Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
of5HklY9qP.exe

Overview

General Information

Sample name:of5HklY9qP.exe
renamed because original name is a hash value
Original sample name:5aafd78c24d92f25dd27dfea5492fa2212d52586af05400e55853f3f2218de8d.exe
Analysis ID:1588704
MD5:57e3ec29544a0c1841ba8c9bef860cf9
SHA1:c1c1ac0421a0b16d07c412f8957335348f24a64b
SHA256:5aafd78c24d92f25dd27dfea5492fa2212d52586af05400e55853f3f2218de8d
Tags:exeuser-adrian__luca
Infos:

Detection

Score:88
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Writes to foreign memory regions
Yara detected Costura Assembly Loader
AV process strings found (often used to terminate AV products)
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • of5HklY9qP.exe (PID: 3048 cmdline: "C:\Users\user\Desktop\of5HklY9qP.exe" MD5: 57E3EC29544A0C1841BA8C9BEF860CF9)
    • RegSvcs.exe (PID: 7288 cmdline: "C:\Users\user\Desktop\of5HklY9qP.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000002.00000002.3782158659.0000000003AF1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
    00000002.00000002.3782668497.00000000050D0000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
      00000002.00000002.3781143208.0000000002AF1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
        Process Memory Space: RegSvcs.exe PID: 7288JoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
          SourceRuleDescriptionAuthorStrings
          2.2.RegSvcs.exe.50d0000.6.raw.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
            2.2.RegSvcs.exe.3b1d790.2.raw.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
              No Sigma rule has matched
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-11T04:25:47.550561+010028590871Malware Command and Control Activity Detected192.168.2.1049737163.5.32.407702TCP
              2025-01-11T04:26:08.907493+010028590871Malware Command and Control Activity Detected192.168.2.1049873163.5.32.407702TCP
              2025-01-11T04:26:30.277546+010028590871Malware Command and Control Activity Detected192.168.2.1049977163.5.32.407702TCP
              2025-01-11T04:26:51.672483+010028590871Malware Command and Control Activity Detected192.168.2.1049979163.5.32.407702TCP
              2025-01-11T04:27:13.032866+010028590871Malware Command and Control Activity Detected192.168.2.1049980163.5.32.407702TCP
              2025-01-11T04:27:34.459237+010028590871Malware Command and Control Activity Detected192.168.2.1049981163.5.32.407702TCP
              2025-01-11T04:27:55.835030+010028590871Malware Command and Control Activity Detected192.168.2.1049982163.5.32.407702TCP
              2025-01-11T04:28:17.199597+010028590871Malware Command and Control Activity Detected192.168.2.1049983163.5.32.407702TCP
              2025-01-11T04:28:38.601940+010028590871Malware Command and Control Activity Detected192.168.2.1049984163.5.32.407702TCP
              2025-01-11T04:29:00.003866+010028590871Malware Command and Control Activity Detected192.168.2.1049985163.5.32.407702TCP
              2025-01-11T04:29:21.376936+010028590871Malware Command and Control Activity Detected192.168.2.1049986163.5.32.407702TCP
              2025-01-11T04:29:42.753769+010028590871Malware Command and Control Activity Detected192.168.2.1049987163.5.32.407702TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: of5HklY9qP.exeVirustotal: Detection: 63%Perma Link
              Source: of5HklY9qP.exeReversingLabs: Detection: 79%
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
              Source: of5HklY9qP.exeJoe Sandbox ML: detected
              Source: of5HklY9qP.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
              Source: Binary string: wntdll.pdbUGP source: of5HklY9qP.exe, 00000000.00000003.1339306073.0000000003DA0000.00000004.00001000.00020000.00000000.sdmp, of5HklY9qP.exe, 00000000.00000003.1336892260.0000000003C00000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: wntdll.pdb source: of5HklY9qP.exe, 00000000.00000003.1339306073.0000000003DA0000.00000004.00001000.00020000.00000000.sdmp, of5HklY9qP.exe, 00000000.00000003.1336892260.0000000003C00000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: protobuf-net.pdbSHA256}Lq source: RegSvcs.exe, 00000002.00000002.3781143208.0000000002AF1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3782979552.00000000052E0000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3782158659.0000000003AF1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3782158659.0000000003BBD000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: protobuf-net.pdb source: RegSvcs.exe, 00000002.00000002.3781143208.0000000002AF1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3782979552.00000000052E0000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3782158659.0000000003AF1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3782158659.0000000003BBD000.00000004.00000800.00020000.00000000.sdmp
              Source: C:\Users\user\Desktop\of5HklY9qP.exeCode function: 0_2_007D445A GetFileAttributesW,FindFirstFileW,FindClose,0_2_007D445A
              Source: C:\Users\user\Desktop\of5HklY9qP.exeCode function: 0_2_007DC6D1 FindFirstFileW,FindClose,0_2_007DC6D1
              Source: C:\Users\user\Desktop\of5HklY9qP.exeCode function: 0_2_007DC75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_007DC75C
              Source: C:\Users\user\Desktop\of5HklY9qP.exeCode function: 0_2_007DEF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_007DEF95
              Source: C:\Users\user\Desktop\of5HklY9qP.exeCode function: 0_2_007DF0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_007DF0F2
              Source: C:\Users\user\Desktop\of5HklY9qP.exeCode function: 0_2_007DF3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_007DF3F3
              Source: C:\Users\user\Desktop\of5HklY9qP.exeCode function: 0_2_007D37EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_007D37EF
              Source: C:\Users\user\Desktop\of5HklY9qP.exeCode function: 0_2_007D3B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_007D3B12
              Source: C:\Users\user\Desktop\of5HklY9qP.exeCode function: 0_2_007DBCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_007DBCBC

              Networking

              barindex
              Source: Network trafficSuricata IDS: 2859087 - Severity 1 - ETPRO MALWARE Win32/zgRAT CnC Checkin : 192.168.2.10:49737 -> 163.5.32.40:7702
              Source: Network trafficSuricata IDS: 2859087 - Severity 1 - ETPRO MALWARE Win32/zgRAT CnC Checkin : 192.168.2.10:49873 -> 163.5.32.40:7702
              Source: Network trafficSuricata IDS: 2859087 - Severity 1 - ETPRO MALWARE Win32/zgRAT CnC Checkin : 192.168.2.10:49980 -> 163.5.32.40:7702
              Source: Network trafficSuricata IDS: 2859087 - Severity 1 - ETPRO MALWARE Win32/zgRAT CnC Checkin : 192.168.2.10:49982 -> 163.5.32.40:7702
              Source: Network trafficSuricata IDS: 2859087 - Severity 1 - ETPRO MALWARE Win32/zgRAT CnC Checkin : 192.168.2.10:49981 -> 163.5.32.40:7702
              Source: Network trafficSuricata IDS: 2859087 - Severity 1 - ETPRO MALWARE Win32/zgRAT CnC Checkin : 192.168.2.10:49984 -> 163.5.32.40:7702
              Source: Network trafficSuricata IDS: 2859087 - Severity 1 - ETPRO MALWARE Win32/zgRAT CnC Checkin : 192.168.2.10:49983 -> 163.5.32.40:7702
              Source: Network trafficSuricata IDS: 2859087 - Severity 1 - ETPRO MALWARE Win32/zgRAT CnC Checkin : 192.168.2.10:49985 -> 163.5.32.40:7702
              Source: Network trafficSuricata IDS: 2859087 - Severity 1 - ETPRO MALWARE Win32/zgRAT CnC Checkin : 192.168.2.10:49987 -> 163.5.32.40:7702
              Source: Network trafficSuricata IDS: 2859087 - Severity 1 - ETPRO MALWARE Win32/zgRAT CnC Checkin : 192.168.2.10:49986 -> 163.5.32.40:7702
              Source: Network trafficSuricata IDS: 2859087 - Severity 1 - ETPRO MALWARE Win32/zgRAT CnC Checkin : 192.168.2.10:49979 -> 163.5.32.40:7702
              Source: Network trafficSuricata IDS: 2859087 - Severity 1 - ETPRO MALWARE Win32/zgRAT CnC Checkin : 192.168.2.10:49977 -> 163.5.32.40:7702
              Source: global trafficTCP traffic: 192.168.2.10:49737 -> 163.5.32.40:7702
              Source: Joe Sandbox ViewASN Name: EPITECHFR EPITECHFR
              Source: unknownTCP traffic detected without corresponding DNS query: 163.5.32.40
              Source: unknownTCP traffic detected without corresponding DNS query: 163.5.32.40
              Source: unknownTCP traffic detected without corresponding DNS query: 163.5.32.40
              Source: unknownTCP traffic detected without corresponding DNS query: 163.5.32.40
              Source: unknownTCP traffic detected without corresponding DNS query: 163.5.32.40
              Source: unknownTCP traffic detected without corresponding DNS query: 163.5.32.40
              Source: unknownTCP traffic detected without corresponding DNS query: 163.5.32.40
              Source: unknownTCP traffic detected without corresponding DNS query: 163.5.32.40
              Source: unknownTCP traffic detected without corresponding DNS query: 163.5.32.40
              Source: unknownTCP traffic detected without corresponding DNS query: 163.5.32.40
              Source: unknownTCP traffic detected without corresponding DNS query: 163.5.32.40
              Source: unknownTCP traffic detected without corresponding DNS query: 163.5.32.40
              Source: unknownTCP traffic detected without corresponding DNS query: 163.5.32.40
              Source: unknownTCP traffic detected without corresponding DNS query: 163.5.32.40
              Source: unknownTCP traffic detected without corresponding DNS query: 163.5.32.40
              Source: unknownTCP traffic detected without corresponding DNS query: 163.5.32.40
              Source: unknownTCP traffic detected without corresponding DNS query: 163.5.32.40
              Source: unknownTCP traffic detected without corresponding DNS query: 163.5.32.40
              Source: unknownTCP traffic detected without corresponding DNS query: 163.5.32.40
              Source: unknownTCP traffic detected without corresponding DNS query: 163.5.32.40
              Source: unknownTCP traffic detected without corresponding DNS query: 163.5.32.40
              Source: unknownTCP traffic detected without corresponding DNS query: 163.5.32.40
              Source: unknownTCP traffic detected without corresponding DNS query: 163.5.32.40
              Source: unknownTCP traffic detected without corresponding DNS query: 163.5.32.40
              Source: unknownTCP traffic detected without corresponding DNS query: 163.5.32.40
              Source: unknownTCP traffic detected without corresponding DNS query: 163.5.32.40
              Source: unknownTCP traffic detected without corresponding DNS query: 163.5.32.40
              Source: unknownTCP traffic detected without corresponding DNS query: 163.5.32.40
              Source: unknownTCP traffic detected without corresponding DNS query: 163.5.32.40
              Source: unknownTCP traffic detected without corresponding DNS query: 163.5.32.40
              Source: unknownTCP traffic detected without corresponding DNS query: 163.5.32.40
              Source: unknownTCP traffic detected without corresponding DNS query: 163.5.32.40
              Source: unknownTCP traffic detected without corresponding DNS query: 163.5.32.40
              Source: unknownTCP traffic detected without corresponding DNS query: 163.5.32.40
              Source: unknownTCP traffic detected without corresponding DNS query: 163.5.32.40
              Source: unknownTCP traffic detected without corresponding DNS query: 163.5.32.40
              Source: unknownTCP traffic detected without corresponding DNS query: 163.5.32.40
              Source: unknownTCP traffic detected without corresponding DNS query: 163.5.32.40
              Source: unknownTCP traffic detected without corresponding DNS query: 163.5.32.40
              Source: unknownTCP traffic detected without corresponding DNS query: 163.5.32.40
              Source: unknownTCP traffic detected without corresponding DNS query: 163.5.32.40
              Source: unknownTCP traffic detected without corresponding DNS query: 163.5.32.40
              Source: unknownTCP traffic detected without corresponding DNS query: 163.5.32.40
              Source: unknownTCP traffic detected without corresponding DNS query: 163.5.32.40
              Source: unknownTCP traffic detected without corresponding DNS query: 163.5.32.40
              Source: unknownTCP traffic detected without corresponding DNS query: 163.5.32.40
              Source: unknownTCP traffic detected without corresponding DNS query: 163.5.32.40
              Source: unknownTCP traffic detected without corresponding DNS query: 163.5.32.40
              Source: unknownTCP traffic detected without corresponding DNS query: 163.5.32.40
              Source: unknownTCP traffic detected without corresponding DNS query: 163.5.32.40
              Source: C:\Users\user\Desktop\of5HklY9qP.exeCode function: 0_2_007E22EE InternetReadFile,InternetQueryDataAvailable,InternetReadFile,0_2_007E22EE
              Source: RegSvcs.exe, 00000002.00000002.3781143208.0000000002AF1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://archive.torproject.org/tor-package-archive/torbrowser/13.0.9/tor-expert-bundle-windows-i686-
              Source: RegSvcs.exe, 00000002.00000002.3781143208.0000000002AF1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3782979552.00000000052E0000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3782158659.0000000003AF1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3782158659.0000000003BBD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-net
              Source: RegSvcs.exe, 00000002.00000002.3781143208.0000000002AF1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3782979552.00000000052E0000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3782158659.0000000003AF1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3782158659.0000000003BBD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-netJ
              Source: RegSvcs.exe, 00000002.00000002.3781143208.0000000002AF1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3782979552.00000000052E0000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3782158659.0000000003AF1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3782158659.0000000003BBD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-neti
              Source: RegSvcs.exe, 00000002.00000002.3781143208.0000000002AF1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3782979552.00000000052E0000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3782158659.0000000003AF1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3782158659.0000000003BBD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/11564914/23354;
              Source: RegSvcs.exe, 00000002.00000002.3781143208.0000000002AF1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3782979552.00000000052E0000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3782158659.0000000003AF1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3782158659.0000000003BBD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/14436606/23354
              Source: RegSvcs.exe, 00000002.00000002.3782979552.00000000052E0000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3782158659.0000000003AF1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3782158659.0000000003BBD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/2152978/23354
              Source: C:\Users\user\Desktop\of5HklY9qP.exeCode function: 0_2_007E4164 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_007E4164
              Source: C:\Users\user\Desktop\of5HklY9qP.exeCode function: 0_2_007E4164 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_007E4164
              Source: C:\Users\user\Desktop\of5HklY9qP.exeCode function: 0_2_007E3F66 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_007E3F66
              Source: C:\Users\user\Desktop\of5HklY9qP.exeCode function: 0_2_007D001C GetKeyboardState,SetKeyboardState,GetAsyncKeyState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,0_2_007D001C
              Source: C:\Users\user\Desktop\of5HklY9qP.exeCode function: 0_2_007FCABC DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_007FCABC

