F500465B606B6092EA356F09CB61
                              APIs
                              • __wsplitpath.LIBCMT ref: 00A6DA10
                              • _wcscat.LIBCMT ref: 00A6DA28
                              • _wcscat.LIBCMT ref: 00A6DA3A
                              • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00A6DA4F
                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00A6DA63
                              • GetFileAttributesW.KERNEL32(?), ref: 00A6DA7B
                              • SetFileAttributesW.KERNEL32(?,00000000), ref: 00A6DA95
                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00A6DAA7
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: CurrentDirectory$AttributesFile_wcscat$__wsplitpath
                              • String ID: *.*
                              • API String ID: 34673085-438819550
                              • Opcode ID: 24adec2d645d9b1b1db8cbd552d79e94df9807cd42afa91e944ee49eda14f136
                              • Instruction ID: ee8154e9161de58e3b60b5ebfb994c201e2a8bbb08967515518ee5446d6e0382
                              • Opcode Fuzzy Hash: 24adec2d645d9b1b1db8cbd552d79e94df9807cd42afa91e944ee49eda14f136
                              • Instruction Fuzzy Hash: AA818372A043459FCB24DF64C944A6AB7F8BF89790F188C2EF889DB251E630D945CB52
                              APIs
                                • Part of subcall function 00A02612: GetWindowLongW.USER32(?,000000EB), ref: 00A02623
                              • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 00A8C1FC
                              • GetFocus.USER32 ref: 00A8C20C
                              • GetDlgCtrlID.USER32(00000000), ref: 00A8C217
                              • _memset.LIBCMT ref: 00A8C342
                              • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 00A8C36D
                              • GetMenuItemCount.USER32(?), ref: 00A8C38D
                              • GetMenuItemID.USER32(?,00000000), ref: 00A8C3A0
                              • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 00A8C3D4
                              • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 00A8C41C
                              • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00A8C454
                              • DefDlgProcW.USER32(?,00000111,?,?,?,?,?,?,?), ref: 00A8C489
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow_memset
                              • String ID: 0
                              • API String ID: 1296962147-4108050209
                              • Opcode ID: a121cd8439352474ca657ece719a57ad895fd1722b172b35517311e3161d7d1c
                              • Instruction ID: 514b75535b3b85f4a10f43d7ff55a68ebc23b7c45ee63b4a3a19b45eaf189ed1
                              • Opcode Fuzzy Hash: a121cd8439352474ca657ece719a57ad895fd1722b172b35517311e3161d7d1c
                              • Instruction Fuzzy Hash: C5818C70608301AFD710EF64D898EABBBE8FB88724F00492EF99597291D770D945CF62
                              APIs
                              • GetDC.USER32(00000000), ref: 00A7738F
                              • CreateCompatibleBitmap.GDI32(00000000,00000007,?), ref: 00A7739B
                              • CreateCompatibleDC.GDI32(?), ref: 00A773A7
                              • SelectObject.GDI32(00000000,?), ref: 00A773B4
                              • StretchBlt.GDI32(00000006,00000000,00000000,00000007,?,?,?,?,00000007,?,00CC0020), ref: 00A77408
                              • GetDIBits.GDI32(00000006,?,00000000,00000000,00000000,00000028,00000000), ref: 00A77444
                              • GetDIBits.GDI32(00000006,?,00000000,?,00000000,00000028,00000000), ref: 00A77468
                              • SelectObject.GDI32(00000006,?), ref: 00A77470
                              • DeleteObject.GDI32(?), ref: 00A77479
                              • DeleteDC.GDI32(00000006), ref: 00A77480
                              • ReleaseDC.USER32(00000000,?), ref: 00A7748B
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                              • String ID: (
                              • API String ID: 2598888154-3887548279
                              • Opcode ID: 1573ba0bbd1fff7a1994344f6230c3979196bddebd31d1e75f12ca02d3505e04
                              • Instruction ID: 702976e5c6846216b398dfa1c577fa4d9a877742dec0b64440a727089a0eb81a
                              • Opcode Fuzzy Hash: 1573ba0bbd1fff7a1994344f6230c3979196bddebd31d1e75f12ca02d3505e04
                              • Instruction Fuzzy Hash: 9C514775904309EFCB14CFA8DC84EAEBBB9EF48310F14C529F99AAB211D731A941CB50
                              APIs
                              • timeGetTime.WINMM ref: 00A64F7A
                                • Part of subcall function 00A2049F: timeGetTime.WINMM(?,753DB400,00A10E7B), ref: 00A204A3
                              • Sleep.KERNEL32(0000000A), ref: 00A64FA6
                              • EnumThreadWindows.USER32(?,Function_00064F28,00000000), ref: 00A64FCA
                              • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 00A64FEC
                              • SetActiveWindow.USER32 ref: 00A6500B
                              • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00A65019
                              • SendMessageW.USER32(00000010,00000000,00000000), ref: 00A65038
                              • Sleep.KERNEL32(000000FA), ref: 00A65043
                              • IsWindow.USER32 ref: 00A6504F
                              • EndDialog.USER32(00000000), ref: 00A65060
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                              • String ID: @U=u$BUTTON
                              • API String ID: 1194449130-2582809321
                              • Opcode ID: 1fe1dd351e302e91049b657c405feffce355bb1f5734d2fff2b4630c400d3fe5
                              • Instruction ID: a56ce121961daef1ba13d9ac4a52fb58a924f94d41bb241799b5d231962f3d8d
                              • Opcode Fuzzy Hash: 1fe1dd351e302e91049b657c405feffce355bb1f5734d2fff2b4630c400d3fe5
                              • Instruction Fuzzy Hash: 20216A7460460ABFEB10DFB0ED89E263BB9EF48745F261038F103821B1DB719D528B62
                              APIs
                                • Part of subcall function 00A20957: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,00A06B0C,?,00008000), ref: 00A20973
                                • Part of subcall function 00A04750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00A04743,?,?,00A037AE,?), ref: 00A04770
                              • SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00A06BAD
                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00A06CFA
                                • Part of subcall function 00A0586D: _wcscpy.LIBCMT ref: 00A058A5
                                • Part of subcall function 00A2363D: _iswctype.LIBCMT ref: 00A23645
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: CurrentDirectory$FullNamePath_iswctype_wcscpy
                              • String ID: #include depth exceeded. Make sure there are no recursive includes$>>>AUTOIT SCRIPT<<<$AU3!$Bad directive syntax error$EA06$Error opening the file$Unterminated string
                              • API String ID: 537147316-1018226102
                              • Opcode ID: 687e0008ac0754228ab4ba2baf41d8e7289bdeb67826cf033acaadef718ba1a1
                              • Instruction ID: a408ee6ac414ac54190f96038a94fbe737575443a68a9ff909b16978cb38bdb2
                              • Opcode Fuzzy Hash: 687e0008ac0754228ab4ba2baf41d8e7289bdeb67826cf033acaadef718ba1a1
                              • Instruction Fuzzy Hash: 3D029D305083459FC724EF24E991AAFBBF5BF98314F14482DF486972A2DB30E949CB52
                              APIs
                              • _memset.LIBCMT ref: 00A62D50
                              • GetMenuItemInfoW.USER32(00000000,00000007,00000000,00000030), ref: 00A62DDD
                              • GetMenuItemCount.USER32(00AC5890), ref: 00A62E66
                              • DeleteMenu.USER32(00AC5890,00000005,00000000,000000F5,?,?), ref: 00A62EF6
                              • DeleteMenu.USER32(00AC5890,00000004,00000000), ref: 00A62EFE
                              • DeleteMenu.USER32(00AC5890,00000006,00000000), ref: 00A62F06
                              • DeleteMenu.USER32(00AC5890,00000003,00000000), ref: 00A62F0E
                              • GetMenuItemCount.USER32(00AC5890), ref: 00A62F16
                              • SetMenuItemInfoW.USER32(00AC5890,00000004,00000000,00000030), ref: 00A62F4C
                              • GetCursorPos.USER32(?), ref: 00A62F56
                              • SetForegroundWindow.USER32(00000000), ref: 00A62F5F
                              • TrackPopupMenuEx.USER32(00AC5890,00000000,?,00000000,00000000,00000000), ref: 00A62F72
                              • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 00A62F7E
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: Menu$DeleteItem$CountInfo$CursorForegroundMessagePopupPostTrackWindow_memset
                              • String ID:
                              • API String ID: 3993528054-0
                              • Opcode ID: 3e196e934bdb9ff7b8892feaa8b680e228d8e3e5736aa7a9953495503e2b87b0
                              • Instruction ID: 90c3b7768b9382e1c249d36890e27fbe03817aafe185229eb6dadd5535a81f48
                              • Opcode Fuzzy Hash: 3e196e934bdb9ff7b8892feaa8b680e228d8e3e5736aa7a9953495503e2b87b0
                              • Instruction Fuzzy Hash: 7E71F670601A06BFEB259F64DC49FAABF74FF04754F100226F625AA1E0C7765C60D791
                              APIs
                                • Part of subcall function 00A07BCC: _memmove.LIBCMT ref: 00A07C06
                              • _memset.LIBCMT ref: 00A5786B
                              • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 00A578A0
                              • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 00A578BC
                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 00A578D8
                              • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 00A57902
                              • CLSIDFromString.OLE32(?,?,?,SOFTWARE\Classes\), ref: 00A5792A
                              • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00A57935
                              • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00A5793A
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_memmove_memset
                              • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                              • API String ID: 1411258926-22481851
                              • Opcode ID: 40009a08ec1b3e879de260375d3d80b63ed8abe6bd247ac7cd2e85b09a02ca67
                              • Instruction ID: be4ffff080f1f1087425c0b5211189fb4cda96e35a6214f9b3345d75254d47e6
                              • Opcode Fuzzy Hash: 40009a08ec1b3e879de260375d3d80b63ed8abe6bd247ac7cd2e85b09a02ca67
                              • Instruction Fuzzy Hash: DF410872C1422DAEDF11EFA4EC45DEEB778BF04310F004429E905B21A1EA306D49CBA0
                              APIs
                              • CharUpperBuffW.USER32(?,?,?,?,?,?,?,00A7FDAD,?,?), ref: 00A80E31
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: BuffCharUpper
                              • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                              • API String ID: 3964851224-909552448
                              • Opcode ID: 1b6a712bb4cb89c740181e6594008b089984493aba053cb951a3e6b4db839028
                              • Instruction ID: 3418d2ef39acc6b81ce721039358930baf48c09f138e3000f4dd895a214ce2d1
                              • Opcode Fuzzy Hash: 1b6a712bb4cb89c740181e6594008b089984493aba053cb951a3e6b4db839028
                              • Instruction Fuzzy Hash: 1C415A3150025A8BCF60EF14EAA5EEF3764BF11384F548464FE655B292DB31AD1ECBA0
                              APIs
                              • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 00A8755E
                              • CreateCompatibleDC.GDI32(00000000), ref: 00A87565
                              • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 00A87578
                              • SelectObject.GDI32(00000000,00000000), ref: 00A87580
                              • GetPixel.GDI32(00000000,00000000,00000000), ref: 00A8758B
                              • DeleteDC.GDI32(00000000), ref: 00A87594
                              • GetWindowLongW.USER32(?,000000EC), ref: 00A8759E
                              • SetLayeredWindowAttributes.USER32(?,00000000,00000000,00000001), ref: 00A875B2
                              • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?,?), ref: 00A875BE
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                              • String ID: @U=u$static
                              • API String ID: 2559357485-3553413495
                              • Opcode ID: af19421802567b410e22b9f4ab50f1a09375e7e5d67d843e1cd39742f3ec8fc6
                              • Instruction ID: f1219feeeb79302041262157e8ed2785c0e947a4f21921214d26ddd492130d84
                              • Opcode Fuzzy Hash: af19421802567b410e22b9f4ab50f1a09375e7e5d67d843e1cd39742f3ec8fc6
                              • Instruction Fuzzy Hash: EE316B32504215BFDF16AFA4DC08FDB3B69FF09360F210224FA15A61A0D731D822DBA4
                              APIs
                              • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,00A3E2A0,00000010,?,Bad directive syntax error,00A8F910,00000000,?,?,?,>>>AUTOIT SCRIPT<<<), ref: 00A5F7C2
                              • LoadStringW.USER32(00000000,?,00A3E2A0,00000010), ref: 00A5F7C9
                                • Part of subcall function 00A07DE1: _memmove.LIBCMT ref: 00A07E22
                              • _wprintf.LIBCMT ref: 00A5F7FC
                              • __swprintf.LIBCMT ref: 00A5F81E
                              • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 00A5F88D
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: HandleLoadMessageModuleString__swprintf_memmove_wprintf
                              • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                              • API String ID: 1506413516-4153970271
                              • Opcode ID: f2dea6656650364aa06dd301ffd0099afef90671fbaa46c2731ac9f03232dc97
                              • Instruction ID: f9d9bb9bf5b445e09b5745906a71510986f4d83538ed7f451094603fff517f11
                              • Opcode Fuzzy Hash: f2dea6656650364aa06dd301ffd0099afef90671fbaa46c2731ac9f03232dc97
                              • Instruction Fuzzy Hash: DB21593290021EBFCF11EFA4DD0AEEE7779BF18300F040865F515660A2EA35AA28DB50
                              APIs
                                • Part of subcall function 00A07BCC: _memmove.LIBCMT ref: 00A07C06
                                • Part of subcall function 00A07924: _memmove.LIBCMT ref: 00A079AD
                              • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 00A65330
                              • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 00A65346
                              • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00A65357
                              • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 00A65369
                              • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 00A6537A
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: SendString$_memmove
                              • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                              • API String ID: 2279737902-1007645807
                              • Opcode ID: c074b1e22ff643f982cfb129182f7d6d3434b44951d799aa61f05b3eb16057d6
                              • Instruction ID: 2849f9046dc7827471593b5f3280060498c04fbc1965e4afe23b87444104eb6e
                              • Opcode Fuzzy Hash: c074b1e22ff643f982cfb129182f7d6d3434b44951d799aa61f05b3eb16057d6
                              • Instruction Fuzzy Hash: F6115B21E5016D79D720ABB5DC5ADFFABBCFB91B84F100829B401A61D2EEA01D45C6A0
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: _wcscpy$CleanupStartup_memmove_strcatgethostbynamegethostnameinet_ntoa
                              • String ID: 0.0.0.0
                              • API String ID: 208665112-3771769585
                              • Opcode ID: 80817be820db9a89d990d56dc73da757f0bfd60cf476082a3dde8e8d8060df54
                              • Instruction ID: 843d183e33443db41123df72cb7ba8cebeb2e0a003a7bf74a5997a63e97e3562
                              • Opcode Fuzzy Hash: 80817be820db9a89d990d56dc73da757f0bfd60cf476082a3dde8e8d8060df54
                              • Instruction Fuzzy Hash: 1711E431900115BFDB20AB74AC4AEEA77BCEF06711F0401B6F44596091FF748AC28B50
                              APIs
                                • Part of subcall function 00A09837: __itow.LIBCMT ref: 00A09862
                                • Part of subcall function 00A09837: __swprintf.LIBCMT ref: 00A098AC
                              • CoInitialize.OLE32(00000000), ref: 00A6D5EA
                              • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 00A6D67D
                              • SHGetDesktopFolder.SHELL32(?), ref: 00A6D691
                              • CoCreateInstance.OLE32(00A92D7C,00000000,00000001,00AB8C1C,?), ref: 00A6D6DD
                              • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 00A6D74C
                              • CoTaskMemFree.OLE32(?,?), ref: 00A6D7A4
                              • _memset.LIBCMT ref: 00A6D7E1
                              • SHBrowseForFolderW.SHELL32(?), ref: 00A6D81D
                              • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00A6D840
                              • CoTaskMemFree.OLE32(00000000), ref: 00A6D847
                              • CoTaskMemFree.OLE32(00000000,00000001,00000000), ref: 00A6D87E
                              • CoUninitialize.OLE32(00000001,00000000), ref: 00A6D880
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize__itow__swprintf_memset
                              • String ID:
                              • API String ID: 1246142700-0
                              • Opcode ID: c500826b1a12eaf7f6526bb34a27a7400700df0d6ca93caef7355a9304f32c3f
                              • Instruction ID: 32a60ad2f97e653569cf0690151af9da8ce7ef5473b65150b77ccc58c95b4199
                              • Opcode Fuzzy Hash: c500826b1a12eaf7f6526bb34a27a7400700df0d6ca93caef7355a9304f32c3f
                              • Instruction Fuzzy Hash: 8AB10B75A00109AFDB04DFA4C988DAEBBB9FF49354F148469F909EB261DB30ED45CB50
                              APIs
                              • GetDlgItem.USER32(?,00000001), ref: 00A5C283
                              • GetWindowRect.USER32(00000000,?), ref: 00A5C295
                              • MoveWindow.USER32(00000001,0000000A,?,00000001,?,00000000), ref: 00A5C2F3
                              • GetDlgItem.USER32(?,00000002), ref: 00A5C2FE
                              • GetWindowRect.USER32(00000000,?), ref: 00A5C310
                              • MoveWindow.USER32(00000001,?,00000000,00000001,?,00000000), ref: 00A5C364
                              • GetDlgItem.USER32(?,000003E9), ref: 00A5C372
                              • GetWindowRect.USER32(00000000,?), ref: 00A5C383
                              • MoveWindow.USER32(00000000,0000000A,00000000,?,?,00000000), ref: 00A5C3C6
                              • GetDlgItem.USER32(?,000003EA), ref: 00A5C3D4
                              • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 00A5C3F1
                              • InvalidateRect.USER32(?,00000000,00000001), ref: 00A5C3FE
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: Window$ItemMoveRect$Invalidate
                              • String ID:
                              • API String ID: 3096461208-0
                              • Opcode ID: f5da2e1b7d4b9b7ad9182f439c321140c72096c7936cddbedf8f9c13b19bc12f
                              • Instruction ID: 67ac2d825f36c179cad9910ce0f5a09e445236cf4874d93cf1d4cebd4c7fd9cf
                              • Opcode Fuzzy Hash: f5da2e1b7d4b9b7ad9182f439c321140c72096c7936cddbedf8f9c13b19bc12f
                              • Instruction Fuzzy Hash: 78515F71B00205AFDB18CFA9DD89AAEBBB6FB88321F14813DF915D6294D7709D458B10
                              APIs
                                • Part of subcall function 00A01B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00A02036,?,00000000,?,?,?,?,00A016CB,00000000,?), ref: 00A01B9A
                              • DestroyWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,?), ref: 00A020D3
                              • KillTimer.USER32(-00000001,?,?,?,?,00A016CB,00000000,?,?,00A01AE2,?,?), ref: 00A0216E
                              • DestroyAcceleratorTable.USER32(00000000), ref: 00A3BCA6
                              • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00A016CB,00000000,?,?,00A01AE2,?,?), ref: 00A3BCD7
                              • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00A016CB,00000000,?,?,00A01AE2,?,?), ref: 00A3BCEE
                              • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00A016CB,00000000,?,?,00A01AE2,?,?), ref: 00A3BD0A
                              • DeleteObject.GDI32(00000000), ref: 00A3BD1C
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                              • String ID:
                              • API String ID: 641708696-0
                              • Opcode ID: 178a47a782db06805ba0f26cd724f2bacf0764cdae6fc295e638868861301c99
                              • Instruction ID: 69d2c01fb5c760e0250c878fc4e1f1c991db03ffe67fb188442f5727a3fde8d9
                              • Opcode Fuzzy Hash: 178a47a782db06805ba0f26cd724f2bacf0764cdae6fc295e638868861301c99
                              • Instruction Fuzzy Hash: A5616831910B09DFDB35DF64E948B2AB7F2FB44312F508529F5429A9A0C770BC92EB90
                              APIs
                                • Part of subcall function 00A025DB: GetWindowLongW.USER32(?,000000EB), ref: 00A025EC
                              • GetSysColor.USER32(0000000F), ref: 00A021D3
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: ColorLongWindow
                              • String ID:
                              • API String ID: 259745315-0
                              • Opcode ID: 56116f3f45322ae6bfbb9896d0a97b46ba5551d652359d16f468e04dc6a185b5
                              • Instruction ID: 6a206c4d57e6ebc057e123d620b1850af632e2d24400a1269e8711c69be7d5b2
                              • Opcode Fuzzy Hash: 56116f3f45322ae6bfbb9896d0a97b46ba5551d652359d16f468e04dc6a185b5
                              • Instruction Fuzzy Hash: E1416431500644AFDB259FA8EC8CBF93766EB4A321F244365FE658A1E5C7318C82DB61
                              APIs
                              • CharLowerBuffW.USER32(?,?,00A8F910), ref: 00A6A90B
                              • GetDriveTypeW.KERNEL32(00000061,00AB89A0,00000061), ref: 00A6A9D5
                              • _wcscpy.LIBCMT ref: 00A6A9FF
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: BuffCharDriveLowerType_wcscpy
                              • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                              • API String ID: 2820617543-1000479233
                              • Opcode ID: 0fc7d9914f054f721c69cf0cc6b742dbfa6828eb85c2cec94fa79638424a087c
                              • Instruction ID: 780398d30dca908c64d962d8a990b5df4238c05486fbb933b162b8f5b2752b1e
                              • Opcode Fuzzy Hash: 0fc7d9914f054f721c69cf0cc6b742dbfa6828eb85c2cec94fa79638424a087c
                              • Instruction Fuzzy Hash: A6517E32508301AFC700EF14DA92AAFB7B9FFA4344F54482DF595672E2DB319909CA53
                              APIs
                              • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 00A886FF
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: InvalidateRect
                              • String ID: @U=u
                              • API String ID: 634782764-2594219639
                              • Opcode ID: 6a2e2a9898283d29c7936894e511f863aaed1cfcb26ae9a25edc0541798e5a34
                              • Instruction ID: a20c7cec8010dbe7d8d26511fb4925eb3afa084813e366292081761275c511bb
                              • Opcode Fuzzy Hash: 6a2e2a9898283d29c7936894e511f863aaed1cfcb26ae9a25edc0541798e5a34
                              • Instruction Fuzzy Hash: CE519030900244BEEF20EB68DC89FAD7BB4FB05760FA04225F951E61E1DF79A980DB50
                              APIs
                              • LoadImageW.USER32(00000000,?,00000001,00000010,00000010,00000010), ref: 00A3C2F7
                              • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00A3C319
                              • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 00A3C331
                              • ExtractIconExW.SHELL32(?,00000000,?,00000000,00000001), ref: 00A3C34F
                              • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 00A3C370
                              • DestroyIcon.USER32(00000000), ref: 00A3C37F
                              • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 00A3C39C
                              • DestroyIcon.USER32(?), ref: 00A3C3AB
                                • Part of subcall function 00A8A4AF: DeleteObject.GDI32(00000000), ref: 00A8A4E8
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: Icon$DestroyExtractImageLoadMessageSend$DeleteObject
                              • String ID: @U=u
                              • API String ID: 2819616528-2594219639
                              • Opcode ID: 03bd860120c4a4a8b4bd3f621521f6a7beffc73cda6f22db2deee934ed554682
                              • Instruction ID: a770e01d2b7a32e018c3bd1b3ac60a95dd01730ffd3dd816e218ecfb87c3807d
                              • Opcode Fuzzy Hash: 03bd860120c4a4a8b4bd3f621521f6a7beffc73cda6f22db2deee934ed554682
                              • Instruction Fuzzy Hash: 29513A70A00309AFDB24DFA4DC49FAA7BB5EB59720F104529F902AB2D0D770ED91DB50
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: __i64tow__itow__swprintf
                              • String ID: %.15g$0x%p$False$True
                              • API String ID: 421087845-2263619337
                              • Opcode ID: 9d09fbdc290efd3cf866f183e715bdd45a5a7cf0254e36eabe6f41fca882d710
                              • Instruction ID: 57f67049472b3587066950c84b25d6f38c06cfcd0b3b39c24350470bdc236192
                              • Opcode Fuzzy Hash: 9d09fbdc290efd3cf866f183e715bdd45a5a7cf0254e36eabe6f41fca882d710
                              • Instruction Fuzzy Hash: B941B571914209AFEB24DF78E946E7A73F9FF05300F20487EF549D6292EA3599458B10
                              APIs
                              • _memset.LIBCMT ref: 00A8716A
                              • CreateMenu.USER32 ref: 00A87185
                              • SetMenu.USER32(?,00000000), ref: 00A87194
                              • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00A87221
                              • IsMenu.USER32(?), ref: 00A87237
                              • CreatePopupMenu.USER32 ref: 00A87241
                              • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00A8726E
                              • DrawMenuBar.USER32 ref: 00A87276
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: Menu$CreateItem$DrawInfoInsertPopup_memset
                              • String ID: 0$F
                              • API String ID: 176399719-3044882817
                              • Opcode ID: 4b258479a78cbc5ce14261624d2e08107551cb830e27dbad46c0b14fc444a9fe
                              • Instruction ID: 9ecad6efd07977b390b898d29c0821c38107f5bdc511c1dfe807656140ee4c37
                              • Opcode Fuzzy Hash: 4b258479a78cbc5ce14261624d2e08107551cb830e27dbad46c0b14fc444a9fe
                              • Instruction Fuzzy Hash: E8415A74A01205EFDB10EFA4D988EDA7BB5FF49310F240028F955A7361E731A920CF90
                              APIs
                                • Part of subcall function 00A07DE1: _memmove.LIBCMT ref: 00A07E22
                                • Part of subcall function 00A5AA99: GetClassNameW.USER32(?,?,000000FF), ref: 00A5AABC
                              • SendMessageW.USER32(?,0000018C,000000FF,00000002), ref: 00A59014
                              • GetDlgCtrlID.USER32 ref: 00A5901F
                              • GetParent.USER32 ref: 00A5903B
                              • SendMessageW.USER32(00000000,?,00000111,?), ref: 00A5903E
                              • GetDlgCtrlID.USER32(?), ref: 00A59047
                              • GetParent.USER32(?), ref: 00A59063
                              • SendMessageW.USER32(00000000,?,?,00000111), ref: 00A59066
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: MessageSend$CtrlParent$ClassName_memmove
                              • String ID: @U=u$ComboBox$ListBox
                              • API String ID: 1536045017-2258501812
                              • Opcode ID: 62910ad205d00bf2babc61a8dc8ab9e648e858cc7cf1c002132887b157ee9e76
                              • Instruction ID: cc1fd51b9051018a4bbe0a61c672441d2600a969938f239b4e0ad6d04f796b7b
                              • Opcode Fuzzy Hash: 62910ad205d00bf2babc61a8dc8ab9e648e858cc7cf1c002132887b157ee9e76
                              • Instruction Fuzzy Hash: 8B21AE70A00109BFDF04ABA0CC85EFEBBB8EF49311F104625B921972E1EB755829DB20
                              APIs
                                • Part of subcall function 00A07DE1: _memmove.LIBCMT ref: 00A07E22
                                • Part of subcall function 00A5AA99: GetClassNameW.USER32(?,?,000000FF), ref: 00A5AABC
                              • SendMessageW.USER32(?,00000186,00000002,00000000), ref: 00A590FD
                              • GetDlgCtrlID.USER32 ref: 00A59108
                              • GetParent.USER32 ref: 00A59124
                              • SendMessageW.USER32(00000000,?,00000111,?), ref: 00A59127
                              • GetDlgCtrlID.USER32(?), ref: 00A59130
                              • GetParent.USER32(?), ref: 00A5914C
                              • SendMessageW.USER32(00000000,?,?,00000111), ref: 00A5914F
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: MessageSend$CtrlParent$ClassName_memmove
                              • String ID: @U=u$ComboBox$ListBox
                              • API String ID: 1536045017-2258501812
                              • Opcode ID: 2106943032d8fec5a0d0fdc92b088e66136877a0db274ed6a274bedd6f058573
                              • Instruction ID: a27ad2e305acb82805d1a4a77a8965a57ce9cc802a86b59673a1ab5895c2919f
                              • Opcode Fuzzy Hash: 2106943032d8fec5a0d0fdc92b088e66136877a0db274ed6a274bedd6f058573
                              • Instruction Fuzzy Hash: B421A174A00109BFDF01ABA4DC85EFEBBB8FF54301F104125B911972A2EB755869DF20
                              APIs
                              • GetParent.USER32 ref: 00A5916F
                              • GetClassNameW.USER32(00000000,?,00000100), ref: 00A59184
                              • _wcscmp.LIBCMT ref: 00A59196
                              • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00A59211
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: ClassMessageNameParentSend_wcscmp
                              • String ID: @U=u$SHELLDLL_DefView$details$largeicons$list$smallicons
                              • API String ID: 1704125052-1428604138
                              • Opcode ID: 690e2230fa109756bddeabaf91a5bf456cc8aecca5556c6509b128cc33cc0fdb
                              • Instruction ID: efcbaa4b4726b1cbd042bc7a1f0cbee96e309f31425d6636c0737f2f77e9f184
                              • Opcode Fuzzy Hash: 690e2230fa109756bddeabaf91a5bf456cc8aecca5556c6509b128cc33cc0fdb
                              • Instruction Fuzzy Hash: 2111A736248317F9FA112628EC06DEF3B9CBB15721F200526FD14E94D2FFB158556694
                              APIs
                              • _memset.LIBCMT ref: 00A26E3E
                                • Part of subcall function 00A28B28: __getptd_noexit.LIBCMT ref: 00A28B28
                              • __gmtime64_s.LIBCMT ref: 00A26ED7
                              • __gmtime64_s.LIBCMT ref: 00A26F0D
                              • __gmtime64_s.LIBCMT ref: 00A26F2A
                              • __allrem.LIBCMT ref: 00A26F80
                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00A26F9C
                              • __allrem.LIBCMT ref: 00A26FB3
                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00A26FD1
                              • __allrem.LIBCMT ref: 00A26FE8
                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00A27006
                              • __invoke_watson.LIBCMT ref: 00A27077
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@__gmtime64_s$__getptd_noexit__invoke_watson_memset
                              • String ID:
                              • API String ID: 384356119-0
                              • Opcode ID: 1572197e9c4cf49d3ac3c19b6e82465e4eefa01e3d88f7bbd38cf7a66862b9c5
                              • Instruction ID: 06b5522d3c2f480902ac81a8f9951936de2b447702a986824f2a5c4cd0766fc1
                              • Opcode Fuzzy Hash: 1572197e9c4cf49d3ac3c19b6e82465e4eefa01e3d88f7bbd38cf7a66862b9c5
                              • Instruction Fuzzy Hash: D9710676A05726ABDB14EF7CED41B6AB7B8AF04360F144239F514D7281E770EE048790
                              APIs
                              • _memset.LIBCMT ref: 00A62542
                              • GetMenuItemInfoW.USER32(00AC5890,000000FF,00000000,00000030), ref: 00A625A3
                              • SetMenuItemInfoW.USER32(00AC5890,00000004,00000000,00000030), ref: 00A625D9
                              • Sleep.KERNEL32(000001F4), ref: 00A625EB
                              • GetMenuItemCount.USER32(?), ref: 00A6262F
                              • GetMenuItemID.USER32(?,00000000), ref: 00A6264B
                              • GetMenuItemID.USER32(?,-00000001), ref: 00A62675
                              • GetMenuItemID.USER32(?,?), ref: 00A626BA
                              • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00A62700
                              • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00A62714
                              • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00A62735
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: ItemMenu$Info$CheckCountRadioSleep_memset
                              • String ID:
                              • API String ID: 4176008265-0
                              • Opcode ID: eab44fab442469941fdad880a89a384f24076c678156a6968b142c886cd67350
                              • Instruction ID: d1411216dca1db0280c0564446973ff50bafd5cc4de19cc5436639033b2f7d2e
                              • Opcode Fuzzy Hash: eab44fab442469941fdad880a89a384f24076c678156a6968b142c886cd67350
                              • Instruction Fuzzy Hash: 1C61A3B4900A4AAFDB21CFA4DD84FFE7BB8EB45344F140169F842A7291D735AD06DB21
                              APIs
                              • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00A86FA5
                              • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00A86FA8
                              • GetWindowLongW.USER32(?,000000F0), ref: 00A86FCC
                              • _memset.LIBCMT ref: 00A86FDD
                              • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00A86FEF
                              • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00A87067
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: MessageSend$LongWindow_memset
                              • String ID:
                              • API String ID: 830647256-0
                              • Opcode ID: c5678019396344a8884e1f051edd00a20e7e75ee268b19bd7bde72dc71ce141d
                              • Instruction ID: 9ed82280419ffc6736cfe7e73bb91cf00ed4ce7f5b45921d7bae01c5915ee56f
                              • Opcode Fuzzy Hash: c5678019396344a8884e1f051edd00a20e7e75ee268b19bd7bde72dc71ce141d
                              • Instruction Fuzzy Hash: 98615B75900208AFDB11EFA4CD85FEE77F8EB09710F244169FA14AB2A1D771AD41DBA0
                              APIs
                              • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 00A56BBF
                              • SafeArrayAllocData.OLEAUT32(?), ref: 00A56C18
                              • VariantInit.OLEAUT32(?), ref: 00A56C2A
                              • SafeArrayAccessData.OLEAUT32(?,?), ref: 00A56C4A
                              • VariantCopy.OLEAUT32(?,?), ref: 00A56C9D
                              • SafeArrayUnaccessData.OLEAUT32(?), ref: 00A56CB1
                              • VariantClear.OLEAUT32(?), ref: 00A56CC6
                              • SafeArrayDestroyData.OLEAUT32(?), ref: 00A56CD3
                              • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00A56CDC
                              • VariantClear.OLEAUT32(?), ref: 00A56CEE
                              • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00A56CF9
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                              • String ID:
                              • API String ID: 2706829360-0
                              • Opcode ID: 90b90e69d715befb8f23a67b65de85af5f54e19df5326a699306757d499cf404
                              • Instruction ID: 807cc003290880a0368ab7563d72a4e5bd809e9c801573cf370ea977ac3a7846
                              • Opcode Fuzzy Hash: 90b90e69d715befb8f23a67b65de85af5f54e19df5326a699306757d499cf404
                              • Instruction Fuzzy Hash: A8414275A00119AFCF00DFA8D9449AEBBB9FF08355F408069ED55E7361DB30A94ACF90
                              APIs
                                • Part of subcall function 00A02612: GetWindowLongW.USER32(?,000000EB), ref: 00A02623
                              • GetSystemMetrics.USER32(0000000F), ref: 00A8D47C
                              • GetSystemMetrics.USER32(0000000F), ref: 00A8D49C
                              • MoveWindow.USER32(00000003,?,?,?,?,00000000,?,?,?), ref: 00A8D6D7
                              • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 00A8D6F5
                              • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 00A8D716
                              • ShowWindow.USER32(00000003,00000000), ref: 00A8D735
                              • InvalidateRect.USER32(?,00000000,00000001), ref: 00A8D75A
                              • DefDlgProcW.USER32(?,00000005,?,?), ref: 00A8D77D
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: Window$MessageMetricsSendSystem$InvalidateLongMoveProcRectShow
                              • String ID: @U=u
                              • API String ID: 1211466189-2594219639
                              • Opcode ID: 5531751ba970534d1ee207f9640c6c158bef89f8b331525bd8b05c0370f91709
                              • Instruction ID: e456419c36fc2def0efcfc479dade678e20db6985621c503c3188863e03686ba
                              • Opcode Fuzzy Hash: 5531751ba970534d1ee207f9640c6c158bef89f8b331525bd8b05c0370f91709
                              • Instruction Fuzzy Hash: 0FB17B71A00219EFDF18DF68C985BAD7BB1BF04711F188179EC58AB295E734A990CB50
                              APIs
                              • SetWindowLongW.USER32(?,000000EB), ref: 00A02EAE
                                • Part of subcall function 00A01DB3: GetClientRect.USER32(?,?), ref: 00A01DDC
                                • Part of subcall function 00A01DB3: GetWindowRect.USER32(?,?), ref: 00A01E1D
                                • Part of subcall function 00A01DB3: ScreenToClient.USER32(?,?), ref: 00A01E45
                              • GetDC.USER32 ref: 00A3CD32
                              • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 00A3CD45
                              • SelectObject.GDI32(00000000,00000000), ref: 00A3CD53
                              • SelectObject.GDI32(00000000,00000000), ref: 00A3CD68
                              • ReleaseDC.USER32(?,00000000), ref: 00A3CD70
                              • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 00A3CDFB
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                              • String ID: @U=u$U
                              • API String ID: 4009187628-4110099822
                              • Opcode ID: 2204a3f734de1633851501ca51e55676c700d26435bfd9c81aa9d6be49487771
                              • Instruction ID: 01a23c375211903370881ce675567a325a71ec15f2da35913ef3b73188238612
                              • Opcode Fuzzy Hash: 2204a3f734de1633851501ca51e55676c700d26435bfd9c81aa9d6be49487771
                              • Instruction Fuzzy Hash: D571DF31900209DFCF21DF64DC84AAA7FB5FF48360F24427AFD55AA2A6D7319881DB60
                              APIs
                              • WSAStartup.WSOCK32(00000101,?), ref: 00A75793
                              • inet_addr.WSOCK32(?,?,?), ref: 00A757D8
                              • gethostbyname.WSOCK32(?), ref: 00A757E4
                              • IcmpCreateFile.IPHLPAPI ref: 00A757F2
                              • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 00A75862
                              • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 00A75878
                              • IcmpCloseHandle.IPHLPAPI(00000000), ref: 00A758ED
                              • WSACleanup.WSOCK32 ref: 00A758F3
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                              • String ID: Ping
                              • API String ID: 1028309954-2246546115
                              • Opcode ID: caa6b608c1e474225353dc2fa3ba49d1b0992ca81f156620634d2247aa7d96b3
                              • Instruction ID: 4388f0fa542b314df42753b97b6a3ad114184fff12a31119661b4bab8c184a43
                              • Opcode Fuzzy Hash: caa6b608c1e474225353dc2fa3ba49d1b0992ca81f156620634d2247aa7d96b3
                              • Instruction Fuzzy Hash: F8518D31A006019FDB10EF64DD49B2A7BE4EF48720F04C969F99ADB2A1DB70E805DB42
                              APIs
                              • SetErrorMode.KERNEL32(00000001), ref: 00A6B4D0
                              • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 00A6B546
                              • GetLastError.KERNEL32 ref: 00A6B550
                              • SetErrorMode.KERNEL32(00000000,READY), ref: 00A6B5BD
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: Error$Mode$DiskFreeLastSpace
                              • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                              • API String ID: 4194297153-14809454
                              • Opcode ID: 835fa0fba1d1da9c9b991fa8ee896889e61f84ac259c0c96b4e3d81d63b5bcfe
                              • Instruction ID: 7e8f5d82d858ef79ecb4fa8afda5fb97a84bdc2f510843e47258ffb53bf7c51a
                              • Opcode Fuzzy Hash: 835fa0fba1d1da9c9b991fa8ee896889e61f84ac259c0c96b4e3d81d63b5bcfe
                              • Instruction Fuzzy Hash: 1E317475A00209EFCB00EFA8D985EEE77B8FF49310F144165E607D7292DB719A82CB61
                              APIs
                              • DeleteObject.GDI32(00000000), ref: 00A861EB
                              • GetDC.USER32(00000000), ref: 00A861F3
                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00A861FE
                              • ReleaseDC.USER32(00000000,00000000), ref: 00A8620A
                              • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00A86246
                              • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00A86257
                              • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,00A8902A,?,?,000000FF,00000000,?,000000FF,?), ref: 00A86291
                              • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00A862B1
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                              • String ID: @U=u
                              • API String ID: 3864802216-2594219639
                              • Opcode ID: 87a5d8e1718dabb4ce3e18fcede91f4b3ecf29eb5da0d77ee248e3d7b8a2fb20
                              • Instruction ID: 1d732ee712d1e17824ed4ec49bb68c70757fed48cdd5ccf3be881dda448600cc
                              • Opcode Fuzzy Hash: 87a5d8e1718dabb4ce3e18fcede91f4b3ecf29eb5da0d77ee248e3d7b8a2fb20
                              • Instruction Fuzzy Hash: F0317C72201210BFEF119F50CC8AFEA3BA9EF49765F044165FE089A292D7759C52CB74
                              APIs
                              • VariantInit.OLEAUT32(?), ref: 00A788D7
                              • CoInitialize.OLE32(00000000), ref: 00A78904
                              • CoUninitialize.OLE32 ref: 00A7890E
                              • GetRunningObjectTable.OLE32(00000000,?), ref: 00A78A0E
                              • SetErrorMode.KERNEL32(00000001,00000029), ref: 00A78B3B
                              • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,00A92C0C), ref: 00A78B6F
                              • CoGetObject.OLE32(?,00000000,00A92C0C,?), ref: 00A78B92
                              • SetErrorMode.KERNEL32(00000000), ref: 00A78BA5
                              • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00A78C25
                              • VariantClear.OLEAUT32(?), ref: 00A78C35
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize
                              • String ID:
                              • API String ID: 2395222682-0
                              • Opcode ID: 2ed0fef003faae843f5822b14ff03c2643ff85cec7bdf27fe086195055797923
                              • Instruction ID: fb8e9b363c9055aa749279a68a001fee8dd2dedceaa261f617e47ac61863e753
                              • Opcode Fuzzy Hash: 2ed0fef003faae843f5822b14ff03c2643ff85cec7bdf27fe086195055797923
                              • Instruction Fuzzy Hash: A7C116B1608305AFD700DF68C88892BB7E9FF89748F00895DF9899B251DB75ED06CB52
                              APIs
                              • SafeArrayGetVartype.OLEAUT32(00000000,?), ref: 00A67A6C
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: ArraySafeVartype
                              • String ID:
                              • API String ID: 1725837607-0
                              • Opcode ID: 3645bd32b87bcfe3babb47b643b6f8543ff8623dcc913ff82f9078eebe076263
                              • Instruction ID: a232b37a1e0fbbc9b897720e623c9763d7b7ca4541d82babc847bde5174877c2
                              • Opcode Fuzzy Hash: 3645bd32b87bcfe3babb47b643b6f8543ff8623dcc913ff82f9078eebe076263
                              • Instruction Fuzzy Hash: E7B1D17591421A9FDB00DFA8D884BBEB7F4FF09329F204429E951E7291D734E941CBA0
                              APIs
                              • GetCurrentThreadId.KERNEL32 ref: 00A611F0
                              • GetForegroundWindow.USER32(00000000,?,?,?,?,?,00A60268,?,00000001), ref: 00A61204
                              • GetWindowThreadProcessId.USER32(00000000), ref: 00A6120B
                              • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00A60268,?,00000001), ref: 00A6121A
                              • GetWindowThreadProcessId.USER32(?,00000000), ref: 00A6122C
                              • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00A60268,?,00000001), ref: 00A61245
                              • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00A60268,?,00000001), ref: 00A61257
                              • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,00A60268,?,00000001), ref: 00A6129C
                              • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,00A60268,?,00000001), ref: 00A612B1
                              • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,00A60268,?,00000001), ref: 00A612BC
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                              • String ID:
                              • API String ID: 2156557900-0
                              • Opcode ID: abac9d891b627a0b52d5fb261207035f30f6f4ef452bea753de81cca44a1bb37
                              • Instruction ID: 90cdaa83f85b2ee7f934d3d3d582afda9eb8650facb26fc588dd1d5fd1d4674c
                              • Opcode Fuzzy Hash: abac9d891b627a0b52d5fb261207035f30f6f4ef452bea753de81cca44a1bb37
                              • Instruction Fuzzy Hash: 1131A0B5600208BFDB10DFA5EC98FAA7BB9EF55315F154239FD00D61A0D7749D418BA0
                              APIs
                              • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00A0FAA6
                              • OleUninitialize.OLE32(?,00000000), ref: 00A0FB45
                              • UnregisterHotKey.USER32(?), ref: 00A0FC9C
                              • DestroyWindow.USER32(?), ref: 00A445D6
                              • FreeLibrary.KERNEL32(?), ref: 00A4463B
                              • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00A44668
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                              • String ID: close all
                              • API String ID: 469580280-3243417748
                              • Opcode ID: 78d972dfaea7e5e9e40699b5938326b02aa395ad478b7b093c1ae8be5cff89b1
                              • Instruction ID: edadb43d1a393390d33796db9809fdc15a9ee62e5281f94c5efcaec28e8f2b96
                              • Opcode Fuzzy Hash: 78d972dfaea7e5e9e40699b5938326b02aa395ad478b7b093c1ae8be5cff89b1
                              • Instruction Fuzzy Hash: 47A19134701216CFDB28EF14D695B69F3A4BF49700F5542ADE80AAB292DB30EC16CF50
                              APIs
                              • EnumChildWindows.USER32(?,00A5A439), ref: 00A5A377
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: ChildEnumWindows
                              • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                              • API String ID: 3555792229-1603158881
                              • Opcode ID: 8a675f063ad9e4a4cf8f33e508e9cc2fd0229f7618cec0ae9e6c78981bc64747
                              • Instruction ID: 163367ab96109fc3c0a73fb76e37c66ca93e2008cbc0258a70002e73b656ccab
                              • Opcode Fuzzy Hash: 8a675f063ad9e4a4cf8f33e508e9cc2fd0229f7618cec0ae9e6c78981bc64747
                              • Instruction Fuzzy Hash: 8C91E631B00606ABCB08DFA4D582BEDFB78BF14351F508229EC49A7192DF31699DCB91
                              APIs
                              • IsWindow.USER32(00CA4E90), ref: 00A8B3EB
                              • IsWindowEnabled.USER32(00CA4E90), ref: 00A8B3F7
                              • SendMessageW.USER32(?,0000041C,00000000,00000000), ref: 00A8B4DB
                              • SendMessageW.USER32(00CA4E90,000000B0,?,?), ref: 00A8B512
                              • IsDlgButtonChecked.USER32(?,?), ref: 00A8B54F
                              • GetWindowLongW.USER32(00CA4E90,000000EC), ref: 00A8B571
                              • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 00A8B589
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                              • String ID: @U=u
                              • API String ID: 4072528602-2594219639
                              • Opcode ID: 66bb39244fcd331c0c0ddb07ac0e57424f2732ae4ab17f4966f2a3946551a452
                              • Instruction ID: 02e29a8862d26195c2d8ca62013a55e834080f1633ec65b93a27d8b229f95bd6
                              • Opcode Fuzzy Hash: 66bb39244fcd331c0c0ddb07ac0e57424f2732ae4ab17f4966f2a3946551a452
                              • Instruction Fuzzy Hash: E771B234A10704EFEB24EFA4C895FBA7BB5FF09300F144569F946972A2C731A991DB60
                              APIs
                              • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00A86E24
                              • SendMessageW.USER32(?,00001036,00000000,?), ref: 00A86E38
                              • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00A86E52
                              • _wcscat.LIBCMT ref: 00A86EAD
                              • SendMessageW.USER32(?,00001057,00000000,?), ref: 00A86EC4
                              • SendMessageW.USER32(?,00001061,?,0000000F), ref: 00A86EF2
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: MessageSend$Window_wcscat
                              • String ID: @U=u$SysListView32
                              • API String ID: 307300125-1908207174
                              • Opcode ID: c719c904601cb011d5f431eee654f1b85823b64d31b95958b1ce1237f98d6d2c
                              • Instruction ID: 5ef511805aa48a79a01b7919771c45eaf2f92193ebfbbcc8bc365ef6aecf1682
                              • Opcode Fuzzy Hash: c719c904601cb011d5f431eee654f1b85823b64d31b95958b1ce1237f98d6d2c
                              • Instruction Fuzzy Hash: 8141A171A00349AFEB21EFA4CC85BEE77B8EF08350F10092AF584E7291D6719D858B60
                              APIs
                              • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00A71A50
                              • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 00A71A7C
                              • InternetQueryOptionW.WININET(00000000,0000001F,00000000,?), ref: 00A71ABE
                              • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 00A71AD3
                              • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00A71AE0
                              • HttpQueryInfoW.WININET(00000000,00000005,?,?,00000000), ref: 00A71B10
                              • InternetCloseHandle.WININET(00000000), ref: 00A71B57
                                • Part of subcall function 00A72483: GetLastError.KERNEL32(?,?,00A71817,00000000,00000000,00000001), ref: 00A72498
                                • Part of subcall function 00A72483: SetEvent.KERNEL32(?,?,00A71817,00000000,00000000,00000001), ref: 00A724AD
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: Internet$Http$OptionQueryRequest$CloseConnectErrorEventHandleInfoLastOpenSend
                              • String ID:
                              • API String ID: 2603140658-3916222277
                              • Opcode ID: 6a515ffddf332a9c136f4f3907cd1f70576939f8ca036f9ab4008dc050df4971
                              • Instruction ID: a306d49888d6b11f4398d87dcc562c4d4a5119a88f8f81757cd00948c0218e90
                              • Opcode Fuzzy Hash: 6a515ffddf332a9c136f4f3907cd1f70576939f8ca036f9ab4008dc050df4971
                              • Instruction Fuzzy Hash: 4E416EB1601219BFEB119F54CC89FFB7BACEF48354F10C12AFA099A141E7749E459BA0
                              APIs
                              • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00A862EC
                              • GetWindowLongW.USER32(00CA4E90,000000F0), ref: 00A8631F
                              • GetWindowLongW.USER32(00CA4E90,000000F0), ref: 00A86354
                              • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 00A86386
                              • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 00A863B0
                              • GetWindowLongW.USER32(00000000,000000F0), ref: 00A863C1
                              • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 00A863DB
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: LongWindow$MessageSend
                              • String ID: @U=u
                              • API String ID: 2178440468-2594219639
                              • Opcode ID: 9fe4d60aedb8e856cc521689238b4a4dc256a70987c5f79f973aade2a71c9c44
                              • Instruction ID: cc4f274cbe60bc988671042b2f89665b8d483b4a53591dc6ea7d17c25355c409
                              • Opcode Fuzzy Hash: 9fe4d60aedb8e856cc521689238b4a4dc256a70987c5f79f973aade2a71c9c44
                              • Instruction Fuzzy Hash: 993105306442519FEB21EFA8DC85F5537E1FB5A714F1901A4F501DF2B1CB71A881EB51
                              APIs
                              • GetModuleFileNameW.KERNEL32(?,?,00000104,?,00A8F910), ref: 00A78D28
                              • FreeLibrary.KERNEL32(00000000,00000001,00000000,?,00A8F910), ref: 00A78D5C
                              • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 00A78ED6
                              • SysFreeString.OLEAUT32(?), ref: 00A78F00
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: Free$FileLibraryModuleNamePathQueryStringType
                              • String ID:
                              • API String ID: 560350794-0
                              • Opcode ID: c73aa0e29533b6cc01215bb9e2f837a083374abdf5f54df92b9a8a7a4d64c5a3
                              • Instruction ID: 9f312469c2fee15b5fadc47d507a99256ca7e6461f563a25d9b0d78ede00aaa5
                              • Opcode Fuzzy Hash: c73aa0e29533b6cc01215bb9e2f837a083374abdf5f54df92b9a8a7a4d64c5a3
                              • Instruction Fuzzy Hash: F6F11671A00209AFCB14DF94CC88EAEB7B9FF49315F10C499F909AB251DB35AE46CB51
                              APIs
                              • _memset.LIBCMT ref: 00A7F6B5
                              • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00A7F848
                              • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00A7F86C
                              • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00A7F8AC
                              • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00A7F8CE
                              • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00A7FA4A
                              • GetLastError.KERNEL32(00000000,00000001,00000000), ref: 00A7FA7C
                              • CloseHandle.KERNEL32(?), ref: 00A7FAAB
                              • CloseHandle.KERNEL32(?), ref: 00A7FB22
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: Directory$CloseCurrentHandleSystem$CreateErrorLastProcess_memset
                              • String ID:
                              • API String ID: 4090791747-0
                              • Opcode ID: bf5fb91061710f51786e792710725e1cf1c49f63e4e04759dfcb35f678263f46
                              • Instruction ID: 7ca4bf14aad094487cc2fefc957825e728046900e99a3ba7f0c9bff308587b58
                              • Opcode Fuzzy Hash: bf5fb91061710f51786e792710725e1cf1c49f63e4e04759dfcb35f678263f46
                              • Instruction Fuzzy Hash: ECE1BD316042019FCB14EF24D981B6ABBE5FF89354F14C96DF8999B2A2CB30DD45CB52
                              APIs
                                • Part of subcall function 00A6466E: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00A63697,?), ref: 00A6468B
                                • Part of subcall function 00A6466E: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00A63697,?), ref: 00A646A4
                                • Part of subcall function 00A64A31: GetFileAttributesW.KERNEL32(?,00A6370B), ref: 00A64A32
                              • lstrcmpiW.KERNEL32(?,?), ref: 00A64D40
                              • _wcscmp.LIBCMT ref: 00A64D5A
                              • MoveFileW.KERNEL32(?,?), ref: 00A64D75
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: FileFullNamePath$AttributesMove_wcscmplstrcmpi
                              • String ID:
                              • API String ID: 793581249-0
                              • Opcode ID: 791edbee65c3fd5cc8f31bcae3fec9a585091962f33a06db76565560d1a06a35
                              • Instruction ID: 9c68d5e55b4bbfb8389796cdc716fbdd926347795d52b81d1224b09065b476bf
                              • Opcode Fuzzy Hash: 791edbee65c3fd5cc8f31bcae3fec9a585091962f33a06db76565560d1a06a35