              System Summary

              barindex
              Source: C:\Users\user\Desktop\of5HklY9qP.exeCode function: This is a third-party compiled AutoIt script.0_2_00773B3A
              Source: of5HklY9qP.exeString found in binary or memory: This is a third-party compiled AutoIt script.
              Source: of5HklY9qP.exe, 00000000.00000000.1326070892.0000000000824000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_65bf7f8f-8
              Source: of5HklY9qP.exe, 00000000.00000000.1326070892.0000000000824000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_d9e2d379-f
              Source: of5HklY9qP.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_32f0f130-f
              Source: of5HklY9qP.exeString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_c96774e3-a
              Source: C:\Users\user\Desktop\of5HklY9qP.exeCode function: 0_2_007DA1EF: GetFullPathNameW,__swprintf,CreateDirectoryW,CreateFileW,_memset,_wcsncpy,DeviceIoControl,CloseHandle,RemoveDirectoryW,CloseHandle,0_2_007DA1EF
              Source: C:\Users\user\Desktop\of5HklY9qP.exeCode function: 0_2_007C85B0 GetCurrentProcess,OpenProcessToken,CreateEnvironmentBlock,CloseHandle,CreateProcessWithLogonW,DestroyEnvironmentBlock,0_2_007C85B0
              Source: C:\Users\user\Desktop\of5HklY9qP.exeCode function: 0_2_007D51BD ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_007D51BD
              Source: C:\Users\user\Desktop\of5HklY9qP.exeCode function: 0_2_0079D9750_2_0079D975
              Source: C:\Users\user\Desktop\of5HklY9qP.exeCode function: 0_2_0077FCE00_2_0077FCE0
              Source: C:\Users\user\Desktop\of5HklY9qP.exeCode function: 0_2_007921C50_2_007921C5
              Source: C:\Users\user\Desktop\of5HklY9qP.exeCode function: 0_2_007A62D20_2_007A62D2
              Source: C:\Users\user\Desktop\of5HklY9qP.exeCode function: 0_2_007F03DA0_2_007F03DA
              Source: C:\Users\user\Desktop\of5HklY9qP.exeCode function: 0_2_007A242E0_2_007A242E
              Source: C:\Users\user\Desktop\of5HklY9qP.exeCode function: 0_2_007925FA0_2_007925FA
              Source: C:\Users\user\Desktop\of5HklY9qP.exeCode function: 0_2_007CE6160_2_007CE616
              Source: C:\Users\user\Desktop\of5HklY9qP.exeCode function: 0_2_007866E10_2_007866E1
              Source: C:\Users\user\Desktop\of5HklY9qP.exeCode function: 0_2_0077E6A00_2_0077E6A0
              Source: C:\Users\user\Desktop\of5HklY9qP.exeCode function: 0_2_007A878F0_2_007A878F
              Source: C:\Users\user\Desktop\of5HklY9qP.exeCode function: 0_2_007F08570_2_007F0857
              Source: C:\Users\user\Desktop\of5HklY9qP.exeCode function: 0_2_007A68440_2_007A6844
              Source: C:\Users\user\Desktop\of5HklY9qP.exeCode function: 0_2_007888080_2_00788808
              Source: C:\Users\user\Desktop\of5HklY9qP.exeCode function: 0_2_007D88890_2_007D8889
              Source: C:\Users\user\Desktop\of5HklY9qP.exeCode function: 0_2_0079CB210_2_0079CB21
              Source: C:\Users\user\Desktop\of5HklY9qP.exeCode function: 0_2_007A6DB60_2_007A6DB6
              Source: C:\Users\user\Desktop\of5HklY9qP.exeCode function: 0_2_00786F9E0_2_00786F9E
              Source: C:\Users\user\Desktop\of5HklY9qP.exeCode function: 0_2_007830300_2_00783030
              Source: C:\Users\user\Desktop\of5HklY9qP.exeCode function: 0_2_0079F1D90_2_0079F1D9
              Source: C:\Users\user\Desktop\of5HklY9qP.exeCode function: 0_2_007931870_2_00793187
              Source: C:\Users\user\Desktop\of5HklY9qP.exeCode function: 0_2_007712870_2_00771287
              Source: C:\Users\user\Desktop\of5HklY9qP.exeCode function: 0_2_007914840_2_00791484
              Source: C:\Users\user\Desktop\of5HklY9qP.exeCode function: 0_2_007855200_2_00785520
              Source: C:\Users\user\Desktop\of5HklY9qP.exeCode function: 0_2_007976960_2_00797696
              Source: C:\Users\user\Desktop\of5HklY9qP.exeCode function: 0_2_007857600_2_00785760
              Source: C:\Users\user\Desktop\of5HklY9qP.exeCode function: 0_2_007919780_2_00791978
              Source: C:\Users\user\Desktop\of5HklY9qP.exeCode function: 0_2_007A9AB50_2_007A9AB5
              Source: C:\Users\user\Desktop\of5HklY9qP.exeCode function: 0_2_007F7DDB0_2_007F7DDB
              Source: C:\Users\user\Desktop\of5HklY9qP.exeCode function: 0_2_0079BDA60_2_0079BDA6
              Source: C:\Users\user\Desktop\of5HklY9qP.exeCode function: 0_2_00791D900_2_00791D90
              Source: C:\Users\user\Desktop\of5HklY9qP.exeCode function: 0_2_0077DF000_2_0077DF00
              Source: C:\Users\user\Desktop\of5HklY9qP.exeCode function: 0_2_00783FE00_2_00783FE0
              Source: C:\Users\user\Desktop\of5HklY9qP.exeCode function: 0_2_013334480_2_01333448
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_029BD2D02_2_029BD2D0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_029B4D192_2_029B4D19
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_029B15302_2_029B1530
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_029B4D282_2_029B4D28
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_029B15502_2_029B1550
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_04FB76682_2_04FB7668
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_04FBC1A82_2_04FBC1A8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_04FBC9182_2_04FBC918
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_04FB46892_2_04FB4689
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_04FB76582_2_04FB7658
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_04FB30C92_2_04FB30C9
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_04FB406C2_2_04FB406C
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_04FBC1972_2_04FBC197
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_04FBC2BA2_2_04FBC2BA
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_04FBBA402_2_04FBBA40
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_04FBBA312_2_04FBBA31
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0512671B2_2_0512671B
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_05124A382_2_05124A38
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_051295582_2_05129558
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_051292572_2_05129257
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_05377B002_2_05377B00
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_05377E272_2_05377E27
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_05378B982_2_05378B98
              Source: C:\Users\user\Desktop\of5HklY9qP.exeCode function: String function: 00790AE3 appears 70 times
              Source: C:\Users\user\Desktop\of5HklY9qP.exeCode function: String function: 00777DE1 appears 36 times
              Source: C:\Users\user\Desktop\of5HklY9qP.exeCode function: String function: 00798900 appears 42 times
              Source: of5HklY9qP.exe, 00000000.00000003.1336574942.0000000003ECD000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs of5HklY9qP.exe
              Source: of5HklY9qP.exe, 00000000.00000003.1335316796.0000000003CB3000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs of5HklY9qP.exe
              Source: of5HklY9qP.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
              Source: classification engineClassification label: mal88.evad.winEXE@3/2@0/1
              Source: C:\Users\user\Desktop\of5HklY9qP.exeCode function: 0_2_007DA06A GetLastError,FormatMessageW,0_2_007DA06A
              Source: C:\Users\user\Desktop\of5HklY9qP.exeCode function: 0_2_007C81CB AdjustTokenPrivileges,CloseHandle,0_2_007C81CB
              Source: C:\Users\user\Desktop\of5HklY9qP.exeCode function: 0_2_007C87E1 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_007C87E1
              Source: C:\Users\user\Desktop\of5HklY9qP.exeCode function: 0_2_007DB333 SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_007DB333
              Source: C:\Users\user\Desktop\of5HklY9qP.exeCode function: 0_2_007EEE0D CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_007EEE0D
              Source: C:\Users\user\Desktop\of5HklY9qP.exeCode function: 0_2_007E83BB CoInitialize,CoUninitialize,CoCreateInstance,IIDFromString,VariantInit,VariantClear,0_2_007E83BB
              Source: C:\Users\user\Desktop\of5HklY9qP.exeCode function: 0_2_00774E89 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_00774E89
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: \Sessions\1\BaseNamedObjects\345392b8d7161851
              Source: C:\Users\user\Desktop\of5HklY9qP.exeFile created: C:\Users\user\AppData\Local\Temp\autD0CA.tmpJump to behavior
              Source: of5HklY9qP.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Users\user\Desktop\of5HklY9qP.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: of5HklY9qP.exeVirustotal: Detection: 63%
              Source: of5HklY9qP.exeReversingLabs: Detection: 79%
              Source: unknownProcess created: C:\Users\user\Desktop\of5HklY9qP.exe "C:\Users\user\Desktop\of5HklY9qP.exe"
              Source: C:\Users\user\Desktop\of5HklY9qP.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\of5HklY9qP.exe"
              Source: C:\Users\user\Desktop\of5HklY9qP.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\of5HklY9qP.exe"Jump to behavior
              Source: C:\Users\user\Desktop\of5HklY9qP.exeSection loaded: wsock32.dllJump to behavior
              Source: C:\Users\user\Desktop\of5HklY9qP.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\of5HklY9qP.exeSection loaded: winmm.dllJump to behavior
              Source: C:\Users\user\Desktop\of5HklY9qP.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Users\user\Desktop\of5HklY9qP.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Users\user\Desktop\of5HklY9qP.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\of5HklY9qP.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\of5HklY9qP.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\of5HklY9qP.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\of5HklY9qP.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\of5HklY9qP.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\of5HklY9qP.exeSection loaded: ntmarta.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
              Source: of5HklY9qP.exeStatic file information: File size 1350144 > 1048576
              Source: of5HklY9qP.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
              Source: of5HklY9qP.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
              Source: of5HklY9qP.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
              Source: of5HklY9qP.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
              Source: of5HklY9qP.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
              Source: of5HklY9qP.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
              Source: of5HklY9qP.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
              Source: Binary string: wntdll.pdbUGP source: of5HklY9qP.exe, 00000000.00000003.1339306073.0000000003DA0000.00000004.00001000.00020000.00000000.sdmp, of5HklY9qP.exe, 00000000.00000003.1336892260.0000000003C00000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: wntdll.pdb source: of5HklY9qP.exe, 00000000.00000003.1339306073.0000000003DA0000.00000004.00001000.00020000.00000000.sdmp, of5HklY9qP.exe, 00000000.00000003.1336892260.0000000003C00000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: protobuf-net.pdbSHA256}Lq source: RegSvcs.exe, 00000002.00000002.3781143208.0000000002AF1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3782979552.00000000052E0000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3782158659.0000000003AF1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3782158659.0000000003BBD000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: protobuf-net.pdb source: RegSvcs.exe, 00000002.00000002.3781143208.0000000002AF1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3782979552.00000000052E0000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3782158659.0000000003AF1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3782158659.0000000003BBD000.00000004.00000800.00020000.00000000.sdmp
              Source: of5HklY9qP.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
              Source: of5HklY9qP.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
              Source: of5HklY9qP.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
              Source: of5HklY9qP.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
              Source: of5HklY9qP.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