                              • Instruction Fuzzy Hash: 7F5175B24083459FC724EBA4D9819DFB3ECAF89750F00092EF689C3151EF34A188C766
                              APIs
                                • Part of subcall function 00A5A82C: GetWindowThreadProcessId.USER32(?,00000000), ref: 00A5A84C
                                • Part of subcall function 00A5A82C: GetCurrentThreadId.KERNEL32 ref: 00A5A853
                                • Part of subcall function 00A5A82C: AttachThreadInput.USER32(00000000,?,00A59683,?,00000001), ref: 00A5A85A
                              • MapVirtualKeyW.USER32(00000025,00000000), ref: 00A5968E
                              • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 00A596AB
                              • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000,?,00000001), ref: 00A596AE
                              • MapVirtualKeyW.USER32(00000025,00000000), ref: 00A596B7
                              • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 00A596D5
                              • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 00A596D8
                              • MapVirtualKeyW.USER32(00000025,00000000), ref: 00A596E1
                              • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 00A596F8
                              • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 00A596FB
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                              • String ID:
                              • API String ID: 2014098862-0
                              • Opcode ID: a0f4076ee7463f4aa2a7647e8d4420445ba03252aa64a58282a1b982eec548f9
                              • Instruction ID: 6854e7ae6a26cc15a8e064cdf762b7ee13fa3adb9d45e055a4e3792771e72f43
                              • Opcode Fuzzy Hash: a0f4076ee7463f4aa2a7647e8d4420445ba03252aa64a58282a1b982eec548f9
                              • Instruction Fuzzy Hash: AF11E1B1A10219BEF610AFA0DC89F6A3B2DEB4C751F100525F744AB0A0C9F25C11DBA4
                              APIs
                              • GetProcessHeap.KERNEL32(00000008,0000000C,00000000,00000000,?,00A5853C,00000B00,?,?), ref: 00A5892A
                              • HeapAlloc.KERNEL32(00000000,?,00A5853C,00000B00,?,?), ref: 00A58931
                              • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00A5853C,00000B00,?,?), ref: 00A58946
                              • GetCurrentProcess.KERNEL32(?,00000000,?,00A5853C,00000B00,?,?), ref: 00A5894E
                              • DuplicateHandle.KERNEL32(00000000,?,00A5853C,00000B00,?,?), ref: 00A58951
                              • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,00A5853C,00000B00,?,?), ref: 00A58961
                              • GetCurrentProcess.KERNEL32(00A5853C,00000000,?,00A5853C,00000B00,?,?), ref: 00A58969
                              • DuplicateHandle.KERNEL32(00000000,?,00A5853C,00000B00,?,?), ref: 00A5896C
                              • CreateThread.KERNEL32(00000000,00000000,00A58992,00000000,00000000,00000000), ref: 00A58986
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                              • String ID:
                              • API String ID: 1957940570-0
                              • Opcode ID: f80557296649daadfd65860eaee88bbeca3f082653f7c0ad6b9c84d65b116224
                              • Instruction ID: a92b3947d312b30baade0837da8dff416b385a6e1df5549b6af5c3b24b8c0acf
                              • Opcode Fuzzy Hash: f80557296649daadfd65860eaee88bbeca3f082653f7c0ad6b9c84d65b116224
                              • Instruction Fuzzy Hash: F901A4B5240309FFE610EBA5DC8DF6B7BACEB89711F408521FB05DB2A1DA7498118B20
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID:
                              • String ID: NULL Pointer assignment$Not an Object type
                              • API String ID: 0-572801152
                              • Opcode ID: deb70e3802480a8f0d9d9a485a61779b03a24b35f19938d7a0fc3c60c5c833d9
                              • Instruction ID: 3bff5eb5cb487aca188824badb9a4c5405070bb1b644114c2140d71546443dac
                              • Opcode Fuzzy Hash: deb70e3802480a8f0d9d9a485a61779b03a24b35f19938d7a0fc3c60c5c833d9
                              • Instruction Fuzzy Hash: 01C16171A0021AAFDF10DF98DD85AAFB7F5FB48314F14C46AE909AB281E7709D45CB90
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: Variant$ClearInit$_memset
                              • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                              • API String ID: 2862541840-625585964
                              • Opcode ID: 2d165b3ee865ea09639c6a8bd2b0225d499f18723a280b1968a58ba7aa6a5fd7
                              • Instruction ID: 7ecbb5e7ecdd6d96d424e25d015f366d3dc0da08a8c58cf521d2767d7d5cd411
                              • Opcode Fuzzy Hash: 2d165b3ee865ea09639c6a8bd2b0225d499f18723a280b1968a58ba7aa6a5fd7
                              • Instruction Fuzzy Hash: C7916871A00219ABDF24DFA5CC48FAFBBB8EF45710F10C55AF919AB281D7709945CBA0
                              APIs
                                • Part of subcall function 00A5710A: CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00A57044,80070057,?,?,?,00A57455), ref: 00A57127
                                • Part of subcall function 00A5710A: ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00A57044,80070057,?,?), ref: 00A57142
                                • Part of subcall function 00A5710A: lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00A57044,80070057,?,?), ref: 00A57150
                                • Part of subcall function 00A5710A: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00A57044,80070057,?), ref: 00A57160
                              • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,?,?,?), ref: 00A79806
                              • _memset.LIBCMT ref: 00A79813
                              • _memset.LIBCMT ref: 00A79956
                              • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,00000000), ref: 00A79982
                              • CoTaskMemFree.OLE32(?), ref: 00A7998D
                              Strings
                              • NULL Pointer assignment, xrefs: 00A799DB
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: FreeFromProgTask_memset$CreateInitializeInstanceSecuritylstrcmpi
                              • String ID: NULL Pointer assignment
                              • API String ID: 1300414916-2785691316
                              • Opcode ID: 63255d9cce5c8647ae5dfc0fcf78dbb4963f622eeac23cbe9d8d9171afb80eb2
                              • Instruction ID: ee8982901775fda794f00839b942200e1131a54d1ced31bdf51431cafc6fceaa
                              • Opcode Fuzzy Hash: 63255d9cce5c8647ae5dfc0fcf78dbb4963f622eeac23cbe9d8d9171afb80eb2
                              • Instruction Fuzzy Hash: FF912771D00229ABDB10DFA4DD41EDEBBB9AF08350F10816AF519A7291EB719A44CFA0
                              APIs
                                • Part of subcall function 00A63C55: CreateToolhelp32Snapshot.KERNEL32 ref: 00A63C7A
                                • Part of subcall function 00A63C55: Process32FirstW.KERNEL32(00000000,?), ref: 00A63C88
                                • Part of subcall function 00A63C55: CloseHandle.KERNEL32(00000000), ref: 00A63D52
                              • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00A7E9A4
                              • GetLastError.KERNEL32 ref: 00A7E9B7
                              • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00A7E9E6
                              • TerminateProcess.KERNEL32(00000000,00000000), ref: 00A7EA63
                              • GetLastError.KERNEL32(00000000), ref: 00A7EA6E
                              • CloseHandle.KERNEL32(00000000), ref: 00A7EAA3
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                              • String ID: SeDebugPrivilege
                              • API String ID: 2533919879-2896544425
                              • Opcode ID: 3ce972839fedf48cf78fa4f3ae59a61855d9d17c7cdb29d6f26868ed89d47a7a
                              • Instruction ID: 889a8167432797ff23c0d3c198ac9a2e1fe1ba32621331c58522a6cd502c6953
                              • Opcode Fuzzy Hash: 3ce972839fedf48cf78fa4f3ae59a61855d9d17c7cdb29d6f26868ed89d47a7a
                              • Instruction Fuzzy Hash: 7E41A9712002019FDB10EF64DD95F6EB7A5BF88355F04C458F9069B2C2DB74A849CB91
                              APIs
                              • ShowWindow.USER32(00AC57B0,00000000,00CA4E90,?,?,00AC57B0,?,00A8B5A8,?,?), ref: 00A8B712
                              • EnableWindow.USER32(00000000,00000000), ref: 00A8B736
                              • ShowWindow.USER32(00AC57B0,00000000,00CA4E90,?,?,00AC57B0,?,00A8B5A8,?,?), ref: 00A8B796
                              • ShowWindow.USER32(00000000,00000004,?,00A8B5A8,?,?), ref: 00A8B7A8
                              • EnableWindow.USER32(00000000,00000001), ref: 00A8B7CC
                              • SendMessageW.USER32(?,0000130C,?,00000000), ref: 00A8B7EF
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: Window$Show$Enable$MessageSend
                              • String ID: @U=u
                              • API String ID: 642888154-2594219639
                              • Opcode ID: 7146519c7fd9a4a0e332a455327782abc4c930d4980fb7ac339f6e1c53e617cc
                              • Instruction ID: bcbe5a5668ab713524636cfd5c73268e75d06f646c41421d30d4b96f486ba3dd
                              • Opcode Fuzzy Hash: 7146519c7fd9a4a0e332a455327782abc4c930d4980fb7ac339f6e1c53e617cc
                              • Instruction Fuzzy Hash: 80418F34602341AFDB22EF24C499B957FE1FF49310F5841B9F9489F6A2C731A856CB60
                              APIs
                              • LoadIconW.USER32(00000000,00007F03), ref: 00A63033
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: IconLoad
                              • String ID: blank$info$question$stop$warning
                              • API String ID: 2457776203-404129466
                              • Opcode ID: 0f3adb24ac58a9614eb34a018a12133e430f6926613c81247b8cb9cc2f6ba94c
                              • Instruction ID: c90acb2f6f0dae99b16e61470861f7992bc8fbb1d8d148665bf7e3ed08e515a6
                              • Opcode Fuzzy Hash: 0f3adb24ac58a9614eb34a018a12133e430f6926613c81247b8cb9cc2f6ba94c
                              • Instruction Fuzzy Hash: D9112B32348347BEEB249B5CDC42DAF7BBCDF15320B21002AFA0066182DB745F4557A0
                              APIs
                              • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 00A64312
                              • LoadStringW.USER32(00000000), ref: 00A64319
                              • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00A6432F
                              • LoadStringW.USER32(00000000), ref: 00A64336
                              • _wprintf.LIBCMT ref: 00A6435C
                              • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00A6437A
                              Strings
                              • %s (%d) : ==> %s: %s %s, xrefs: 00A64357
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: HandleLoadModuleString$Message_wprintf
                              • String ID: %s (%d) : ==> %s: %s %s
                              • API String ID: 3648134473-3128320259
                              • Opcode ID: a441ee3f7e8d571940925e6b8060974bb08aac3b954a96f299aa2549e165c0cb
                              • Instruction ID: 88abf14db1b8ba27d626ebec64da1ac5f8797a1f7c5b6a1331b03bd03326186d
                              • Opcode Fuzzy Hash: a441ee3f7e8d571940925e6b8060974bb08aac3b954a96f299aa2549e165c0cb
                              • Instruction Fuzzy Hash: A1014FF6900209BFE711E7E4DD89EE6776CEB08300F0005B1B749E6051EA745E854B70
                              APIs
                              • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,00A3C1C7,00000004,00000000,00000000,00000000), ref: 00A02ACF
                              • ShowWindow.USER32(FFFFFFFF,00000000,00000000,00000000,?,00A3C1C7,00000004,00000000,00000000,00000000,000000FF), ref: 00A02B17
                              • ShowWindow.USER32(FFFFFFFF,00000006,00000000,00000000,?,00A3C1C7,00000004,00000000,00000000,00000000), ref: 00A3C21A
                              • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,00A3C1C7,00000004,00000000,00000000,00000000), ref: 00A3C286
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: ShowWindow
                              • String ID:
                              • API String ID: 1268545403-0
                              • Opcode ID: b0cca81ff9ea1d6cfdac8e229ba1e7c4298373d91d0fc217f7db7c763585e77a
                              • Instruction ID: 95e685bd26e1b311d72a0d45ee1180a0757eadd05fac999c6e30275e2e9bc908
                              • Opcode Fuzzy Hash: b0cca81ff9ea1d6cfdac8e229ba1e7c4298373d91d0fc217f7db7c763585e77a
                              • Instruction Fuzzy Hash: 94413B307047C89FDB359B78AC9CB6B7BA2BB85354F24881DF047925E0CA75A886D720
                              APIs
                              • InterlockedExchange.KERNEL32(?,000001F5), ref: 00A670DD
                                • Part of subcall function 00A20DB6: std::exception::exception.LIBCMT ref: 00A20DEC
                                • Part of subcall function 00A20DB6: __CxxThrowException@8.LIBCMT ref: 00A20E01
                              • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,?,00000000), ref: 00A67114
                              • EnterCriticalSection.KERNEL32(?), ref: 00A67130
                              • _memmove.LIBCMT ref: 00A6717E
                              • _memmove.LIBCMT ref: 00A6719B
                              • LeaveCriticalSection.KERNEL32(?), ref: 00A671AA
                              • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,00000000,00000000), ref: 00A671BF
                              • InterlockedExchange.KERNEL32(?,000001F6), ref: 00A671DE
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterException@8LeaveThrowstd::exception::exception
                              • String ID:
                              • API String ID: 256516436-0
                              • Opcode ID: 59713f8ac01c86b4ce52bcb9895a9999f96ee5d02f5bddbebf081efb704783bd
                              • Instruction ID: abee2ea2a04d2e6d4399b3f80dc0e33e00507be7c9c4c4a99fcaf8281daa6f4d
                              • Opcode Fuzzy Hash: 59713f8ac01c86b4ce52bcb9895a9999f96ee5d02f5bddbebf081efb704783bd
                              • Instruction Fuzzy Hash: AA318D71900215EFDB00EFA8DD85EAEB779EF45710F1441B5E904AB256EB309E51CBA0
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: _memcmp
                              • String ID:
                              • API String ID: 2931989736-0
                              • Opcode ID: 4b160ec226a94fda7963ba2090a64c4f6abe709e11b13a0663e291947951dee6
                              • Instruction ID: 33d2c3b1d13ebbdbe05c019248efb87a1d5ac512260267a8688b74e210c15eba
                              • Opcode Fuzzy Hash: 4b160ec226a94fda7963ba2090a64c4f6abe709e11b13a0663e291947951dee6
                              • Instruction Fuzzy Hash: 8321B0B17112157BAA047715AE42FFB73ACBE2434BB054420FD089A647EB74DE1982B5
                              APIs
                                • Part of subcall function 00A09837: __itow.LIBCMT ref: 00A09862
                                • Part of subcall function 00A09837: __swprintf.LIBCMT ref: 00A098AC
                                • Part of subcall function 00A1FC86: _wcscpy.LIBCMT ref: 00A1FCA9
                              • _wcstok.LIBCMT ref: 00A6EC94
                              • _wcscpy.LIBCMT ref: 00A6ED23
                              • _memset.LIBCMT ref: 00A6ED56
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: _wcscpy$__itow__swprintf_memset_wcstok
                              • String ID: X
                              • API String ID: 774024439-3081909835
                              • Opcode ID: 6cd54a5a5e4fe454ea87eb1008068556db542754adf047991743024fc4b3f4fe
                              • Instruction ID: 16aeb9cc958dce3a91cae00e00b6e7fb434c9e0364aea3da2a2a1a30b4c38445
                              • Opcode Fuzzy Hash: 6cd54a5a5e4fe454ea87eb1008068556db542754adf047991743024fc4b3f4fe
                              • Instruction Fuzzy Hash: 65C15C759083059FC754EF68D981A6AB7F4FF85310F00892DF8999B2A2DB30EC45CB82
                              APIs
                              • __WSAFDIsSet.WSOCK32(00000000,?,00000000,00000000,?,00000064,00000000), ref: 00A76C00
                              • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 00A76C21
                              • WSAGetLastError.WSOCK32(00000000), ref: 00A76C34
                              • htons.WSOCK32(?,?,?,00000000,?), ref: 00A76CEA
                              • inet_ntoa.WSOCK32(?), ref: 00A76CA7
                                • Part of subcall function 00A5A7E9: _strlen.LIBCMT ref: 00A5A7F3
                                • Part of subcall function 00A5A7E9: _memmove.LIBCMT ref: 00A5A815
                              • _strlen.LIBCMT ref: 00A76D44
                              • _memmove.LIBCMT ref: 00A76DAD
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: _memmove_strlen$ErrorLasthtonsinet_ntoa
                              • String ID:
                              • API String ID: 3619996494-0
                              • Opcode ID: 36b8fcf2506c0194750c1e027d6f43f919c746beddc6a119349bd9b89d61dd5f
                              • Instruction ID: 834ef2880a0ee332b8590d21f301f521ed92259b8f0fb631ffc205b89a850a09
                              • Opcode Fuzzy Hash: 36b8fcf2506c0194750c1e027d6f43f919c746beddc6a119349bd9b89d61dd5f
                              • Instruction Fuzzy Hash: C981F071204B04AFD720EF24DD82F6BB7A8AF85714F10CA18F9499B2D2DA70AD05CB91
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 7bfab6285dabf8cec08c9381ab51cbadf1211166db976c636289f7ae59ceccf6
                              • Instruction ID: 6f2f6b2f425824562357cce3d661001ab7751b3f758b31e8d35c759380ea265d
                              • Opcode Fuzzy Hash: 7bfab6285dabf8cec08c9381ab51cbadf1211166db976c636289f7ae59ceccf6
                              • Instruction Fuzzy Hash: E0715A70900109EFCB04DF98DC89AFEBB79FF85314F248159F915AA2A1C735AA51CFA0
                              APIs
                              • _memset.LIBCMT ref: 00A7F448
                              • _memset.LIBCMT ref: 00A7F511
                              • ShellExecuteExW.SHELL32(?), ref: 00A7F556
                                • Part of subcall function 00A09837: __itow.LIBCMT ref: 00A09862
                                • Part of subcall function 00A09837: __swprintf.LIBCMT ref: 00A098AC
                                • Part of subcall function 00A1FC86: _wcscpy.LIBCMT ref: 00A1FCA9
                              • GetProcessId.KERNEL32(00000000), ref: 00A7F5CD
                              • CloseHandle.KERNEL32(00000000), ref: 00A7F5FC
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: _memset$CloseExecuteHandleProcessShell__itow__swprintf_wcscpy
                              • String ID: @
                              • API String ID: 3522835683-2766056989
                              • Opcode ID: e727c0f38e8ffc10c78cfbda0ce4ce00a323134f64f3d64c1f3212cbfaca32a4
                              • Instruction ID: dadb1d3df2059af2c5b04314af97cf157145e07b84cbe381af41e44e4bf92e90
                              • Opcode Fuzzy Hash: e727c0f38e8ffc10c78cfbda0ce4ce00a323134f64f3d64c1f3212cbfaca32a4
                              • Instruction Fuzzy Hash: 1E6180B5A00619DFCB14DFA4D9859AEBBF5FF49310F14C069E859AB391CB30AE41CB90
                              APIs
                              • GetParent.USER32(?), ref: 00A60F8C
                              • GetKeyboardState.USER32(?), ref: 00A60FA1
                              • SetKeyboardState.USER32(?), ref: 00A61002
                              • PostMessageW.USER32(?,00000101,00000010,?), ref: 00A61030
                              • PostMessageW.USER32(?,00000101,00000011,?), ref: 00A6104F
                              • PostMessageW.USER32(?,00000101,00000012,?), ref: 00A61095
                              • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00A610B8
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: MessagePost$KeyboardState$Parent
                              • String ID:
                              • API String ID: 87235514-0
                              • Opcode ID: d7537a88d65c412f24c795e6970cd399b0c8ee0a192bf6a76e6c36dc5022d807
                              • Instruction ID: 5a7f3f97aa5ec5e6859d7ad7fd86456345b3ea4db6b08def8d595590eb28e4f5
                              • Opcode Fuzzy Hash: d7537a88d65c412f24c795e6970cd399b0c8ee0a192bf6a76e6c36dc5022d807
                              • Instruction Fuzzy Hash: 8951E1A06047D63DFB3643348C15BBBBEB96B06304F0C8989E1D4868D2D2A9ECD9D751
                              APIs
                              • GetParent.USER32(00000000), ref: 00A60DA5
                              • GetKeyboardState.USER32(?), ref: 00A60DBA
                              • SetKeyboardState.USER32(?), ref: 00A60E1B
                              • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 00A60E47
                              • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 00A60E64
                              • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 00A60EA8
                              • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 00A60EC9
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: MessagePost$KeyboardState$Parent
                              • String ID:
                              • API String ID: 87235514-0
                              • Opcode ID: 2f9e9cc204f23f39191577bf82c2f53409d244ed0ecb62d8161f8df32beefc17
                              • Instruction ID: 988ac547c61e2b4bee939c9ed2cc66c45602f56ce77fb5320599877903ecc38b
                              • Opcode Fuzzy Hash: 2f9e9cc204f23f39191577bf82c2f53409d244ed0ecb62d8161f8df32beefc17
                              • Instruction Fuzzy Hash: 1151E1A05487E57DFB3683748C55FBBBFB9AB06300F088989E1D4468C2D396ACD9D760
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: _wcsncpy$LocalTime
                              • String ID:
                              • API String ID: 2945705084-0
                              • Opcode ID: 361792a7c7bff3e17004e80817e6aaea8c5abc1469a71cde38054c6feb41482b
                              • Instruction ID: 5b45d5e984332dfaa04df28a1724bfe1e42b91cee9b4d9f65f6421addc6b438a
                              • Opcode Fuzzy Hash: 361792a7c7bff3e17004e80817e6aaea8c5abc1469a71cde38054c6feb41482b
                              • Instruction Fuzzy Hash: 33416566C1062476CB11EBB8DC46ACFB7B89F05310F508966F518E3221FB34A695C7A6
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID:
                              • String ID: @U=u
                              • API String ID: 0-2594219639
                              • Opcode ID: b354af5906d1d983ae32d8575421b6a77ac3e2804ce999defa34b16f6710268e
                              • Instruction ID: 0492d346af0614e523071c2368f8e53a4234edf9c1dd1d7f05b60bde90969297
                              • Opcode Fuzzy Hash: b354af5906d1d983ae32d8575421b6a77ac3e2804ce999defa34b16f6710268e
                              • Instruction Fuzzy Hash: 4041C335E04104AFE710EF68CC4CFA9BBB4EB29310F150266F856A72E1C730AD52DB51
                              APIs
                                • Part of subcall function 00A6466E: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00A63697,?), ref: 00A6468B
                                • Part of subcall function 00A6466E: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00A63697,?), ref: 00A646A4
                              • lstrcmpiW.KERNEL32(?,?), ref: 00A636B7
                              • _wcscmp.LIBCMT ref: 00A636D3
                              • MoveFileW.KERNEL32(?,?), ref: 00A636EB
                              • _wcscat.LIBCMT ref: 00A63733
                              • SHFileOperationW.SHELL32(?), ref: 00A6379F
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: FileFullNamePath$MoveOperation_wcscat_wcscmplstrcmpi
                              • String ID: \*.*
                              • API String ID: 1377345388-1173974218
                              • Opcode ID: 21b33fd7c47995579d341ecc741a14abab1c5c32e64d759e94e282f5dfc7fdde
                              • Instruction ID: ce4466fc1c4c1df2113e49bf10272e037d380e838dd43d15b260df4392fdfe1c
                              • Opcode Fuzzy Hash: 21b33fd7c47995579d341ecc741a14abab1c5c32e64d759e94e282f5dfc7fdde
                              • Instruction Fuzzy Hash: E0416172508345AECB52EF64D541ADFB7F8EF89380F40092EB49AC3251EA34D68AC752
                              APIs
                              • _memset.LIBCMT ref: 00A872AA
                              • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00A87351
                              • IsMenu.USER32(?), ref: 00A87369
                              • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00A873B1
                              • DrawMenuBar.USER32 ref: 00A873C4
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: Menu$Item$DrawInfoInsert_memset
                              • String ID: 0
                              • API String ID: 3866635326-4108050209
                              • Opcode ID: e840d3edfd1fc9f9071e15ed4a089f9a38c2196c9a6574403b148d9e9d23036b
                              • Instruction ID: 922d996967d50f9eb053eadf14d8face9f3b16545d90be454dfbb8df171d4c50
                              • Opcode Fuzzy Hash: e840d3edfd1fc9f9071e15ed4a089f9a38c2196c9a6574403b148d9e9d23036b
                              • Instruction Fuzzy Hash: 2B411675A04209AFDB20EFA0D884E9EBBB8FB05350F248529FD15AB260D730ED50EB51
                              APIs
                              • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?), ref: 00A80FD4
                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00A80FFE
                              • FreeLibrary.KERNEL32(00000000), ref: 00A810B5
                                • Part of subcall function 00A80FA5: RegCloseKey.ADVAPI32(?), ref: 00A8101B
                                • Part of subcall function 00A80FA5: FreeLibrary.KERNEL32(?), ref: 00A8106D
                                • Part of subcall function 00A80FA5: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00A81090
                              • RegDeleteKeyW.ADVAPI32(?,?), ref: 00A81058
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: EnumFreeLibrary$CloseDeleteOpen
                              • String ID:
                              • API String ID: 395352322-0
                              • Opcode ID: 17b0d7c6dbf0e7dd1eb3ffd8020515128fc50abb8b2b3b91dee90250a0c5048e
                              • Instruction ID: ee0f38b26d6fe511c46cd32db12e636e58d62c5c30d13bdc281c9028fe2d1800
                              • Opcode Fuzzy Hash: 17b0d7c6dbf0e7dd1eb3ffd8020515128fc50abb8b2b3b91dee90250a0c5048e
                              • Instruction Fuzzy Hash: E7310A71901109BFDB15EB90DC89EFFB7BCEF08300F10416AE501E2151EA749E8A9BA1
                              APIs
                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00A5DB2E
                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00A5DB54
                              • SysAllocString.OLEAUT32(00000000), ref: 00A5DB57
                              • SysAllocString.OLEAUT32(?), ref: 00A5DB75
                              • SysFreeString.OLEAUT32(?), ref: 00A5DB7E
                              • StringFromGUID2.OLE32(?,?,00000028), ref: 00A5DBA3
                              • SysAllocString.OLEAUT32(?), ref: 00A5DBB1
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                              • String ID:
                              • API String ID: 3761583154-0
                              • Opcode ID: a72fc61e1c196e9f0d9685bcb6a77bb090615586bb4654a63cdc1e4b9462c36b
                              • Instruction ID: 18e7e285bed2313be2b5440d122f799f846b738e9bfac39b4e9f8fa1bbad4308
                              • Opcode Fuzzy Hash: a72fc61e1c196e9f0d9685bcb6a77bb090615586bb4654a63cdc1e4b9462c36b
                              • Instruction Fuzzy Hash: DF219236600219AFEF20DFE8DC88CBB73ADFB09361B128526FD54DB251D6709C458760
                              APIs
                                • Part of subcall function 00A77D8B: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 00A77DB6
                              • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 00A761C6
                              • WSAGetLastError.WSOCK32(00000000), ref: 00A761D5
                              • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 00A7620E
                              • connect.WSOCK32(00000000,?,00000010), ref: 00A76217
                              • WSAGetLastError.WSOCK32 ref: 00A76221
                              • closesocket.WSOCK32(00000000), ref: 00A7624A
                              • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 00A76263
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: ErrorLastioctlsocket$closesocketconnectinet_addrsocket
                              • String ID:
                              • API String ID: 910771015-0
                              • Opcode ID: 1ad8914fb5112725fe557a91f4274836bca57f61d29bc47437b6064229bafe5a
                              • Instruction ID: c4ef295d0008eb1e6013bf792021d790cb181d2fdbdc91c8c413e4fe80f7f65c
                              • Opcode Fuzzy Hash: 1ad8914fb5112725fe557a91f4274836bca57f61d29bc47437b6064229bafe5a
                              • Instruction Fuzzy Hash: D031A471600508AFDF10AF64DC85BBE7BACEB45710F04C069FD09A7292DB70AC458BA1
                              APIs