              Data Obfuscation

              barindex
              Source: Yara matchFile source: 2.2.RegSvcs.exe.50d0000.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.3b1d790.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000002.00000002.3782158659.0000000003AF1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.3782668497.00000000050D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.3781143208.0000000002AF1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7288, type: MEMORYSTR
              Source: C:\Users\user\Desktop\of5HklY9qP.exeCode function: 0_2_00774B37 LoadLibraryA,GetProcAddress,0_2_00774B37
              Source: C:\Users\user\Desktop\of5HklY9qP.exeCode function: 0_2_0077C4C7 push A30077BAh; retn 0077h0_2_0077C50D
              Source: C:\Users\user\Desktop\of5HklY9qP.exeCode function: 0_2_00798945 push ecx; ret 0_2_00798958
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_05120F68 push esp; iretd 2_2_051210E9
              Source: C:\Users\user\Desktop\of5HklY9qP.exeCode function: 0_2_007748D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_007748D7
              Source: C:\Users\user\Desktop\of5HklY9qP.exeCode function: 0_2_007F5376 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_007F5376
              Source: C:\Users\user\Desktop\of5HklY9qP.exeCode function: 0_2_00793187 EncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00793187
              Source: C:\Users\user\Desktop\of5HklY9qP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\of5HklY9qP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: C:\Users\user\Desktop\of5HklY9qP.exeAPI/Special instruction interceptor: Address: 133306C
              Source: of5HklY9qP.exe, 00000000.00000003.1327412780.000000000139C000.00000004.00000020.00020000.00000000.sdmp, of5HklY9qP.exe, 00000000.00000002.1341378563.000000000140A000.00000004.00000020.00020000.00000000.sdmp, of5HklY9qP.exe, 00000000.00000003.1327540017.000000000140A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PROCMON.EXE
              Source: RegSvcs.exe, 00000002.00000002.3781143208.0000000002AF1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
              Source: of5HklY9qP.exe, 00000000.00000003.1327412780.000000000139C000.00000004.00000020.00020000.00000000.sdmp, of5HklY9qP.exe, 00000000.00000002.1341378563.000000000140A000.00000004.00000020.00020000.00000000.sdmp, of5HklY9qP.exe, 00000000.00000003.1327540017.000000000140A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PROCMON.EXESY
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 7926Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 1927Jump to behavior
              Source: C:\Users\user\Desktop\of5HklY9qP.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-102434
              Source: C:\Users\user\Desktop\of5HklY9qP.exeAPI coverage: 4.4 %
              Source: C:\Users\user\Desktop\of5HklY9qP.exeCode function: 0_2_007D445A GetFileAttributesW,FindFirstFileW,FindClose,0_2_007D445A
              Source: C:\Users\user\Desktop\of5HklY9qP.exeCode function: 0_2_007DC6D1 FindFirstFileW,FindClose,0_2_007DC6D1
              Source: C:\Users\user\Desktop\of5HklY9qP.exeCode function: 0_2_007DC75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_007DC75C
              Source: C:\Users\user\Desktop\of5HklY9qP.exeCode function: 0_2_007DEF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_007DEF95
              Source: C:\Users\user\Desktop\of5HklY9qP.exeCode function: 0_2_007DF0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_007DF0F2
              Source: C:\Users\user\Desktop\of5HklY9qP.exeCode function: 0_2_007DF3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_007DF3F3
              Source: C:\Users\user\Desktop\of5HklY9qP.exeCode function: 0_2_007D37EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_007D37EF
              Source: C:\Users\user\Desktop\of5HklY9qP.exeCode function: 0_2_007D3B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_007D3B12
              Source: C:\Users\user\Desktop\of5HklY9qP.exeCode function: 0_2_007DBCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_007DBCBC
              Source: C:\Users\user\Desktop\of5HklY9qP.exeCode function: 0_2_007749A0 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_007749A0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: RegSvcs.exe, 00000002.00000002.3781143208.0000000002AF1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 0VMware|VIRTUAL|A M I|Xen4win32_process.handle='{0}'
              Source: RegSvcs.exe, 00000002.00000002.3781143208.0000000002AF1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmGuestLib.dllDselect * from Win32_ComputerSystem
              Source: RegSvcs.exe, 00000002.00000002.3781143208.0000000002AF1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: model0Microsoft|VMWare|Virtual
              Source: RegSvcs.exe, 00000002.00000002.3780396305.0000000000E72000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dlld
              Source: C:\Users\user\Desktop\of5HklY9qP.exeCode function: 0_2_007E3F09 BlockInput,0_2_007E3F09
              Source: C:\Users\user\Desktop\of5HklY9qP.exeCode function: 0_2_00773B3A GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00773B3A
              Source: C:\Users\user\Desktop\of5HklY9qP.exeCode function: 0_2_007A5A7C EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_007A5A7C
              Source: C:\Users\user\Desktop\of5HklY9qP.exeCode function: 0_2_00774B37 LoadLibraryA,GetProcAddress,0_2_00774B37
              Source: C:\Users\user\Desktop\of5HklY9qP.exeCode function: 0_2_01333338 mov eax, dword ptr fs:[00000030h]0_2_01333338
              Source: C:\Users\user\Desktop\of5HklY9qP.exeCode function: 0_2_013332D8 mov eax, dword ptr fs:[00000030h]0_2_013332D8
              Source: C:\Users\user\Desktop\of5HklY9qP.exeCode function: 0_2_01331C98 mov eax, dword ptr fs:[00000030h]0_2_01331C98
              Source: C:\Users\user\Desktop\of5HklY9qP.exeCode function: 0_2_007C80A9 GetTokenInformation,GetLastError,GetProcessHeap,HeapAlloc,GetTokenInformation,0_2_007C80A9
              Source: C:\Users\user\Desktop\of5HklY9qP.exeCode function: 0_2_0079A155 SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0079A155
              Source: C:\Users\user\Desktop\of5HklY9qP.exeCode function: 0_2_0079A124 SetUnhandledExceptionFilter,0_2_0079A124
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Users\user\Desktop\of5HklY9qP.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
              Source: C:\Users\user\Desktop\of5HklY9qP.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 990008Jump to behavior
              Source: C:\Users\user\Desktop\of5HklY9qP.exeCode function: 0_2_007C87B1 LogonUserW,0_2_007C87B1
              Source: C:\Users\user\Desktop\of5HklY9qP.exeCode function: 0_2_00773B3A GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00773B3A
              Source: C:\Users\user\Desktop\of5HklY9qP.exeCode function: 0_2_007748D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_007748D7
              Source: C:\Users\user\Desktop\of5HklY9qP.exeCode function: 0_2_007D4C7F mouse_event,0_2_007D4C7F
              Source: C:\Users\user\Desktop\of5HklY9qP.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\of5HklY9qP.exe"Jump to behavior
              Source: C:\Users\user\Desktop\of5HklY9qP.exeCode function: 0_2_007C7CAF GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_007C7CAF
              Source: C:\Users\user\Desktop\of5HklY9qP.exeCode function: 0_2_007C874B AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_007C874B
              Source: of5HklY9qP.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
              Source: of5HklY9qP.exeBinary or memory string: Shell_TrayWnd
              Source: C:\Users\user\Desktop\of5HklY9qP.exeCode function: 0_2_0079862B cpuid 0_2_0079862B
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\of5HklY9qP.exeCode function: 0_2_007A4E87 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_007A4E87
              Source: C:\Users\user\Desktop\of5HklY9qP.exeCode function: 0_2_007B1E06 GetUserNameW,0_2_007B1E06
              Source: C:\Users\user\Desktop\of5HklY9qP.exeCode function: 0_2_007A3F3A __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_007A3F3A
              Source: C:\Users\user\Desktop\of5HklY9qP.exeCode function: 0_2_007749A0 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_007749A0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
              Source: of5HklY9qP.exe, 00000000.00000003.1327412780.000000000139C000.00000004.00000020.00020000.00000000.sdmp, of5HklY9qP.exe, 00000000.00000002.1341378563.000000000140A000.00000004.00000020.00020000.00000000.sdmp, of5HklY9qP.exe, 00000000.00000003.1327540017.000000000140A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: procmon.exe
              Source: of5HklY9qP.exeBinary or memory string: WIN_81
              Source: of5HklY9qP.exeBinary or memory string: WIN_XP
              Source: of5HklY9qP.exeBinary or memory string: WIN_XPe
              Source: of5HklY9qP.exeBinary or memory string: WIN_VISTA
              Source: of5HklY9qP.exeBinary or memory string: WIN_7
              Source: of5HklY9qP.exeBinary or memory string: WIN_8
              Source: of5HklY9qP.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 0USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte
              Source: C:\Users\user\Desktop\of5HklY9qP.exeCode function: 0_2_007E6283 socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,0_2_007E6283
              Source: C:\Users\user\Desktop\of5HklY9qP.exeCode function: 0_2_007E6747 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_007E6747
              Source: C:\Users\user\Desktop\of5HklY9qP.exeCode function: 0_2_007A7AA1 RpcBindingSetOption,_LocaleUpdate::_LocaleUpdate,_memset,WideCharToMultiByte,GetLastError,_memset,0_2_007A7AA1
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire Infrastructure2
              Valid Accounts
              2
              Native API
              1
              DLL Side-Loading
              1
              Exploitation for Privilege Escalation
              11
              Disable or Modify Tools
              21
              Input Capture
              2
              System Time Discovery
              Remote Services1
              Archive Collected Data
              1
              Ingress Tool Transfer
              Exfiltration Over Other Network Medium1
              System Shutdown/Reboot
              CredentialsDomainsDefault AccountsScheduled Task/Job2
              Valid Accounts
              1
              DLL Side-Loading
              1
              Deobfuscate/Decode Files or Information
              LSASS Memory1
              Account Discovery
              Remote Desktop Protocol21
              Input Capture
              1
              Encrypted Channel
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
              Valid Accounts
              2
              Obfuscated Files or Information
              Security Account Manager1
              File and Directory Discovery
              SMB/Windows Admin Shares3
              Clipboard Data
              1
              Non-Standard Port
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
              Access Token Manipulation
              1
              DLL Side-Loading
              NTDS126
              System Information Discovery
              Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
              Process Injection
              2
              Valid Accounts
              LSA Secrets241
              Security Software Discovery
              SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts11
              Virtualization/Sandbox Evasion
              Cached Domain Credentials11
              Virtualization/Sandbox Evasion
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items21
              Access Token Manipulation
              DCSync2
              Process Discovery
              Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job212
              Process Injection
              Proc Filesystem11
              Application Window Discovery
              Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
              Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
              System Owner/User Discovery
              Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              of5HklY9qP.exe64%VirustotalBrowse
              of5HklY9qP.exe79%ReversingLabsWin32.Trojan.AutoItinject
              of5HklY9qP.exe100%Joe Sandbox ML
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              NameIPActiveMaliciousAntivirus DetectionReputation
              s-part-0017.t-0009.t-msedge.net
              13.107.246.45
              truefalse
                high
                NameSourceMaliciousAntivirus DetectionReputation
                https://github.com/mgravell/protobuf-netRegSvcs.exe, 00000002.00000002.3781143208.0000000002AF1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3782979552.00000000052E0000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3782158659.0000000003AF1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3782158659.0000000003BBD000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  https://github.com/mgravell/protobuf-netiRegSvcs.exe, 00000002.00000002.3781143208.0000000002AF1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3782979552.00000000052E0000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3782158659.0000000003AF1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3782158659.0000000003BBD000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    https://stackoverflow.com/q/14436606/23354RegSvcs.exe, 00000002.00000002.3781143208.0000000002AF1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3782979552.00000000052E0000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3782158659.0000000003AF1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3782158659.0000000003BBD000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      https://github.com/mgravell/protobuf-netJRegSvcs.exe, 00000002.00000002.3781143208.0000000002AF1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3782979552.00000000052E0000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3782158659.0000000003AF1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3782158659.0000000003BBD000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        https://stackoverflow.com/q/11564914/23354;RegSvcs.exe, 00000002.00000002.3781143208.0000000002AF1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3782979552.00000000052E0000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3782158659.0000000003AF1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3782158659.0000000003BBD000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          https://stackoverflow.com/q/2152978/23354RegSvcs.exe, 00000002.00000002.3782979552.00000000052E0000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3782158659.0000000003AF1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3782158659.0000000003BBD000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs
                            IPDomainCountryFlagASNASN NameMalicious
                            163.5.32.40
                            unknownFrance
                            56339EPITECHFRtrue
                            Joe Sandbox version:42.0.0 Malachite
                            Analysis ID:1588704
                            Start date and time:2025-01-11 04:24:47 +01:00
                            Joe Sandbox product:CloudBasic
                            Overall analysis duration:0h 8m 5s
                            Hypervisor based Inspection enabled:false
                            Report type:full
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                            Number of analysed new started processes analysed:7
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Sample name:of5HklY9qP.exe
                            renamed because original name is a hash value
                            Original Sample Name:5aafd78c24d92f25dd27dfea5492fa2212d52586af05400e55853f3f2218de8d.exe
                            Detection:MAL
                            Classification:mal88.evad.winEXE@3/2@0/1
                            EGA Information:
                            • Successful, ratio: 100%
                            HCA Information:
                            • Successful, ratio: 93%
                            • Number of executed functions: 47
                            • Number of non-executed functions: 284
                            Cookbook Comments:
                            • Found application associated with file extension: .exe
                            • Override analysis time to 240000 for current running targets taking high CPU consumption
                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                            • Excluded IPs from analysis (whitelisted): 13.107.246.45, 20.109.210.53
                            • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, otelrules.azureedge.net, otelrules.afd.azureedge.net, ctldl.windowsupdate.com, azureedge-t-prod.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
                            • Not all processes where analyzed, report is missing behavior information
                            • Report size exceeded maximum capacity and may have missing disassembly code.
                            • Report size getting too big, too many NtProtectVirtualMemory calls found.
                            • Report size getting too big, too many NtQueryValueKey calls found.
                            TimeTypeDescription
                            22:25:47API Interceptor10536435x Sleep call for process: RegSvcs.exe modified
                            No context
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            s-part-0017.t-0009.t-msedge.netyMXFgPOdf2.exeGet hashmaliciousGuLoaderBrowse
                            • 13.107.246.45
                            1dVtYIvfHz.exeGet hashmaliciousUnknownBrowse
                            • 13.107.246.45
                            FJRUb5lb9m.exeGet hashmaliciousFormBookBrowse
                            • 13.107.246.45
                            5hD3Yjf7xD.exeGet hashmaliciousAgentTeslaBrowse
                            • 13.107.246.45
                            02Eh1ah35H.exeGet hashmaliciousGuLoaderBrowse
                            • 13.107.246.45
                            AJ5zYYsisA.exeGet hashmaliciousUnknownBrowse
                            • 13.107.246.45
                            suBpo1g13Q.exeGet hashmaliciousFormBookBrowse
                            • 13.107.246.45
                            1297823757234143258.jsGet hashmaliciousStrela DownloaderBrowse
                            • 13.107.246.45
                            4N4nldx1wW.exeGet hashmaliciousFormBookBrowse
                            • 13.107.246.45
                            1487427797195518826.jsGet hashmaliciousStrela DownloaderBrowse
                            • 13.107.246.45
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            EPITECHFRarm.elfGet hashmaliciousUnknownBrowse
                            • 163.5.152.74
                            IGz.sh4.elfGet hashmaliciousMiraiBrowse
                            • 163.5.217.247
                            https://santa-secret.ru/api/verify?a=NjgyODEwNCw1bWluOHE2MHpuX3J1LC9hY2NvdW50L2JveGVzLHZsYWRpbWlyLmdsdXNoZW5rb0Bob2NobGFuZC5ydSwyNDE0MTYzMg==Get hashmaliciousUnknownBrowse
                            • 163.5.194.31
                            lz4wnSavmK.exeGet hashmaliciousPython StealerBrowse
                            • 163.5.242.208
                            WVuXCNNYG0.exeGet hashmaliciousPython StealerBrowse
                            • 163.5.242.208
                            dipwo1iToJ.exeGet hashmaliciousPython StealerBrowse
                            • 163.5.242.208
                            105vjMVwfJ.dllGet hashmaliciousCobaltStrikeBrowse
                            • 163.5.169.26
                            7RDTQuL8WF.exeGet hashmaliciousCobaltStrikeBrowse
                            • 163.5.169.26
                            botx.spc.elfGet hashmaliciousMiraiBrowse
                            • 163.5.176.64
                            spc.elfGet hashmaliciousMiraiBrowse
                            • 163.5.130.180
                            No context
                            No context
                            Process:C:\Users\user\Desktop\of5HklY9qP.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):423936
                            Entropy (8bit):7.970480458053438
                            Encrypted:false
                            SSDEEP:12288:lAqk00hIVsZVACEHAQ6/s3c3WdMHwrVIx:WDUVsrACtqIWd6wyx
                            MD5:9E8E6E8BF8B55809DDF551D1D16480E7
                            SHA1:C53DE93EBE69CF1F6E4A2FB210CF4DC87BF2F019
                            SHA-256:15BFA8A34C8A324382A03B8C6B46DED860B2DBE912483C31FDFE59837998662B
                            SHA-512:1CE474B485A8EFD32BB74A5FF81C3F358D11F01C06758315D76CA09268D17C7DFF7947D80393BCD942292C91D155234D634DA3F4903FCF9282D16570724E7EDE
                            Malicious:false
                            Reputation:low
                            Preview:.n.FYP5N3RFZ..2S.D4LDPJU.4BFZP5N7RFZPG2STD4LDPJUN4BFZP5N7RFZ.G2SZ[.BD.C.o.C..qa&^!f*"(U!5)./%>$::. #z"@ .;(z..as9+P)j]G_j4BFZP5Ng.FZ.F1S.O..DPJUN4BF.P;O<SvZP)4STL4LDPJU.DFZp5N7.@ZPGrSTd4LDRJUJ4BFZP5N3RFZPG2ST.2LDRJUN4BFXPu.7RVZPW2STD$LD@JUN4BFJP5N7RFZPG2S4.2L.PJUN.DF2U5N7RFZPG2STD4LDPJUN.DFVP5N7RFZPG2STD4LDPJUN4BFZP5N7RFZPG2STD4LDPJUN4BFZP5N7rFZXG2STD4LDPJUF.BF.P5N7RFZPG2Sz0Q40PJU.YDFZp5N7<@ZPE2STD4LDPJUN4BFzP5.. 5(3G2S<A4LD.LUN2BFZ 3N7RFZPG2STD4L.PJ.`F'*535N;RFZP.4STF4LD&LUN4BFZP5N7RFZ.G2.TD4LDPJUN4BFZP5N..@ZPG2S.D4LFPOU6.BF..5N4RFZSG2Up.4L.NJUN4BFZP5N7RFZPG2STD4LDPJUN4BFZP5N7RFZPG2SRn4L^xKUN2hFDx3N7T`p.o"STN.KDPL}F4B@5A5N=xFZ.o6STBAPDPKu.z..z.3..38)PG6(*D4H%xeUN2-TZP?d$bAZ'G2SUD4]lUJUHA\FZQZ]7RLIP..STD#.APJTd.GFZP.^7RFKQV2.={1LDPr...WZA4.$P~IPG2EGE.....DO#.U[h..WX?S2S^U6#QPJ_n4CFZD!ZXDFZZa.....L_`NU?5BFXP5_.2GZPG#StD5LD?]UN>z.ZP5_7CF5HG2YED[UDP@:T4BLIQ.|7RFKPg.....NDPJ7n8u(@1K=7RB!.G2W5l.LDVbNN4H)FP5D...4/STN'N|bJUN%Bf..E.WFZP$...}.-:#JUJO.FZTTf.RF\x\2S^+*LDZr..Fz..K7.[ZPF..
                            Process:C:\Users\user\Desktop\of5HklY9qP.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):423936
                            Entropy (8bit):7.970480458053438
                            Encrypted:false
                            SSDEEP:12288:lAqk00hIVsZVACEHAQ6/s3c3WdMHwrVIx:WDUVsrACtqIWd6wyx
                            MD5:9E8E6E8BF8B55809DDF551D1D16480E7
                            SHA1:C53DE93EBE69CF1F6E4A2FB210CF4DC87BF2F019
                            SHA-256:15BFA8A34C8A324382A03B8C6B46DED860B2DBE912483C31FDFE59837998662B
                            SHA-512:1CE474B485A8EFD32BB74A5FF81C3F358D11F01C06758315D76CA09268D17C7DFF7947D80393BCD942292C91D155234D634DA3F4903FCF9282D16570724E7EDE
                            Malicious:false
                            Reputation:low
                            Preview:.n.FYP5N3RFZ..2S.D4LDPJU.4BFZP5N7RFZPG2STD4LDPJUN4BFZP5N7RFZ.G2SZ[.BD.C.o.C..qa&^!f*"(U!5)./%>$::. #z"@ .;(z..as9+P)j]G_j4BFZP5Ng.FZ.F1S.O..DPJUN4BF.P;O<SvZP)4STL4LDPJU.DFZp5N7.@ZPGrSTd4LDRJUJ4BFZP5N3RFZPG2ST.2LDRJUN4BFXPu.7RVZPW2STD$LD@JUN4BFJP5N7RFZPG2S4.2L.PJUN.DF2U5N7RFZPG2STD4LDPJUN.DFVP5N7RFZPG2STD4LDPJUN4BFZP5N7RFZPG2STD4LDPJUN4BFZP5N7rFZXG2STD4LDPJUF.BF.P5N7RFZPG2Sz0Q40PJU.YDFZp5N7<@ZPE2STD4LDPJUN4BFzP5.. 5(3G2S<A4LD.LUN2BFZ 3N7RFZPG2STD4L.PJ.`F'*535N;RFZP.4STF4LD&LUN4BFZP5N7RFZ.G2.TD4LDPJUN4BFZP5N..@ZPG2S.D4LFPOU6.BF..5N4RFZSG2Up.4L.NJUN4BFZP5N7RFZPG2STD4LDPJUN4BFZP5N7RFZPG2SRn4L^xKUN2hFDx3N7T`p.o"STN.KDPL}F4B@5A5N=xFZ.o6STBAPDPKu.z..z.3..38)PG6(*D4H%xeUN2-TZP?d$bAZ'G2SUD4]lUJUHA\FZQZ]7RLIP..STD#.APJTd.GFZP.^7RFKQV2.={1LDPr...WZA4.$P~IPG2EGE.....DO#.U[h..WX?S2S^U6#QPJ_n4CFZD!ZXDFZZa.....L_`NU?5BFXP5_.2GZPG#StD5LD?]UN>z.ZP5_7CF5HG2YED[UDP@:T4BLIQ.|7RFKPg.....NDPJ7n8u(@1K=7RB!.G2W5l.LDVbNN4H)FP5D...4/STN'N|bJUN%Bf..E.WFZP$...}.-:#JUJO.FZTTf.RF\x\2S^+*LDZr..Fz..K7.[ZPF..
                            File type:PE32 executable (GUI) Intel 80386, for MS Windows
                            Entropy (8bit):7.319013668486431
                            TrID:
                            • Win32 Executable (generic) a (10002005/4) 99.96%
                            • Generic Win/DOS Executable (2004/3) 0.02%
                            • DOS Executable Generic (2002/1) 0.02%
                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                            File name:of5HklY9qP.exe
                            File size:1'350'144 bytes
                            MD5:57e3ec29544a0c1841ba8c9bef860cf9
                            SHA1:c1c1ac0421a0b16d07c412f8957335348f24a64b
                            SHA256:5aafd78c24d92f25dd27dfea5492fa2212d52586af05400e55853f3f2218de8d
                            SHA512:0582a49ac257fb63551ef91085e36b2943527181377cfcb6ac0695d34926b3465b2bc483a1f3e8f2b1b0d04b76355f362cae7d310c45cbf4eaaf7294f51b9d68
                            SSDEEP:24576:tu6J33O0c+JY5UZ+XC0kGso6FasX37NrlF4NjVS1uhiWY:fu0c++OCvkGs9FasXBrlgj8+Y
                            TLSH:8555DF2273DDC360CB769173BF69B7016EBF78614630B85B2F980D7DA950162262C7A3
                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......6...r}..r}..r}..4,".p}......s}.../..A}.../#..}.../".G}..{.@.{}..{.P.W}..r}..R.....)."}......s}.../..s}..r}T.s}......s}..Richr}.
                            Icon Hash:aaf3e3e3938382a0
                            Entrypoint:0x427dcd
                            Entrypoint Section:.text
                            Digitally signed:false
                            Imagebase:0x400000
                            Subsystem:windows gui
                            Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                            DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                            Time Stamp:0x674EDC7F [Tue Dec 3 10:25:03 2024 UTC]
                            TLS Callbacks:
                            CLR (.Net) Version:
                            OS Version Major:5
                            OS Version Minor:1
                            File Version Major:5
                            File Version Minor:1
                            Subsystem Version Major:5
                            Subsystem Version Minor:1
                            Import Hash:afcdf79be1557326c854b6e20cb900a7
                            Instruction
                            call 00007F8FC4B15BAAh
                            jmp 00007F8FC4B08974h
                            int3
                            int3
                            int3
                            int3
                            int3
                            int3
                            int3
                            int3
                            int3
                            push edi
                            push esi
                            mov esi, dword ptr [esp+10h]
                            mov ecx, dword ptr [esp+14h]
                            mov edi, dword ptr [esp+0Ch]
                            mov eax, ecx
                            mov edx, ecx
                            add eax, esi
                            cmp edi, esi
                            jbe 00007F8FC4B08AFAh
                            cmp edi, eax
                            jc 00007F8FC4B08E5Eh
                            bt dword ptr [004C31FCh], 01h
                            jnc 00007F8FC4B08AF9h
                            rep movsb
                            jmp 00007F8FC4B08E0Ch
                            cmp ecx, 00000080h
                            jc 00007F8FC4B08CC4h
                            mov eax, edi
                            xor eax, esi
                            test eax, 0000000Fh
                            jne 00007F8FC4B08B00h
                            bt dword ptr [004BE324h], 01h
                            jc 00007F8FC4B08FD0h
                            bt dword ptr [004C31FCh], 00000000h
                            jnc 00007F8FC4B08C9Dh
                            test edi, 00000003h
                            jne 00007F8FC4B08CAEh
                            test esi, 00000003h
                            jne 00007F8FC4B08C8Dh
                            bt edi, 02h
                            jnc 00007F8FC4B08AFFh
                            mov eax, dword ptr [esi]
                            sub ecx, 04h
                            lea esi, dword ptr [esi+04h]
                            mov dword ptr [edi], eax
                            lea edi, dword ptr [edi+04h]
                            bt edi, 03h
                            jnc 00007F8FC4B08B03h
                            movq xmm1, qword ptr [esi]
                            sub ecx, 08h
                            lea esi, dword ptr [esi+08h]
                            movq qword ptr [edi], xmm1
                            lea edi, dword ptr [edi+08h]
                            test esi, 00000007h
                            je 00007F8FC4B08B55h
                            bt esi, 03h
                            jnc 00007F8FC4B08BA8h
                            Programming Language:
                            • [ASM] VS2013 build 21005
                            • [ C ] VS2013 build 21005
                            • [C++] VS2013 build 21005
                            • [ C ] VS2008 SP1 build 30729
                            • [IMP] VS2008 SP1 build 30729
                            • [ASM] VS2013 UPD4 build 31101
                            • [RES] VS2013 build 21005
                            • [LNK] VS2013 UPD4 build 31101
                            NameVirtual AddressVirtual Size Is in Section
                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IMPORT0xba44c0x17c.rdata
                            IMAGE_DIRECTORY_ENTRY_RESOURCE0xc70000x810ac.rsrc
                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x1490000x711c.reloc
                            IMAGE_DIRECTORY_ENTRY_DEBUG0x92bc00x1c.rdata
                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xa48700x40.rdata
                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IAT0x8f0000x884.rdata
                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                            .text0x10000x8dcc40x8de00d28a820a1d9ff26cda02d12b888ba4b4False0.5728679102422908data6.676118058520316IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                            .rdata0x8f0000x2e10e0x2e20079b14b254506b0dbc8cd0ad67fb70ad9False0.33535526761517614OpenPGP Public Key5.76010872795207IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .data0xbe0000x8f740x52009f9d6f746f1a415a63de45f8b7983d33False0.1017530487804878data1.198745897703538IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            .rsrc0xc70000x810ac0x8120059e979fb523f9dfb62e0412be8d524e7False0.949031567642788data7.937981103569764IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .reloc0x1490000x711c0x72006fcae3cbbf6bfbabf5ec5bbe7cf612c3False0.7650767543859649data6.779031650454199IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                            NameRVASizeTypeLanguageCountryZLIB Complexity
                            RT_ICON0xc75a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                            RT_ICON0xc76d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                            RT_ICON0xc77f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                            RT_ICON0xc79200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                            RT_ICON0xc7c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                            RT_ICON0xc7d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                            RT_ICON0xc8bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                            RT_ICON0xc94800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                            RT_ICON0xc99e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                            RT_ICON0xcbf900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                            RT_ICON0xcd0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                            RT_MENU0xcd4a00x50dataEnglishGreat Britain0.9
                            RT_STRING0xcd4f00x594dataEnglishGreat Britain0.3333333333333333
                            RT_STRING0xcda840x68adataEnglishGreat Britain0.2747909199522103
                            RT_STRING0xce1100x490dataEnglishGreat Britain0.3715753424657534
                            RT_STRING0xce5a00x5fcdataEnglishGreat Britain0.3087467362924282
                            RT_STRING0xceb9c0x65cdataEnglishGreat Britain0.34336609336609336
                            RT_STRING0xcf1f80x466dataEnglishGreat Britain0.3605683836589698
                            RT_STRING0xcf6600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                            RT_RCDATA0xcf7b80x78373data1.0003269679510483
                            RT_GROUP_ICON0x147b2c0x76dataEnglishGreat Britain0.6610169491525424
                            RT_GROUP_ICON0x147ba40x14dataEnglishGreat Britain1.25
                            RT_GROUP_ICON0x147bb80x14dataEnglishGreat Britain1.15
                            RT_GROUP_ICON0x147bcc0x14dataEnglishGreat Britain1.25
                            RT_VERSION0x147be00xdcdataEnglishGreat Britain0.6181818181818182
                            RT_MANIFEST0x147cbc0x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                            DLLImport
                            WSOCK32.dllWSACleanup, socket, inet_ntoa, setsockopt, ntohs, recvfrom, ioctlsocket, htons, WSAStartup, __WSAFDIsSet, select, accept, listen, bind, closesocket, WSAGetLastError, recv, sendto, send, inet_addr, gethostbyname, gethostname, connect
                            VERSION.dllGetFileVersionInfoW, GetFileVersionInfoSizeW, VerQueryValueW
                            WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                            COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                            MPR.dllWNetUseConnectionW, WNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W
                            WININET.dllInternetQueryDataAvailable, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetConnectW
                            PSAPI.DLLGetProcessMemoryInfo
                            IPHLPAPI.DLLIcmpCreateFile, IcmpCloseHandle, IcmpSendEcho
                            USERENV.dllDestroyEnvironmentBlock, UnloadUserProfile, CreateEnvironmentBlock, LoadUserProfileW
                            UxTheme.dllIsThemeActive
                            KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, SetCurrentDirectoryW, GetLongPathNameW, GetShortPathNameW, DeleteFileW, FindNextFileW, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, GetLocalTime, CompareStringW, GetCurrentProcess, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, LoadLibraryW, VirtualAlloc, IsDebuggerPresent, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, GetCurrentThread, CloseHandle, GetFullPathNameW, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetCommandLineW, IsProcessorFeaturePresent, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetStartupInfoW, GetStringTypeW, SetStdHandle, GetFileType, GetConsoleCP, GetConsoleMode, RtlUnwind, ReadConsoleW, GetTimeZoneInformation, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetEnvironmentStringsW, FreeEnvironmentStringsW, WriteConsoleW, FindClose, SetEnvironmentVariableA
                            USER32.dllAdjustWindowRectEx, CopyImage, SetWindowPos, GetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, SetRect, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, MonitorFromRect, keybd_event, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, DispatchMessageW, TranslateMessage, PeekMessageW, UnregisterHotKey, CheckMenuRadioItem, CharLowerBuffW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, SystemParametersInfoW, LoadImageW, GetClassNameW
                            GDI32.dllStrokePath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, GetDeviceCaps, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, LineTo, AngleArc, MoveToEx, Ellipse, DeleteDC, GetPixel, CreateDCW, GetStockObject, GetTextFaceW, CreateFontW, SetTextColor, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, StrokeAndFillPath
                            COMDLG32.dllGetOpenFileNameW, GetSaveFileNameW
                            ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, RegCreateKeyExW, FreeSid, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, AddAce, SetSecurityDescriptorDacl, GetUserNameW, InitiateSystemShutdownExW
                            SHELL32.dllDragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                            ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoSetProxyBlanket, CoCreateInstanceEx, CoInitializeSecurity
                            OLEAUT32.dllLoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, RegisterTypeLib, CreateStdDispatch, DispCallFunc, VariantChangeType, SysStringLen, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, VariantCopy, VariantClear, OleLoadPicture, QueryPathOfRegTypeLib, RegisterTypeLibForUser, UnRegisterTypeLibForUser, UnRegisterTypeLib, CreateDispTypeInfo, SysAllocString, VariantInit
                            Language of compilation systemCountry where language is spokenMap
                            EnglishGreat Britain
                            TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                            2025-01-11T04:25:47.550561+01002859087ETPRO MALWARE Win32/zgRAT CnC Checkin1192.168.2.1049737163.5.32.407702TCP
                            2025-01-11T04:26:08.907493+01002859087ETPRO MALWARE Win32/zgRAT CnC Checkin1192.168.2.1049873163.5.32.407702TCP
                            2025-01-11T04:26:30.277546+01002859087ETPRO MALWARE Win32/zgRAT CnC Checkin1192.168.2.1049977163.5.32.407702TCP
                            2025-01-11T04:26:51.672483+01002859087ETPRO MALWARE Win32/zgRAT CnC Checkin1192.168.2.1049979163.5.32.407702TCP
                            2025-01-11T04:27:13.032866+01002859087ETPRO MALWARE Win32/zgRAT CnC Checkin1192.168.2.1049980163.5.32.407702TCP
                            2025-01-11T04:27:34.459237+01002859087ETPRO MALWARE Win32/zgRAT CnC Checkin1192.168.2.1049981163.5.32.407702TCP
                            2025-01-11T04:27:55.835030+01002859087ETPRO MALWARE Win32/zgRAT CnC Checkin1192.168.2.1049982163.5.32.407702TCP
                            2025-01-11T04:28:17.199597+01002859087ETPRO MALWARE Win32/zgRAT CnC Checkin1192.168.2.1049983163.5.32.407702TCP
                            2025-01-11T04:28:38.601940+01002859087ETPRO MALWARE Win32/zgRAT CnC Checkin1192.168.2.1049984163.5.32.407702TCP
                            2025-01-11T04:29:00.003866+01002859087ETPRO MALWARE Win32/zgRAT CnC Checkin1192.168.2.1049985163.5.32.407702TCP
                            2025-01-11T04:29:21.376936+01002859087ETPRO MALWARE Win32/zgRAT CnC Checkin1192.168.2.1049986163.5.32.407702TCP
                            2025-01-11T04:29:42.753769+01002859087ETPRO MALWARE Win32/zgRAT CnC Checkin1192.168.2.1049987163.5.32.407702TCP
                            TimestampSource PortDest PortSource IPDest IP
                            Jan 11, 2025 04:25:47.528083086 CET497377702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:25:47.532896996 CET770249737163.5.32.40192.168.2.10
                            Jan 11, 2025 04:25:47.532994986 CET497377702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:25:47.545682907 CET497377702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:25:47.550448895 CET770249737163.5.32.40192.168.2.10
                            Jan 11, 2025 04:25:47.550560951 CET497377702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:25:47.555361986 CET770249737163.5.32.40192.168.2.10
                            Jan 11, 2025 04:26:08.895751953 CET770249737163.5.32.40192.168.2.10
                            Jan 11, 2025 04:26:08.896100998 CET497377702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:26:08.896724939 CET497377702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:26:08.896912098 CET498737702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:26:08.901567936 CET770249737163.5.32.40192.168.2.10
                            Jan 11, 2025 04:26:08.901695013 CET770249873163.5.32.40192.168.2.10
                            Jan 11, 2025 04:26:08.901782036 CET498737702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:26:08.902621984 CET498737702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:26:08.907416105 CET770249873163.5.32.40192.168.2.10
                            Jan 11, 2025 04:26:08.907493114 CET498737702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:26:08.912245035 CET770249873163.5.32.40192.168.2.10
                            Jan 11, 2025 04:26:28.890216112 CET498737702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:26:28.895029068 CET770249873163.5.32.40192.168.2.10
                            Jan 11, 2025 04:26:28.895179987 CET498737702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:26:28.900007010 CET770249873163.5.32.40192.168.2.10
                            Jan 11, 2025 04:26:30.266405106 CET770249873163.5.32.40192.168.2.10
                            Jan 11, 2025 04:26:30.266482115 CET498737702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:26:30.266638041 CET498737702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:26:30.266927958 CET499777702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:26:30.271493912 CET770249873163.5.32.40192.168.2.10
                            Jan 11, 2025 04:26:30.271821976 CET770249977163.5.32.40192.168.2.10
                            Jan 11, 2025 04:26:30.271900892 CET499777702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:26:30.272703886 CET499777702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:26:30.277477980 CET770249977163.5.32.40192.168.2.10
                            Jan 11, 2025 04:26:30.277545929 CET499777702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:26:30.282345057 CET770249977163.5.32.40192.168.2.10
                            Jan 11, 2025 04:26:51.639838934 CET770249977163.5.32.40192.168.2.10
                            Jan 11, 2025 04:26:51.639967918 CET499777702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:26:51.643862009 CET499777702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:26:51.648627996 CET499797702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:26:51.648683071 CET770249977163.5.32.40192.168.2.10
                            Jan 11, 2025 04:26:51.653584003 CET770249979163.5.32.40192.168.2.10
                            Jan 11, 2025 04:26:51.653727055 CET499797702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:26:51.667366982 CET499797702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:26:51.672224045 CET770249979163.5.32.40192.168.2.10
                            Jan 11, 2025 04:26:51.672482967 CET499797702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:26:51.677354097 CET770249979163.5.32.40192.168.2.10
                            Jan 11, 2025 04:27:13.017925978 CET770249979163.5.32.40192.168.2.10
                            Jan 11, 2025 04:27:13.020961046 CET499797702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:27:13.020961046 CET499797702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:27:13.021318913 CET499807702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:27:13.025815964 CET770249979163.5.32.40192.168.2.10
                            Jan 11, 2025 04:27:13.026176929 CET770249980163.5.32.40192.168.2.10
                            Jan 11, 2025 04:27:13.026662111 CET499807702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:27:13.027333021 CET499807702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:27:13.032196999 CET770249980163.5.32.40192.168.2.10
                            Jan 11, 2025 04:27:13.032866001 CET499807702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:27:13.037807941 CET770249980163.5.32.40192.168.2.10
                            Jan 11, 2025 04:27:29.577552080 CET499807702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:27:29.582648039 CET770249980163.5.32.40192.168.2.10
                            Jan 11, 2025 04:27:29.582714081 CET499807702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:27:29.587532997 CET770249980163.5.32.40192.168.2.10
                            Jan 11, 2025 04:27:34.441215038 CET770249980163.5.32.40192.168.2.10
                            Jan 11, 2025 04:27:34.443185091 CET499807702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:27:34.443373919 CET499807702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:27:34.443641901 CET499817702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:27:34.448183060 CET770249980163.5.32.40192.168.2.10
                            Jan 11, 2025 04:27:34.449959040 CET770249981163.5.32.40192.168.2.10
                            Jan 11, 2025 04:27:34.450098038 CET499817702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:27:34.454101086 CET499817702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:27:34.458913088 CET770249981163.5.32.40192.168.2.10
                            Jan 11, 2025 04:27:34.459237099 CET499817702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:27:34.464093924 CET770249981163.5.32.40192.168.2.10
                            Jan 11, 2025 04:27:37.123934031 CET499817702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:27:37.128858089 CET770249981163.5.32.40192.168.2.10
                            Jan 11, 2025 04:27:37.128926039 CET499817702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:27:37.133781910 CET770249981163.5.32.40192.168.2.10
                            Jan 11, 2025 04:27:37.827598095 CET499817702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:27:37.832582951 CET770249981163.5.32.40192.168.2.10
                            Jan 11, 2025 04:27:37.832696915 CET499817702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:27:37.837506056 CET770249981163.5.32.40192.168.2.10
                            Jan 11, 2025 04:27:37.983211994 CET499817702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:27:37.988275051 CET770249981163.5.32.40192.168.2.10
                            Jan 11, 2025 04:27:37.988348007 CET499817702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:27:37.993235111 CET770249981163.5.32.40192.168.2.10
                            Jan 11, 2025 04:27:39.311923981 CET499817702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:27:39.316997051 CET770249981163.5.32.40192.168.2.10
                            Jan 11, 2025 04:27:39.317050934 CET499817702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:27:39.321901083 CET770249981163.5.32.40192.168.2.10
                            Jan 11, 2025 04:27:50.827169895 CET499817702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:27:50.832667112 CET770249981163.5.32.40192.168.2.10
                            Jan 11, 2025 04:27:50.832710981 CET499817702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:27:50.838406086 CET770249981163.5.32.40192.168.2.10
                            Jan 11, 2025 04:27:52.764333010 CET499817702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:27:52.770684004 CET770249981163.5.32.40192.168.2.10
                            Jan 11, 2025 04:27:52.770786047 CET499817702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:27:52.777183056 CET770249981163.5.32.40192.168.2.10
                            Jan 11, 2025 04:27:53.890866995 CET499817702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:27:53.895800114 CET770249981163.5.32.40192.168.2.10
                            Jan 11, 2025 04:27:53.895931005 CET499817702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:27:53.901642084 CET770249981163.5.32.40192.168.2.10
                            Jan 11, 2025 04:27:55.819690943 CET770249981163.5.32.40192.168.2.10
                            Jan 11, 2025 04:27:55.819751978 CET499817702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:27:55.820003033 CET499817702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:27:55.820302010 CET499827702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:27:55.828353882 CET770249981163.5.32.40192.168.2.10
                            Jan 11, 2025 04:27:55.828367949 CET770249982163.5.32.40192.168.2.10
                            Jan 11, 2025 04:27:55.828516006 CET499827702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:27:55.829281092 CET499827702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:27:55.834901094 CET770249982163.5.32.40192.168.2.10
                            Jan 11, 2025 04:27:55.835030079 CET499827702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:27:55.841049910 CET770249982163.5.32.40192.168.2.10
                            Jan 11, 2025 04:27:57.451941967 CET499827702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:27:57.456943989 CET770249982163.5.32.40192.168.2.10
                            Jan 11, 2025 04:27:57.457025051 CET499827702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:27:57.461903095 CET770249982163.5.32.40192.168.2.10
                            Jan 11, 2025 04:28:07.077136040 CET499827702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:28:07.082175970 CET770249982163.5.32.40192.168.2.10
                            Jan 11, 2025 04:28:07.082241058 CET499827702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:28:07.087071896 CET770249982163.5.32.40192.168.2.10
                            Jan 11, 2025 04:28:08.280673981 CET499827702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:28:08.285593987 CET770249982163.5.32.40192.168.2.10
                            Jan 11, 2025 04:28:08.287019968 CET499827702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:28:08.291946888 CET770249982163.5.32.40192.168.2.10
                            Jan 11, 2025 04:28:12.717811108 CET499827702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:28:12.722758055 CET770249982163.5.32.40192.168.2.10
                            Jan 11, 2025 04:28:12.723015070 CET499827702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:28:12.727859020 CET770249982163.5.32.40192.168.2.10
                            Jan 11, 2025 04:28:13.530481100 CET499827702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:28:13.535449982 CET770249982163.5.32.40192.168.2.10
                            Jan 11, 2025 04:28:13.535501957 CET499827702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:28:13.540291071 CET770249982163.5.32.40192.168.2.10
                            Jan 11, 2025 04:28:14.327044964 CET499827702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:28:14.332022905 CET770249982163.5.32.40192.168.2.10
                            Jan 11, 2025 04:28:14.333095074 CET499827702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:28:14.338493109 CET770249982163.5.32.40192.168.2.10
                            Jan 11, 2025 04:28:17.188234091 CET770249982163.5.32.40192.168.2.10
                            Jan 11, 2025 04:28:17.188297033 CET499827702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:28:17.188771963 CET499837702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:28:17.188879013 CET499827702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:28:17.193672895 CET770249983163.5.32.40192.168.2.10
                            Jan 11, 2025 04:28:17.193684101 CET770249982163.5.32.40192.168.2.10
                            Jan 11, 2025 04:28:17.193773985 CET499837702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:28:17.194732904 CET499837702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:28:17.199553967 CET770249983163.5.32.40192.168.2.10
                            Jan 11, 2025 04:28:17.199596882 CET499837702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:28:17.204355955 CET770249983163.5.32.40192.168.2.10
                            Jan 11, 2025 04:28:28.452205896 CET499837702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:28:28.457077026 CET770249983163.5.32.40192.168.2.10
                            Jan 11, 2025 04:28:28.457138062 CET499837702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:28:28.461992025 CET770249983163.5.32.40192.168.2.10
                            Jan 11, 2025 04:28:38.583283901 CET770249983163.5.32.40192.168.2.10
                            Jan 11, 2025 04:28:38.583415985 CET499837702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:28:38.589719057 CET499837702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:28:38.590487957 CET499847702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:28:38.594511032 CET770249983163.5.32.40192.168.2.10
                            Jan 11, 2025 04:28:38.595334053 CET770249984163.5.32.40192.168.2.10
                            Jan 11, 2025 04:28:38.595396996 CET499847702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:28:38.597090006 CET499847702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:28:38.601888895 CET770249984163.5.32.40192.168.2.10
                            Jan 11, 2025 04:28:38.601939917 CET499847702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:28:38.606702089 CET770249984163.5.32.40192.168.2.10
                            Jan 11, 2025 04:28:54.937012911 CET499847702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:28:54.941978931 CET770249984163.5.32.40192.168.2.10
                            Jan 11, 2025 04:28:54.942075014 CET499847702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:28:54.946953058 CET770249984163.5.32.40192.168.2.10
                            Jan 11, 2025 04:28:56.713720083 CET499847702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:28:56.719296932 CET770249984163.5.32.40192.168.2.10
                            Jan 11, 2025 04:28:56.719388008 CET499847702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:28:56.724988937 CET770249984163.5.32.40192.168.2.10
                            Jan 11, 2025 04:28:59.436681032 CET499847702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:28:59.441613913 CET770249984163.5.32.40192.168.2.10
                            Jan 11, 2025 04:28:59.441745996 CET499847702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:28:59.446568966 CET770249984163.5.32.40192.168.2.10
                            Jan 11, 2025 04:28:59.991606951 CET770249984163.5.32.40192.168.2.10
                            Jan 11, 2025 04:28:59.991669893 CET499847702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:28:59.991827965 CET499847702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:28:59.992886066 CET499857702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:28:59.996599913 CET770249984163.5.32.40192.168.2.10
                            Jan 11, 2025 04:28:59.997642994 CET770249985163.5.32.40192.168.2.10
                            Jan 11, 2025 04:28:59.997708082 CET499857702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:28:59.999039888 CET499857702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:29:00.003822088 CET770249985163.5.32.40192.168.2.10
                            Jan 11, 2025 04:29:00.003865957 CET499857702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:29:00.008879900 CET770249985163.5.32.40192.168.2.10
                            Jan 11, 2025 04:29:00.874650002 CET499857702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:29:00.879565001 CET770249985163.5.32.40192.168.2.10
                            Jan 11, 2025 04:29:00.879625082 CET499857702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:29:00.884427071 CET770249985163.5.32.40192.168.2.10
                            Jan 11, 2025 04:29:05.499236107 CET499857702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:29:05.504275084 CET770249985163.5.32.40192.168.2.10
                            Jan 11, 2025 04:29:05.505671024 CET499857702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:29:05.510586023 CET770249985163.5.32.40192.168.2.10
                            Jan 11, 2025 04:29:12.311882973 CET499857702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:29:12.316704988 CET770249985163.5.32.40192.168.2.10
                            Jan 11, 2025 04:29:12.316768885 CET499857702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:29:12.321583033 CET770249985163.5.32.40192.168.2.10
                            Jan 11, 2025 04:29:21.363099098 CET770249985163.5.32.40192.168.2.10
                            Jan 11, 2025 04:29:21.363229990 CET499857702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:29:21.363878012 CET499857702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:29:21.363878965 CET499867702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:29:21.368642092 CET770249985163.5.32.40192.168.2.10
                            Jan 11, 2025 04:29:21.368716002 CET770249986163.5.32.40192.168.2.10
                            Jan 11, 2025 04:29:21.369250059 CET499867702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:29:21.372060061 CET499867702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:29:21.376857042 CET770249986163.5.32.40192.168.2.10
                            Jan 11, 2025 04:29:21.376935959 CET499867702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:29:21.381710052 CET770249986163.5.32.40192.168.2.10
                            Jan 11, 2025 04:29:25.811402082 CET499867702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:29:25.816252947 CET770249986163.5.32.40192.168.2.10
                            Jan 11, 2025 04:29:25.816350937 CET499867702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:29:25.821144104 CET770249986163.5.32.40192.168.2.10
                            Jan 11, 2025 04:29:28.796437025 CET499867702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:29:28.801445007 CET770249986163.5.32.40192.168.2.10
                            Jan 11, 2025 04:29:28.801496983 CET499867702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:29:28.806301117 CET770249986163.5.32.40192.168.2.10
                            Jan 11, 2025 04:29:30.125243902 CET499867702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:29:30.130220890 CET770249986163.5.32.40192.168.2.10
                            Jan 11, 2025 04:29:30.130290985 CET499867702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:29:30.135159016 CET770249986163.5.32.40192.168.2.10
                            Jan 11, 2025 04:29:42.452297926 CET499867702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:29:42.457659960 CET770249986163.5.32.40192.168.2.10
                            Jan 11, 2025 04:29:42.457720041 CET499867702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:29:42.462686062 CET770249986163.5.32.40192.168.2.10
                            Jan 11, 2025 04:29:42.739973068 CET770249986163.5.32.40192.168.2.10
                            Jan 11, 2025 04:29:42.740063906 CET499867702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:29:42.742054939 CET499867702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:29:42.742628098 CET499877702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:29:42.746942043 CET770249986163.5.32.40192.168.2.10
                            Jan 11, 2025 04:29:42.747565985 CET770249987163.5.32.40192.168.2.10
                            Jan 11, 2025 04:29:42.747652054 CET499877702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:29:42.748837948 CET499877702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:29:42.753714085 CET770249987163.5.32.40192.168.2.10
                            Jan 11, 2025 04:29:42.753768921 CET499877702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:29:42.758734941 CET770249987163.5.32.40192.168.2.10
                            Jan 11, 2025 04:29:49.983886003 CET499877702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:29:49.988789082 CET770249987163.5.32.40192.168.2.10
                            Jan 11, 2025 04:29:49.989116907 CET499877702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:29:49.993913889 CET770249987163.5.32.40192.168.2.10
                            Jan 11, 2025 04:29:50.663141012 CET499877702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:29:50.668389082 CET770249987163.5.32.40192.168.2.10
                            Jan 11, 2025 04:29:50.668452978 CET499877702192.168.2.10163.5.32.40
                            Jan 11, 2025 04:29:50.673331022 CET770249987163.5.32.40192.168.2.10
                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                            Jan 11, 2025 04:25:41.491877079 CET1.1.1.1192.168.2.100x578dNo error (0)shed.dual-low.s-part-0017.t-0009.t-msedge.nets-part-0017.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
                            Jan 11, 2025 04:25:41.491877079 CET1.1.1.1192.168.2.100x578dNo error (0)s-part-0017.t-0009.t-msedge.net13.107.246.45A (IP address)IN (0x0001)false