                                • Part of subcall function 00A07DE1: _memmove.LIBCMT ref: 00A07E22
                                • Part of subcall function 00A5AA99: GetClassNameW.USER32(?,?,000000FF), ref: 00A5AABC
                              • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00A58F14
                              • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00A58F27
                              • SendMessageW.USER32(?,00000189,?,00000000), ref: 00A58F57
                                • Part of subcall function 00A07BCC: _memmove.LIBCMT ref: 00A07C06
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: MessageSend$_memmove$ClassName
                              • String ID: @U=u$ComboBox$ListBox
                              • API String ID: 365058703-2258501812
                              • Opcode ID: 17f81cd9532380f4412774f82f8b8bed0bdb92af0883ca49a6c0c7645fd61ab1
                              • Instruction ID: 7eb36e034fa915415e822fad14b67e3e957b85b69fd6063d3a82467ff8e27797
                              • Opcode Fuzzy Hash: 17f81cd9532380f4412774f82f8b8bed0bdb92af0883ca49a6c0c7645fd61ab1
                              • Instruction Fuzzy Hash: 88210171A00108BEDB14ABB0DC86CFFB779EF09360B104629F825A71E1DF39584E9A20
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: __wcsnicmp
                              • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                              • API String ID: 1038674560-2734436370
                              • Opcode ID: e03399bc0d222e630fa9720987a89b03f6e92789563d9b6884bedcd96813da32
                              • Instruction ID: d60b0baef2df02c31a5177accd1902df56aa5a648e39a8dd0eacb9251361edcb
                              • Opcode Fuzzy Hash: e03399bc0d222e630fa9720987a89b03f6e92789563d9b6884bedcd96813da32
                              • Instruction Fuzzy Hash: AB2134722042617EDA20AB38AD02FA773E8FF59341F104439FD4686491EB70AD89D395
                              APIs
                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00A5DC09
                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00A5DC2F
                              • SysAllocString.OLEAUT32(00000000), ref: 00A5DC32
                              • SysAllocString.OLEAUT32 ref: 00A5DC53
                              • SysFreeString.OLEAUT32 ref: 00A5DC5C
                              • StringFromGUID2.OLE32(?,?,00000028), ref: 00A5DC76
                              • SysAllocString.OLEAUT32(?), ref: 00A5DC84
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                              • String ID:
                              • API String ID: 3761583154-0
                              • Opcode ID: 96b53c01e6994a786f7c3bccaa4992cb1363b3fcc0dabaeb6458374972a8ca25
                              • Instruction ID: 7d3306ed456d736c13c922bb6127132cc4eb57ea05c224b0d4af375994f1e360
                              • Opcode Fuzzy Hash: 96b53c01e6994a786f7c3bccaa4992cb1363b3fcc0dabaeb6458374972a8ca25
                              • Instruction Fuzzy Hash: 41215E35604205AF9B20DBF8DC88DAA77ACFB08361B108126FD14DB261DAB09C45C764
                              APIs
                              • IsWindowVisible.USER32(?), ref: 00A5B204
                              • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00A5B221
                              • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00A5B259
                              • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 00A5B27F
                              • _wcsstr.LIBCMT ref: 00A5B289
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: MessageSend$BuffCharUpperVisibleWindow_wcsstr
                              • String ID: @U=u
                              • API String ID: 3902887630-2594219639
                              • Opcode ID: d01d73a8a020850a4e630b82de735cf336dc7f0b69469e4fc72bff681965deb3
                              • Instruction ID: e6cc8b9d1a5d963d47eab9f382fcc28189e16b46aae3ee2cf262888fa8406e0d
                              • Opcode Fuzzy Hash: d01d73a8a020850a4e630b82de735cf336dc7f0b69469e4fc72bff681965deb3
                              • Instruction Fuzzy Hash: D8212532214201BEEB159B79AC09EBF7BA8EF49712F104139FC04CA1A1EF718C419370
                              APIs
                              • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00A59320
                                • Part of subcall function 00A07BCC: _memmove.LIBCMT ref: 00A07C06
                              • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00A59352
                              • __itow.LIBCMT ref: 00A5936A
                              • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00A59392
                              • __itow.LIBCMT ref: 00A593A3
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: MessageSend$__itow$_memmove
                              • String ID: @U=u
                              • API String ID: 2983881199-2594219639
                              • Opcode ID: 6d8079f1fe0662e4260b086913b16886f74e9350529e99288056f7cde832b80d
                              • Instruction ID: 58dbc7c9d791a59a1b82248fa70e393cbd14ef9e802ed55785961833099c1b31
                              • Opcode Fuzzy Hash: 6d8079f1fe0662e4260b086913b16886f74e9350529e99288056f7cde832b80d
                              • Instruction Fuzzy Hash: 2D21F531B00208FBDB10ABA49D89EAF3BA8FB49721F144029FD09DF1C1D6B0DD599791
                              APIs
                                • Part of subcall function 00A01D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00A01D73
                                • Part of subcall function 00A01D35: GetStockObject.GDI32(00000011), ref: 00A01D87
                                • Part of subcall function 00A01D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00A01D91
                              • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00A87632
                              • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 00A8763F
                              • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00A8764A
                              • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00A87659
                              • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00A87665
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: MessageSend$CreateObjectStockWindow
                              • String ID: Msctls_Progress32
                              • API String ID: 1025951953-3636473452
                              • Opcode ID: 2b499fc5e07f733e00566aae10180ab473e32ffb7ea68841d06b0ca8b15afcb2
                              • Instruction ID: e2fe0d3fc815a06c4e7f4da104a7b76ae779b47c74874ef57fe447363db6602e
                              • Opcode Fuzzy Hash: 2b499fc5e07f733e00566aae10180ab473e32ffb7ea68841d06b0ca8b15afcb2
                              • Instruction Fuzzy Hash: F811B6B1110119BFEF159F64CC85EEB7F6DEF08798F114125B604A20A0D772DC21DBA4
                              APIs
                              • __init_pointers.LIBCMT ref: 00A29AE6
                                • Part of subcall function 00A23187: EncodePointer.KERNEL32(00000000), ref: 00A2318A
                                • Part of subcall function 00A23187: __initp_misc_winsig.LIBCMT ref: 00A231A5
                                • Part of subcall function 00A23187: GetModuleHandleW.KERNEL32(kernel32.dll), ref: 00A29EA0
                                • Part of subcall function 00A23187: GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00A29EB4
                                • Part of subcall function 00A23187: GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00A29EC7
                                • Part of subcall function 00A23187: GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00A29EDA
                                • Part of subcall function 00A23187: GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00A29EED
                                • Part of subcall function 00A23187: GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 00A29F00
                                • Part of subcall function 00A23187: GetProcAddress.KERNEL32(00000000,CreateEventExW), ref: 00A29F13
                                • Part of subcall function 00A23187: GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 00A29F26
                                • Part of subcall function 00A23187: GetProcAddress.KERNEL32(00000000,SetThreadStackGuarantee), ref: 00A29F39
                                • Part of subcall function 00A23187: GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 00A29F4C
                                • Part of subcall function 00A23187: GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 00A29F5F
                                • Part of subcall function 00A23187: GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 00A29F72
                                • Part of subcall function 00A23187: GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 00A29F85
                                • Part of subcall function 00A23187: GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 00A29F98
                                • Part of subcall function 00A23187: GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 00A29FAB
                                • Part of subcall function 00A23187: GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 00A29FBE
                              • __mtinitlocks.LIBCMT ref: 00A29AEB
                              • __mtterm.LIBCMT ref: 00A29AF4
                                • Part of subcall function 00A29B5C: DeleteCriticalSection.KERNEL32(00000000,00000000,?,?,00A29AF9,00A27CD0,00ABA0B8,00000014), ref: 00A29C56
                                • Part of subcall function 00A29B5C: _free.LIBCMT ref: 00A29C5D
                                • Part of subcall function 00A29B5C: DeleteCriticalSection.KERNEL32(00ABEC00,?,?,00A29AF9,00A27CD0,00ABA0B8,00000014), ref: 00A29C7F
                              • __calloc_crt.LIBCMT ref: 00A29B19
                              • __initptd.LIBCMT ref: 00A29B3B
                              • GetCurrentThreadId.KERNEL32 ref: 00A29B42
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: AddressProc$CriticalDeleteSection$CurrentEncodeHandleModulePointerThread__calloc_crt__init_pointers__initp_misc_winsig__initptd__mtinitlocks__mtterm_free
                              • String ID:
                              • API String ID: 3567560977-0
                              • Opcode ID: 65640f6fe884a044693c533439a151ed93d2be6e8e595b6b36b7c8b14fc4d0ae
                              • Instruction ID: a2617c835adb0719d60eb6c56d8adae65dde54ab4285ef259878c2152a554292
                              • Opcode Fuzzy Hash: 65640f6fe884a044693c533439a151ed93d2be6e8e595b6b36b7c8b14fc4d0ae
                              • Instruction Fuzzy Hash: BBF0903251A7316AFA34B7BCBD0768B6694EF02F70F200A39F464D51D2EF61844245A4
                              APIs
                              • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,00A23F85), ref: 00A24085
                              • GetProcAddress.KERNEL32(00000000), ref: 00A2408C
                              • EncodePointer.KERNEL32(00000000), ref: 00A24097
                              • DecodePointer.KERNEL32(00A23F85), ref: 00A240B2
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                              • String ID: RoUninitialize$combase.dll
                              • API String ID: 3489934621-2819208100
                              • Opcode ID: b095bf4ea913eb5c40a847c0e894ed1fb3606f5111aca7dd30735049d06e245f
                              • Instruction ID: be35329c5805487f277eb2a05ebb36c80e1deb2378f6dfbd9a1cec9e341938d3
                              • Opcode Fuzzy Hash: b095bf4ea913eb5c40a847c0e894ed1fb3606f5111aca7dd30735049d06e245f
                              • Instruction Fuzzy Hash: C2E0B671685311EFEF10EFE2ED0DF853AA5BB04742F158625F621E50A0CBBA4642DB14
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: _memmove$__itow__swprintf
                              • String ID:
                              • API String ID: 3253778849-0
                              • Opcode ID: 07f7beecbd1dd8334db84aaf9af2abfb4d3119d97a414b28777fd7aaa104b083
                              • Instruction ID: 0a1bed82d289a3d17eee400d3544fd92582dc9f75c4e9ac379e49da5ddbea62a
                              • Opcode Fuzzy Hash: 07f7beecbd1dd8334db84aaf9af2abfb4d3119d97a414b28777fd7aaa104b083
                              • Instruction Fuzzy Hash: 67617C7090025A9BCF05EF64EE82EFE37B9AF05308F058529FD566B293DB34A945CB50
                              APIs
                                • Part of subcall function 00A07DE1: _memmove.LIBCMT ref: 00A07E22
                                • Part of subcall function 00A80E1A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00A7FDAD,?,?), ref: 00A80E31
                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00A802BD
                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00A802FD
                              • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 00A80320
                              • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 00A80349
                              • RegCloseKey.ADVAPI32(?,?,00000000), ref: 00A8038C
                              • RegCloseKey.ADVAPI32(00000000), ref: 00A80399
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: Close$BuffCharConnectEnumOpenRegistryUpperValue_memmove
                              • String ID:
                              • API String ID: 4046560759-0
                              • Opcode ID: 68f2250eb504d4d25971fa8510db5ad7b82c2d7383bd6ef4989a89a5f42b8b08
                              • Instruction ID: fd0f6aa5c6f6e013567826bb98063f33835df8d9a48a9b3817c3c161e3af8c25
                              • Opcode Fuzzy Hash: 68f2250eb504d4d25971fa8510db5ad7b82c2d7383bd6ef4989a89a5f42b8b08
                              • Instruction Fuzzy Hash: BF514931508204AFCB10EF64D985EAFBBE9FF85314F04491DF5958B2A2EB31E909CB52
                              APIs
                              • GetMenu.USER32(?), ref: 00A857FB
                              • GetMenuItemCount.USER32(00000000), ref: 00A85832
                              • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 00A8585A
                              • GetMenuItemID.USER32(?,?), ref: 00A858C9
                              • GetSubMenu.USER32(?,?), ref: 00A858D7
                              • PostMessageW.USER32(?,00000111,?,00000000), ref: 00A85928
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: Menu$Item$CountMessagePostString
                              • String ID:
                              • API String ID: 650687236-0
                              • Opcode ID: ce8ada7cd0caa3b5f10e272d55d46ba9c104afe7d48c2e26027ac50d39ce17bd
                              • Instruction ID: 8449ad29a9e488bf46d908dad9ff2732f44a6a86669a6e496935d4a23dad3ad1
                              • Opcode Fuzzy Hash: ce8ada7cd0caa3b5f10e272d55d46ba9c104afe7d48c2e26027ac50d39ce17bd
                              • Instruction Fuzzy Hash: 20516E35E00615EFCF11EFA4D945AAEB7B5EF48310F104066EC41BB351DB34AE419B90
                              APIs
                              • VariantInit.OLEAUT32(?), ref: 00A5EF06
                              • VariantClear.OLEAUT32(00000013), ref: 00A5EF78
                              • VariantClear.OLEAUT32(00000000), ref: 00A5EFD3
                              • _memmove.LIBCMT ref: 00A5EFFD
                              • VariantClear.OLEAUT32(?), ref: 00A5F04A
                              • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00A5F078
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: Variant$Clear$ChangeInitType_memmove
                              • String ID:
                              • API String ID: 1101466143-0
                              • Opcode ID: 25bbb3be7c5046b7d7de47cbee00961107c877878bb330e60361e6e3f8290de0
                              • Instruction ID: 931c6adafd47d5e6bf2b1304dbc0e4a2f703f01e31092df5c311a2bf385c717e
                              • Opcode Fuzzy Hash: 25bbb3be7c5046b7d7de47cbee00961107c877878bb330e60361e6e3f8290de0
                              • Instruction Fuzzy Hash: 4F5166B5A00209EFCB14CF58C884AAAB7B8FF4C314B15856AED59DB341E734E915CFA0
                              APIs
                              • _memset.LIBCMT ref: 00A62258
                              • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00A622A3
                              • IsMenu.USER32(00000000), ref: 00A622C3
                              • CreatePopupMenu.USER32 ref: 00A622F7
                              • GetMenuItemCount.USER32(000000FF), ref: 00A62355
                              • InsertMenuItemW.USER32(00000000,?,00000001,00000030), ref: 00A62386
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: Menu$Item$CountCreateInfoInsertPopup_memset
                              • String ID:
                              • API String ID: 3311875123-0
                              • Opcode ID: 90e4ae234ab231924f4b64d106c30989802d34533de95d10b1ff88a7cc7243b4
                              • Instruction ID: a0dad188e8f7f38946e8fd4f6674d5fa6589b93196808d62e3d4c6576f02cf3d
                              • Opcode Fuzzy Hash: 90e4ae234ab231924f4b64d106c30989802d34533de95d10b1ff88a7cc7243b4
                              • Instruction Fuzzy Hash: CB51BB70A00A4AEFDF25CF68C988BAEBBF5FF05314F104129E811AB290E3748944CB51
                              APIs
                                • Part of subcall function 00A02612: GetWindowLongW.USER32(?,000000EB), ref: 00A02623
                              • BeginPaint.USER32(?,?,?,?,?,?), ref: 00A0179A
                              • GetWindowRect.USER32(?,?), ref: 00A017FE
                              • ScreenToClient.USER32(?,?), ref: 00A0181B
                              • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00A0182C
                              • EndPaint.USER32(?,?), ref: 00A01876
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: PaintWindow$BeginClientLongRectScreenViewport
                              • String ID:
                              • API String ID: 1827037458-0
                              • Opcode ID: 0ff72616d3c9876727f74abf895c2f7bc08d7c3049ac39c92a092fab5b24ac27
                              • Instruction ID: 156f14cd2a0a633dabde8aa8eea3ad20738b0cf888210e1c89062eb6f8749b93
                              • Opcode Fuzzy Hash: 0ff72616d3c9876727f74abf895c2f7bc08d7c3049ac39c92a092fab5b24ac27
                              • Instruction Fuzzy Hash: E341AD30500705AFD710DF64DC84FBA7BF8EB49724F044629FAA48B2E1D730A94ADB62
                              APIs
                              • GetForegroundWindow.USER32(?,?,?,?,?,?,00A74E41,?,?,00000000,00000001), ref: 00A770AC
                                • Part of subcall function 00A739A0: GetWindowRect.USER32(?,?), ref: 00A739B3
                              • GetDesktopWindow.USER32 ref: 00A770D6
                              • GetWindowRect.USER32(00000000), ref: 00A770DD
                              • mouse_event.USER32(00008001,?,?,00000001,00000001), ref: 00A7710F
                                • Part of subcall function 00A65244: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00A652BC
                              • GetCursorPos.USER32(?), ref: 00A7713B
                              • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00A77199
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: Window$Rectmouse_event$CursorDesktopForegroundSleep
                              • String ID:
                              • API String ID: 4137160315-0
                              • Opcode ID: aafb60ed35602272de26514e354dae50124543867ff68194db734fdb03b73e8c
                              • Instruction ID: 0ee47d6d96f06bdb826e25664dce606240e0216690bcec76bf39f149351843df
                              • Opcode Fuzzy Hash: aafb60ed35602272de26514e354dae50124543867ff68194db734fdb03b73e8c
                              • Instruction Fuzzy Hash: D331C372505306AFD720DF64DC49A9FB7A9FF88314F004A29F58997191DB30EA05CB92
                              APIs
                                • Part of subcall function 00A580A9: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00A580C0
                                • Part of subcall function 00A580A9: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00A580CA
                                • Part of subcall function 00A580A9: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00A580D9
                                • Part of subcall function 00A580A9: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00A580E0
                                • Part of subcall function 00A580A9: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00A580F6
                              • GetLengthSid.ADVAPI32(?,00000000,00A5842F), ref: 00A588CA
                              • GetProcessHeap.KERNEL32(00000008,00000000), ref: 00A588D6
                              • HeapAlloc.KERNEL32(00000000), ref: 00A588DD
                              • CopySid.ADVAPI32(00000000,00000000,?), ref: 00A588F6
                              • GetProcessHeap.KERNEL32(00000000,00000000,00A5842F), ref: 00A5890A
                              • HeapFree.KERNEL32(00000000), ref: 00A58911
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                              • String ID:
                              • API String ID: 3008561057-0
                              • Opcode ID: 78ec00018f9b096689cff1eb70c5c375103434a563f476f055c305d6d52fec5b
                              • Instruction ID: 151fa2a0b8108b734bfc460ab9b2a856df5d52fe44034b7d9ec4ed0164ece627
                              • Opcode Fuzzy Hash: 78ec00018f9b096689cff1eb70c5c375103434a563f476f055c305d6d52fec5b
                              • Instruction Fuzzy Hash: 3E11AF31501209FFDB10DFE4DC09BBEB778FB44316F104128E845A7210DB3AA919DB60
                              APIs
                              • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 00A585E2
                              • OpenProcessToken.ADVAPI32(00000000), ref: 00A585E9
                              • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 00A585F8
                              • CloseHandle.KERNEL32(00000004), ref: 00A58603
                              • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00A58632
                              • DestroyEnvironmentBlock.USERENV(00000000), ref: 00A58646
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                              • String ID:
                              • API String ID: 1413079979-0
                              • Opcode ID: 37f413bf5e257567cdcd7b970e432301dec7bb779a23eb5b55ff4bee88ea57d8
                              • Instruction ID: f3bc62d3590abacd8c0c026356b95822b30ad9cb8a5beb74632a634bdc8d24d9
                              • Opcode Fuzzy Hash: 37f413bf5e257567cdcd7b970e432301dec7bb779a23eb5b55ff4bee88ea57d8
                              • Instruction Fuzzy Hash: 9011597250124AAFDF01CFA4ED49BEE7BA9FF08305F144064FE04A2160D7768E65EB60
                              APIs
                              • GetDC.USER32(00000000), ref: 00A5B7B5
                              • GetDeviceCaps.GDI32(00000000,00000058), ref: 00A5B7C6
                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00A5B7CD
                              • ReleaseDC.USER32(00000000,00000000), ref: 00A5B7D5
                              • MulDiv.KERNEL32(000009EC,?,00000000), ref: 00A5B7EC
                              • MulDiv.KERNEL32(000009EC,?,?), ref: 00A5B7FE
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: CapsDevice$Release
                              • String ID:
                              • API String ID: 1035833867-0
                              • Opcode ID: 332141c2926e9a0e6ad2f938f73417639dd391999e7c2b6c8963cc96bde8a2cf
                              • Instruction ID: 00fba6698e066a3a1590d5479cb57a7a521766e23317afe91af533ab8b71fc60
                              • Opcode Fuzzy Hash: 332141c2926e9a0e6ad2f938f73417639dd391999e7c2b6c8963cc96bde8a2cf
                              • Instruction Fuzzy Hash: 23018475E00209BFEF109BE69D49A5EBFB8EB48312F004175FE04A7291D6309C11CFA0
                              APIs
                              • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00A20193
                              • MapVirtualKeyW.USER32(00000010,00000000), ref: 00A2019B
                              • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00A201A6
                              • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00A201B1
                              • MapVirtualKeyW.USER32(00000011,00000000), ref: 00A201B9
                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 00A201C1
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: Virtual
                              • String ID:
                              • API String ID: 4278518827-0
                              • Opcode ID: ff883d040a5fa2806003882158101a4625f64463f21d5ae519240e43555a2066
                              • Instruction ID: ddbfd63445d74f59e6cf7224e01a5f1b7faa2f6708cd823b8d1136530b66c8f9
                              • Opcode Fuzzy Hash: ff883d040a5fa2806003882158101a4625f64463f21d5ae519240e43555a2066
                              • Instruction Fuzzy Hash: D7016CB090175A7DE3008F5A8C85B52FFA8FF19354F00411BA15C87941C7F5A864CBE5
                              APIs
                              • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 00A653F9
                              • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 00A6540F
                              • GetWindowThreadProcessId.USER32(?,?), ref: 00A6541E
                              • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00A6542D
                              • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00A65437
                              • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00A6543E
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                              • String ID:
                              • API String ID: 839392675-0
                              • Opcode ID: 3c920697bb9e8c6aa521461ddf6ce2f21e4e78e72d8f20bcd3c97988409ab208
                              • Instruction ID: 4a2474a2bdea3987286a6d299e0105840de1ecb0a6909dd14cca0415857aca6b
                              • Opcode Fuzzy Hash: 3c920697bb9e8c6aa521461ddf6ce2f21e4e78e72d8f20bcd3c97988409ab208
                              • Instruction Fuzzy Hash: C2F06231240159BFD3209BE29C0DEAB7A7CEFC6B11F000279FA04D1050E6A41A0287B5
                              APIs
                              • InterlockedExchange.KERNEL32(?,?), ref: 00A67243
                              • EnterCriticalSection.KERNEL32(?,?,00A10EE4,?,?), ref: 00A67254
                              • TerminateThread.KERNEL32(00000000,000001F6,?,00A10EE4,?,?), ref: 00A67261
                              • WaitForSingleObject.KERNEL32(00000000,000003E8,?,00A10EE4,?,?), ref: 00A6726E
                                • Part of subcall function 00A66C35: CloseHandle.KERNEL32(00000000,?,00A6727B,?,00A10EE4,?,?), ref: 00A66C3F
                              • InterlockedExchange.KERNEL32(?,000001F6), ref: 00A67281
                              • LeaveCriticalSection.KERNEL32(?,?,00A10EE4,?,?), ref: 00A67288
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                              • String ID:
                              • API String ID: 3495660284-0
                              • Opcode ID: d2fa659e501fbc51c04d302f24a9795d95cc7a1cae2cc9ede51bd6b44d6701c9
                              • Instruction ID: da30938aeaa9a39feeb8d676012d1853a70094fe3826ca80ef0e7815c211a7f0
                              • Opcode Fuzzy Hash: d2fa659e501fbc51c04d302f24a9795d95cc7a1cae2cc9ede51bd6b44d6701c9
                              • Instruction Fuzzy Hash: 75F08276540613EFD7115BA4ED4C9DF7739FF45702B100631F603A10A0EB7A5812CB50
                              APIs
                              • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00A5899D
                              • UnloadUserProfile.USERENV(?,?), ref: 00A589A9
                              • CloseHandle.KERNEL32(?), ref: 00A589B2
                              • CloseHandle.KERNEL32(?), ref: 00A589BA
                              • GetProcessHeap.KERNEL32(00000000,?), ref: 00A589C3
                              • HeapFree.KERNEL32(00000000), ref: 00A589CA
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                              • String ID:
                              • API String ID: 146765662-0
                              • Opcode ID: cfd790ac15d675f40321c961b382cc60cef92a08bc2e1e0f33bc78045b030102
                              • Instruction ID: e25650ebfe12a7133cfcbe9080a8cfa6bb7dfd46aab6f2115f1796290891127a
                              • Opcode Fuzzy Hash: cfd790ac15d675f40321c961b382cc60cef92a08bc2e1e0f33bc78045b030102
                              • Instruction Fuzzy Hash: A3E05276104506FFDA019FE5EC0C95ABB69FB89762B508631F329C5474CB329462DB50
                              APIs
                              • VariantInit.OLEAUT32(?), ref: 00A78613
                              • CharUpperBuffW.USER32(?,?), ref: 00A78722
                              • VariantClear.OLEAUT32(?), ref: 00A7889A
                                • Part of subcall function 00A67562: VariantInit.OLEAUT32(00000000), ref: 00A675A2
                                • Part of subcall function 00A67562: VariantCopy.OLEAUT32(00000000,?), ref: 00A675AB
                                • Part of subcall function 00A67562: VariantClear.OLEAUT32(00000000), ref: 00A675B7
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: Variant$ClearInit$BuffCharCopyUpper
                              • String ID: AUTOIT.ERROR$Incorrect Parameter format
                              • API String ID: 4237274167-1221869570
                              • Opcode ID: b5ecf824e54d656d29d7b689a6c1d79dba8d10b59222a591c22e98f8edb2b99e