                            Click to jump to process

                            Click to jump to process

                            Click to dive into process behavior distribution

                            Click to jump to process

                            Target ID:0
                            Start time:22:25:44
                            Start date:10/01/2025
                            Path:C:\Users\user\Desktop\of5HklY9qP.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\Desktop\of5HklY9qP.exe"
                            Imagebase:0x770000
                            File size:1'350'144 bytes
                            MD5 hash:57E3EC29544A0C1841BA8C9BEF860CF9
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:low
                            Has exited:true

                            Target ID:2
                            Start time:22:25:45
                            Start date:10/01/2025
                            Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\Desktop\of5HklY9qP.exe"
                            Imagebase:0x7c0000
                            File size:45'984 bytes
                            MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000002.00000002.3782158659.0000000003AF1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000002.00000002.3782668497.00000000050D0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000002.00000002.3781143208.0000000002AF1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            Reputation:high
                            Has exited:false

                            Reset < >

                              Execution Graph

                              Execution Coverage:3.4%
                              Dynamic/Decrypted Code Coverage:0.4%
                              Signature Coverage:10.2%
                              Total number of Nodes:2000
                              Total number of Limit Nodes:152
                              execution_graph 101007 7d8d0d 101008 7d8d1a 101007->101008 101012 7d8d20 101007->101012 101015 792d55 101008->101015 101010 7d8d31 101011 7d8d43 101010->101011 101014 792d55 _free 58 API calls 101010->101014 101012->101010 101013 792d55 _free 58 API calls 101012->101013 101013->101010 101014->101011 101016 792d87 __dosmaperr 101015->101016 101017 792d5e RtlFreeHeap 101015->101017 101016->101012 101017->101016 101018 792d73 101017->101018 101021 798b28 58 API calls __getptd_noexit 101018->101021 101020 792d79 GetLastError 101020->101016 101021->101020 101022 771066 101027 77f76f 101022->101027 101024 77106c 101060 792d40 101024->101060 101028 77f790 101027->101028 101063 78ff03 101028->101063 101032 77f7d7 101073 777667 101032->101073 101035 777667 59 API calls 101036 77f7eb 101035->101036 101037 777667 59 API calls 101036->101037 101038 77f7f5 101037->101038 101039 777667 59 API calls 101038->101039 101040 77f833 101039->101040 101041 777667 59 API calls 101040->101041 101042 77f8fe 101041->101042 101078 785f87 101042->101078 101046 77f930 101047 777667 59 API calls 101046->101047 101048 77f93a 101047->101048 101106 78fd9e 101048->101106 101050 77f981 101051 77f991 GetStdHandle 101050->101051 101052 7b45ab 101051->101052 101053 77f9dd 101051->101053 101052->101053 101054 7b45b4 101052->101054 101055 77f9e5 OleInitialize 101053->101055 101113 7d6b38 64 API calls Mailbox 101054->101113 101055->101024 101057 7b45bb 101114 7d7207 CreateThread 101057->101114 101059 7b45c7 CloseHandle 101059->101055 101186 792c44 101060->101186 101062 771076 101115 78ffdc 101063->101115 101066 78ffdc 59 API calls 101067 78ff45 101066->101067 101068 777667 59 API calls 101067->101068 101069 78ff51 101068->101069 101122 777bcc 101069->101122 101071 77f796 101072 790162 6 API calls 101071->101072 101072->101032 101074 790db6 Mailbox 59 API calls 101073->101074 101075 777688 101074->101075 101076 790db6 Mailbox 59 API calls 101075->101076 101077 777696 101076->101077 101077->101035 101079 777667 59 API calls 101078->101079 101080 785f97 101079->101080 101081 777667 59 API calls 101080->101081 101082 785f9f 101081->101082 101181 785a9d 101082->101181 101085 785a9d 59 API calls 101086 785faf 101085->101086 101087 777667 59 API calls 101086->101087 101088 785fba 101087->101088 101089 790db6 Mailbox 59 API calls 101088->101089 101090 77f908 101089->101090 101091 7860f9 101090->101091 101092 786107 101091->101092 101093 777667 59 API calls 101092->101093 101094 786112 101093->101094 101095 777667 59 API calls 101094->101095 101096 78611d 101095->101096 101097 777667 59 API calls 101096->101097 101098 786128 101097->101098 101099 777667 59 API calls 101098->101099 101100 786133 101099->101100 101101 785a9d 59 API calls 101100->101101 101102 78613e 101101->101102 101103 790db6 Mailbox 59 API calls 101102->101103 101104 786145 RegisterWindowMessageW 101103->101104 101104->101046 101107 7c576f 101106->101107 101108 78fdae 101106->101108 101184 7d9ae7 60 API calls 101107->101184 101109 790db6 Mailbox 59 API calls 101108->101109 101111 78fdb6 101109->101111 101111->101050 101112 7c577a 101113->101057 101114->101059 101185 7d71ed 65 API calls 101114->101185 101116 777667 59 API calls 101115->101116 101117 78ffe7 101116->101117 101118 777667 59 API calls 101117->101118 101119 78ffef 101118->101119 101120 777667 59 API calls 101119->101120 101121 78ff3b 101120->101121 101121->101066 101123 777c45 101122->101123 101125 777bd8 __wsetenvp 101122->101125 101135 777d2c 101123->101135 101126 777c13 101125->101126 101127 777bee 101125->101127 101132 778029 101126->101132 101131 777f27 59 API calls Mailbox 101127->101131 101130 777bf6 _memmove 101130->101071 101131->101130 101139 790db6 101132->101139 101134 778033 101134->101130 101136 777d43 _memmove 101135->101136 101137 777d3a 101135->101137 101136->101130 101137->101136 101177 777e4f 101137->101177 101142 790dbe 101139->101142 101141 790dd8 101141->101134 101142->101141 101144 790ddc std::exception::exception 101142->101144 101149 79571c 101142->101149 101166 7933a1 DecodePointer 101142->101166 101167 79859b RaiseException 101144->101167 101146 790e06 101168 7984d1 58 API calls _free 101146->101168 101148 790e18 101148->101134 101150 795797 101149->101150 101156 795728 101149->101156 101175 7933a1 DecodePointer 101150->101175 101152 79579d 101176 798b28 58 API calls __getptd_noexit 101152->101176 101153 795733 101153->101156 101169 79a16b 58 API calls 2 library calls 101153->101169 101170 79a1c8 58 API calls 8 library calls 101153->101170 101171 79309f GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 101153->101171 101156->101153 101157 79575b RtlAllocateHeap 101156->101157 101160 795783 101156->101160 101164 795781 101156->101164 101172 7933a1 DecodePointer 101156->101172 101157->101156 101158 79578f 101157->101158 101158->101142 101173 798b28 58 API calls __getptd_noexit 101160->101173 101174 798b28 58 API calls __getptd_noexit 101164->101174 101166->101142 101167->101146 101168->101148 101169->101153 101170->101153 101172->101156 101173->101164 101174->101158 101175->101152 101176->101158 101178 777e62 101177->101178 101180 777e5f _memmove 101177->101180 101179 790db6 Mailbox 59 API calls 101178->101179 101179->101180 101180->101136 101182 777667 59 API calls 101181->101182 101183 785aa5 101182->101183 101183->101085 101184->101112 101187 792c50 __getstream 101186->101187 101194 793217 101187->101194 101193 792c77 __getstream 101193->101062 101211 799c0b 101194->101211 101196 792c59 101197 792c88 DecodePointer DecodePointer 101196->101197 101198 792cb5 101197->101198 101199 792c65 101197->101199 101198->101199 101250 7987a4 59 API calls 2 library calls 101198->101250 101208 792c82 101199->101208 101201 792d18 EncodePointer EncodePointer 101201->101199 101202 792cec 101202->101199 101206 792d06 EncodePointer 101202->101206 101252 798864 61 API calls __realloc_crt 101202->101252 101203 792cc7 101203->101201 101203->101202 101251 798864 61 API calls __realloc_crt 101203->101251 101206->101201 101207 792d00 101207->101199 101207->101206 101253 793220 101208->101253 101212 799c1c 101211->101212 101213 799c2f EnterCriticalSection 101211->101213 101218 799c93 101212->101218 101213->101196 101215 799c22 101215->101213 101242 7930b5 58 API calls 3 library calls 101215->101242 101219 799c9f __getstream 101218->101219 101220 799ca8 101219->101220 101221 799cc0 101219->101221 101243 79a16b 58 API calls 2 library calls 101220->101243 101229 799ce1 __getstream 101221->101229 101246 79881d 58 API calls 2 library calls 101221->101246 101223 799cad 101244 79a1c8 58 API calls 8 library calls 101223->101244 101225 799cd5 101227 799ceb 101225->101227 101228 799cdc 101225->101228 101232 799c0b __lock 58 API calls 101227->101232 101247 798b28 58 API calls __getptd_noexit 101228->101247 101229->101215 101230 799cb4 101245 79309f GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 101230->101245 101234 799cf2 101232->101234 101236 799cff 101234->101236 101237 799d17 101234->101237 101248 799e2b InitializeCriticalSectionAndSpinCount 101236->101248 101239 792d55 _free 58 API calls 101237->101239 101240 799d0b 101239->101240 101249 799d33 LeaveCriticalSection _doexit 101240->101249 101243->101223 101244->101230 101246->101225 101247->101229 101248->101240 101249->101229 101250->101203 101251->101202 101252->101207 101256 799d75 LeaveCriticalSection 101253->101256 101255 792c87 101255->101193 101256->101255 101257 771016 101262 774974 101257->101262 101260 792d40 __cinit 67 API calls 101261 771025 101260->101261 101263 790db6 Mailbox 59 API calls 101262->101263 101264 77497c 101263->101264 101265 77101b 101264->101265 101269 774936 101264->101269 101265->101260 101270 77493f 101269->101270 101272 774951 101269->101272 101271 792d40 __cinit 67 API calls 101270->101271 101271->101272 101273 7749a0 101272->101273 101274 777667 59 API calls 101273->101274 101275 7749b8 GetVersionExW 101274->101275 101276 777bcc 59 API calls 101275->101276 101277 7749fb 101276->101277 101278 777d2c 59 API calls 101277->101278 101288 774a28 101277->101288 101279 774a1c 101278->101279 101301 777726 101279->101301 101281 774a93 GetCurrentProcess IsWow64Process 101282 774aac 101281->101282 101284 774ac2 101282->101284 101285 774b2b GetSystemInfo 101282->101285 101283 7ad864 101297 774b37 101284->101297 101287 774af8 101285->101287 101287->101265 101288->101281 101288->101283 101290 774ad4 101292 774b37 2 API calls 101290->101292 101291 774b1f GetSystemInfo 101293 774ae9 101291->101293 101294 774adc GetNativeSystemInfo 101292->101294 101293->101287 101295 774aef FreeLibrary 101293->101295 101294->101293 101295->101287 101298 774ad0 101297->101298 101299 774b40 LoadLibraryA 101297->101299 101298->101290 101298->101291 101299->101298 101300 774b51 GetProcAddress 101299->101300 101300->101298 101302 777734 101301->101302 101303 777d2c 59 API calls 101302->101303 101304 777744 101303->101304 101304->101288 101305 771055 101310 772649 101305->101310 101308 792d40 __cinit 67 API calls 101309 771064 101308->101309 101311 777667 59 API calls 101310->101311 101312 7726b7 101311->101312 101317 773582 101312->101317 101314 772754 101315 77105a 101314->101315 101320 773416 59 API calls 2 library calls 101314->101320 101315->101308 101321 7735b0 101317->101321 101320->101314 101322 7735a1 101321->101322 101323 7735bd 101321->101323 101322->101314 101323->101322 101324 7735c4 RegOpenKeyExW 101323->101324 101324->101322 101325 7735de RegQueryValueExW 101324->101325 101326 773614 RegCloseKey 101325->101326 101327 7735ff 101325->101327 101326->101322 101327->101326 101328 773633 101329 77366a 101328->101329 101330 7736e7 101329->101330 101331 773688 101329->101331 101368 7736e5 101329->101368 101333 7ad0cc 101330->101333 101334 7736ed 101330->101334 101335 773695 101331->101335 101336 77374b PostQuitMessage 101331->101336 101332 7736ca DefWindowProcW 101370 7736d8 101332->101370 101377 781070 10 API calls Mailbox 101333->101377 101337 773715 SetTimer RegisterWindowMessageW 101334->101337 101338 7736f2 101334->101338 101340 7736a0 101335->101340 101341 7ad154 101335->101341 101336->101370 101345 77373e CreatePopupMenu 101337->101345 101337->101370 101342 7ad06f 101338->101342 101343 7736f9 KillTimer 101338->101343 101346 773755 101340->101346 101347 7736a8 101340->101347 101393 7d2527 71 API calls _memset 101341->101393 101349 7ad0a8 MoveWindow 101342->101349 101350 7ad074 101342->101350 101373 77443a Shell_NotifyIconW _memset 101343->101373 101344 7ad0f3 101378 781093 332 API calls Mailbox 101344->101378 101345->101370 101375 7744a0 64 API calls _memset 101346->101375 101353 7ad139 101347->101353 101354 7736b3 101347->101354 101349->101370 101357 7ad078 101350->101357 101358 7ad097 SetFocus 101350->101358 101353->101332 101392 7c7c36 59 API calls Mailbox 101353->101392 101360 7736be 101354->101360 101361 7ad124 101354->101361 101355 7ad166 101355->101332 101355->101370 101357->101360 101362 7ad081 101357->101362 101358->101370 101359 77370c 101374 773114 DeleteObject DestroyWindow Mailbox 101359->101374 101360->101332 101379 77443a Shell_NotifyIconW _memset 101360->101379 101391 7d2d36 81 API calls _memset 101361->101391 101376 781070 10 API calls Mailbox 101362->101376 101367 773764 101367->101370 101368->101332 101371 7ad118 101380 77434a 101371->101380 101373->101359 101374->101370 101375->101367 101376->101370 101377->101344 101378->101360 101379->101371 101381 774375 _memset 101380->101381 101394 774182 101381->101394 101384 7743fa 101386 774414 Shell_NotifyIconW 101384->101386 101387 774430 Shell_NotifyIconW 101384->101387 101388 774422 101386->101388 101387->101388 101398 77407c 101388->101398 101390 774429 101390->101368 101391->101367 101392->101368 101393->101355 101395 774196 101394->101395 101396 7ad423 101394->101396 101395->101384 101420 7d2f94 62 API calls _W_store_winword 101395->101420 101396->101395 101397 7ad42c DestroyIcon 101396->101397 101397->101395 101399 77416f Mailbox 101398->101399 101400 774098 101398->101400 101399->101390 101421 777a16 101400->101421 101403 7ad3c8 LoadStringW 101407 7ad3e2 101403->101407 101404 7740b3 101405 777bcc 59 API calls 101404->101405 101406 7740c8 101405->101406 101406->101407 101408 7740d9 101406->101408 101409 777b2e 59 API calls 101407->101409 101410 774174 101408->101410 101411 7740e3 101408->101411 101414 7ad3ec 101409->101414 101435 778047 101410->101435 101426 777b2e 101411->101426 101417 7740ed _memset _wcscpy 101414->101417 101439 777cab 101414->101439 101416 7ad40e 101419 777cab 59 API calls 101416->101419 101418 774155 Shell_NotifyIconW 101417->101418 101418->101399 101419->101417 101420->101384 101422 790db6 Mailbox 59 API calls 101421->101422 101423 777a3b 101422->101423 101424 778029 59 API calls 101423->101424 101425 7740a6 101424->101425 101425->101403 101425->101404 101427 7aec6b 101426->101427 101428 777b40 101426->101428 101452 7c7bdb 59 API calls _memmove 101427->101452 101446 777a51 101428->101446 101431 777b4c 101431->101417 101432 7aec75 101433 778047 59 API calls 101432->101433 101434 7aec7d Mailbox 101433->101434 101436 778052 101435->101436 101437 77805a 101435->101437 101453 777f77 59 API calls 2 library calls 101436->101453 101437->101417 101440 7aed4a 101439->101440 101441 777cbf 101439->101441 101443 778029 59 API calls 101440->101443 101454 777c50 101441->101454 101445 7aed55 __wsetenvp _memmove 101443->101445 101444 777cca 101444->101416 101447 777a5f 101446->101447 101451 777a85 _memmove 101446->101451 101448 790db6 Mailbox 59 API calls 101447->101448 101447->101451 101449 777ad4 101448->101449 101450 790db6 Mailbox 59 API calls 101449->101450 101450->101451 101451->101431 101452->101432 101453->101437 101455 777c5f __wsetenvp 101454->101455 101456 778029 59 API calls 101455->101456 101457 777c70 _memmove 101455->101457 101458 7aed07 _memmove 101456->101458 101457->101444 101459 7b416f 101463 7c5fe6 101459->101463 101461 7b417a 101462 7c5fe6 86 API calls 101461->101462 101462->101461 101469 7c6020 101463->101469 101470 7c5ff3 101463->101470 101464 7c6022 101493 779328 85 API calls Mailbox 101464->101493 101466 7c6027 101474 779837 101466->101474 101469->101461 101470->101464 101470->101466 101470->101469 101472 7c601a 101470->101472 101471 777b2e 59 API calls 101471->101469 101492 7795a0 59 API calls _wcsstr 101472->101492 101475 779851 101474->101475 101476 77984b 101474->101476 101477 7af5d3 __i64tow 101475->101477 101478 779899 101475->101478 101479 779857 __itow 101475->101479 101483 7af4da 101475->101483 101476->101471 101498 793698 84 API calls 4 library calls 101478->101498 101481 790db6 Mailbox 59 API calls 101479->101481 101484 779871 101481->101484 101485 790db6 Mailbox 59 API calls 101483->101485 101490 7af552 Mailbox _wcscpy 101483->101490 101484->101476 101494 777de1 101484->101494 101487 7af51f 101485->101487 101488 790db6 Mailbox 59 API calls 101487->101488 101489 7af545 101488->101489 101489->101490 101491 777de1 59 API calls 101489->101491 101499 793698 84 API calls 4 library calls 101490->101499 101491->101490 101492->101469 101493->101466 101495 777df0 __wsetenvp _memmove 101494->101495 101496 790db6 Mailbox 59 API calls 101495->101496 101497 777e2e 101496->101497 101497->101476 101498->101479 101499->101477 101500 7afdfc 101524 77ab30 Mailbox _memmove 101500->101524 101504 77b525 101591 7d9e4a 90 API calls 4 library calls 101504->101591 101507 7b09e5 101597 7d9e4a 90 API calls 4 library calls 101507->101597 101508 7b0055 101590 7d9e4a 90 API calls 4 library calls 101508->101590 101509 77a057 101512 77b475 101517 778047 59 API calls 101512->101517 101514 77a55a 101595 7d9e4a 90 API calls 4 library calls 101514->101595 101515 7b0064 101516 790db6 59 API calls Mailbox 101526 779f37 Mailbox 101516->101526 101517->101509 101519 77b47a 101519->101507 101519->101508 101521 778047 59 API calls 101521->101526 101523 777667 59 API calls 101523->101526 101524->101504 101524->101509 101524->101526 101528 777de1 59 API calls 101524->101528 101533 790db6 59 API calls Mailbox 101524->101533 101534 77b2b6 101524->101534 101537 7b086a 101524->101537 101539 7b0878 101524->101539 101541 7b085c 101524->101541 101542 77b21c 101524->101542 101545 7c6e8f 59 API calls 101524->101545 101549 7edf37 101524->101549 101552 7edf23 101524->101552 101557 779ea0 101524->101557 101581 779c90 59 API calls Mailbox 