                              • Instruction ID: 66b6d2ca20eb979c7a6b31eb132caf119f43d723d02c30881d0faf90344211f2
                              • Opcode Fuzzy Hash: b5ecf824e54d656d29d7b689a6c1d79dba8d10b59222a591c22e98f8edb2b99e
                              • Instruction Fuzzy Hash: 89915B716043059FC710DF24C98495BB7E4EF89754F14C96EF88A8B3A2DB34E905CB52
                              APIs
                                • Part of subcall function 00A1FC86: _wcscpy.LIBCMT ref: 00A1FCA9
                              • _memset.LIBCMT ref: 00A62B87
                              • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00A62BB6
                              • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00A62C69
                              • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 00A62C97
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: ItemMenu$Info$Default_memset_wcscpy
                              • String ID: 0
                              • API String ID: 4152858687-4108050209
                              • Opcode ID: ca43b84ab8ca6cc7edd5cf07eb2e05f64c4fe0b6924123cce06fac67b73caed0
                              • Instruction ID: 33413c54ea7535929a95353a085e42b5fa9693b0ea4b5a08365599ce6c4fa89d
                              • Opcode Fuzzy Hash: ca43b84ab8ca6cc7edd5cf07eb2e05f64c4fe0b6924123cce06fac67b73caed0
                              • Instruction Fuzzy Hash: 6351CA71608B019ED7249F28D845B6FBBF8EF99350F040A2DF895D6291DB70DC449B92
                              APIs
                              • GetWindowRect.USER32(00CADCC8,?), ref: 00A89863
                              • ScreenToClient.USER32(00000002,00000002), ref: 00A89896
                              • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,00000002,?,?), ref: 00A89903
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: Window$ClientMoveRectScreen
                              • String ID: @U=u
                              • API String ID: 3880355969-2594219639
                              • Opcode ID: 982a764b66ba1b73d99dd53440d8499313143db9ddb87319b89426425443d701
                              • Instruction ID: 56a7cbefd1f6bdca3a2def19ab5c8bc7786f4d693b4094534c540bdf8833058e
                              • Opcode Fuzzy Hash: 982a764b66ba1b73d99dd53440d8499313143db9ddb87319b89426425443d701
                              • Instruction Fuzzy Hash: 06512D34A00209AFDB10DF68D984ABE7BB5FF55360F148269F8659B2A0D731AD81CB90
                              APIs
                              • SendMessageW.USER32(?,0000110A,00000004,00000000), ref: 00A59AD2
                              • __itow.LIBCMT ref: 00A59B03
                                • Part of subcall function 00A59D53: SendMessageW.USER32(?,0000113E,00000000,00000000), ref: 00A59DBE
                              • SendMessageW.USER32(?,0000110A,00000001,?), ref: 00A59B6C
                              • __itow.LIBCMT ref: 00A59BC3
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: MessageSend$__itow
                              • String ID: @U=u
                              • API String ID: 3379773720-2594219639
                              • Opcode ID: 90b15be44cece3ca813e62317fa444f38b1e762654e2fa6a0333063701beed36
                              • Instruction ID: 320d1a7efc69b50587d6845587ca2fce81b5f90b6cd1d8f26fac6064a0bd15ff
                              • Opcode Fuzzy Hash: 90b15be44cece3ca813e62317fa444f38b1e762654e2fa6a0333063701beed36
                              • Instruction Fuzzy Hash: BF417E74A0020CABEF11EF54E945BEE7BB9EF44755F000069FD05AB291DB70AE49CBA1
                              APIs
                                • Part of subcall function 00A614BC: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00A59296,?,?,00000034,00000800,?,00000034), ref: 00A614E6
                              • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 00A5983F
                                • Part of subcall function 00A61487: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00A592C5,?,?,00000800,?,00001073,00000000,?,?), ref: 00A614B1
                                • Part of subcall function 00A613DE: GetWindowThreadProcessId.USER32(?,?), ref: 00A61409
                                • Part of subcall function 00A613DE: OpenProcess.KERNEL32(00000438,00000000,?,?,?,00A5925A,00000034,?,?,00001004,00000000,00000000), ref: 00A61419
                                • Part of subcall function 00A613DE: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,00A5925A,00000034,?,?,00001004,00000000,00000000), ref: 00A6142F
                              • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00A598AC
                              • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00A598F9
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                              • String ID: @$@U=u
                              • API String ID: 4150878124-826235744
                              • Opcode ID: 5a4073796d15ea2d3537dd72825ee8b58bfb9553dba85e5c4e709bb965bf5f72
                              • Instruction ID: ec9f580eaaa1056781cbe4cd5638d983ac120078bdd9d8da4d20850d9c0f3ef5
                              • Opcode Fuzzy Hash: 5a4073796d15ea2d3537dd72825ee8b58bfb9553dba85e5c4e709bb965bf5f72
                              • Instruction Fuzzy Hash: 70416F7690021CBFCB10DFA4CD85ADEBBB8EB09300F144199FA55B7191DA706E89CBA0
                              APIs
                              • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00A5D5D4
                              • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 00A5D60A
                              • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 00A5D61B
                              • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 00A5D69D
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: ErrorMode$AddressCreateInstanceProc
                              • String ID: DllGetClassObject
                              • API String ID: 753597075-1075368562
                              • Opcode ID: a873cce329c35397bd95b595a32a955106010b5e03131ed24c9c23a169e736d5
                              • Instruction ID: d76fe9b4e1e14d6c582c157d7a892379bc7e7a95ee86446302511c24d42d4d87
                              • Opcode Fuzzy Hash: a873cce329c35397bd95b595a32a955106010b5e03131ed24c9c23a169e736d5
                              • Instruction Fuzzy Hash: DF41AEB1600204EFDF24DF64C884A9A7BB9FF48312F1581A9ED09DF205D7B0D949CBA0
                              APIs
                              • _memset.LIBCMT ref: 00A627C0
                              • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 00A627DC
                              • DeleteMenu.USER32(?,00000007,00000000), ref: 00A62822
                              • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00AC5890,00000000), ref: 00A6286B
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: Menu$Delete$InfoItem_memset
                              • String ID: 0
                              • API String ID: 1173514356-4108050209
                              • Opcode ID: dfefd0c71843d81093896ba5e6c83b280faec5b022a9cd71e97a02eaa3bd470f
                              • Instruction ID: 5b59352a8c95504200c0ce959e1a549f8ab5e3b161ae2bc390e53d7cf1cfa707
                              • Opcode Fuzzy Hash: dfefd0c71843d81093896ba5e6c83b280faec5b022a9cd71e97a02eaa3bd470f
                              • Instruction Fuzzy Hash: 4941AD706047019FD724DF28CC84B6ABBF8EF85314F144A2DF9A59B2D1DB30A805CB62
                              APIs
                              • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00A888DE
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: InvalidateRect
                              • String ID: @U=u
                              • API String ID: 634782764-2594219639
                              • Opcode ID: 895f44d6b14f601c828522e6c9b0127b9a2f3e37d17cd018e911e89fde680b03
                              • Instruction ID: d646be904869fa911a40203f91f9ada77003650fd7100f7883d11bbe2e2b461b
                              • Opcode Fuzzy Hash: 895f44d6b14f601c828522e6c9b0127b9a2f3e37d17cd018e911e89fde680b03
                              • Instruction Fuzzy Hash: 1931B434A00109AFEF20BB68CC45FB977B5EB09350FE44111F955E71A1CF78E9909752
                              APIs
                              • CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 00A7D7C5
                                • Part of subcall function 00A0784B: _memmove.LIBCMT ref: 00A07899
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: BuffCharLower_memmove
                              • String ID: cdecl$none$stdcall$winapi
                              • API String ID: 3425801089-567219261
                              • Opcode ID: 3b49035e8a93e85abb583cab234ad35d352190feb5b71fca1e522f823a43521c
                              • Instruction ID: 472a28dddea0fd066d02f009029f8eb807963045ef505e78282b81335b1c3a30
                              • Opcode Fuzzy Hash: 3b49035e8a93e85abb583cab234ad35d352190feb5b71fca1e522f823a43521c
                              • Instruction Fuzzy Hash: 94316E71904619AFCF00EF68DD919EEB3B5FF04320B10C629E869976D2DB71A905CB80
                              APIs
                              • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00A7184C
                              • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00A71872
                              • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00A718A2
                              • InternetCloseHandle.WININET(00000000), ref: 00A718E9
                                • Part of subcall function 00A72483: GetLastError.KERNEL32(?,?,00A71817,00000000,00000000,00000001), ref: 00A72498
                                • Part of subcall function 00A72483: SetEvent.KERNEL32(?,?,00A71817,00000000,00000000,00000001), ref: 00A724AD
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                              • String ID:
                              • API String ID: 3113390036-3916222277
                              • Opcode ID: bdb33f3a92634abc43a4870771c5b8b63f7c775abe3b608401c52931ba35c020
                              • Instruction ID: 7ee097ea223410fdc212ee77be9606ab75df0678d09071f1a6080afce0c06c85
                              • Opcode Fuzzy Hash: bdb33f3a92634abc43a4870771c5b8b63f7c775abe3b608401c52931ba35c020
                              • Instruction Fuzzy Hash: 522180B1600208BFEB119F68DC85FBB77EDEB48744F10C12AF54996140DA249D0557A1
                              APIs
                                • Part of subcall function 00A01D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00A01D73
                                • Part of subcall function 00A01D35: GetStockObject.GDI32(00000011), ref: 00A01D87
                                • Part of subcall function 00A01D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00A01D91
                              • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00A86461
                              • LoadLibraryW.KERNEL32(?), ref: 00A86468
                              • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 00A8647D
                              • DestroyWindow.USER32(?), ref: 00A86485
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: MessageSend$Window$CreateDestroyLibraryLoadObjectStock
                              • String ID: SysAnimate32
                              • API String ID: 4146253029-1011021900
                              • Opcode ID: ab0c1e7611f09af2f53b4ad21d4445dfac664e53acff73e069f18b41618a3f71
                              • Instruction ID: d48e58b7057d0c9f76870302e62a38e8b9a7ea3c276490d5404bda7e1e0f6006
                              • Opcode Fuzzy Hash: ab0c1e7611f09af2f53b4ad21d4445dfac664e53acff73e069f18b41618a3f71
                              • Instruction Fuzzy Hash: 94219D71210205BFFF10AFA4DD80EBF37ADEB58324F208629FA20961A0D731DC919760
                              APIs
                              • GetStdHandle.KERNEL32(0000000C), ref: 00A66DBC
                              • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00A66DEF
                              • GetStdHandle.KERNEL32(0000000C), ref: 00A66E01
                              • CreateFileW.KERNEL32(nul,40000000,00000002,0000000C,00000003,00000080,00000000), ref: 00A66E3B
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: CreateHandle$FilePipe
                              • String ID: nul
                              • API String ID: 4209266947-2873401336
                              • Opcode ID: 2b7b97ccf11e34724124e7ab4d1ddf0eef9c926f72d152d9e7b362c20dab0927
                              • Instruction ID: 3c44b09c5c93f8555ff6877828b68196073eeb4e15d826d5aecdd5ef4af6f650
                              • Opcode Fuzzy Hash: 2b7b97ccf11e34724124e7ab4d1ddf0eef9c926f72d152d9e7b362c20dab0927
                              • Instruction Fuzzy Hash: 1C21AF7460060AEFDB209F69DC05A9A7BF8FF44720F204A29FDA0D72D0EB719951CB50
                              APIs
                              • GetStdHandle.KERNEL32(000000F6), ref: 00A66E89
                              • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00A66EBB
                              • GetStdHandle.KERNEL32(000000F6), ref: 00A66ECC
                              • CreateFileW.KERNEL32(nul,80000000,00000001,0000000C,00000003,00000080,00000000), ref: 00A66F06
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: CreateHandle$FilePipe
                              • String ID: nul
                              • API String ID: 4209266947-2873401336
                              • Opcode ID: be6a96d74dde937501e33ea9266acf81ae14c6decb7b0db15609fcb6b9760c48
                              • Instruction ID: e99026c52debc4d32ed42d6e411acd2abc5abbdf4eb6ad17d9998aaefee6fff3
                              • Opcode Fuzzy Hash: be6a96d74dde937501e33ea9266acf81ae14c6decb7b0db15609fcb6b9760c48
                              • Instruction Fuzzy Hash: 29217F79600706AFDB209F69DC44AAA77B8EF55720F200B19FDA1D72D0EB71A851CB50
                              APIs
                              • SetErrorMode.KERNEL32(00000001), ref: 00A6AC54
                              • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 00A6ACA8
                              • __swprintf.LIBCMT ref: 00A6ACC1
                              • SetErrorMode.KERNEL32(00000000,00000001,00000000,00A8F910), ref: 00A6ACFF
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: ErrorMode$InformationVolume__swprintf
                              • String ID: %lu
                              • API String ID: 3164766367-685833217
                              • Opcode ID: 2550262d2af7b0da9d79c8fb72e7bcae903b0bb7514a958512e2ea7b91d7a14c
                              • Instruction ID: e66fa66a4d2f1b3ba0fcef1550fb1ffbd52949771a909b3e945f1b6f5f49428e
                              • Opcode Fuzzy Hash: 2550262d2af7b0da9d79c8fb72e7bcae903b0bb7514a958512e2ea7b91d7a14c
                              • Instruction Fuzzy Hash: B8217431A00109AFCB10DFA4DA45DEF77B8FF49714B004469F905AB252DA31EA51CB61
                              APIs
                              • CharUpperBuffW.USER32(?,?), ref: 00A61B19
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: BuffCharUpper
                              • String ID: APPEND$EXISTS$KEYS$REMOVE
                              • API String ID: 3964851224-769500911
                              • Opcode ID: 57f57bfb29e85a0ed5c0fe75149332cb47614f5fad539cd7a37ee630dd217324
                              • Instruction ID: 1a8f5308c7dae8cfd5d1ed1e5fff50dd0f41c82adcfcb52a05b2fc7905195537
                              • Opcode Fuzzy Hash: 57f57bfb29e85a0ed5c0fe75149332cb47614f5fad539cd7a37ee630dd217324
                              • Instruction Fuzzy Hash: EB1184309001198FCF00EFA8E9918FEB7B8FF25744B944575D815A7292EB325D06CF50
                              APIs
                              • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 00A7EC07
                              • GetProcessIoCounters.KERNEL32(00000000,?), ref: 00A7EC37
                              • GetProcessMemoryInfo.PSAPI(00000000,?,00000028), ref: 00A7ED6A
                              • CloseHandle.KERNEL32(?), ref: 00A7EDEB
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: Process$CloseCountersHandleInfoMemoryOpen
                              • String ID:
                              • API String ID: 2364364464-0
                              • Opcode ID: df78dc2f44ad30de991d120fefbf171f1fbcda7ea9afa23df2cf26242411b199
                              • Instruction ID: 858edef33fd2d3f1f33437a06e542828a66e537c6beabbb8ed7e52028281cec6
                              • Opcode Fuzzy Hash: df78dc2f44ad30de991d120fefbf171f1fbcda7ea9afa23df2cf26242411b199
                              • Instruction Fuzzy Hash: 6B816CB16007009FD720EF28D986B2AB7E5AF88710F04C95DF999DB3D2DAB0AC458B51
                              APIs
                                • Part of subcall function 00A07DE1: _memmove.LIBCMT ref: 00A07E22
                                • Part of subcall function 00A80E1A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00A7FDAD,?,?), ref: 00A80E31
                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00A800FD
                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00A8013C
                              • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 00A80183
                              • RegCloseKey.ADVAPI32(?,?), ref: 00A801AF
                              • RegCloseKey.ADVAPI32(00000000), ref: 00A801BC
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: Close$BuffCharConnectEnumOpenRegistryUpper_memmove
                              • String ID:
                              • API String ID: 3440857362-0
                              • Opcode ID: 4bfe10e527a30e9823097027d02acb5f0189014d1c6e3a4ef4acf5a8cb1ebc65
                              • Instruction ID: 1015bec0531ecdd2fe624b31db098969ffcf5e76635fc4d34044d63639a826f0
                              • Opcode Fuzzy Hash: 4bfe10e527a30e9823097027d02acb5f0189014d1c6e3a4ef4acf5a8cb1ebc65
                              • Instruction Fuzzy Hash: 72515A71608208AFD704EF68D985E6BB7F9FF84314F40892DF595872A2DB31E909CB52
                              APIs
                                • Part of subcall function 00A09837: __itow.LIBCMT ref: 00A09862
                                • Part of subcall function 00A09837: __swprintf.LIBCMT ref: 00A098AC
                              • LoadLibraryW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 00A7D927
                              • GetProcAddress.KERNEL32(00000000,?), ref: 00A7D9AA
                              • GetProcAddress.KERNEL32(00000000,00000000), ref: 00A7D9C6
                              • GetProcAddress.KERNEL32(00000000,?), ref: 00A7DA07
                              • FreeLibrary.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,?,?), ref: 00A7DA21
                                • Part of subcall function 00A05A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00A67896,?,?,00000000), ref: 00A05A2C
                                • Part of subcall function 00A05A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00A67896,?,?,00000000,?,?), ref: 00A05A50
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad__itow__swprintf
                              • String ID:
                              • API String ID: 327935632-0
                              • Opcode ID: eee8f8670c7cddbef71ec0ee9ec3db55e45421b47b38b4c41c6de44563804eb3
                              • Instruction ID: 1720fae1c7be011e09733e8a5a5fa81efd2dc45a624e91d2d481bb50193d6885
                              • Opcode Fuzzy Hash: eee8f8670c7cddbef71ec0ee9ec3db55e45421b47b38b4c41c6de44563804eb3
                              • Instruction Fuzzy Hash: 5D511775A00209DFCB00EFA8D9849AEBBF9FF09320B14C165E959AB352D731AD45CF91
                              APIs
                              • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 00A6E61F
                              • GetPrivateProfileSectionW.KERNEL32(?,00000001,00000003,?), ref: 00A6E648
                              • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 00A6E687
                                • Part of subcall function 00A09837: __itow.LIBCMT ref: 00A09862
                                • Part of subcall function 00A09837: __swprintf.LIBCMT ref: 00A098AC
                              • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 00A6E6AC
                              • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00A6E6B4
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: PrivateProfile$SectionWrite$String$__itow__swprintf
                              • String ID:
                              • API String ID: 1389676194-0
                              • Opcode ID: d2db6b4e6a74fa7fc58fad47ee7377221f7f149757c302ceb94ce6c295531609
                              • Instruction ID: 70c528616a9a554fe4f918c5ec46ebaca918b9ce2c4bdd4c4df45227f66c6436
                              • Opcode Fuzzy Hash: d2db6b4e6a74fa7fc58fad47ee7377221f7f149757c302ceb94ce6c295531609
                              • Instruction Fuzzy Hash: 3C510D79A00109DFCB01EF64D981AAEBBF5EF09314F1480A5E849AB3A2DB31ED15DF51
                              APIs
                              • GetCursorPos.USER32(?), ref: 00A02357
                              • ScreenToClient.USER32(00AC57B0,?), ref: 00A02374
                              • GetAsyncKeyState.USER32(00000001), ref: 00A02399
                              • GetAsyncKeyState.USER32(00000002), ref: 00A023A7
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: AsyncState$ClientCursorScreen
                              • String ID:
                              • API String ID: 4210589936-0
                              • Opcode ID: e424c7ff8bc0ecb904cfd6e2cdc2954ecc9c3f2ff5198cb20e42ec5786c43dbf
                              • Instruction ID: 60b50e06ad6dfecb7249a83498c05b3fbc0093c1388b8356f7cb105630063d38
                              • Opcode Fuzzy Hash: e424c7ff8bc0ecb904cfd6e2cdc2954ecc9c3f2ff5198cb20e42ec5786c43dbf
                              • Instruction Fuzzy Hash: 68417D35604219FFDF199FA8DC48AE9FB75BB05364F20431AF829A62E0C7349950DBA1
                              APIs
                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00A563E7
                              • TranslateAcceleratorW.USER32(?,?,?), ref: 00A56433
                              • TranslateMessage.USER32(?), ref: 00A5645C
                              • DispatchMessageW.USER32(?), ref: 00A56466
                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00A56475
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: Message$PeekTranslate$AcceleratorDispatch
                              • String ID:
                              • API String ID: 2108273632-0
                              • Opcode ID: 557dd202b64159b7d99647e438e68325d461260b3b0b27c474b805fd95cd66e5
                              • Instruction ID: 6216f8f5ca5fc4d6a46dab1b1a18e86c6a24e051103aac2c2378d9107c06eeff
                              • Opcode Fuzzy Hash: 557dd202b64159b7d99647e438e68325d461260b3b0b27c474b805fd95cd66e5
                              • Instruction Fuzzy Hash: B7319E71A00646AEDB64CFB0D944FA67BF8BB01312F940565F821C71A1E735A8CEDB60
                              APIs
                              • GetWindowRect.USER32(?,?), ref: 00A58A30
                              • PostMessageW.USER32(?,00000201,00000001), ref: 00A58ADA
                              • Sleep.KERNEL32(00000000,?,00000201,00000001,?,?,?), ref: 00A58AE2
                              • PostMessageW.USER32(?,00000202,00000000), ref: 00A58AF0
                              • Sleep.KERNEL32(00000000,?,00000202,00000000,?,?,00000201,00000001,?,?,?), ref: 00A58AF8
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: MessagePostSleep$RectWindow
                              • String ID:
                              • API String ID: 3382505437-0
                              • Opcode ID: 8906c7f7316a5bd5c5568c462319872d104a2c2ada44a252e6da2b8498cfd72c
                              • Instruction ID: b092c51ba6f88e67592105145941718d27c18effb5bf6282e2496719452d627c
                              • Opcode Fuzzy Hash: 8906c7f7316a5bd5c5568c462319872d104a2c2ada44a252e6da2b8498cfd72c
                              • Instruction Fuzzy Hash: BE31DF71500219EFDF14CFA8D94CA9E3BB5FB04316F11822AFA24E71D1C7B49918CB90
                              APIs
                                • Part of subcall function 00A02612: GetWindowLongW.USER32(?,000000EB), ref: 00A02623
                              • GetWindowLongW.USER32(?,000000F0), ref: 00A8B192
                              • SetWindowLongW.USER32(00000000,000000F0,00000001), ref: 00A8B1B7
                              • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 00A8B1CF
                              • GetSystemMetrics.USER32(00000004), ref: 00A8B1F8
                              • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000047,?,?,?,?,?,?,?,00A70E90,00000000), ref: 00A8B216
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: Window$Long$MetricsSystem
                              • String ID:
                              • API String ID: 2294984445-0
                              • Opcode ID: cb869f80e38136db84ce1221fe74e809db15aa3ef728d18c44230788de872d88
                              • Instruction ID: cc56a80d737682433b57be222adad50beeb3be99fb1e104d7c5cfd5ce24a487b
                              • Opcode Fuzzy Hash: cb869f80e38136db84ce1221fe74e809db15aa3ef728d18c44230788de872d88
                              • Instruction Fuzzy Hash: BC218371920656AFCB14AF78DC18A6A7BA4FB05361F154738FD32D71E0E7309851DBA0
                              APIs
                              • IsWindow.USER32(00000000), ref: 00A75A6E
                              • GetForegroundWindow.USER32 ref: 00A75A85
                              • GetDC.USER32(00000000), ref: 00A75AC1
                              • GetPixel.GDI32(00000000,?,00000003), ref: 00A75ACD
                              • ReleaseDC.USER32(00000000,00000003), ref: 00A75B08
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: Window$ForegroundPixelRelease
                              • String ID:
                              • API String ID: 4156661090-0
                              • Opcode ID: 0ead22fae53ad85c466913410fcda188ae9bc937a720c777c0c76f3f40772df4
                              • Instruction ID: 1ac47df95dd8a960173ab900129d1c3e773bc68425901e7c608110fd59e18a38
                              • Opcode Fuzzy Hash: 0ead22fae53ad85c466913410fcda188ae9bc937a720c777c0c76f3f40772df4
                              • Instruction Fuzzy Hash: 77219375A00204AFDB14EFA5DD88A9ABBF9EF48350F14C579F849D7362DA70AD01CB90
                              APIs
                              • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00A0134D
                              • SelectObject.GDI32(?,00000000), ref: 00A0135C
                              • BeginPath.GDI32(?), ref: 00A01373
                              • SelectObject.GDI32(?,00000000), ref: 00A0139C
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: ObjectSelect$BeginCreatePath
                              • String ID:
                              • API String ID: 3225163088-0
                              • Opcode ID: 58ed2caf9d83165755630681770568815d12bfffe52048f8345be722595e9286
                              • Instruction ID: 6a2ecee456436ea098ff798edde2dbe0f5cecd7bda3da65e49e3e86d8487167c
                              • Opcode Fuzzy Hash: 58ed2caf9d83165755630681770568815d12bfffe52048f8345be722595e9286
                              • Instruction Fuzzy Hash: CA214A30C00709EFDB10DFA5EC09BA97BB8EB00361F554226F8109A1E0D770A892EB92
                              APIs
                              • GetCurrentThreadId.KERNEL32 ref: 00A64ABA
                              • __beginthreadex.LIBCMT ref: 00A64AD8
                              • MessageBoxW.USER32(?,?,?,?), ref: 00A64AED
                              • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 00A64B03
                              • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00A64B0A
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: CloseCurrentHandleMessageObjectSingleThreadWait__beginthreadex
                              • String ID:
                              • API String ID: 3824534824-0
                              • Opcode ID: ef3aee51c76868ba89f6bfe4137b1178afd88721fbe4fd3c2435baefb669a1ae
                              • Instruction ID: df170ee9b523e15b6de1bcb6c92869c1847ac639e096fc1108a5aa699f2ce122
                              • Opcode Fuzzy Hash: ef3aee51c76868ba89f6bfe4137b1178afd88721fbe4fd3c2435baefb669a1ae
                              • Instruction Fuzzy Hash: 8011E176904219BFC701DBF8EC08ADB7BBCEB49320F154269F925D3250D675994587A0
                              APIs
                              • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00A5821E
                              • GetLastError.KERNEL32(?,00A57CE2,?,?,?), ref: 00A58228
                              • GetProcessHeap.KERNEL32(00000008,?,?,00A57CE2,?,?,?), ref: 00A58237
                              • HeapAlloc.KERNEL32(00000000,?,00A57CE2,?,?,?), ref: 00A5823E
                              • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00A58255
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                              • String ID:
                              • API String ID: 842720411-0
                              • Opcode ID: b479acc5c917bd0ceb5d72de34f5659c2ca68e2e8cc54ed277363025659be4ce
                              • Instruction ID: da9494c4749468b7e7f3d631e9f0768ac430a09f186ae282d0cd595964281ebd
                              • Opcode Fuzzy Hash: b479acc5c917bd0ceb5d72de34f5659c2ca68e2e8cc54ed277363025659be4ce
                              • Instruction Fuzzy Hash: B3016971200205BFDB208FA6DC88DAB7FACFF9A755B500539FD19D2220DA318C15CB60
                              APIs
                              • CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00A57044,80070057,?,?,?,00A57455), ref: 00A57127
                              • ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00A57044,80070057,?,?), ref: 00A57142
                              • lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00A57044,80070057,?,?), ref: 00A57150
                              • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00A57044,80070057,?), ref: 00A57160
                              • CLSIDFromString.OLE32(?,?,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00A57044,80070057,?,?), ref: 00A5716C
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: From$Prog$FreeStringTasklstrcmpi
                              • String ID:
                              • API String ID: 3897988419-0
                              • Opcode ID: 0a9d04bd6fd3881ff1ea5fad0b8ae6aed91f159562c347c7f1b2d2350e434df8
                              • Instruction ID: e3ffca702dd4ce8941377672b948d7e6e737d1573275cf02652a997b4ba8b247
                              • Opcode Fuzzy Hash: 0a9d04bd6fd3881ff1ea5fad0b8ae6aed91f159562c347c7f1b2d2350e434df8
                              • Instruction Fuzzy Hash: 15017C72601615AFDB118FA5EC44AAE7BADFB44792F140264FD04E2220DB31DD459BA0
                              APIs
                              • QueryPerformanceCounter.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00A65260
                              • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00A6526E
                              • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?), ref: 00A65276
                              • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00A65280
                              • Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00A652BC
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: PerformanceQuery$CounterSleep$Frequency
                              • String ID:
                              • API String ID: 2833360925-0
                              • Opcode ID: 00e1349f4fc7423cea064b8fed53ffaad1f94e2f57bc6e1bfefa9a02dd3e77cd
                              • Instruction ID: dce39dcb1719cb5c6bec7afb4cbf43a357891639f92c5a558fe52642c9eee99a
                              • Opcode Fuzzy Hash: 00e1349f4fc7423cea064b8fed53ffaad1f94e2f57bc6e1bfefa9a02dd3e77cd
                              • Instruction Fuzzy Hash: D2011771D01A2ADBCF00EFF5EC999EDBB78BB09711F400556EA45F2144CB30555187A1
                              APIs
                              • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00A58121
                              • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00A5812B
                              • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00A5813A
                              • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00A58141
                              • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00A58157
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: HeapInformationToken$AllocErrorLastProcess
                              • String ID:
                              • API String ID: 44706859-0
                              • Opcode ID: 6825ef2b602889a8a413cff3e153a5ca0f6866c7a8950bed2cf6696c50a69436
                              • Instruction ID: 5ebb55a90ed506c2e0d515cec28856c746ea9e8805c7306b4d55db756ce60595
                              • Opcode Fuzzy Hash: 6825ef2b602889a8a413cff3e153a5ca0f6866c7a8950bed2cf6696c50a69436
                              • Instruction Fuzzy Hash: A4F0AF70200305AFEB114FA5EC88E673BACFF49755B100125FA45D6150DA749806DB60
                              APIs
                              • GetDlgItem.USER32(?,000003E9), ref: 00A5C1F7
                              • GetWindowTextW.USER32(00000000,?,00000100), ref: 00A5C20E
                              • MessageBeep.USER32(00000000), ref: 00A5C226
                              • KillTimer.USER32(?,0000040A), ref: 00A5C242
                              • EndDialog.USER32(?,00000001), ref: 00A5C25C
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: BeepDialogItemKillMessageTextTimerWindow
                              • String ID:
                              • API String ID: 3741023627-0
                              • Opcode ID: 50e83ce93fdb6e551406b08965a220655ed1bbc17845406a789e7d29f253b1c0
                              • Instruction ID: de9a592cacd203a6b8a248f97a9955018f6afd9bcc83d03bb18efb0e55e11133
                              • Opcode Fuzzy Hash: 50e83ce93fdb6e551406b08965a220655ed1bbc17845406a789e7d29f253b1c0
                              • Instruction Fuzzy Hash: 9B018B305047059FEB20AB94ED4EFDA7778FF10716F000669F982E14E1EBF469999B50
                              APIs
                              • EndPath.GDI32(?), ref: 00A013BF
                              • StrokeAndFillPath.GDI32(?,?,00A3B888,00000000,?), ref: 00A013DB
                              • SelectObject.GDI32(?,00000000), ref: 00A013EE
                              • DeleteObject.GDI32 ref: 00A01401
                              • StrokePath.GDI32(?), ref: 00A0141C
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: Path$ObjectStroke$DeleteFillSelect
                              • String ID:
                              • API String ID: 2625713937-0
                              • Opcode ID: 1113c180c58fa5aadfd1f4e9b32426a3bcc437f0ccf96436764346b854d1e9bd
                              • Instruction ID: 9669070f01f1de14e1ccc340d186be380cd1393c3e79cb89371e093cafc9ddfa
                              • Opcode Fuzzy Hash: 1113c180c58fa5aadfd1f4e9b32426a3bcc437f0ccf96436764346b854d1e9bd
                              • Instruction Fuzzy Hash: 97F0C434404A09EFDB11DFA6EC4CB983FB5AB11326F198224F429890F1DB3599A6EF51
                              APIs
                              • CoInitialize.OLE32(00000000), ref: 00A6C432
                              • CoCreateInstance.OLE32(00A92D6C,00000000,00000001,00A92BDC,?), ref: 00A6C44A
                                • Part of subcall function 00A07DE1: _memmove.LIBCMT ref: 00A07E22
                              • CoUninitialize.OLE32 ref: 00A6C6B7
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: CreateInitializeInstanceUninitialize_memmove
                              • String ID: .lnk
                              • API String ID: 2683427295-24824748
                              • Opcode ID: 2a412e1c4f638533ffc3f127efb23ad723a0ee26c1b2cf1eb42b3e3633eaa2d5
                              • Instruction ID: d45959cf00f4800df79274e6039a2c7fb9b281cbf6ce32e24f2b3808849ca47b
                              • Opcode Fuzzy Hash: 2a412e1c4f638533ffc3f127efb23ad723a0ee26c1b2cf1eb42b3e3633eaa2d5
                              • Instruction Fuzzy Hash: CFA14BB1104209AFD700EF64D991EAFB7E8FF89354F00491DF59587192EB71EA09CB52
                              APIs
                                • Part of subcall function 00A20DB6: std::exception::exception.LIBCMT ref: 00A20DEC
                                • Part of subcall function 00A20DB6: __CxxThrowException@8.LIBCMT ref: 00A20E01
                                • Part of subcall function 00A07DE1: _memmove.LIBCMT ref: 00A07E22
                                • Part of subcall function 00A07A51: _memmove.LIBCMT ref: 00A07AAB
                              • __swprintf.LIBCMT ref: 00A12ECD
                              Strings
                              • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 00A12D66
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: _memmove$Exception@8Throw__swprintfstd::exception::exception
                              • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                              • API String ID: 1943609520-557222456
                              • Opcode ID: e172c22bd96216aed5cd9952c0fb21f52d552bff386c8c426a831dd89413363e
                              • Instruction ID: 8ca82fddb78725d265a11d0d4d4ec264d0bbdebf3c172bb53abf4cede64af280
                              • Opcode Fuzzy Hash: e172c22bd96216aed5cd9952c0fb21f52d552bff386c8c426a831dd89413363e
                              • Instruction Fuzzy Hash: 20917D715082159FCB14EF28EA85DAFB7B8EF85750F00491DF4859B2E2EA30ED85CB52
                              APIs
                                • Part of subcall function 00A04750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00A04743,?,?,00A037AE,?), ref: 00A04770
                              • CoInitialize.OLE32(00000000), ref: 00A6B9BB
                              • CoCreateInstance.OLE32(00A92D6C,00000000,00000001,00A92BDC,?), ref: 00A6B9D4
                              • CoUninitialize.OLE32 ref: 00A6B9F1
                                • Part of subcall function 00A09837: __itow.LIBCMT ref: 00A09862
                                • Part of subcall function 00A09837: __swprintf.LIBCMT ref: 00A098AC
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: CreateFullInitializeInstanceNamePathUninitialize__itow__swprintf
                              • String ID: .lnk
                              • API String ID: 2126378814-24824748
                              • Opcode ID: 124e37d6c555f6a7e7512a4bf2cce3576d46b37aab9aee0aa0a449d2dec54705
                              • Instruction ID: 058059e975f4c16c55caf750be3c0d16cce9fbaef11e6f53f09a0c8e7bee99bd
                              • Opcode Fuzzy Hash: 124e37d6c555f6a7e7512a4bf2cce3576d46b37aab9aee0aa0a449d2dec54705
                              • Instruction Fuzzy Hash: 1DA114756042059FCB10DF14C984D6ABBF9FF89314F148998F8999B3A2CB31ED86CB91
                              APIs
                              • __startOneArgErrorHandling.LIBCMT ref: 00A250AD
                                • Part of subcall function 00A300F0: __87except.LIBCMT ref: 00A3012B
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: ErrorHandling__87except__start
                              • String ID: pow
                              • API String ID: 2905807303-2276729525
                              • Opcode ID: 830650f68329af35813429cfdc09d1da17aa45cbc344d5dbea3710d6dd61a02a
                              • Instruction ID: 7eec3f1d3c02480992e277a5f99a4600a33e089e7a576c34bcb0c0eb4ef0a06a
                              • Opcode Fuzzy Hash: 830650f68329af35813429cfdc09d1da17aa45cbc344d5dbea3710d6dd61a02a
                              • Instruction Fuzzy Hash: 37517D71E1C5019ADB11B77CDE21BBF2BA0BB40700F208A79F4D5862A9DE348DD4DB86
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: _memset$_memmove
                              • String ID: ERCP
                              • API String ID: 2532777613-1384759551
                              • Opcode ID: 13a702f9e96ab5d9479df803b5297bd58ef22f9f8121b9dbc4dfdc48bf747429
                              • Instruction ID: 49afdf227f34995e5c3a0910b227cfd64615fb338f4f01cdac72758602479f79
                              • Opcode Fuzzy Hash: 13a702f9e96ab5d9479df803b5297bd58ef22f9f8121b9dbc4dfdc48bf747429
                              • Instruction Fuzzy Hash: 6D517071900715DBDB24CF65C981BEBB7F4AF08314F20456EE95ADB251E770AA84CB50
                              APIs
                              • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,00A8F910,00000000,?,?,?,?), ref: 00A879DF
                              • GetWindowLongW.USER32 ref: 00A879FC
                              • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00A87A0C
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: Window$Long
                              • String ID: SysTreeView32
                              • API String ID: 847901565-1698111956
                              • Opcode ID: c6f4f68c247bf695b95a330276b7e3fe253b22c9a44c59202634465b9774e708
                              • Instruction ID: b22d00911ce7abbde76b7dac63aa88bb2d7239275f3a05f2ecbcb930378d3440
                              • Opcode Fuzzy Hash: c6f4f68c247bf695b95a330276b7e3fe253b22c9a44c59202634465b9774e708
                              • Instruction Fuzzy Hash: FA31BE3120460AAFDB15AF78DC45BEB77A9FB09324F204725F875A32E0D731E9919B50
                              APIs
                              • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00A87461
                              • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00A87475
                              • SendMessageW.USER32(?,00001002,00000000,?), ref: 00A87499
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: MessageSend$Window
                              • String ID: SysMonthCal32
                              • API String ID: 2326795674-1439706946
                              • Opcode ID: 82f1b809d20dfa5afe1f58ccdf906c82e42a4140b87e6e303b595a8b5357a019
                              • Instruction ID: d6672705d21c3b128de26b6166c86ed07c8c58c72b609708015996e256820549
                              • Opcode Fuzzy Hash: 82f1b809d20dfa5afe1f58ccdf906c82e42a4140b87e6e303b595a8b5357a019
                              • Instruction Fuzzy Hash: C8218D32500219ABDF15DFA4DC46FEE3B69EB48724F210214FA156B190DA75E8919BA0
                              APIs
                              • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 00A87C4A
                              • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 00A87C58
                              • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 00A87C5F
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: MessageSend$DestroyWindow
                              • String ID: msctls_updown32
                              • API String ID: 4014797782-2298589950
                              • Opcode ID: 726fb353c656093b9164b49246bf627d2affb8b90f58f8da16f441df73d4ff1e
                              • Instruction ID: cb3f204bb8face7a5f70120b1a59071679442ca9ea40ee33cafa549fb74e5739
                              • Opcode Fuzzy Hash: 726fb353c656093b9164b49246bf627d2affb8b90f58f8da16f441df73d4ff1e
                              • Instruction Fuzzy Hash: 9D219DB5604209AFDB10EF68DCC5DAB37EDEF5A354B240459FA019B3A1CB31EC518BA0
                              APIs
                              • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00A86D3B
                              • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00A86D4B
                              • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00A86D70
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: MessageSend$MoveWindow
                              • String ID: Listbox
                              • API String ID: 3315199576-2633736733
                              • Opcode ID: 9e8c74b5c4a9e14323fc0bf50d66944385267bb8b0c8ea4272ceaec4443d8e83
                              • Instruction ID: f6cd837439c79906118f7d5228245b6169bdf4667efecea0552fe7ada85d3f37
                              • Opcode Fuzzy Hash: 9e8c74b5c4a9e14323fc0bf50d66944385267bb8b0c8ea4272ceaec4443d8e83
                              • Instruction Fuzzy Hash: 8821C672610118BFEF129F54DC45FFB3BBAEF89750F118128F9459B1A0C671AC5287A0
                              APIs
                              • SendMessageW.USER32(?,000000B0,?,?), ref: 00A58C6D
                              • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00A58C84
                              • SendMessageW.USER32(?,0000000D,?,00000000), ref: 00A58CBC
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: MessageSend
                              • String ID: @U=u
                              • API String ID: 3850602802-2594219639
                              • Opcode ID: 3aa1b9b7ab3e026020102893ef9e6e26c168fea77ce2b24e04f6b4b493f30cf8
                              • Instruction ID: d31b9c4717e52625ae4e2cebaf2785287feec7723918c6e0081472699a2ef19e
                              • Opcode Fuzzy Hash: 3aa1b9b7ab3e026020102893ef9e6e26c168fea77ce2b24e04f6b4b493f30cf8
                              • Instruction Fuzzy Hash: E121A132601119BFDB10DBA8DC41DAFB7BDFF44350F11046AE905E3260DA75AD44CBA4
                              APIs
                              • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00A87772
                              • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00A87787
                              • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00A87794
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: MessageSend
                              • String ID: msctls_trackbar32
                              • API String ID: 3850602802-1010561917
                              • Opcode ID: 1f303e9bd2816e892d1bad21742ee619729c507375378ad7df03f6e4d5bd9333
                              • Instruction ID: 88f687c41208f2e86f8c6e1a06e0b7be8ecc0fd8ce788297682a3cd88a89adae
                              • Opcode Fuzzy Hash: 1f303e9bd2816e892d1bad21742ee619729c507375378ad7df03f6e4d5bd9333
                              • Instruction Fuzzy Hash: 74112732200208BEEF10AF60CC01FDB7768EF88B54F110528F64192090D271E851CB20
                              APIs
                              • GetWindowTextLengthW.USER32(00000000), ref: 00A869A2
                              • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 00A869B1
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: LengthMessageSendTextWindow
                              • String ID: @U=u$edit
                              • API String ID: 2978978980-590756393
                              • Opcode ID: 6aa028654736cd51b0b911abab65472fafd6705aa4e87e9e9ae3f7d8dfcfdf00
                              • Instruction ID: 25501da5e512ba78d5c57598cbec758c2ca45cb585fc3e24357bbdf4f0ea1bb2
                              • Opcode Fuzzy Hash: 6aa028654736cd51b0b911abab65472fafd6705aa4e87e9e9ae3f7d8dfcfdf00
                              • Instruction Fuzzy Hash: 17116A71510209AFFB10AF649C45AEB37A9EB053B4F604724F9A5962E0C731DC9197A0
                              APIs
                                • Part of subcall function 00A07DE1: _memmove.LIBCMT ref: 00A07E22
                                • Part of subcall function 00A5AA99: GetClassNameW.USER32(?,?,000000FF), ref: 00A5AABC
                              • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00A58E73
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: ClassMessageNameSend_memmove
                              • String ID: @U=u$ComboBox$ListBox
                              • API String ID: 372448540-2258501812
                              • Opcode ID: ee10b6eea9213e320ca7ac2d37bb9b7ef8b181a7bc24e57aa0cf3d22f28c868b
                              • Instruction ID: 41a61ef735872de2a8bce56b3e6fb462d012e296033c0a6473493068aa2322d9
                              • Opcode Fuzzy Hash: ee10b6eea9213e320ca7ac2d37bb9b7ef8b181a7bc24e57aa0cf3d22f28c868b
                              • Instruction Fuzzy Hash: 15019EB1A01219BBCB14EBE4DD568FE7379BF46360B540A19FC25672E2EE35980CCA50
                              APIs
                                • Part of subcall function 00A07DE1: _memmove.LIBCMT ref: 00A07E22
                                • Part of subcall function 00A5AA99: GetClassNameW.USER32(?,?,000000FF), ref: 00A5AABC
                              • SendMessageW.USER32(?,00000180,00000000,?), ref: 00A58D6B
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: ClassMessageNameSend_memmove
                              • String ID: @U=u$ComboBox$ListBox
                              • API String ID: 372448540-2258501812
                              • Opcode ID: f0018eb6675864ac0bc3fef05d9f4194f0fc78c8e08ada0739bf14d781a45518
                              • Instruction ID: b39a02d2ae2e2c4106ce8a6f759d17b90eb1cf61a0ff8a8b5be8f7acf53dac39
                              • Opcode Fuzzy Hash: f0018eb6675864ac0bc3fef05d9f4194f0fc78c8e08ada0739bf14d781a45518
                              • Instruction Fuzzy Hash: C301BCB2B4110DABCF14EBE0DA52AFE73B8AF15381F500429B906772E2DE345A0C9661
                              APIs
                                • Part of subcall function 00A07DE1: _memmove.LIBCMT ref: 00A07E22
                                • Part of subcall function 00A5AA99: GetClassNameW.USER32(?,?,000000FF), ref: 00A5AABC
                              • SendMessageW.USER32(?,00000182,?,00000000), ref: 00A58DEE
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: ClassMessageNameSend_memmove
                              • String ID: @U=u$ComboBox$ListBox
                              • API String ID: 372448540-2258501812
                              • Opcode ID: fa6d776fa056bb6a533f35f4c91f2494da9f367b983be10bf8f6780d0c87727a
                              • Instruction ID: fa02a0d70b344ae9f928df892446d59302d8aa4d0c5aa5d22707a57d1a27d53a
                              • Opcode Fuzzy Hash: fa6d776fa056bb6a533f35f4c91f2494da9f367b983be10bf8f6780d0c87727a
                              • Instruction Fuzzy Hash: 6901DFB2B41109BBDB10EBE4DA52AFE73ACAB11341F104425BC05732D2DA355E0CD671
                              APIs
                              • GetForegroundWindow.USER32(?,00AC57B0,00A8D809,000000FC,?,00000000,00000000,?,?,?,00A3B969,?,?,?,?,?), ref: 00A8ACD1
                              • GetFocus.USER32 ref: 00A8ACD9
                                • Part of subcall function 00A02612: GetWindowLongW.USER32(?,000000EB), ref: 00A02623
                                • Part of subcall function 00A025DB: GetWindowLongW.USER32(?,000000EB), ref: 00A025EC
                              • SendMessageW.USER32(00CADCC8,000000B0,000001BC,000001C0), ref: 00A8AD4B
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: Window$Long$FocusForegroundMessageSend
                              • String ID: @U=u
                              • API String ID: 3601265619-2594219639
                              • Opcode ID: f4a7da299d69ef7f64cebb29a8ddffe8ef9b4ed82e5d673d02a4aa7557b64471
                              • Instruction ID: cc5a6e0d9c0b1e31783d2944763e9fead001a842573ffedad33a26f979c6b39b
                              • Opcode Fuzzy Hash: f4a7da299d69ef7f64cebb29a8ddffe8ef9b4ed82e5d673d02a4aa7557b64471
                              • Instruction Fuzzy Hash: 6A014031601A009FD724EB38D898B6677E6EB99325B190279F815C72B1DB31AC468B51
                              APIs
                                • Part of subcall function 00A1603A: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00A16051
                              • SendMessageW.USER32(?,0000000C,00000000,?), ref: 00A1607F
                              • GetParent.USER32(?), ref: 00A50D46
                              • InvalidateRect.USER32(00000000,?,00A13A4F,?,00000000,00000001), ref: 00A50D4D
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: MessageSend$InvalidateParentRectTimeout
                              • String ID: @U=u
                              • API String ID: 3648793173-2594219639
                              • Opcode ID: 36a132031ac0b7afb31f7b0e1837770d436efe6487f664fada6d8ced133b3b6d
                              • Instruction ID: 343d6677a88e38b519b205dc69ef6219c883f4841bcfdef4c971560596c0701d
                              • Opcode Fuzzy Hash: 36a132031ac0b7afb31f7b0e1837770d436efe6487f664fada6d8ced133b3b6d
                              • Instruction Fuzzy Hash: 5DF0A031100240FFEF205FA0DC09FD57B6AAB09340F208438F944DA0A0D6B36CD1AB50
                              APIs
                              • LoadLibraryA.KERNEL32(kernel32.dll,?,00A04B83,?), ref: 00A04C44
                              • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00A04C56
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: AddressLibraryLoadProc
                              • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                              • API String ID: 2574300362-1355242751
                              • Opcode ID: 197e5fe0021adaddeebfcd13f1629d43ab2012cfe88d94503207309f6332ffc0
                              • Instruction ID: e0401dccc69bf2374fd96492dd009b673cf1fb376c0679291aeee6ffad9e14b7
                              • Opcode Fuzzy Hash: 197e5fe0021adaddeebfcd13f1629d43ab2012cfe88d94503207309f6332ffc0
                              • Instruction Fuzzy Hash: 05D01770A10713DFEB209F71E90C64A76E8BF09752B118D3E9696D61A4E670D8C0CB60
                              APIs
                              • LoadLibraryA.KERNEL32(kernel32.dll,?,00A04BD0,?,00A04DEF,?,00AC52F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00A04C11
                              • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00A04C23
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: AddressLibraryLoadProc
                              • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                              • API String ID: 2574300362-3689287502
                              • Opcode ID: f778917e07bed1f48dc4a89df4eed007aeefa961feb4951780077b395e5c27c4
                              • Instruction ID: 758b2130a83520a6ef08c498e4adb6f61bfb0facf16438a30fdc03798058ff53
                              • Opcode Fuzzy Hash: f778917e07bed1f48dc4a89df4eed007aeefa961feb4951780077b395e5c27c4
                              • Instruction Fuzzy Hash: DCD01270511713DFD720AFB1D90C64AB6D5FF09752B118D3A9585D6190E6B0D481C750
                              APIs
                              • LoadLibraryA.KERNEL32(advapi32.dll,?,00A81039), ref: 00A80DF5
                              • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00A80E07
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: AddressLibraryLoadProc
                              • String ID: RegDeleteKeyExW$advapi32.dll
                              • API String ID: 2574300362-4033151799
                              • Opcode ID: 40da59849d664b6edee2d04a7ae890cbf4cf937f63311b9c6ef475ca8f3f50f1
                              • Instruction ID: b167636545faf98667191b756b1a973574bfd95d5cf626a760530fe2608befd5
                              • Opcode Fuzzy Hash: 40da59849d664b6edee2d04a7ae890cbf4cf937f63311b9c6ef475ca8f3f50f1
                              • Instruction Fuzzy Hash: C9D0C730540323DFC320AFB0C808AC372E8BF14342F008D3E96C2C2150E6B4D894CB00
                              APIs
                              • LoadLibraryA.KERNEL32(kernel32.dll,00000001,00A78CF4,?,00A8F910), ref: 00A790EE
                              • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 00A79100
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: AddressLibraryLoadProc
                              • String ID: GetModuleHandleExW$kernel32.dll
                              • API String ID: 2574300362-199464113
                              • Opcode ID: 72bcade08ac583412b7949a88d20d211d90ff48b2c2b3d01c681c1569b77857a
                              • Instruction ID: bc7208f6688ddea49442e40fcbe593756d80fc0d3319dda353bb1d81d33ebb0c
                              • Opcode Fuzzy Hash: 72bcade08ac583412b7949a88d20d211d90ff48b2c2b3d01c681c1569b77857a
                              • Instruction Fuzzy Hash: A6D0C730650313DFCB20DF78CC0C20372E8AF00351F02CD3A948AC2190EA70C890CB90
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: LocalTime__swprintf
                              • String ID: %.3d$WIN_XPe
                              • API String ID: 2070861257-2409531811
                              • Opcode ID: dedd3989be68014ac663f9e3cd1014e49fd5e16fde1cbcae7b61c65f0492ff34
                              • Instruction ID: cd68aa0867e3be1fbd2d6f3a613f672f82560898d7eb72819c7ec7cee6ff874e
                              • Opcode Fuzzy Hash: dedd3989be68014ac663f9e3cd1014e49fd5e16fde1cbcae7b61c65f0492ff34
                              • Instruction Fuzzy Hash: BAD0177A844119FBCB509B90A9888FA73BCAB49311F200562B512A2080E22A9BD4EE21
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 757235ea6afed1163ba2442d5a259462144ee4e212bbabbe65e896cce98375a7
                              • Instruction ID: e9574d85ec20079508a4896fc9303d3daa02d0e80fa0d24f5aa7b916135b36db
                              • Opcode Fuzzy Hash: 757235ea6afed1163ba2442d5a259462144ee4e212bbabbe65e896cce98375a7
                              • Instruction Fuzzy Hash: 1FC16C74A04216EFCB14CFA8D884EAEBBB9FF48715B148598EC05EB251D730ED85DB90
                              APIs
                              • CharLowerBuffW.USER32(?,?), ref: 00A7E0BE
                              • CharLowerBuffW.USER32(?,?), ref: 00A7E101
                                • Part of subcall function 00A7D7A5: CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 00A7D7C5
                              • VirtualAlloc.KERNEL32(00000000,00000077,00003000,00000040), ref: 00A7E301
                              • _memmove.LIBCMT ref: 00A7E314
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: BuffCharLower$AllocVirtual_memmove
                              • String ID:
                              • API String ID: 3659485706-0
                              • Opcode ID: 7c613074c0f0da749f663c4c4996fec0e004ca18a72d31d5a690c9ea39775e15
                              • Instruction ID: 49c32cda29aa25a35e63950410687172ef6d814332720b50099b188884f9df65
                              • Opcode Fuzzy Hash: 7c613074c0f0da749f663c4c4996fec0e004ca18a72d31d5a690c9ea39775e15
                              • Instruction Fuzzy Hash: 6BC13971A083119FC714DF28C88196ABBE4FF89714F14C96EF8999B352D731E946CB81
                              APIs
                              • CoInitialize.OLE32(00000000), ref: 00A780C3
                              • CoUninitialize.OLE32 ref: 00A780CE
                                • Part of subcall function 00A5D56C: CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00A5D5D4
                              • VariantInit.OLEAUT32(?), ref: 00A780D9
                              • VariantClear.OLEAUT32(?), ref: 00A783AA
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: Variant$ClearCreateInitInitializeInstanceUninitialize
                              • String ID:
                              • API String ID: 780911581-0
                              • Opcode ID: 0185a156c656b77ce2d7a35dd6ec0e38c6a0ae994ad5a01464c43b52a648ac6d
                              • Instruction ID: 148e8eaff0094ee1fe365450295212b4124e717cf208c5b4df8c876bf147858b