101524->101581 101585 7ec193 86 API calls 2 library calls 101524->101585 101586 7ec2e0 97 API calls Mailbox 101524->101586 101587 7d7956 59 API calls Mailbox 101524->101587 101588 7ebc6b 332 API calls Mailbox 101524->101588 101589 7c617e 59 API calls Mailbox 101524->101589 101525 7c6e8f 59 API calls 101525->101526 101526->101508 101526->101509 101526->101512 101526->101514 101526->101516 101526->101519 101526->101521 101526->101523 101526->101525 101527 792d40 67 API calls __cinit 101526->101527 101529 7b09d6 101526->101529 101555 77c8c0 332 API calls 2 library calls 101526->101555 101556 77b900 60 API calls Mailbox 101526->101556 101527->101526 101528->101524 101596 7d9e4a 90 API calls 4 library calls 101529->101596 101533->101524 101584 77f6a3 332 API calls 101534->101584 101593 779c90 59 API calls Mailbox 101537->101593 101594 7d9e4a 90 API calls 4 library calls 101539->101594 101541->101509 101592 7c617e 59 API calls Mailbox 101541->101592 101582 779d3c 60 API calls Mailbox 101542->101582 101544 77b22d 101583 779d3c 60 API calls Mailbox 101544->101583 101545->101524 101598 7ecadd 101549->101598 101551 7edf47 101551->101524 101553 7ecadd 131 API calls 101552->101553 101554 7edf33 101553->101554 101554->101524 101555->101526 101556->101526 101558 779ebf 101557->101558 101579 779eed Mailbox 101557->101579 101559 790db6 Mailbox 59 API calls 101558->101559 101559->101579 101560 792d40 67 API calls __cinit 101560->101579 101561 77b47a 101566 7b09e5 101561->101566 101567 7b0055 101561->101567 101562 77b475 101563 778047 59 API calls 101562->101563 101564 77a057 101563->101564 101564->101524 101565 7c6e8f 59 API calls 101565->101579 101728 7d9e4a 90 API calls 4 library calls 101566->101728 101725 7d9e4a 90 API calls 4 library calls 101567->101725 101568 790db6 59 API calls Mailbox 101568->101579 101572 7b0064 101572->101524 101574 778047 59 API calls 101574->101579 101576 777667 59 API calls 101576->101579 101577 7b09d6 101727 7d9e4a 90 API calls 4 library calls 101577->101727 101579->101560 101579->101561 101579->101562 101579->101564 101579->101565 101579->101567 101579->101568 101579->101574 101579->101576 101579->101577 101580 77a55a 101579->101580 101723 77c8c0 332 API calls 2 library calls 101579->101723 101724 77b900 60 API calls Mailbox 101579->101724 101726 7d9e4a 90 API calls 4 library calls 101580->101726 101581->101524 101582->101544 101583->101534 101584->101504 101585->101524 101586->101524 101587->101524 101588->101524 101589->101524 101590->101515 101591->101541 101592->101509 101593->101541 101594->101541 101595->101509 101596->101507 101597->101509 101599 779837 85 API calls 101598->101599 101600 7ecb1a 101599->101600 101605 7ecb61 Mailbox 101600->101605 101636 7ed7a5 101600->101636 101602 7ecbb2 Mailbox 101602->101605 101609 779837 85 API calls 101602->101609 101623 7ecdb9 101602->101623 101668 7efbce 59 API calls 2 library calls 101602->101668 101669 7ecfdf 61 API calls 2 library calls 101602->101669 101603 7ecf2e 101686 7ed8c8 93 API calls Mailbox 101603->101686 101605->101551 101607 7ecf3d 101608 7ecdc7 101607->101608 101610 7ecf49 101607->101610 101649 7ec96e 101608->101649 101609->101602 101610->101605 101615 7ece00 101664 790c08 101615->101664 101618 7ece1a 101670 7d9e4a 90 API calls 4 library calls 101618->101670 101619 7ece33 101671 7792ce 101619->101671 101622 7ece25 GetCurrentProcess TerminateProcess 101622->101619 101623->101603 101623->101608 101628 7ecfa4 101628->101605 101631 7ecfb8 FreeLibrary 101628->101631 101629 7ece6b 101683 7ed649 108 API calls _free 101629->101683 101631->101605 101635 7ece7c 101635->101628 101684 778d40 59 API calls Mailbox 101635->101684 101685 779d3c 60 API calls Mailbox 101635->101685 101687 7ed649 108 API calls _free 101635->101687 101637 777e4f 59 API calls 101636->101637 101638 7ed7c0 CharLowerBuffW 101637->101638 101688 7cf167 101638->101688 101642 777667 59 API calls 101643 7ed7f9 101642->101643 101695 77784b 101643->101695 101645 7ed810 101646 777d2c 59 API calls 101645->101646 101647 7ed81c Mailbox 101646->101647 101648 7ed858 Mailbox 101647->101648 101708 7ecfdf 61 API calls 2 library calls 101647->101708 101648->101602 101650 7ec989 101649->101650 101651 7ec9de 101649->101651 101652 790db6 Mailbox 59 API calls 101650->101652 101655 7eda50 101651->101655 101654 7ec9ab 101652->101654 101653 790db6 Mailbox 59 API calls 101653->101654 101654->101651 101654->101653 101656 7edc79 Mailbox 101655->101656 101657 7eda73 _strcat _wcscpy __wsetenvp 101655->101657 101656->101615 101657->101656 101658 779be6 59 API calls 101657->101658 101659 779b3c 59 API calls 101657->101659 101660 779b98 59 API calls 101657->101660 101661 779837 85 API calls 101657->101661 101662 79571c 58 API calls std::exception::_Copy_str 101657->101662 101712 7d5887 61 API calls 2 library calls 101657->101712 101658->101657 101659->101657 101660->101657 101661->101657 101662->101657 101665 790c1d 101664->101665 101666 790cb5 VirtualProtect 101665->101666 101667 790c83 101665->101667 101666->101667 101667->101618 101667->101619 101668->101602 101669->101602 101670->101622 101672 7792d6 101671->101672 101673 790db6 Mailbox 59 API calls 101672->101673 101674 7792e4 101673->101674 101676 7792f0 101674->101676 101713 7791fc 59 API calls Mailbox 101674->101713 101677 779050 101676->101677 101714 779160 101677->101714 101679 77905f 101680 790db6 Mailbox 59 API calls 101679->101680 101681 7790fb 101679->101681 101680->101681 101681->101635 101682 778d40 59 API calls Mailbox 101681->101682 101682->101629 101683->101635 101684->101635 101685->101635 101686->101607 101687->101635 101690 7cf192 __wsetenvp 101688->101690 101689 7cf1d1 101689->101642 101689->101647 101690->101689 101691 7cf1c7 101690->101691 101694 7cf278 101690->101694 101691->101689 101709 7778c4 61 API calls 101691->101709 101694->101689 101710 7778c4 61 API calls 101694->101710 101696 7778b7 101695->101696 101697 77785a 101695->101697 101698 777d2c 59 API calls 101696->101698 101697->101696 101699 777865 101697->101699 101705 777888 _memmove 101698->101705 101700 7aeb09 101699->101700 101701 777880 101699->101701 101702 778029 59 API calls 101700->101702 101711 777f27 59 API calls Mailbox 101701->101711 101704 7aeb13 101702->101704 101706 790db6 Mailbox 59 API calls 101704->101706 101705->101645 101707 7aeb33 101706->101707 101708->101648 101709->101691 101710->101694 101711->101705 101712->101657 101713->101676 101715 779169 Mailbox 101714->101715 101716 7af19f 101715->101716 101721 779173 101715->101721 101717 790db6 Mailbox 59 API calls 101716->101717 101719 7af1ab 101717->101719 101718 77917a 101718->101679 101721->101718 101722 779c90 59 API calls Mailbox 101721->101722 101722->101721 101723->101579 101724->101579 101725->101572 101726->101564 101727->101566 101728->101564 101729 77107d 101734 77708b 101729->101734 101731 77108c 101732 792d40 __cinit 67 API calls 101731->101732 101733 771096 101732->101733 101735 77709b __write_nolock 101734->101735 101736 777667 59 API calls 101735->101736 101737 777151 101736->101737 101765 774706 101737->101765 101739 77715a 101772 79050b 101739->101772 101742 777cab 59 API calls 101743 777173 101742->101743 101778 773f74 101743->101778 101746 777667 59 API calls 101747 77718b 101746->101747 101784 777d8c 101747->101784 101749 777194 RegOpenKeyExW 101750 7ae8b1 RegQueryValueExW 101749->101750 101755 7771b6 Mailbox 101749->101755 101751 7ae8ce 101750->101751 101752 7ae943 RegCloseKey 101750->101752 101753 790db6 Mailbox 59 API calls 101751->101753 101752->101755 101763 7ae955 _wcscat Mailbox __wsetenvp 101752->101763 101754 7ae8e7 101753->101754 101788 77522e 101754->101788 101755->101731 101758 7ae90f 101759 777bcc 59 API calls 101758->101759 101760 7ae929 101759->101760 101760->101752 101761 777de1 59 API calls 101761->101763 101762 773f74 59 API calls 101762->101763 101763->101755 101763->101761 101763->101762 101764 7779f2 59 API calls 101763->101764 101764->101763 101791 7a1940 101765->101791 101768 777de1 59 API calls 101769 774739 101768->101769 101793 774750 101769->101793 101771 774743 Mailbox 101771->101739 101773 7a1940 __write_nolock 101772->101773 101774 790518 GetFullPathNameW 101773->101774 101775 79053a 101774->101775 101776 777bcc 59 API calls 101775->101776 101777 777165 101776->101777 101777->101742 101779 773f82 101778->101779 101783 773fa4 _memmove 101778->101783 101781 790db6 Mailbox 59 API calls 101779->101781 101780 790db6 Mailbox 59 API calls 101782 773fb8 101780->101782 101781->101783 101782->101746 101783->101780 101785 777da6 101784->101785 101787 777d99 101784->101787 101786 790db6 Mailbox 59 API calls 101785->101786 101786->101787 101787->101749 101789 790db6 Mailbox 59 API calls 101788->101789 101790 775240 RegQueryValueExW 101789->101790 101790->101758 101790->101760 101792 774713 GetModuleFileNameW 101791->101792 101792->101768 101794 7a1940 __write_nolock 101793->101794 101795 77475d GetFullPathNameW 101794->101795 101796 77477c 101795->101796 101797 774799 101795->101797 101798 777bcc 59 API calls 101796->101798 101799 777d8c 59 API calls 101797->101799 101800 774788 101798->101800 101799->101800 101801 777726 59 API calls 101800->101801 101802 774794 101801->101802 101802->101771 101803 13321d8 101817 132fe28 101803->101817 101805 13322ad 101820 13320c8 101805->101820 101819 13304b3 101817->101819 101823 13332d8 GetPEB 101817->101823 101819->101805 101821 13320d1 Sleep 101820->101821 101822 13320df 101821->101822 101823->101819 101824 797c56 101825 797c62 __getstream 101824->101825 101861 799e08 GetStartupInfoW 101825->101861 101827 797c67 101863 798b7c GetProcessHeap 101827->101863 101829 797cbf 101830 797cca 101829->101830 101946 797da6 58 API calls 3 library calls 101829->101946 101864 799ae6 101830->101864 101833 797cd0 101834 797cdb __RTC_Initialize 101833->101834 101947 797da6 58 API calls 3 library calls 101833->101947 101885 79d5d2 101834->101885 101837 797cea 101838 797cf6 GetCommandLineW 101837->101838 101948 797da6 58 API calls 3 library calls 101837->101948 101904 7a4f23 GetEnvironmentStringsW 101838->101904 101841 797cf5 101841->101838 101844 797d10 101845 797d1b 101844->101845 101949 7930b5 58 API calls 3 library calls 101844->101949 101914 7a4d58 101845->101914 101848 797d21 101849 797d2c 101848->101849 101950 7930b5 58 API calls 3 library calls 101848->101950 101928 7930ef 101849->101928 101852 797d34 101853 797d3f __wwincmdln 101852->101853 101951 7930b5 58 API calls 3 library calls 101852->101951 101934 7747d0 101853->101934 101856 797d53 101857 797d62 101856->101857 101952 793358 58 API calls _doexit 101856->101952 101953 7930e0 58 API calls _doexit 101857->101953 101860 797d67 __getstream 101862 799e1e 101861->101862 101862->101827 101863->101829 101954 793187 36 API calls 2 library calls 101864->101954 101866 799aeb 101955 799d3c InitializeCriticalSectionAndSpinCount __getstream 101866->101955 101868 799af0 101869 799af4 101868->101869 101957 799d8a TlsAlloc 101868->101957 101956 799b5c 61 API calls 2 library calls 101869->101956 101872 799b06 101872->101869 101874 799b11 101872->101874 101873 799af9 101873->101833 101958 7987d5 101874->101958 101877 799b53 101966 799b5c 61 API calls 2 library calls 101877->101966 101880 799b32 101880->101877 101882 799b38 101880->101882 101881 799b58 101881->101833 101965 799a33 58 API calls 4 library calls 101882->101965 101884 799b40 GetCurrentThreadId 101884->101833 101886 79d5de __getstream 101885->101886 101887 799c0b __lock 58 API calls 101886->101887 101888 79d5e5 101887->101888 101889 7987d5 __calloc_crt 58 API calls 101888->101889 101891 79d5f6 101889->101891 101890 79d661 GetStartupInfoW 101898 79d676 101890->101898 101899 79d7a5 101890->101899 101891->101890 101892 79d601 @_EH4_CallFilterFunc@8 __getstream 101891->101892 101892->101837 101893 79d86d 101980 79d87d LeaveCriticalSection _doexit 101893->101980 101895 7987d5 __calloc_crt 58 API calls 101895->101898 101896 79d7f2 GetStdHandle 101896->101899 101897 79d805 GetFileType 101897->101899 101898->101895 101898->101899 101901 79d6c4 101898->101901 101899->101893 101899->101896 101899->101897 101979 799e2b InitializeCriticalSectionAndSpinCount 101899->101979 101900 79d6f8 GetFileType 101900->101901 101901->101899 101901->101900 101978 799e2b InitializeCriticalSectionAndSpinCount 101901->101978 101905 797d06 101904->101905 101906 7a4f34 101904->101906 101910 7a4b1b GetModuleFileNameW 101905->101910 101906->101906 101981 79881d 58 API calls 2 library calls 101906->101981 101908 7a4f5a _memmove 101909 7a4f70 FreeEnvironmentStringsW 101908->101909 101909->101905 101911 7a4b4f _wparse_cmdline 101910->101911 101913 7a4b8f _wparse_cmdline 101911->101913 101982 79881d 58 API calls 2 library calls 101911->101982 101913->101844 101915 7a4d69 101914->101915 101916 7a4d71 __wsetenvp 101914->101916 101915->101848 101917 7987d5 __calloc_crt 58 API calls 101916->101917 101919 7a4d9a __wsetenvp 101917->101919 101918 792d55 _free 58 API calls 101918->101915 101919->101915 101920 7a4df1 101919->101920 101921 7987d5 __calloc_crt 58 API calls 101919->101921 101922 7a4e16 101919->101922 101925 7a4e2d 101919->101925 101983 7a4607 58 API calls 2 library calls 101919->101983 101920->101918 101921->101919 101923 792d55 _free 58 API calls 101922->101923 101923->101915 101984 798dc6 IsProcessorFeaturePresent 101925->101984 101927 7a4e39 101927->101848 101929 7930fb __IsNonwritableInCurrentImage 101928->101929 102007 79a4d1 101929->102007 101931 793119 __initterm_e 101932 792d40 __cinit 67 API calls 101931->101932 101933 793138 _doexit __IsNonwritableInCurrentImage 101931->101933 101932->101933 101933->101852 101935 7747ea 101934->101935 101945 774889 101934->101945 101936 774824 IsThemeActive 101935->101936 102010 79336c 101936->102010 101940 774850 102022 7748fd SystemParametersInfoW SystemParametersInfoW 101940->102022 101942 77485c 102023 773b3a 101942->102023 101944 774864 SystemParametersInfoW 101944->101945 101945->101856 101946->101830 101947->101834 101948->101841 101952->101857 101953->101860 101954->101866 101955->101868 101956->101873 101957->101872 101960 7987dc 101958->101960 101961 798817 101960->101961 101963 7987fa 101960->101963 101967 7a51f6 101960->101967 101961->101877 101964 799de6 TlsSetValue 101961->101964 101963->101960 101963->101961 101975 79a132 Sleep 101963->101975 101964->101880 101965->101884 101966->101881 101968 7a5201 101967->101968 101972 7a521c 101967->101972 101969 7a520d 101968->101969 101968->101972 101976 798b28 58 API calls __getptd_noexit 101969->101976 101971 7a522c HeapAlloc 101971->101972 101973 7a5212 101971->101973 101972->101971 101972->101973 101977 7933a1 DecodePointer 101972->101977 101973->101960 101975->101963 101976->101973 101977->101972 101978->101901 101979->101899 101980->101892 101981->101908 101982->101913 101983->101919 101985 798dd1 101984->101985 101990 798c59 101985->101990 101989 798dec 101989->101927 101991 798c73 _memset __call_reportfault 101990->101991 101992 798c93 IsDebuggerPresent 101991->101992 101998 79a155 SetUnhandledExceptionFilter UnhandledExceptionFilter 101992->101998 101994 798d57 __call_reportfault 101999 79c5f6 101994->101999 101996 798d7a 101997 79a140 GetCurrentProcess TerminateProcess 101996->101997 101997->101989 101998->101994 102000 79c5fe 101999->102000 102001 79c600 IsProcessorFeaturePresent 101999->102001 102000->101996 102003 7a590a 102001->102003 102006 7a58b9 5 API calls 2 library calls 102003->102006 102005 7a59ed 102005->101996 102006->102005 102008 79a4d4 EncodePointer 102007->102008 102008->102008 102009 79a4ee 102008->102009 102009->101931 102011 799c0b __lock 58 API calls 102010->102011 102012 793377 DecodePointer EncodePointer 102011->102012 102075 799d75 LeaveCriticalSection 102012->102075 102014 774849 102015 7933d4 102014->102015 102016 7933f8 102015->102016 102017 7933de 102015->102017 102016->101940 102017->102016 102076 798b28 58 API calls __getptd_noexit 102017->102076 102019 7933e8 102077 798db6 9 API calls __gmtime64_s 102019->102077 102021 7933f3 102021->101940 102022->101942 102024 773b47 __write_nolock 102023->102024 102025 777667 59 API calls 102024->102025 102026 773b51 GetCurrentDirectoryW 102025->102026 102078 773766 102026->102078 102028 773b7a IsDebuggerPresent 102029 7ad272 MessageBoxA 102028->102029 102030 773b88 102028->102030 102033 7ad28c 102029->102033 102031 773c61 102030->102031 102030->102033 102034 773ba5 102030->102034 102032 773c68 SetCurrentDirectoryW 102031->102032 102035 773c75 Mailbox 102032->102035 102277 777213 59 API calls Mailbox 102033->102277 102159 777285 102034->102159 102035->101944 102038 7ad29c 102043 7ad2b2 SetCurrentDirectoryW 102038->102043 102040 773bc3 GetFullPathNameW 102041 777bcc 59 API calls 102040->102041 102042 773bfe 102041->102042 102175 78092d 102042->102175 102043->102035 102046 773c1c 102047 773c26 102046->102047 102278 7c874b AllocateAndInitializeSid CheckTokenMembership FreeSid 102046->102278 102191 773a46 GetSysColorBrush LoadCursorW LoadIconW LoadIconW LoadIconW 102047->102191 102050 7ad2cf 102050->102047 102053 7ad2e0 102050->102053 102055 774706 61 API calls 102053->102055 102054 773c30 102056 773c43 102054->102056 102058 77434a 68 API calls 102054->102058 102057 7ad2e8 102055->102057 102199 7809d0 102056->102199 102060 777de1 59 API calls 102057->102060 102058->102056 102062 7ad2f5 102060->102062 102061 773c4e 102061->102031 102276 77443a Shell_NotifyIconW _memset 102061->102276 102063 7ad2ff 102062->102063 102064 7ad324 102062->102064 102067 777cab 59 API calls 102063->102067 102066 777cab 59 API calls 102064->102066 102068 7ad320 GetForegroundWindow ShellExecuteW 102066->102068 102069 7ad30a 102067->102069 102072 7ad354 Mailbox 102068->102072 102071 777b2e 59 API calls 102069->102071 102073 7ad317 102071->102073 102072->102031 102074 777cab 59 API calls 102073->102074 102074->102068 102075->102014 102076->102019 102077->102021 102079 777667 59 API calls 102078->102079 102080 77377c 102079->102080 102279 773d31 102080->102279 102082 77379a 102083 774706 61 API calls 102082->102083 102084 7737ae 102083->102084 102085 777de1 59 API calls 102084->102085 102086 7737bb 102085->102086 102293 774ddd 102086->102293 102089 7ad173 102349 7d955b 102089->102349 102090 7737dc Mailbox 102094 778047 59 API calls 102090->102094 102093 7ad192 102096 792d55 _free 58 API calls 102093->102096 