                              • Opcode Fuzzy Hash: 0185a156c656b77ce2d7a35dd6ec0e38c6a0ae994ad5a01464c43b52a648ac6d
                              • Instruction Fuzzy Hash: 9EA168756047059FDB00DF68C985B2AB7E4BF89364F04C459F99A9B3A2CB34ED05CB82
                              APIs
                              • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,00A92C7C,?), ref: 00A576EA
                              • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,00A92C7C,?), ref: 00A57702
                              • CLSIDFromProgID.OLE32(?,?,00000000,00A8FB80,000000FF,?,00000000,00000800,00000000,?,00A92C7C,?), ref: 00A57727
                              • _memcmp.LIBCMT ref: 00A57748
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: FromProg$FreeTask_memcmp
                              • String ID:
                              • API String ID: 314563124-0
                              • Opcode ID: 233b3fa859969fe8a2c9e1714d3a9bf4b0f648756fd0a1fec6adc8a8c2fd2f92
                              • Instruction ID: fe89bb252b126623a2a02c44d8555deeef10de33527995d039c0c2d8f7055b9f
                              • Opcode Fuzzy Hash: 233b3fa859969fe8a2c9e1714d3a9bf4b0f648756fd0a1fec6adc8a8c2fd2f92
                              • Instruction Fuzzy Hash: 5981EC75A00109EFCB04DFA4D984EEEB7B9FF89315F204558E905BB250DB71AE4ACB60
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: Variant$AllocClearCopyInitString
                              • String ID:
                              • API String ID: 2808897238-0
                              • Opcode ID: df68e56d9c94f1940db758b5d252df9ca8b508d7e20d0d72b5b0ecedc75eddf6
                              • Instruction ID: 3abf11e5ccdbc5a5aeca43ee88e6d3f968abc5e6e11bdf4056c716e9533c6b36
                              • Opcode Fuzzy Hash: df68e56d9c94f1940db758b5d252df9ca8b508d7e20d0d72b5b0ecedc75eddf6
                              • Instruction Fuzzy Hash: 3451D3747003029EDF24EF65D891A3AB3F5BF55351FA0C81FEA96EB292DA30D8488700
                              APIs
                              • socket.WSOCK32(00000002,00000002,00000011), ref: 00A769D1
                              • WSAGetLastError.WSOCK32(00000000), ref: 00A769E1
                                • Part of subcall function 00A09837: __itow.LIBCMT ref: 00A09862
                                • Part of subcall function 00A09837: __swprintf.LIBCMT ref: 00A098AC
                              • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 00A76A45
                              • WSAGetLastError.WSOCK32(00000000), ref: 00A76A51
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: ErrorLast$__itow__swprintfsocket
                              • String ID:
                              • API String ID: 2214342067-0
                              • Opcode ID: 6fb648d72485d0c0d068b814c7860845c73804ec65d52da0bc7b6af6698eccdb
                              • Instruction ID: 6bf510029c50fc6744475c47273e2a84114064971070bdf04a400d9dea835f97
                              • Opcode Fuzzy Hash: 6fb648d72485d0c0d068b814c7860845c73804ec65d52da0bc7b6af6698eccdb
                              • Instruction Fuzzy Hash: BF41CE75740604AFEB60AF64DD86F2A77A8AB04B50F04C158FA59AB3C3DA749D018B91
                              APIs
                              • #16.WSOCK32(?,?,00000000,00000000,00000000,00000000,?,?,00000000,00A8F910), ref: 00A764A7
                              • _strlen.LIBCMT ref: 00A764D9
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: _strlen
                              • String ID:
                              • API String ID: 4218353326-0
                              • Opcode ID: 347841042dd7a46ff7507b8ead4682c798d7d5ebb27772abe68661ea721d5c43
                              • Instruction ID: 41af8bf3d8cf935c20dec7537c8938ebb8f319422c14a02a588cd29c9c5a4f6c
                              • Opcode Fuzzy Hash: 347841042dd7a46ff7507b8ead4682c798d7d5ebb27772abe68661ea721d5c43
                              • Instruction Fuzzy Hash: 8D41A431A00508AFCB14EBA8ED95FAEB7B9AF44310F14C165F919972D3EB30AD05DB50
                              APIs
                              • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 00A6B89E
                              • GetLastError.KERNEL32(?,00000000), ref: 00A6B8C4
                              • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 00A6B8E9
                              • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 00A6B915
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: CreateHardLink$DeleteErrorFileLast
                              • String ID:
                              • API String ID: 3321077145-0
                              • Opcode ID: 314fa3ddc33e6d2510efed375ef8e1b2dcbc0d13df37a7f52391ac690690ca7e
                              • Instruction ID: 98c3ae2ec2e4f79e75712af40081312d312aafeae6e48cedee5f4eeb6f0eec19
                              • Opcode Fuzzy Hash: 314fa3ddc33e6d2510efed375ef8e1b2dcbc0d13df37a7f52391ac690690ca7e
                              • Instruction Fuzzy Hash: 7F410639600615DFCB11EF15D584A5ABBF5AF4A310F09C098EC4AAB3A2CB30FD45CB91
                              APIs
                              • ClientToScreen.USER32(?,?), ref: 00A8AB60
                              • GetWindowRect.USER32(?,?), ref: 00A8ABD6
                              • PtInRect.USER32(?,?,00A8C014), ref: 00A8ABE6
                              • MessageBeep.USER32(00000000), ref: 00A8AC57
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: Rect$BeepClientMessageScreenWindow
                              • String ID:
                              • API String ID: 1352109105-0
                              • Opcode ID: 24269df187db69464ff87500fbc197243e8901d29be12f2cdd73536850164042
                              • Instruction ID: 1224d350ba499886ea59d9eea2278c7f27639e22cf2e0c6f8575eccf11a76dcf
                              • Opcode Fuzzy Hash: 24269df187db69464ff87500fbc197243e8901d29be12f2cdd73536850164042
                              • Instruction Fuzzy Hash: B8419170A00519DFEB11EF98C884F597BF5FF59310F1481AAE415DB260D730E842DB92
                              APIs
                              • GetKeyboardState.USER32(?,00000000,?,00000001), ref: 00A60B27
                              • SetKeyboardState.USER32(00000080,?,00000001), ref: 00A60B43
                              • PostMessageW.USER32(00000000,00000102,00000001,00000001), ref: 00A60BA9
                              • SendInput.USER32(00000001,00000000,0000001C,00000000,?,00000001), ref: 00A60BFB
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: KeyboardState$InputMessagePostSend
                              • String ID:
                              • API String ID: 432972143-0
                              • Opcode ID: b724a7a8f0c0f7482e17175a09b4a4dd885497cd6ef8745900734b71593a2eb8
                              • Instruction ID: 523c7641bb10dabbc615805f38a01290cb98bceb25719f39e3f6c046498a3216
                              • Opcode Fuzzy Hash: b724a7a8f0c0f7482e17175a09b4a4dd885497cd6ef8745900734b71593a2eb8
                              • Instruction Fuzzy Hash: D9314470A40208AEFF358B69CC05FFBBBB9EB45319F08826AE491921D1C3B58DC59761
                              APIs
                              • GetKeyboardState.USER32(?,753DC0D0,?,00008000), ref: 00A60C66
                              • SetKeyboardState.USER32(00000080,?,00008000), ref: 00A60C82
                              • PostMessageW.USER32(00000000,00000101,00000000), ref: 00A60CE1
                              • SendInput.USER32(00000001,?,0000001C,753DC0D0,?,00008000), ref: 00A60D33
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: KeyboardState$InputMessagePostSend
                              • String ID:
                              • API String ID: 432972143-0
                              • Opcode ID: 25abce6b9e5dfdd7e0dd52d9879a9e7da8fe52582e6d4481614dd8ca0abdf66c
                              • Instruction ID: dbcf501f7a05ecda9347531a183f83f6a73363cfb5a96acc90b5e1d6e6924e1e
                              • Opcode Fuzzy Hash: 25abce6b9e5dfdd7e0dd52d9879a9e7da8fe52582e6d4481614dd8ca0abdf66c
                              • Instruction Fuzzy Hash: BC312430940618AEFF348B65C814FFFBBB6EB45320F08432AE495921D1C37999D5C7A1
                              APIs
                              • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00A361FB
                              • __isleadbyte_l.LIBCMT ref: 00A36229
                              • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 00A36257
                              • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 00A3628D
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                              • String ID:
                              • API String ID: 3058430110-0
                              • Opcode ID: 562c6faf274dd79e06fc582f960e64c4c07e6eb239efc9889edf8615f6ebea60
                              • Instruction ID: 45ea5eb904206159614eadc9787132bf7ff6612fd4cf3a2af3f51f083a2e910f
                              • Opcode Fuzzy Hash: 562c6faf274dd79e06fc582f960e64c4c07e6eb239efc9889edf8615f6ebea60
                              • Instruction Fuzzy Hash: 1931B031A04256BFDF218FA5CC48BAB7BB9FF42310F168129F864971A1DB31D960DB90
                              APIs
                              • GetForegroundWindow.USER32 ref: 00A84F02
                                • Part of subcall function 00A63641: GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00A6365B
                                • Part of subcall function 00A63641: GetCurrentThreadId.KERNEL32 ref: 00A63662
                                • Part of subcall function 00A63641: AttachThreadInput.USER32(00000000,?,00A65005), ref: 00A63669
                              • GetCaretPos.USER32(?), ref: 00A84F13
                              • ClientToScreen.USER32(00000000,?), ref: 00A84F4E
                              • GetForegroundWindow.USER32 ref: 00A84F54
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                              • String ID:
                              • API String ID: 2759813231-0
                              • Opcode ID: 92eb8ad285d32cefbdcb67447952b116c96aa8db41cbd9ab53f9d247d3c81302
                              • Instruction ID: 21d165cbc3daad396eebe7acce911d30d355f74e0ad08ea513fbddeea559e60a
                              • Opcode Fuzzy Hash: 92eb8ad285d32cefbdcb67447952b116c96aa8db41cbd9ab53f9d247d3c81302
                              • Instruction Fuzzy Hash: F4311072D00108AFDB00EFB5D9859EFB7F9EF98300F10806AE555E7242EA759E05CBA1
                              APIs
                                • Part of subcall function 00A02612: GetWindowLongW.USER32(?,000000EB), ref: 00A02623
                              • GetCursorPos.USER32(?), ref: 00A8C4D2
                              • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,00A3B9AB,?,?,?,?,?), ref: 00A8C4E7
                              • GetCursorPos.USER32(?), ref: 00A8C534
                              • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,00A3B9AB,?,?,?), ref: 00A8C56E
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: Cursor$LongMenuPopupProcTrackWindow
                              • String ID:
                              • API String ID: 2864067406-0
                              • Opcode ID: f5e4ea05beef4e84bce50b74cd5cb815c5eda721b5052b5d796c93e688706bb8
                              • Instruction ID: b635cd267a61de0a1a9731d72dfdb43030d8bda25a9545e1d4de7d3dc723d3f4
                              • Opcode Fuzzy Hash: f5e4ea05beef4e84bce50b74cd5cb815c5eda721b5052b5d796c93e688706bb8
                              • Instruction Fuzzy Hash: 18319135600058EFCF29DF98CC58EEA7BB5EB09320F444169F9058B261C732AD91DFA4
                              APIs
                                • Part of subcall function 00A5810A: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00A58121
                                • Part of subcall function 00A5810A: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00A5812B
                                • Part of subcall function 00A5810A: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00A5813A
                                • Part of subcall function 00A5810A: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00A58141
                                • Part of subcall function 00A5810A: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00A58157
                              • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 00A586A3
                              • _memcmp.LIBCMT ref: 00A586C6
                              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00A586FC
                              • HeapFree.KERNEL32(00000000), ref: 00A58703
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                              • String ID:
                              • API String ID: 1592001646-0
                              • Opcode ID: 9d43f12d025324f6059fe3bc7ae803d7336054802c0063d8a7701b4633082b77
                              • Instruction ID: d4246035edb0e1ddcedd38672bdeb19433411098fc4e80b55f62d5474c98bc96
                              • Opcode Fuzzy Hash: 9d43f12d025324f6059fe3bc7ae803d7336054802c0063d8a7701b4633082b77
                              • Instruction Fuzzy Hash: B4217C71E41109EFDB10DFA4C989BEEB7B8FF44306F154059E844AB240DB34AE09CB50
                              APIs
                              • __setmode.LIBCMT ref: 00A209AE
                                • Part of subcall function 00A05A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00A67896,?,?,00000000), ref: 00A05A2C
                                • Part of subcall function 00A05A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00A67896,?,?,00000000,?,?), ref: 00A05A50
                              • _fprintf.LIBCMT ref: 00A209E5
                              • OutputDebugStringW.KERNEL32(?), ref: 00A55DBB
                                • Part of subcall function 00A24AAA: _flsall.LIBCMT ref: 00A24AC3
                              • __setmode.LIBCMT ref: 00A20A1A
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: ByteCharMultiWide__setmode$DebugOutputString_flsall_fprintf
                              • String ID:
                              • API String ID: 521402451-0
                              • Opcode ID: f1298b74c0fc578c2cd4385cf1176e036471a7155768b9acaeeeec32b3387e15
                              • Instruction ID: 35943fef931035d30666250b1ff445a49324333d13ca09770d8e258f32c3d9c4
                              • Opcode Fuzzy Hash: f1298b74c0fc578c2cd4385cf1176e036471a7155768b9acaeeeec32b3387e15
                              • Instruction Fuzzy Hash: 5C112472A042187FDB04B7B8BC4ADBEB7BCAF49360F644165F105561C3EE20584687A1
                              APIs
                              • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00A717A3
                                • Part of subcall function 00A7182D: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00A7184C
                                • Part of subcall function 00A7182D: InternetCloseHandle.WININET(00000000), ref: 00A718E9
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: Internet$CloseConnectHandleOpen
                              • String ID:
                              • API String ID: 1463438336-0
                              • Opcode ID: a5345e86887104664e507dcb8a4bd2c78fbb012c756d9dd094e968e8cb427fcf
                              • Instruction ID: 0c1de1a63afd35505993145ab00d241a487678934d7a223dd078cfaa1f5a2143
                              • Opcode Fuzzy Hash: a5345e86887104664e507dcb8a4bd2c78fbb012c756d9dd094e968e8cb427fcf
                              • Instruction Fuzzy Hash: 8821A432200605BFEB169F64DC01FBABBE9FF48710F10C02AF91996550D771D811ABA5
                              APIs
                              • GetFileAttributesW.KERNEL32(?,00A8FAC0), ref: 00A63A64
                              • GetLastError.KERNEL32 ref: 00A63A73
                              • CreateDirectoryW.KERNEL32(?,00000000), ref: 00A63A82
                              • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,00A8FAC0), ref: 00A63ADF
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: CreateDirectory$AttributesErrorFileLast
                              • String ID:
                              • API String ID: 2267087916-0
                              • Opcode ID: 1e85c4fbca3b5236421e0165640067b642807309ed86507e5b0d84f6d855ff2f
                              • Instruction ID: 1af1695ed73c15066fadcd386caae6f54e69dbd415bdfd6c06d86c949217ec05
                              • Opcode Fuzzy Hash: 1e85c4fbca3b5236421e0165640067b642807309ed86507e5b0d84f6d855ff2f
                              • Instruction Fuzzy Hash: 182182355082059FCB00EF64D9818AEB7F4AE653A4F144A1DF499C72E1D7319E47DB42
                              APIs
                              • _free.LIBCMT ref: 00A35101
                                • Part of subcall function 00A2571C: __FF_MSGBANNER.LIBCMT ref: 00A25733
                                • Part of subcall function 00A2571C: __NMSG_WRITE.LIBCMT ref: 00A2573A
                                • Part of subcall function 00A2571C: RtlAllocateHeap.NTDLL(00C90000,00000000,00000001,00000000,?,?,?,00A20DD3,?), ref: 00A2575F
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: AllocateHeap_free
                              • String ID:
                              • API String ID: 614378929-0
                              • Opcode ID: c4c8f7cbdbabf6ff409fb9d1008689e2fd5be621b77f0e75499c953fb81631e4
                              • Instruction ID: 5c25ae002a3c5b039b914cff853acefa276408bfbeddad76525bba1a31b7fcdc
                              • Opcode Fuzzy Hash: c4c8f7cbdbabf6ff409fb9d1008689e2fd5be621b77f0e75499c953fb81631e4
                              • Instruction Fuzzy Hash: AB11C272D01A26AFCF317FBCFD45B5E3BA8AF153A1F104A3AF9049A150DE3489419790
                              APIs
                                • Part of subcall function 00A05A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00A67896,?,?,00000000), ref: 00A05A2C
                                • Part of subcall function 00A05A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00A67896,?,?,00000000,?,?), ref: 00A05A50
                              • gethostbyname.WSOCK32(?,?,?), ref: 00A76399
                              • WSAGetLastError.WSOCK32(00000000), ref: 00A763A4
                              • _memmove.LIBCMT ref: 00A763D1
                              • inet_ntoa.WSOCK32(?), ref: 00A763DC
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: ByteCharMultiWide$ErrorLast_memmovegethostbynameinet_ntoa
                              • String ID:
                              • API String ID: 1504782959-0
                              • Opcode ID: 4dcb520420791d9418600615299368aca95519d4558fcab41e0e4eb9ff92eb3f
                              • Instruction ID: f90eea7cf97152c9c0fd818b5de2d411e0e5b6a281154b7221ddf789f4ec6271
                              • Opcode Fuzzy Hash: 4dcb520420791d9418600615299368aca95519d4558fcab41e0e4eb9ff92eb3f
                              • Instruction Fuzzy Hash: 0B113371900109AFCF04FFA4EE46DEF77B8AF04310B548065F505A71A2DB309E15DB61
                              APIs
                              • SendMessageW.USER32(?,000000B0,?,?), ref: 00A58B61
                              • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00A58B73
                              • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00A58B89
                              • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00A58BA4
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: MessageSend
                              • String ID:
                              • API String ID: 3850602802-0
                              • Opcode ID: c5f8119faa3060b4d29bdfb483d72743a086d8643eb896ef7be995e2ed17acc9
                              • Instruction ID: 88f21628569fde54a3c7d8e7d3952bd730b57adba808bd70fc3eff92f1cb6fff
                              • Opcode Fuzzy Hash: c5f8119faa3060b4d29bdfb483d72743a086d8643eb896ef7be995e2ed17acc9
                              • Instruction Fuzzy Hash: 45115A79900218FFEB10DFA5CC84FADBBB8FB48710F2141A5EA00B7290DA716E11DB94
                              APIs
                                • Part of subcall function 00A02612: GetWindowLongW.USER32(?,000000EB), ref: 00A02623
                              • DefDlgProcW.USER32(?,00000020,?), ref: 00A012D8
                              • GetClientRect.USER32(?,?), ref: 00A3B5FB
                              • GetCursorPos.USER32(?), ref: 00A3B605
                              • ScreenToClient.USER32(?,?), ref: 00A3B610
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: Client$CursorLongProcRectScreenWindow
                              • String ID:
                              • API String ID: 4127811313-0
                              • Opcode ID: 3a1026a2fb0cc778ad6c7a3cee28a7018eed3d26a0eeed78b79a111fdfb91b5d
                              • Instruction ID: 63350f6a8a424afdf0078566a6f91cf1303963f55853fb82219fb0a97764ba7a
                              • Opcode Fuzzy Hash: 3a1026a2fb0cc778ad6c7a3cee28a7018eed3d26a0eeed78b79a111fdfb91b5d
                              • Instruction Fuzzy Hash: 78113D3590011DEFCB04DFA4E989DEE77B8EB09300F500466F901E7180D730BA529BA5
                              APIs
                              • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,00A5FCED,?,00A60D40,?,00008000), ref: 00A6115F
                              • Sleep.KERNEL32(00000000,?,?,?,?,?,?,00A5FCED,?,00A60D40,?,00008000), ref: 00A61184
                              • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,00A5FCED,?,00A60D40,?,00008000), ref: 00A6118E
                              • Sleep.KERNEL32(?,?,?,?,?,?,?,00A5FCED,?,00A60D40,?,00008000), ref: 00A611C1
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: CounterPerformanceQuerySleep
                              • String ID:
                              • API String ID: 2875609808-0
                              • Opcode ID: e058c730d5d01adf200447953cab09b629045a86171b70dbb300a434985435ef
                              • Instruction ID: f5ebdad6d5157469fe328d28a93ce225c73459c18b215b2d2da4d950d9622c74
                              • Opcode Fuzzy Hash: e058c730d5d01adf200447953cab09b629045a86171b70dbb300a434985435ef
                              • Instruction Fuzzy Hash: 65111831D0062DDBCF00DFE5D948AEEBFB8FB0A711F04465AEA45B2240CA749591CB95
                              APIs
                              • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000,00000000), ref: 00A5D84D
                              • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 00A5D864
                              • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 00A5D879
                              • RegisterTypeLibForUser.OLEAUT32(?,?,00000000), ref: 00A5D897
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: Type$Register$FileLoadModuleNameUser
                              • String ID:
                              • API String ID: 1352324309-0
                              • Opcode ID: 4176139eaafaff9a053f9fc6ed1531c4bde79a94040101adda6beb45b91c41fe
                              • Instruction ID: 10df62a28f614b2fdadf8812328f259c52064c104a0c2aa22a69b9b3933162eb
                              • Opcode Fuzzy Hash: 4176139eaafaff9a053f9fc6ed1531c4bde79a94040101adda6beb45b91c41fe
                              • Instruction Fuzzy Hash: 13116175605305EFE330CF90EC08F93BBBCFB00B01F10856AAA16DA051D7B0E5499BA1
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                              • String ID:
                              • API String ID: 3016257755-0
                              • Opcode ID: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                              • Instruction ID: 66641cdf2bb7be8f676e5274c5845f51c02317959ad6c7990907acbd4b4e7a3c
                              • Opcode Fuzzy Hash: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                              • Instruction Fuzzy Hash: DD014CB244814ABBCF2A5F88DC42CEE3F62BB19350F588415FE1958031D736CAB1BB81
                              APIs
                              • GetWindowRect.USER32(?,?), ref: 00A8B2E4
                              • ScreenToClient.USER32(?,?), ref: 00A8B2FC
                              • ScreenToClient.USER32(?,?), ref: 00A8B320
                              • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 00A8B33B
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: ClientRectScreen$InvalidateWindow
                              • String ID:
                              • API String ID: 357397906-0
                              • Opcode ID: 16cc49551ee02f343ed6562e15e8c2dcd11da1b6306a3fb9792dcf8fdce3da13
                              • Instruction ID: 595add61a0b9fad9cbe3bd66f6c83f31ffdf1db5eb6847baaef45e3fa7ddde35
                              • Opcode Fuzzy Hash: 16cc49551ee02f343ed6562e15e8c2dcd11da1b6306a3fb9792dcf8fdce3da13
                              • Instruction Fuzzy Hash: 9D114775D0024AEFDB41DF99C4449EEBBF5FF18310F104166E914E3620D735AA558F50
                              APIs
                              • _memset.LIBCMT ref: 00A8B644
                              • _memset.LIBCMT ref: 00A8B653
                              • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,00AC6F20,00AC6F64), ref: 00A8B682
                              • CloseHandle.KERNEL32 ref: 00A8B694
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: _memset$CloseCreateHandleProcess
                              • String ID:
                              • API String ID: 3277943733-0
                              • Opcode ID: d157eef3c86527abc2c33c65e30bae3e1af311f5346c7be9031ace365fcafc90
                              • Instruction ID: 2fa24a5c31be7f675073dd09fc522840420e71864ec564a0bd3591d6737c6198
                              • Opcode Fuzzy Hash: d157eef3c86527abc2c33c65e30bae3e1af311f5346c7be9031ace365fcafc90
                              • Instruction Fuzzy Hash: EBF05EB25403107EF610E7A5BC06FBB3A9CEB08395F014038FA08E9192D7758C0187E8
                              APIs
                              • EnterCriticalSection.KERNEL32(?), ref: 00A66BE6
                                • Part of subcall function 00A676C4: _memset.LIBCMT ref: 00A676F9
                              • _memmove.LIBCMT ref: 00A66C09
                              • _memset.LIBCMT ref: 00A66C16
                              • LeaveCriticalSection.KERNEL32(?), ref: 00A66C26
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: CriticalSection_memset$EnterLeave_memmove
                              • String ID:
                              • API String ID: 48991266-0
                              • Opcode ID: b5258232c598ea5586e35717d8cfb5158b28a009245fe4c64c62435d2b2139b0
                              • Instruction ID: dc0e7de1c02a61a65dd9e647cf504ceca7cb8ce177a9b4e8ef5453dc7d60cf92
                              • Opcode Fuzzy Hash: b5258232c598ea5586e35717d8cfb5158b28a009245fe4c64c62435d2b2139b0
                              • Instruction Fuzzy Hash: CBF05E3A200110BFCF01AF95EC85E8ABB29EF45320F088061FE085E227D735E811CBB4
                              APIs
                              • GetSysColor.USER32(00000008), ref: 00A02231
                              • SetTextColor.GDI32(?,000000FF), ref: 00A0223B
                              • SetBkMode.GDI32(?,00000001), ref: 00A02250
                              • GetStockObject.GDI32(00000005), ref: 00A02258
                              • GetWindowDC.USER32(?,00000000), ref: 00A3BE83
                              • GetPixel.GDI32(00000000,00000000,00000000), ref: 00A3BE90
                              • GetPixel.GDI32(00000000,?,00000000), ref: 00A3BEA9
                              • GetPixel.GDI32(00000000,00000000,?), ref: 00A3BEC2
                              • GetPixel.GDI32(00000000,?,?), ref: 00A3BEE2
                              • ReleaseDC.USER32(?,00000000), ref: 00A3BEED
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: Pixel$Color$ModeObjectReleaseStockTextWindow
                              • String ID:
                              • API String ID: 1946975507-0
                              • Opcode ID: fa9ec3f9f00f392e8b974ada6afcd4587e2d262716ce4723696c6597bd61b92b
                              • Instruction ID: 94b811f73f8e785fefd3131e205b521a92cb998f9afa46f61efca60abde5ce0b
                              • Opcode Fuzzy Hash: fa9ec3f9f00f392e8b974ada6afcd4587e2d262716ce4723696c6597bd61b92b
                              • Instruction Fuzzy Hash: 1DE06D32104245EEDF219FA8FC4D7D83F11EB05332F108366FB69480E187714991DB22
                              APIs
                              • GetCurrentThread.KERNEL32 ref: 00A5871B
                              • OpenThreadToken.ADVAPI32(00000000,?,?,?,00A582E6), ref: 00A58722
                              • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,00A582E6), ref: 00A5872F
                              • OpenProcessToken.ADVAPI32(00000000,?,?,?,00A582E6), ref: 00A58736
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: CurrentOpenProcessThreadToken
                              • String ID:
                              • API String ID: 3974789173-0
                              • Opcode ID: 0c43d600eff07983e52d0654779bc2e5329a5118bf740a91c33080ee3a6b7dfd
                              • Instruction ID: 2953d37f1bbd021c7116dec258d5a598029f7b7c150cea2373dbbb2f8f2c1b13
                              • Opcode Fuzzy Hash: 0c43d600eff07983e52d0654779bc2e5329a5118bf740a91c33080ee3a6b7dfd
                              • Instruction Fuzzy Hash: 68E086366113129FD7209FF05D0CB963BBCEF54B92F244828BA45D9050EA388446C750
                              APIs
                              • OleSetContainedObject.OLE32(?,00000001), ref: 00A5B4BE
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: ContainedObject
                              • String ID: AutoIt3GUI$Container
                              • API String ID: 3565006973-3941886329