102097 7737ef 102094->102097 102098 7ad19f 102096->102098 102317 77928a 102097->102317 102100 774e4a 84 API calls 102098->102100 102102 7ad1a8 102100->102102 102106 773ed0 59 API calls 102102->102106 102103 777de1 59 API calls 102104 773808 102103->102104 102320 7784c0 102104->102320 102108 7ad1c3 102106->102108 102107 77381a Mailbox 102109 777de1 59 API calls 102107->102109 102110 773ed0 59 API calls 102108->102110 102111 773840 102109->102111 102112 7ad1df 102110->102112 102113 7784c0 69 API calls 102111->102113 102114 774706 61 API calls 102112->102114 102115 77384f Mailbox 102113->102115 102116 7ad204 102114->102116 102119 777667 59 API calls 102115->102119 102117 773ed0 59 API calls 102116->102117 102118 7ad210 102117->102118 102120 778047 59 API calls 102118->102120 102121 77386d 102119->102121 102122 7ad21e 102120->102122 102324 773ed0 102121->102324 102125 773ed0 59 API calls 102122->102125 102126 7ad22d 102125->102126 102132 778047 59 API calls 102126->102132 102128 773887 102128->102102 102129 773891 102128->102129 102130 792efd _W_store_winword 60 API calls 102129->102130 102131 77389c 102130->102131 102131->102108 102133 7738a6 102131->102133 102134 7ad24f 102132->102134 102135 792efd _W_store_winword 60 API calls 102133->102135 102136 773ed0 59 API calls 102134->102136 102137 7738b1 102135->102137 102138 7ad25c 102136->102138 102137->102112 102139 7738bb 102137->102139 102138->102138 102140 792efd _W_store_winword 60 API calls 102139->102140 102141 7738c6 102140->102141 102141->102126 102142 773907 102141->102142 102144 773ed0 59 API calls 102141->102144 102142->102126 102143 773914 102142->102143 102145 7792ce 59 API calls 102143->102145 102146 7738ea 102144->102146 102148 773924 102145->102148 102147 778047 59 API calls 102146->102147 102149 7738f8 102147->102149 102150 779050 59 API calls 102148->102150 102151 773ed0 59 API calls 102149->102151 102152 773932 102150->102152 102151->102142 102340 778ee0 102152->102340 102154 77928a 59 API calls 102156 77394f 102154->102156 102155 778ee0 60 API calls 102155->102156 102156->102154 102156->102155 102157 773ed0 59 API calls 102156->102157 102158 773995 Mailbox 102156->102158 102157->102156 102158->102028 102160 777292 __write_nolock 102159->102160 102161 7772ab 102160->102161 102163 7aea22 _memset 102160->102163 102162 774750 60 API calls 102161->102162 102164 7772b4 102162->102164 102165 7aea3e GetOpenFileNameW 102163->102165 102947 790791 102164->102947 102167 7aea8d 102165->102167 102168 777bcc 59 API calls 102167->102168 102170 7aeaa2 102168->102170 102170->102170 102172 7772c9 102965 77686a 102172->102965 102176 78093a __write_nolock 102175->102176 103193 776d80 102176->103193 102178 78093f 102190 773c14 102178->102190 103204 78119e 90 API calls 102178->103204 102180 78094c 102180->102190 103205 783ee7 92 API calls Mailbox 102180->103205 102182 780955 102183 780959 GetFullPathNameW 102182->102183 102182->102190 102184 777bcc 59 API calls 102183->102184 102185 780985 102184->102185 102186 777bcc 59 API calls 102185->102186 102187 780992 102186->102187 102188 7b4cab _wcscat 102187->102188 102189 777bcc 59 API calls 102187->102189 102189->102190 102190->102038 102190->102046 102192 773ab0 LoadImageW RegisterClassExW 102191->102192 102193 7ad261 102191->102193 103242 773041 7 API calls 102192->103242 103243 7747a0 LoadImageW EnumResourceNamesW 102193->103243 102196 7ad26a 102197 773b34 102198 7739d5 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 102197->102198 102198->102054 102200 7b4cc3 102199->102200 102212 7809f5 102199->102212 103379 7d9e4a 90 API calls 4 library calls 102200->103379 102202 780cfa 102202->102061 102205 780ee4 102205->102202 102207 780ef1 102205->102207 102206 780a4b PeekMessageW 102269 780a05 Mailbox 102206->102269 103377 781093 332 API calls Mailbox 102207->103377 102210 780ef8 LockWindowUpdate DestroyWindow GetMessageW 102210->102202 102214 780f2a 102210->102214 102211 780ce4 102211->102202 103376 781070 10 API calls Mailbox 102211->103376 102212->102269 103380 779e5d 60 API calls 102212->103380 103381 7c6349 332 API calls 102212->103381 102213 7b4e81 Sleep 102213->102269 102215 7b5c58 TranslateMessage DispatchMessageW GetMessageW 102214->102215 102215->102215 102217 7b5c88 102215->102217 102217->102202 102218 7b4d50 TranslateAcceleratorW 102220 780e43 PeekMessageW 102218->102220 102218->102269 102219 779e5d 60 API calls 102219->102269 102220->102269 102221 780ea5 TranslateMessage DispatchMessageW 102221->102220 102222 7b581f WaitForSingleObject 102226 7b583c GetExitCodeProcess CloseHandle 102222->102226 102222->102269 102224 790db6 59 API calls Mailbox 102224->102269 102225 780d13 timeGetTime 102225->102269 102259 780f95 102226->102259 102227 780e5f Sleep 102258 780e70 Mailbox 102227->102258 102228 778047 59 API calls 102228->102269 102229 777667 59 API calls 102229->102258 102230 7b5af8 Sleep 102230->102258 102233 79049f timeGetTime 102233->102258 102234 780f4e timeGetTime 103378 779e5d 60 API calls 102234->103378 102237 7b5b8f GetExitCodeProcess 102240 7b5bbb CloseHandle 102237->102240 102241 7b5ba5 WaitForSingleObject 102237->102241 102238 779837 85 API calls 102238->102269 102239 77b7dd 110 API calls 102239->102258 102240->102258 102241->102240 102241->102269 102244 7f5f25 111 API calls 102244->102258 102245 7b5874 102245->102259 102246 7b5078 Sleep 102246->102269 102247 7b5c17 Sleep 102247->102269 102249 777de1 59 API calls 102249->102258 102258->102229 102258->102233 102258->102237 102258->102239 102258->102244 102258->102245 102258->102246 102258->102247 102258->102249 102258->102259 102258->102269 103388 7d2408 60 API calls 102258->103388 103389 779e5d 60 API calls 102258->103389 103390 7789b3 69 API calls Mailbox 102258->103390 103391 77b73c 332 API calls 102258->103391 103392 7c64da 60 API calls 102258->103392 103393 7d5244 QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 102258->103393 103394 7d3c55 66 API calls Mailbox 102258->103394 102259->102061 102260 7d9e4a 90 API calls 102260->102269 102262 7784c0 69 API calls 102262->102269 102263 779c90 59 API calls Mailbox 102263->102269 102264 779ea0 305 API calls 102264->102269 102265 77b73c 305 API calls 102265->102269 102267 7c617e 59 API calls Mailbox 102267->102269 102268 7789b3 69 API calls 102268->102269 102269->102206 102269->102211 102269->102213 102269->102218 102269->102219 102269->102220 102269->102221 102269->102222 102269->102224 102269->102225 102269->102227 102269->102228 102269->102230 102269->102234 102269->102238 102269->102258 102269->102259 102269->102260 102269->102262 102269->102263 102269->102264 102269->102265 102269->102267 102269->102268 102270 7b55d5 VariantClear 102269->102270 102271 7c6e8f 59 API calls 102269->102271 102272 7b566b VariantClear 102269->102272 102273 778cd4 59 API calls Mailbox 102269->102273 102274 7b5419 VariantClear 102269->102274 102275 777de1 59 API calls 102269->102275 103244 77e6a0 102269->103244 103275 77f460 102269->103275 103294 77fce0 102269->103294 103374 77e420 332 API calls 102269->103374 103375 7731ce IsDialogMessageW GetClassLongW 102269->103375 103382 7f6018 59 API calls 102269->103382 103383 7d9a15 59 API calls Mailbox 102269->103383 103384 7cd4f2 59 API calls 102269->103384 103385 7c60ef 59 API calls 2 library calls 102269->103385 103386 778401 59 API calls 102269->103386 103387 7782df 59 API calls Mailbox 102269->103387 102270->102269 102271->102269 102272->102269 102273->102269 102274->102269 102275->102269 102276->102031 102277->102038 102278->102050 102280 773d3e __write_nolock 102279->102280 102281 777bcc 59 API calls 102280->102281 102286 773ea4 Mailbox 102280->102286 102283 773d70 102281->102283 102292 773da6 Mailbox 102283->102292 102390 7779f2 102283->102390 102284 7779f2 59 API calls 102284->102292 102285 773e77 102285->102286 102287 777de1 59 API calls 102285->102287 102286->102082 102289 773e98 102287->102289 102288 777de1 59 API calls 102288->102292 102290 773f74 59 API calls 102289->102290 102290->102286 102291 773f74 59 API calls 102291->102292 102292->102284 102292->102285 102292->102286 102292->102288 102292->102291 102393 774bb5 102293->102393 102298 7ad8e6 102301 774e4a 84 API calls 102298->102301 102299 774e08 LoadLibraryExW 102403 774b6a 102299->102403 102303 7ad8ed 102301->102303 102305 774b6a 3 API calls 102303->102305 102306 7ad8f5 102305->102306 102429 774f0b 102306->102429 102307 774e2f 102307->102306 102308 774e3b 102307->102308 102310 774e4a 84 API calls 102308->102310 102312 7737d4 102310->102312 102312->102089 102312->102090 102314 7ad91c 102435 774ec7 102314->102435 102316 7ad929 102318 790db6 Mailbox 59 API calls 102317->102318 102319 7737fb 102318->102319 102319->102103 102321 7784cb 102320->102321 102322 7784f2 102321->102322 102681 7789b3 69 API calls Mailbox 102321->102681 102322->102107 102325 773ef3 102324->102325 102326 773eda 102324->102326 102328 777bcc 59 API calls 102325->102328 102327 778047 59 API calls 102326->102327 102329 773879 102327->102329 102328->102329 102330 792efd 102329->102330 102331 792f7e 102330->102331 102332 792f09 102330->102332 102684 792f90 60 API calls 4 library calls 102331->102684 102338 792f2e 102332->102338 102682 798b28 58 API calls __getptd_noexit 102332->102682 102335 792f8b 102335->102128 102336 792f15 102683 798db6 9 API calls __gmtime64_s 102336->102683 102338->102128 102339 792f20 102339->102128 102341 7af17c 102340->102341 102344 778ef7 102340->102344 102341->102344 102686 778bdb 59 API calls Mailbox 102341->102686 102343 778fff 102343->102156 102344->102343 102345 779040 102344->102345 102346 778ff8 102344->102346 102685 779d3c 60 API calls Mailbox 102345->102685 102348 790db6 Mailbox 59 API calls 102346->102348 102348->102343 102350 774ee5 85 API calls 102349->102350 102351 7d95ca 102350->102351 102687 7d9734 96 API calls 2 library calls 102351->102687 102353 7d95dc 102354 774f0b 74 API calls 102353->102354 102383 7ad186 102353->102383 102355 7d95f7 102354->102355 102356 774f0b 74 API calls 102355->102356 102357 7d9607 102356->102357 102358 774f0b 74 API calls 102357->102358 102359 7d9622 102358->102359 102360 774f0b 74 API calls 102359->102360 102361 7d963d 102360->102361 102362 774ee5 85 API calls 102361->102362 102363 7d9654 102362->102363 102364 79571c std::exception::_Copy_str 58 API calls 102363->102364 102365 7d965b 102364->102365 102366 79571c std::exception::_Copy_str 58 API calls 102365->102366 102367 7d9665 102366->102367 102368 774f0b 74 API calls 102367->102368 102369 7d9679 102368->102369 102688 7d9109 GetSystemTimeAsFileTime 102369->102688 102371 7d968c 102372 7d96b6 102371->102372 102373 7d96a1 102371->102373 102375 7d96bc 102372->102375 102376 7d971b 102372->102376 102374 792d55 _free 58 API calls 102373->102374 102378 7d96a7 102374->102378 102689 7d8b06 116 API calls __fcloseall 102375->102689 102377 792d55 _free 58 API calls 102376->102377 102377->102383 102381 792d55 _free 58 API calls 102378->102381 102380 7d9713 102382 792d55 _free 58 API calls 102380->102382 102381->102383 102382->102383 102383->102093 102384 774e4a 102383->102384 102385 774e54 102384->102385 102386 774e5b 102384->102386 102690 7953a6 102385->102690 102388 774e7b FreeLibrary 102386->102388 102389 774e6a 102386->102389 102388->102389 102389->102093 102391 777e4f 59 API calls 102390->102391 102392 7779fd 102391->102392 102392->102283 102440 774c03 102393->102440 102396 774bdc 102398 774bf5 102396->102398 102399 774bec FreeLibrary 102396->102399 102397 774c03 2 API calls 102397->102396 102400 79525b 102398->102400 102399->102398 102444 795270 102400->102444 102402 774dfc 102402->102298 102402->102299 102604 774c36 102403->102604 102406 774c36 2 API calls 102409 774b8f 102406->102409 102407 774ba1 FreeLibrary 102408 774baa 102407->102408 102410 774c70 102408->102410 102409->102407 102409->102408 102411 790db6 Mailbox 59 API calls 102410->102411 102412 774c85 102411->102412 102413 77522e 59 API calls 102412->102413 102414 774c91 _memmove 102413->102414 102415 774ccc 102414->102415 102416 774dc1 102414->102416 102417 774d89 102414->102417 102418 774ec7 69 API calls 102415->102418 102619 7d991b 95 API calls 102416->102619 102608 774e89 CreateStreamOnHGlobal 102417->102608 102426 774cd5 102418->102426 102421 774f0b 74 API calls 102421->102426 102422 774d69 102422->102307 102424 7ad8a7 102425 774ee5 85 API calls 102424->102425 102427 7ad8bb 102425->102427 102426->102421 102426->102422 102426->102424 102614 774ee5 102426->102614 102428 774f0b 74 API calls 102427->102428 102428->102422 102430 7ad9cd 102429->102430 102431 774f1d 102429->102431 102643 7955e2 102431->102643 102434 7d9109 GetSystemTimeAsFileTime 102434->102314 102436 774ed6 102435->102436 102437 7ad990 102435->102437 102663 795c60 102436->102663 102439 774ede 102439->102316 102441 774bd0 102440->102441 102442 774c0c LoadLibraryA 102440->102442 102441->102396 102441->102397 102442->102441 102443 774c1d GetProcAddress 102442->102443 102443->102441 102447 79527c __getstream 102444->102447 102445 79528f 102493 798b28 58 API calls __getptd_noexit 102445->102493 102447->102445 102448 7952c0 102447->102448 102463 7a04e8 102448->102463 102449 795294 102494 798db6 9 API calls __gmtime64_s 102449->102494 102452 7952c5 102453 7952db 102452->102453 102454 7952ce 102452->102454 102456 795305 102453->102456 102457 7952e5 102453->102457 102495 798b28 58 API calls __getptd_noexit 102454->102495 102478 7a0607 102456->102478 102496 798b28 58 API calls __getptd_noexit 102457->102496 102460 79529f @_EH4_CallFilterFunc@8 __getstream 102460->102402 102464 7a04f4 __getstream 102463->102464 102465 799c0b __lock 58 API calls 102464->102465 102476 7a0502 102465->102476 102466 7a0576 102498 7a05fe 102466->102498 102467 7a057d 102503 79881d 58 API calls 2 library calls 102467->102503 102470 7a0584 102470->102466 102504 799e2b InitializeCriticalSectionAndSpinCount 102470->102504 102471 7a05f3 __getstream 102471->102452 102473 799c93 __mtinitlocknum 58 API calls 102473->102476 102475 7a05aa EnterCriticalSection 102475->102466 102476->102466 102476->102467 102476->102473 102501 796c50 59 API calls __lock 102476->102501 102502 796cba LeaveCriticalSection LeaveCriticalSection _doexit 102476->102502 102479 7a0627 __wopenfile 102478->102479 102480 7a0641 102479->102480 102492 7a07fc 102479->102492 102511 7937cb 60 API calls 3 library calls 102479->102511 102509 798b28 58 API calls __getptd_noexit 102480->102509 102482 7a0646 102510 798db6 9 API calls __gmtime64_s 102482->102510 102484 7a085f 102506 7a85a1 102484->102506 102486 795310 102497 795332 LeaveCriticalSection LeaveCriticalSection __wfsopen 102486->102497 102488 7a07f5 102488->102492 102512 7937cb 60 API calls 3 library calls 102488->102512 102490 7a0814 102490->102492 102513 7937cb 60 API calls 3 library calls 102490->102513 102492->102480 102492->102484 102493->102449 102494->102460 102495->102460 102496->102460 102497->102460 102505 799d75 LeaveCriticalSection 102498->102505 102500 7a0605 102500->102471 102501->102476 102502->102476 102503->102470 102504->102475 102505->102500 102514 7a7d85 102506->102514 102508 7a85ba 102508->102486 102509->102482 102510->102486 102511->102488 102512->102490 102513->102492 102516 7a7d91 __getstream 102514->102516 102515 7a7da7 102601 798b28 58 API calls __getptd_noexit 102515->102601 102516->102515 102519 7a7ddd 102516->102519 102518 7a7dac 102602 798db6 9 API calls __gmtime64_s 102518->102602 102525 7a7e4e 102519->102525 102522 7a7df9 102603 7a7e22 LeaveCriticalSection __unlock_fhandle 102522->102603 102524 7a7db6 __getstream 102524->102508 102526 7a7e6e 102525->102526 102527 7944ea __wsopen_nolock 58 API calls 102526->102527 102531 7a7e8a 102527->102531 102528 7a7fc1 102529 798dc6 __invoke_watson 8 API calls 102528->102529 102530 7a85a0 102529->102530 102532 7a7d85 __wsopen_helper 103 API calls 102530->102532 102531->102528 102533 7a7ec4 102531->102533 102539 7a7ee7 102531->102539 102534 7a85ba 102532->102534 102535 798af4 __dosmaperr 58 API calls 102533->102535 102534->102522 102536 7a7ec9 102535->102536 102537 798b28 __calloc_impl 58 API calls 102536->102537 102538 7a7ed6 102537->102538 102541 798db6 __gmtime64_s 9 API calls 102538->102541 102540 7a7fa5 102539->102540 102547 7a7f83 102539->102547 102542 798af4 __dosmaperr 58 API calls 102540->102542 102543 7a7ee0 102541->102543 102544 7a7faa 102542->102544 102543->102522 102545 798b28 __calloc_impl 58 API calls 102544->102545 102546 7a7fb7 102545->102546 102548 798db6 __gmtime64_s 9 API calls 102546->102548 102549 79d294 __alloc_osfhnd 61 API calls 102547->102549 102548->102528 102550 7a8051 102549->102550 102551 7a805b 102550->102551 102552 7a807e 102550->102552 102553 798af4 __dosmaperr 58 API calls 102551->102553 102554 7a7cfd ___createFile GetModuleHandleW GetProcAddress CreateFileW 102552->102554 102555 7a8060 102553->102555 102562 7a80a0 102554->102562 102557 798b28 __calloc_impl 58 API calls 102555->102557 102556 7a811e GetFileType 102560 7a816b 102556->102560 102561 7a8129 GetLastError 102556->102561 102559 7a806a 102557->102559 102558 7a80ec GetLastError 102563 798b07 __dosmaperr 58 API calls 102558->102563 102564 798b28 __calloc_impl 58 API calls 102559->102564 102571 79d52a __set_osfhnd 59 API calls 102560->102571 102565 798b07 __dosmaperr 58 API calls 102561->102565 102562->102556 102562->102558 102566 7a7cfd ___createFile GetModuleHandleW GetProcAddress CreateFileW 102562->102566 102567 7a8111 102563->102567 102564->102543 102568 7a8150 CloseHandle 102565->102568 102570 7a80e1 102566->102570 102573 798b28 __calloc_impl 58 API calls 102567->102573 102568->102567 102569 7a815e 102568->102569 102572 798b28 __calloc_impl 58 API calls 102569->102572 102570->102556 102570->102558 102576 7a8189 102571->102576 102574 7a8163 102572->102574 102573->102528 102574->102567 102575 7a820a 102577 7a8344 102575->102577 102592 79d886 __write 78 API calls 102575->102592 102594 7a18c1 60 API calls __lseeki64_nolock 102575->102594 102599 7a8212 102575->102599 102576->102575 102576->102577 102578 7a18c1 __lseeki64_nolock 60 API calls 102576->102578 102577->102528 102579 7a8517 CloseHandle 102577->102579 102580 7a81f3 102578->102580 102581 7a7cfd ___createFile GetModuleHandleW GetProcAddress CreateFileW 102579->102581 102582 798af4 __dosmaperr 58 API calls 102580->102582 102580->102599 102584 7a853e 102581->102584 102582->102575 102583 7a0e5b 70 