                              • Opcode ID: d65b79bc3660a9ff703dfb7d1eb7173bc12df5110dee40fd88f4f1ca66b32d62
                              • Instruction ID: ba8e9b4d56021450023ac8492a4b2be38ebae9d32ae3bc18b99836671be5e1ff
                              • Opcode Fuzzy Hash: d65b79bc3660a9ff703dfb7d1eb7173bc12df5110dee40fd88f4f1ca66b32d62
                              • Instruction Fuzzy Hash: 7C913970610601AFDB14DF68C884A6ABBF9FF49712F20856DED46CB691EB70E845CB60
                              APIs
                                • Part of subcall function 00A1FC86: _wcscpy.LIBCMT ref: 00A1FCA9
                                • Part of subcall function 00A09837: __itow.LIBCMT ref: 00A09862
                                • Part of subcall function 00A09837: __swprintf.LIBCMT ref: 00A098AC
                              • __wcsnicmp.LIBCMT ref: 00A6B02D
                              • WNetUseConnectionW.MPR(00000000,?,?,00000000,?,?,00000100,?), ref: 00A6B0F6
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: Connection__itow__swprintf__wcsnicmp_wcscpy
                              • String ID: LPT
                              • API String ID: 3222508074-1350329615
                              • Opcode ID: 38ed48ca69b8f2ea86f73cb31497651ab835ecb4a3e5fb107a46eac0e6856c66
                              • Instruction ID: 474e5f6c52b5a046e0c8d5a806b4d00563c6e00e89610fd4cb3e46bc46c144d0
                              • Opcode Fuzzy Hash: 38ed48ca69b8f2ea86f73cb31497651ab835ecb4a3e5fb107a46eac0e6856c66
                              • Instruction Fuzzy Hash: CF619375A10219EFCB14DF94D991EAEB7B8EF09310F118169F916EB391D730AE84CB60
                              APIs
                              • Sleep.KERNEL32(00000000), ref: 00A12968
                              • GlobalMemoryStatusEx.KERNEL32(?), ref: 00A12981
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: GlobalMemorySleepStatus
                              • String ID: @
                              • API String ID: 2783356886-2766056989
                              • Opcode ID: f89107aa1ddffb8dfd97fb208187d1bfec2a713de8c2fa211e7aefc321a9b6f2
                              • Instruction ID: 3ad021380d774021588f62560dc32285732319607a4f671150908d725969da90
                              • Opcode Fuzzy Hash: f89107aa1ddffb8dfd97fb208187d1bfec2a713de8c2fa211e7aefc321a9b6f2
                              • Instruction Fuzzy Hash: 5D5148724087489BD320EF54E986BAFBBE8FF85344F41885DF2D8411A2DB708529CB66
                              APIs
                                • Part of subcall function 00A04F0B: __fread_nolock.LIBCMT ref: 00A04F29
                              • _wcscmp.LIBCMT ref: 00A69824
                              • _wcscmp.LIBCMT ref: 00A69837
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: _wcscmp$__fread_nolock
                              • String ID: FILE
                              • API String ID: 4029003684-3121273764
                              • Opcode ID: fe9c5c8389f3384f1da4e3d28001ccb0f9e5473277daa7c6ad68a10762a5c1ec
                              • Instruction ID: 249d6f3ff85bd418cb6787318a440ba13048af3533d8441d27f8b44f41df2e51
                              • Opcode Fuzzy Hash: fe9c5c8389f3384f1da4e3d28001ccb0f9e5473277daa7c6ad68a10762a5c1ec
                              • Instruction Fuzzy Hash: 4C41BA71A4021ABADF209BA4DD45FEF7BBDEF49710F000469FA04E71C1DA75A9048B61
                              APIs
                              • _memset.LIBCMT ref: 00A7259E
                              • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 00A725D4
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: CrackInternet_memset
                              • String ID: |
                              • API String ID: 1413715105-2343686810
                              • Opcode ID: 79235f6d67e47e7b2f624b4590111d73d99bf45cc6ecddbc7121b39bfe488333
                              • Instruction ID: fd1a7cbd5238d06ff2d571b100a5a344d68be16f218b1bf15fe3feb6dc1d566a
                              • Opcode Fuzzy Hash: 79235f6d67e47e7b2f624b4590111d73d99bf45cc6ecddbc7121b39bfe488333
                              • Instruction Fuzzy Hash: DB313571D00119ABCF11EFA0DD85EEEBFB8FF08340F10406AF918A6162EB315916DB60
                              APIs
                              • SendMessageW.USER32(?,00001132,00000000,?), ref: 00A87B61
                              • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00A87B76
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: MessageSend
                              • String ID: '
                              • API String ID: 3850602802-1997036262
                              • Opcode ID: ea20fa861063b63ee892662a163ee233efcab3006dcada5389456edadb5a5841
                              • Instruction ID: 668b69f965261ea70b531593579ddacbfdd972a3e4340449989af637c0b5f334
                              • Opcode Fuzzy Hash: ea20fa861063b63ee892662a163ee233efcab3006dcada5389456edadb5a5841
                              • Instruction Fuzzy Hash: B8410874A0520A9FDB14DF68C985BEEBBB5FB09340F20016AE905AB391D770A951DF90
                              APIs
                              • DestroyWindow.USER32(?,?,?,?), ref: 00A86B17
                              • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 00A86B53
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: Window$DestroyMove
                              • String ID: static
                              • API String ID: 2139405536-2160076837
                              • Opcode ID: 73bfebd5089a1ef870e2f0ad25436f33fa033c6825512084de30fb5e83e68c93
                              • Instruction ID: cd6fb4df29df882dbe5818ea53e3c37741cf5621df26f3d89747202c688c548f
                              • Opcode Fuzzy Hash: 73bfebd5089a1ef870e2f0ad25436f33fa033c6825512084de30fb5e83e68c93
                              • Instruction Fuzzy Hash: 5F318D71200604AEEB10AF64DC81BFB73B9FF48764F108619F9A5D7190DA30AC81C760
                              APIs
                              • SendMessageW.USER32(?,0000110A,00000000,00000000), ref: 00A59965
                              • SendMessageW.USER32(?,0000110A,00000004,00000000), ref: 00A5999F
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: MessageSend
                              • String ID: @U=u
                              • API String ID: 3850602802-2594219639
                              • Opcode ID: 49ba0e2aec634d15a6b087242b2bdbc36c0a13d947ded0dd0a2685b77182740e
                              • Instruction ID: 9a6f0fcd87361fa274f3b40adca3b723717f7078ff968d3829e6fda9beac3cf1
                              • Opcode Fuzzy Hash: 49ba0e2aec634d15a6b087242b2bdbc36c0a13d947ded0dd0a2685b77182740e
                              • Instruction Fuzzy Hash: 3A21C531D00209EFCF10EBA4D881DAFB779FF88751B114069FE15AB290EA716C46C760
                              APIs
                              • _memset.LIBCMT ref: 00A62911
                              • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00A6294C
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: InfoItemMenu_memset
                              • String ID: 0
                              • API String ID: 2223754486-4108050209
                              • Opcode ID: 4afa86ae7583312a3a70b5a3ca6890c75d4acb644c919897a078e7a965b6520a
                              • Instruction ID: a183fcdbadbe94154b994c9cea03b920c883ca321a09ec17e86a14ddbe81dfce
                              • Opcode Fuzzy Hash: 4afa86ae7583312a3a70b5a3ca6890c75d4acb644c919897a078e7a965b6520a
                              • Instruction Fuzzy Hash: 5231D632A00705AFEB25CF98DD85BEEBBF9EF85350F180029E985A71A1DB709944CB51
                              APIs
                              • __snwprintf.LIBCMT ref: 00A73A66
                                • Part of subcall function 00A07DE1: _memmove.LIBCMT ref: 00A07E22
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: __snwprintf_memmove
                              • String ID: , $$AUTOITCALLVARIABLE%d
                              • API String ID: 3506404897-2584243854
                              • Opcode ID: e15ea30c36f0dee5dfc7974857a1de45d9a01a2bc78409d3f92d7a1171b73185
                              • Instruction ID: ca4ad246f4b6be41f4d19365d2399217cf1fa9465ec19b6b82649063114d2005
                              • Opcode Fuzzy Hash: e15ea30c36f0dee5dfc7974857a1de45d9a01a2bc78409d3f92d7a1171b73185
                              • Instruction Fuzzy Hash: 0721BD71A0021DAECF10EF68DD82AAE77B9BF44340F408454E849AB182DB35EA45DBA5
                              APIs
                                • Part of subcall function 00A1603A: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00A16051
                              • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00A5AA10
                              • _strlen.LIBCMT ref: 00A5AA1B
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: MessageSend$Timeout_strlen
                              • String ID: @U=u
                              • API String ID: 2777139624-2594219639
                              • Opcode ID: 4ea6234fc37c533b665bd55ed9637c42599d9978372bdec2c07f26c567dae9ca
                              • Instruction ID: e931549a03ebdf25db712f6f55ab7a09283fcb05684046bcd77b490ddb115635
                              • Opcode Fuzzy Hash: 4ea6234fc37c533b665bd55ed9637c42599d9978372bdec2c07f26c567dae9ca
                              • Instruction Fuzzy Hash: D31105327001056ADF14AF78EE829BE7BA9AF69381F00013DFE0ACB193DD349949C661
                              APIs
                                • Part of subcall function 00A655FD: GetLocalTime.KERNEL32 ref: 00A6560A
                                • Part of subcall function 00A655FD: _wcsncpy.LIBCMT ref: 00A6563F
                                • Part of subcall function 00A655FD: _wcsncpy.LIBCMT ref: 00A65671
                                • Part of subcall function 00A655FD: _wcsncpy.LIBCMT ref: 00A656A4
                                • Part of subcall function 00A655FD: _wcsncpy.LIBCMT ref: 00A656E6
                              • SendMessageW.USER32(?,00001002,00000000,?), ref: 00A868FF
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: _wcsncpy$LocalMessageSendTime
                              • String ID: @U=u$SysDateTimePick32
                              • API String ID: 2466184910-2530228043
                              • Opcode ID: ee6fbaef54215fe867c50372522c57f3b6e3f547adcba57b454ba111ad56680f
                              • Instruction ID: 4a77be90265546018c120fb929dc76af9cae000b0dae5c285d905590003be294
                              • Opcode Fuzzy Hash: ee6fbaef54215fe867c50372522c57f3b6e3f547adcba57b454ba111ad56680f
                              • Instruction Fuzzy Hash: 462129717402096FFF21AF64DC82FEF73AAEB44750F200519F994AB1D0D6B1AC918760
                              APIs
                              • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00A5923E
                                • Part of subcall function 00A613DE: GetWindowThreadProcessId.USER32(?,?), ref: 00A61409
                                • Part of subcall function 00A613DE: OpenProcess.KERNEL32(00000438,00000000,?,?,?,00A5925A,00000034,?,?,00001004,00000000,00000000), ref: 00A61419
                                • Part of subcall function 00A613DE: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,00A5925A,00000034,?,?,00001004,00000000,00000000), ref: 00A6142F
                                • Part of subcall function 00A614BC: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00A59296,?,?,00000034,00000800,?,00000034), ref: 00A614E6
                              • SendMessageW.USER32(?,00001073,00000000,?), ref: 00A592A5
                                • Part of subcall function 00A61487: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00A592C5,?,?,00000800,?,00001073,00000000,?,?), ref: 00A614B1
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: Process$MemoryMessageSend$AllocOpenReadThreadVirtualWindowWrite
                              • String ID: @U=u
                              • API String ID: 1045663743-2594219639
                              • Opcode ID: 30a9dd04dda86fc03f5a575fac18c1e84ea2766296c3b7be4aba21f69034a8b2
                              • Instruction ID: e856a26467bfc979cfca03bc7c3e3dbf4af7e57917d72d40298481052dd80c06
                              • Opcode Fuzzy Hash: 30a9dd04dda86fc03f5a575fac18c1e84ea2766296c3b7be4aba21f69034a8b2
                              • Instruction Fuzzy Hash: 3D215E71901129FBDF11DBA4DD81FDEBBB8FF09310F1001A5F948AB190EA705A84CB90
                              APIs
                              • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00A86761
                              • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00A8676C
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: MessageSend
                              • String ID: Combobox
                              • API String ID: 3850602802-2096851135
                              • Opcode ID: c0762703e5bdb18eef489b5f07b59ca32f78e1e4212e517d9c68059818f0631b
                              • Instruction ID: a8248ed42f4a478d2090b098717b9c9efbe4d1ed2e60dc2fddd0eda20f7ec387
                              • Opcode Fuzzy Hash: c0762703e5bdb18eef489b5f07b59ca32f78e1e4212e517d9c68059818f0631b
                              • Instruction Fuzzy Hash: 6511B271600208AFFF15EF54DC81EEB376AEB483A8F100129F91497290D6319C5187A0
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID:
                              • String ID: @U=u
                              • API String ID: 0-2594219639
                              • Opcode ID: 9014f1a1d2412107273687edb4616707d68684d381c68afe19712fad1561aff3
                              • Instruction ID: c015927c6578d5fe1383265fe3f4bd9df4ef8c59a0f647f945c20ee8b2b31568
                              • Opcode Fuzzy Hash: 9014f1a1d2412107273687edb4616707d68684d381c68afe19712fad1561aff3
                              • Instruction Fuzzy Hash: 03218E35624208BFEB10AF68CC85FFB37E4EB09310F584165FA52DA1E0D672EA51DB60
                              APIs
                                • Part of subcall function 00A01D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00A01D73
                                • Part of subcall function 00A01D35: GetStockObject.GDI32(00000011), ref: 00A01D87
                                • Part of subcall function 00A01D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00A01D91
                              • GetWindowRect.USER32(00000000,?), ref: 00A86C71
                              • GetSysColor.USER32(00000012), ref: 00A86C8B
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: Window$ColorCreateMessageObjectRectSendStock
                              • String ID: static
                              • API String ID: 1983116058-2160076837
                              • Opcode ID: d49e20403282b1d34443305db26485b501af528fc4858aeb99c119ddac03416c
                              • Instruction ID: e0e2856ad08c910fa6111f9d485a37c6324d37a7046a3037907795e732199a42
                              • Opcode Fuzzy Hash: d49e20403282b1d34443305db26485b501af528fc4858aeb99c119ddac03416c
                              • Instruction Fuzzy Hash: B02129B261020AAFDF04EFB8DC45EEA7BB8FB08315F004629F995D2250D635E861DB60
                              APIs
                              • _memset.LIBCMT ref: 00A62A22
                              • GetMenuItemInfoW.USER32(00000030,?,00000000,00000030), ref: 00A62A41
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: InfoItemMenu_memset
                              • String ID: 0
                              • API String ID: 2223754486-4108050209
                              • Opcode ID: f2d3d50fbf387e878188c411138da56c6cbf4bfa6d727ab0f4f5a82a205cc4b6
                              • Instruction ID: 11a4871c4d7d03695c5f7157b019baa4b3df39683f5fbfca4b44ebcab92e24f7
                              • Opcode Fuzzy Hash: f2d3d50fbf387e878188c411138da56c6cbf4bfa6d727ab0f4f5a82a205cc4b6
                              • Instruction Fuzzy Hash: FB11D072D01914ABDB30DFE8D844BEA77B8AB95384F054021EA95F7290D7B0AD0AC791
                              APIs
                              • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 00A7222C
                              • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 00A72255
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: Internet$OpenOption
                              • String ID: <local>
                              • API String ID: 942729171-4266983199
                              • Opcode ID: 5dfe692965c0c00b2ba1c0a797d49eafa1e3bdaf302ec0589050d6e8b00ea123
                              • Instruction ID: 2dd48ebc2ac83bed80c1bcc66fe6e55c8d1cdee29b614aa57b50740772006ca1
                              • Opcode Fuzzy Hash: 5dfe692965c0c00b2ba1c0a797d49eafa1e3bdaf302ec0589050d6e8b00ea123
                              • Instruction Fuzzy Hash: F611A070541225BADB258F518C84FFBFBACFF1A751F10C22AF91986101D6709991D7F0
                              APIs
                              • SendMessageW.USER32(?,?,?,?), ref: 00A88530
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: MessageSend
                              • String ID: @U=u
                              • API String ID: 3850602802-2594219639
                              • Opcode ID: ee718fcd89ab361dab2441cb5348e8c3410330d5834d23efef693a65a6d51a37
                              • Instruction ID: 997ab4652fc59f6fb135128fd5b582859e7bc3aa59502bbac6703756f40ad8e0
                              • Opcode Fuzzy Hash: ee718fcd89ab361dab2441cb5348e8c3410330d5834d23efef693a65a6d51a37
                              • Instruction Fuzzy Hash: A321E775A0020AEFCB19EFA4D940CEA7BB5FB4C350B514158FD05A7360DB35AD61DB90
                              APIs
                              • SendMessageW.USER32(?,00000401,?,00000000), ref: 00A8662C
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: MessageSend
                              • String ID: @U=u$button
                              • API String ID: 3850602802-1762282863
                              • Opcode ID: 0d1ed8e4ea054e58cf3de1e92476f3f6cf756cb8ea45a81f6aaefb04a74f5d85
                              • Instruction ID: 5a45e3b1bd3765263359acaa9585ba0a4d6722a437283a70d6c602df0f05b1c1
                              • Opcode Fuzzy Hash: 0d1ed8e4ea054e58cf3de1e92476f3f6cf756cb8ea45a81f6aaefb04a74f5d85
                              • Instruction Fuzzy Hash: DE110432150209ABEF15AF60DC11FEA376AFF08314F114628FA51A7190D776ECA29B20
                              APIs
                              • SendMessageW.USER32(?,0000133E,00000000,?), ref: 00A878D8
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: MessageSend
                              • String ID: @U=u
                              • API String ID: 3850602802-2594219639
                              • Opcode ID: 89d90a77dfefa12c93e75e22e093c5fd8c02b0d1a8201a270fad5b2b856cf5bc
                              • Instruction ID: 3da5c8c4286dc34dab4c2b30b32e7b29ed2f01da31a9b6cc74b68656537ce7be
                              • Opcode Fuzzy Hash: 89d90a77dfefa12c93e75e22e093c5fd8c02b0d1a8201a270fad5b2b856cf5bc
                              • Instruction Fuzzy Hash: 1D11E630504744AFD720DF74C891AEBB7E9FF05310F20851DE8AA47391DB716941DB60
                              APIs
                                • Part of subcall function 00A614BC: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00A59296,?,?,00000034,00000800,?,00000034), ref: 00A614E6
                              • SendMessageW.USER32(?,0000102B,?,00000000), ref: 00A59509
                              • SendMessageW.USER32(?,0000102B,?,00000000), ref: 00A5952E
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: MessageSend$MemoryProcessWrite
                              • String ID: @U=u
                              • API String ID: 1195347164-2594219639
                              • Opcode ID: 2fcb97e83f58f84c6fcf8ca1238e04ea353261d81ae998517828d610609ca43c
                              • Instruction ID: 8a6d9b0c9fdbfa9bbe64b9b6f0f7a6b913a7b787a1d164930aaf53efe93b61c0
                              • Opcode Fuzzy Hash: 2fcb97e83f58f84c6fcf8ca1238e04ea353261d81ae998517828d610609ca43c
                              • Instruction Fuzzy Hash: B601DF71900119EBDB11AF54DC45FDABB7CEB14310F10416AF915A71D1EB705D55CB60
                              APIs
                              • SendMessageW.USER32(?,00000406,00000000,00000000), ref: 00A595FB
                              • SendMessageW.USER32(?,0000040D,?,00000000), ref: 00A5962E
                                • Part of subcall function 00A61487: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00A592C5,?,?,00000800,?,00001073,00000000,?,?), ref: 00A614B1
                                • Part of subcall function 00A07BCC: _memmove.LIBCMT ref: 00A07C06
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: MessageSend$MemoryProcessRead_memmove
                              • String ID: @U=u
                              • API String ID: 339422723-2594219639
                              • Opcode ID: f5dc965249852b43190f06692e44e7770ef12f54059ec352f55ecb28eb22121b
                              • Instruction ID: 71b37c390075322cdbd2f26eda3c52ad2667064792657aa5c1b73b74c36f20fa
                              • Opcode Fuzzy Hash: f5dc965249852b43190f06692e44e7770ef12f54059ec352f55ecb28eb22121b
                              • Instruction Fuzzy Hash: BE015B71900118AFDB50EE90DD81EDA7BBCFB14340F8081AABA4997150DE315E99CF90
                              APIs
                                • Part of subcall function 00A02612: GetWindowLongW.USER32(?,000000EB), ref: 00A02623
                              • DefDlgProcW.USER32(?,0000002B,?,?,?,?,?,?,?,00A3B93A,?,?,?), ref: 00A8C5F1
                                • Part of subcall function 00A025DB: GetWindowLongW.USER32(?,000000EB), ref: 00A025EC
                              • SendMessageW.USER32(?,00000401,00000000,00000000), ref: 00A8C5D7
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: LongWindow$MessageProcSend
                              • String ID: @U=u
                              • API String ID: 982171247-2594219639
                              • Opcode ID: fa6e514f6394d0213d04aac9c873a0d60fa9419c3c9244bb96af52581f96e839
                              • Instruction ID: f43c904f66a61c3c158ea2daf92d04e5a8d2746b13907c25a288c922ea6f0e91
                              • Opcode Fuzzy Hash: fa6e514f6394d0213d04aac9c873a0d60fa9419c3c9244bb96af52581f96e839
                              • Instruction Fuzzy Hash: 2E01B531240604AFCB29AF54DC58F6A3BA6FB85774F140528F9411B2E0CB31B852EFA0
                              APIs
                              • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00A5954C
                              • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00A59564
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: MessageSend
                              • String ID: @U=u
                              • API String ID: 3850602802-2594219639
                              • Opcode ID: a0de2b13a65f4f673c449b32ef8c5f4593dd048811c8cd50c65d399d7adf322a
                              • Instruction ID: 05decc6b6e5e4133c9d818e3a0b58594a5e6869d2586864288ae8908dc6e48f6
                              • Opcode Fuzzy Hash: a0de2b13a65f4f673c449b32ef8c5f4593dd048811c8cd50c65d399d7adf322a
                              • Instruction Fuzzy Hash: 2FE02B35342352F6F23117658D4AFD71F1AEB88BA2F240034FF019D0D1EAE20DAA83A0
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: ClassName_wcscmp
                              • String ID: #32770
                              • API String ID: 2292705959-463685578
                              • Opcode ID: 416245cb9016e7113ce43b19044cafcde90221dd659b23e79a7d3ac5f56bee05
                              • Instruction ID: 2c85c0acfde7f114c8e13660c845c527844d08287d4c045a774d1d18266b44b2
                              • Opcode Fuzzy Hash: 416245cb9016e7113ce43b19044cafcde90221dd659b23e79a7d3ac5f56bee05
                              • Instruction Fuzzy Hash: 5CE092326002292AE720DB99AC49EA7F7ACEB55B60F11016AFD04D2051D960AA5687E0
                              APIs
                                • Part of subcall function 00A3B314: _memset.LIBCMT ref: 00A3B321
                                • Part of subcall function 00A20940: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,00A3B2F0,?,?,?,00A0100A), ref: 00A20945
                              • IsDebuggerPresent.KERNEL32(?,?,?,00A0100A), ref: 00A3B2F4
                              • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,00A0100A), ref: 00A3B303
                              Strings
                              • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00A3B2FE
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString_memset
                              • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                              • API String ID: 3158253471-631824599
                              • Opcode ID: 57299f6792795bb465aef62471023956afc0a3bf4e701e1e016479773a74482f
                              • Instruction ID: 8871801aee77ce5e3e840ce79deb20fba43fc30e32e7a3152c071a81eb6cfc25
                              • Opcode Fuzzy Hash: 57299f6792795bb465aef62471023956afc0a3bf4e701e1e016479773a74482f
                              • Instruction Fuzzy Hash: 90E06D702107218FD720EF68E504782BAE4BF10304F00893CF856CB691EBB4E485CBB1
                              APIs
                              • GetSystemDirectoryW.KERNEL32(?), ref: 00A41775
                                • Part of subcall function 00A7BFF0: LoadLibraryA.KERNEL32(kernel32.dll,?,00A4195E,?), ref: 00A7BFFE
                                • Part of subcall function 00A7BFF0: GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 00A7C010
                              • FreeLibrary.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00000104), ref: 00A4196D
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: Library$AddressDirectoryFreeLoadProcSystem
                              • String ID: WIN_XPe
                              • API String ID: 582185067-3257408948
                              • Opcode ID: cccd2e0d490afc83aa707c750a19fc6d45384e812786a678b6931160917129c9
                              • Instruction ID: 55c55b53489ebbb89e0554273d05a8f2f94bdd8741867a06ce4da8b4c2bc9e5f
                              • Opcode Fuzzy Hash: cccd2e0d490afc83aa707c750a19fc6d45384e812786a678b6931160917129c9
                              • Instruction Fuzzy Hash: D4F0E5B4800109EFDB25DBA1CA88BECBBF8BB88301F640095E112A60A0D7759F85DF64
                              APIs
                              • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00A859AE
                              • PostMessageW.USER32(00000000), ref: 00A859B5
                                • Part of subcall function 00A65244: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00A652BC
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: FindMessagePostSleepWindow
                              • String ID: Shell_TrayWnd
                              • API String ID: 529655941-2988720461
                              • Opcode ID: aa2f5a990c3467d70084210286465c5951eafdb7240bb9f0fc317e53849352b1
                              • Instruction ID: a2503d1a42e64e52a99d54249c74b66d58f9830911e1f0165182170906a288e2
                              • Opcode Fuzzy Hash: aa2f5a990c3467d70084210286465c5951eafdb7240bb9f0fc317e53849352b1
                              • Instruction Fuzzy Hash: D8D0C9317803127AE668BBB09C0BFD66628BB04B50F000935B246AA1D1D9E4A801C754
                              APIs
                              • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00A8596E
                              • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00A85981
                                • Part of subcall function 00A65244: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00A652BC
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: FindMessagePostSleepWindow
                              • String ID: Shell_TrayWnd
                              • API String ID: 529655941-2988720461
                              • Opcode ID: 1b28249e23ff8ca7330d3d242435d3382df7bcc990727e3317636753b37cd817
                              • Instruction ID: 84a7322bdec74111cf2f21ff15a9b13d5495725385c00b71a802b87c5604d2aa
                              • Opcode Fuzzy Hash: 1b28249e23ff8ca7330d3d242435d3382df7bcc990727e3317636753b37cd817
                              • Instruction Fuzzy Hash: 83D0C931784312BAE668BBB09C1BFD66A28BB00B50F000935B24AAA1D1D9E4A801C754
                              APIs
                              • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00A593E9
                              • SendMessageW.USER32(00000000,00001200,00000000,00000000), ref: 00A593F7
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1459944685.0000000000A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A00000, based on PE: true
                              • Associated: 00000000.00000002.1459931334.0000000000A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000A8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460058237.0000000000AB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460224674.0000000000ABE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1460245962.0000000000AC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a00000_ewYjhndHg2.jbxd
                              Similarity
                              • API ID: MessageSend
                              • String ID: @U=u
                              • API String ID: 3850602802-2594219639
                              • Opcode ID: 84775ec098c2c73426ed54a43f1c071e125b4e968b62642b5a15938afb45b248
                              • Instruction ID: 9f53e151105bc973a8cfb2aa3b226d3df507ed2ebd6c197bd5ec534040f52d7c
                              • Opcode Fuzzy Hash: 84775ec098c2c73426ed54a43f1c071e125b4e968b62642b5a15938afb45b248
                              • Instruction Fuzzy Hash: 17C002311511C1BAEA215BB7AC0DD873E3DE7CAF52721026CB211950B5966500A6D624