API calls __read_nolock 102583->102599 102585 7a83ce 102584->102585 102586 7a8546 GetLastError 102584->102586 102585->102528 102587 798b07 __dosmaperr 58 API calls 102586->102587 102588 7a8552 102587->102588 102590 79d43d __free_osfhnd 59 API calls 102588->102590 102589 7a0add __close_nolock 61 API calls 102589->102599 102590->102585 102591 7a97a2 __chsize_nolock 82 API calls 102591->102599 102592->102575 102593 7a83c1 102596 7a0add __close_nolock 61 API calls 102593->102596 102594->102575 102595 7a83aa 102595->102577 102598 7a83c8 102596->102598 102597 7a18c1 60 API calls __lseeki64_nolock 102597->102599 102600 798b28 __calloc_impl 58 API calls 102598->102600 102599->102575 102599->102583 102599->102589 102599->102591 102599->102593 102599->102595 102599->102597 102600->102585 102601->102518 102602->102524 102603->102524 102605 774b83 102604->102605 102606 774c3f LoadLibraryA 102604->102606 102605->102406 102605->102409 102606->102605 102607 774c50 GetProcAddress 102606->102607 102607->102605 102609 774ea3 FindResourceExW 102608->102609 102610 774ec0 102608->102610 102609->102610 102611 7ad933 LoadResource 102609->102611 102610->102415 102611->102610 102612 7ad948 SizeofResource 102611->102612 102612->102610 102613 7ad95c LockResource 102612->102613 102613->102610 102615 7ad9ab 102614->102615 102616 774ef4 102614->102616 102620 79584d 102616->102620 102618 774f02 102618->102426 102619->102415 102624 795859 __getstream 102620->102624 102621 79586b 102633 798b28 58 API calls __getptd_noexit 102621->102633 102623 795891 102635 796c11 102623->102635 102624->102621 102624->102623 102625 795870 102634 798db6 9 API calls __gmtime64_s 102625->102634 102628 795897 102641 7957be 83 API calls 5 library calls 102628->102641 102630 7958a6 102642 7958c8 LeaveCriticalSection LeaveCriticalSection __wfsopen 102630->102642 102632 79587b __getstream 102632->102618 102633->102625 102634->102632 102636 796c21 102635->102636 102637 796c43 EnterCriticalSection 102635->102637 102636->102637 102638 796c29 102636->102638 102639 796c39 102637->102639 102640 799c0b __lock 58 API calls 102638->102640 102639->102628 102640->102639 102641->102630 102642->102632 102646 7955fd 102643->102646 102645 774f2e 102645->102434 102647 795609 __getstream 102646->102647 102648 795644 __getstream 102647->102648 102649 79564c 102647->102649 102650 79561f _memset 102647->102650 102648->102645 102651 796c11 __lock_file 59 API calls 102649->102651 102659 798b28 58 API calls __getptd_noexit 102650->102659 102653 795652 102651->102653 102661 79541d 72 API calls 7 library calls 102653->102661 102654 795639 102660 798db6 9 API calls __gmtime64_s 102654->102660 102657 795668 102662 795686 LeaveCriticalSection LeaveCriticalSection __wfsopen 102657->102662 102659->102654 102660->102648 102661->102657 102662->102648 102664 795c6c __getstream 102663->102664 102665 795c7e 102664->102665 102666 795c93 102664->102666 102677 798b28 58 API calls __getptd_noexit 102665->102677 102668 796c11 __lock_file 59 API calls 102666->102668 102670 795c99 102668->102670 102669 795c83 102678 798db6 9 API calls __gmtime64_s 102669->102678 102679 7958d0 67 API calls 7 library calls 102670->102679 102673 795c8e __getstream 102673->102439 102674 795ca4 102680 795cc4 LeaveCriticalSection LeaveCriticalSection __wfsopen 102674->102680 102676 795cb6 102676->102673 102677->102669 102678->102673 102679->102674 102680->102676 102681->102322 102682->102336 102683->102339 102684->102335 102685->102343 102686->102344 102687->102353 102688->102371 102689->102380 102691 7953b2 __getstream 102690->102691 102692 7953de 102691->102692 102693 7953c6 102691->102693 102696 796c11 __lock_file 59 API calls 102692->102696 102700 7953d6 __getstream 102692->102700 102719 798b28 58 API calls __getptd_noexit 102693->102719 102695 7953cb 102720 798db6 9 API calls __gmtime64_s 102695->102720 102698 7953f0 102696->102698 102703 79533a 102698->102703 102700->102386 102704 795349 102703->102704 102707 79535d 102703->102707 102765 798b28 58 API calls __getptd_noexit 102704->102765 102706 795359 102721 795415 LeaveCriticalSection LeaveCriticalSection __wfsopen 102706->102721 102707->102706 102722 794a3d 102707->102722 102708 79534e 102766 798db6 9 API calls __gmtime64_s 102708->102766 102715 795377 102739 7a0a02 102715->102739 102717 79537d 102717->102706 102718 792d55 _free 58 API calls 102717->102718 102718->102706 102719->102695 102720->102700 102721->102700 102723 794a50 102722->102723 102727 794a74 102722->102727 102724 7946e6 __output_l 58 API calls 102723->102724 102723->102727 102725 794a6d 102724->102725 102767 79d886 102725->102767 102728 7a0b77 102727->102728 102729 795371 102728->102729 102730 7a0b84 102728->102730 102732 7946e6 102729->102732 102730->102729 102731 792d55 _free 58 API calls 102730->102731 102731->102729 102733 7946f0 102732->102733 102734 794705 102732->102734 102902 798b28 58 API calls __getptd_noexit 102733->102902 102734->102715 102736 7946f5 102903 798db6 9 API calls __gmtime64_s 102736->102903 102738 794700 102738->102715 102740 7a0a0e __getstream 102739->102740 102741 7a0a1b 102740->102741 102742 7a0a32 102740->102742 102919 798af4 58 API calls __getptd_noexit 102741->102919 102743 7a0abd 102742->102743 102745 7a0a42 102742->102745 102924 798af4 58 API calls __getptd_noexit 102743->102924 102748 7a0a6a 102745->102748 102749 7a0a60 102745->102749 102747 7a0a20 102920 798b28 58 API calls __getptd_noexit 102747->102920 102753 79d206 ___lock_fhandle 59 API calls 102748->102753 102921 798af4 58 API calls __getptd_noexit 102749->102921 102750 7a0a65 102925 798b28 58 API calls __getptd_noexit 102750->102925 102755 7a0a70 102753->102755 102757 7a0a8e 102755->102757 102758 7a0a83 102755->102758 102756 7a0ac9 102926 798db6 9 API calls __gmtime64_s 102756->102926 102922 798b28 58 API calls __getptd_noexit 102757->102922 102904 7a0add 102758->102904 102761 7a0a27 __getstream 102761->102717 102763 7a0a89 102923 7a0ab5 LeaveCriticalSection __unlock_fhandle 102763->102923 102765->102708 102766->102706 102768 79d892 __getstream 102767->102768 102769 79d89f 102768->102769 102770 79d8b6 102768->102770 102868 798af4 58 API calls __getptd_noexit 102769->102868 102771 79d955 102770->102771 102774 79d8ca 102770->102774 102874 798af4 58 API calls __getptd_noexit 102771->102874 102773 79d8a4 102869 798b28 58 API calls __getptd_noexit 102773->102869 102777 79d8e8 102774->102777 102778 79d8f2 102774->102778 102870 798af4 58 API calls __getptd_noexit 102777->102870 102795 79d206 102778->102795 102779 79d8ed 102875 798b28 58 API calls __getptd_noexit 102779->102875 102782 79d8f8 102784 79d90b 102782->102784 102785 79d91e 102782->102785 102804 79d975 102784->102804 102871 798b28 58 API calls __getptd_noexit 102785->102871 102786 79d961 102876 798db6 9 API calls __gmtime64_s 102786->102876 102787 79d8ab __getstream 102787->102727 102791 79d923 102872 798af4 58 API calls __getptd_noexit 102791->102872 102792 79d917 102873 79d94d LeaveCriticalSection __unlock_fhandle 102792->102873 102796 79d212 __getstream 102795->102796 102797 79d261 EnterCriticalSection 102796->102797 102798 799c0b __lock 58 API calls 102796->102798 102799 79d287 __getstream 102797->102799 102800 79d237 102798->102800 102799->102782 102801 79d24f 102800->102801 102877 799e2b InitializeCriticalSectionAndSpinCount 102800->102877 102878 79d28b LeaveCriticalSection _doexit 102801->102878 102805 79d982 __write_nolock 102804->102805 102806 79d9b6 102805->102806 102807 79d9c1 102805->102807 102808 79d9e0 102805->102808 102809 79c5f6 __call_reportfault 6 API calls 102806->102809 102888 798af4 58 API calls __getptd_noexit 102807->102888 102812 79da38 102808->102812 102813 79da1c 102808->102813 102814 79e1d6 102809->102814 102811 79d9c6 102889 798b28 58 API calls __getptd_noexit 102811->102889 102816 79da51 102812->102816 102894 7a18c1 60 API calls 3 library calls 102812->102894 102891 798af4 58 API calls __getptd_noexit 102813->102891 102814->102792 102879 7a5c6b 102816->102879 102818 79d9cd 102890 798db6 9 API calls __gmtime64_s 102818->102890 102821 79da21 102892 798b28 58 API calls __getptd_noexit 102821->102892 102823 79da5f 102825 79ddb8 102823->102825 102895 7999ac 58 API calls 2 library calls 102823->102895 102827 79e14b WriteFile 102825->102827 102828 79ddd6 102825->102828 102826 79da28 102893 798db6 9 API calls __gmtime64_s 102826->102893 102831 79ddab GetLastError 102827->102831 102839 79dd78 102827->102839 102832 79defa 102828->102832 102833 79ddec 102828->102833 102831->102839 102835 79dfef 102832->102835 102836 79df05 102832->102836 102841 79de5b WriteFile 102833->102841 102845 79e184 102833->102845 102834 79da8b GetConsoleMode 102834->102825 102837 79daca 102834->102837 102835->102845 102851 79e064 WideCharToMultiByte 102835->102851 102836->102845 102846 79df6a WriteFile 102836->102846 102837->102825 102840 79dada GetConsoleCP 102837->102840 102839->102806 102844 79ded8 102839->102844 102839->102845 102840->102845 102866 79db09 102840->102866 102841->102831 102842 79de98 102841->102842 102842->102833 102847 79debc 102842->102847 102843 79e1b2 102901 798af4 58 API calls __getptd_noexit 102843->102901 102849 79e17b 102844->102849 102850 79dee3 102844->102850 102845->102806 102900 798b28 58 API calls __getptd_noexit 102845->102900 102846->102831 102852 79dfb9 102846->102852 102847->102839 102899 798b07 58 API calls 2 library calls 102849->102899 102897 798b28 58 API calls __getptd_noexit 102850->102897 102851->102831 102860 79e0ab 102851->102860 102852->102836 102852->102839 102852->102847 102855 79e0b3 WriteFile 102858 79e106 GetLastError 102855->102858 102855->102860 102856 79dee8 102898 798af4 58 API calls __getptd_noexit 102856->102898 102858->102860 102860->102835 102860->102839 102860->102847 102860->102855 102861 7a62ba 60 API calls __write_nolock 102861->102866 102862 79dbf2 WideCharToMultiByte 102862->102839 102863 79dc2d WriteFile 102862->102863 102863->102831 102865 79dc5f 102863->102865 102864 7a7a5e WriteConsoleW CreateFileW __putwch_nolock 102864->102865 102865->102831 102865->102839 102865->102864 102865->102866 102867 79dc87 WriteFile 102865->102867 102866->102839 102866->102861 102866->102862 102866->102865 102896 7935f5 58 API calls __isleadbyte_l 102866->102896 102867->102831 102867->102865 102868->102773 102869->102787 102870->102779 102871->102791 102872->102792 102873->102787 102874->102779 102875->102786 102876->102787 102877->102801 102878->102797 102880 7a5c83 102879->102880 102881 7a5c76 102879->102881 102884 7a5c8f 102880->102884 102885 798b28 __calloc_impl 58 API calls 102880->102885 102882 798b28 __calloc_impl 58 API calls 102881->102882 102883 7a5c7b 102882->102883 102883->102823 102884->102823 102886 7a5cb0 102885->102886 102887 798db6 __gmtime64_s 9 API calls 102886->102887 102887->102883 102888->102811 102889->102818 102890->102806 102891->102821 102892->102826 102893->102806 102894->102816 102895->102834 102896->102866 102897->102856 102898->102806 102899->102806 102900->102843 102901->102806 102902->102736 102903->102738 102927 79d4c3 102904->102927 102906 7a0b41 102940 79d43d 59 API calls 2 library calls 102906->102940 102907 7a0aeb 102907->102906 102908 7a0b1f 102907->102908 102910 79d4c3 __chsize_nolock 58 API calls 102907->102910 102908->102906 102911 79d4c3 __chsize_nolock 58 API calls 102908->102911 102913 7a0b16 102910->102913 102914 7a0b2b CloseHandle 102911->102914 102912 7a0b49 102915 7a0b6b 102912->102915 102941 798b07 58 API calls 2 library calls 102912->102941 102917 79d4c3 __chsize_nolock 58 API calls 102913->102917 102914->102906 102918 7a0b37 GetLastError 102914->102918 102915->102763 102917->102908 102918->102906 102919->102747 102920->102761 102921->102750 102922->102763 102923->102761 102924->102750 102925->102756 102926->102761 102928 79d4ce 102927->102928 102929 79d4e3 102927->102929 102942 798af4 58 API calls __getptd_noexit 102928->102942 102934 79d508 102929->102934 102944 798af4 58 API calls __getptd_noexit 102929->102944 102932 79d4d3 102943 798b28 58 API calls __getptd_noexit 102932->102943 102934->102907 102935 79d512 102945 798b28 58 API calls __getptd_noexit 102935->102945 102936 79d4db 102936->102907 102938 79d51a 102946 798db6 9 API calls __gmtime64_s 102938->102946 102940->102912 102941->102915 102942->102932 102943->102936 102944->102935 102945->102938 102946->102936 102948 79079e __write_nolock 102947->102948 102949 79079f GetLongPathNameW 102948->102949 102950 777bcc 59 API calls 102949->102950 102951 7772bd 102950->102951 102952 77700b 102951->102952 102953 777667 59 API calls 102952->102953 102954 77701d 102953->102954 102955 774750 60 API calls 102954->102955 102956 777028 102955->102956 102957 777033 102956->102957 102962 7ae885 102956->102962 102958 773f74 59 API calls 102957->102958 102960 77703f 102958->102960 102999 7734c2 102960->102999 102963 7ae89f 102962->102963 103005 777908 61 API calls 102962->103005 102964 777052 Mailbox 102964->102172 102966 774ddd 136 API calls 102965->102966 102967 77688f 102966->102967 102968 7ae031 102967->102968 102969 774ddd 136 API calls 102967->102969 102970 7d955b 122 API calls 102968->102970 102972 7768a3 102969->102972 102971 7ae046 102970->102971 102973 7ae04a 102971->102973 102974 7ae067 102971->102974 102972->102968 102975 7768ab 102972->102975 102976 774e4a 84 API calls 102973->102976 102977 790db6 Mailbox 59 API calls 102974->102977 102978 7768b7 102975->102978 102979 7ae052 102975->102979 102976->102979 102998 7ae0ac Mailbox 102977->102998 103006 776a8c 102978->103006 103099 7d42f8 91 API calls _wprintf 102979->103099 102982 7ae060 102982->102974 102984 7ae260 102985 792d55 _free 58 API calls 102984->102985 102986 7ae268 102985->102986 102987 774e4a 84 API calls 102986->102987 102992 7ae271 102987->102992 102991 792d55 _free 58 API calls 102991->102992 102992->102991 102994 774e4a 84 API calls 102992->102994 103105 7cf7a1 90 API calls 4 library calls 102992->103105 102994->102992 102995 777de1 59 API calls 102995->102998 102998->102984 102998->102992 102998->102995 103100 7cf73d 59 API calls 2 library calls 102998->103100 103101 7cf65e 61 API calls 2 library calls 102998->103101 103102 7d737f 59 API calls Mailbox 102998->103102 103103 77750f 59 API calls 2 library calls 102998->103103 103104 77735d 59 API calls Mailbox 102998->103104 103000 7734d4 102999->103000 103004 7734f3 _memmove 102999->103004 103002 790db6 Mailbox 59 API calls 103000->103002 103001 790db6 Mailbox 59 API calls 103003 77350a 103001->103003 103002->103004 103003->102964 103004->103001 103005->102962 103007 776ab5 103006->103007 103008 7ae41e 103006->103008 103111 7757a6 60 API calls Mailbox 103007->103111 103178 7cf7a1 90 API calls 4 library calls 103008->103178 103011 776ad7 103112 7757f6 67 API calls 103011->103112 103012 7ae431 103179 7cf7a1 90 API calls 4 library calls 103012->103179 103014 776aec 103014->103012 103015 776af4 103014->103015 103017 777667 59 API calls 103015->103017 103019 776b00 103017->103019 103018 7ae44d 103050 776b61 103018->103050 103113 790957 60 API calls __write_nolock 103019->103113 103021 776b0c 103025 777667 59 API calls 103021->103025 103022 776b6f 103024 777667 59 API calls 103022->103024 103023 7ae460 103026 775c6f CloseHandle 103023->103026 103027 776b78 103024->103027 103028 776b18 103025->103028 103029 7ae46c 103026->103029 103031 777667 59 API calls 103027->103031 103032 774750 60 API calls 103028->103032 103030 774ddd 136 API calls 103029->103030 103033 7ae488 103030->103033 103034 776b81 103031->103034 103035 776b26 103032->103035 103036 7ae4b1 103033->103036 103039 7d955b 122 API calls 103033->103039 103116 77459b 103034->103116 103114 775850 ReadFile SetFilePointerEx 103035->103114 103180 7cf7a1 90 API calls 4 library calls 103036->103180 103043 7ae4a4 103039->103043 103040 776b98 103044 777b2e 59 API calls 103040->103044 103042 776b52 103115 775aee SetFilePointerEx SetFilePointerEx 103042->103115 103047 7ae4ac 103043->103047 103048 7ae4cd 103043->103048 103049 776ba9 SetCurrentDirectoryW 103044->103049 103045 7ae4c8 103078 776d0c Mailbox 103045->103078 103051 774e4a 84 API calls 103047->103051 103052 774e4a 84 API calls 103048->103052 103055 776bbc Mailbox 103049->103055 103050->103022 103050->103023 103051->103036 103053 7ae4d2 103052->103053 103054 790db6 Mailbox 59 API calls 103053->103054 103060 7ae506 103054->103060 103057 790db6 Mailbox 59 API calls 103055->103057 103059 776bcf 103057->103059 103058 773bbb 103058->102031 103058->102040 103061 77522e 59 API calls 103059->103061 103181 77750f 59 API calls 2 library calls 103060->103181 103088 776bda Mailbox __wsetenvp 103061->103088 103063 776ce7 103174 775c6f 103063->103174 103066 7ae740 103187 7d72df 59 API calls Mailbox 103066->103187 103067 776cf3 SetCurrentDirectoryW 103067->103078 103070 7ae762 103188 7efbce 59 API calls 2 library calls 103070->103188 103073 7ae76f 103075 792d55 _free 58 API calls 103073->103075 103074 7ae7d9 103191 7cf7a1 90 API calls 4 library calls 103074->103191 103075->103078 103106 7757d4 103078->103106 103079 7ae7f2 103079->103063 103082 7ae7d1 103190 7cf5f7 59 API calls 4 library calls 103082->103190 103084 777de1 59 API calls 103084->103088 103088->103063 103088->103074 103088->103082 103088->103084 103167 77586d 67 API calls _wcscpy 103088->103167 103168 776f5d GetStringTypeW 103088->103168 103169 776ecc 60 API calls __wcsnicmp 103088->103169 103170 776faa GetStringTypeW __wsetenvp 103088->103170 103171 79363d GetStringTypeW _iswctype 103088->103171 103172 7768dc 166 API calls 3 library calls 103088->103172 103173 777213 59 API calls Mailbox 103088->103173 103089 777de1 59 API calls 103096 7ae54f Mailbox 103089->103096 103092 7ae792 103189 7cf7a1 90 API calls 4 library calls 103092->103189 103095 7ae7ab 103097 792d55 _free 58 API calls 103095->103097 103096->103066 103096->103089 103096->103092 103182 7cf73d 59 API calls 2 library calls 103096->103182 103183 7cf65e 61 API calls 2 library calls 103096->103183 103184 7d737f 59 API calls Mailbox 103096->103184 103185 77750f 59 API calls 2 library calls 103096->103185 103186 777213 59 API calls Mailbox 103096->103186 103098 7ae7be 103097->103098 103098->103078 103099->102982 103100->102998 103101->102998 103102->102998 103103->102998 103104->102998 103105->102992 103107 775c6f CloseHandle 103106->103107 103108 7757dc Mailbox 103107->103108 103109 775c6f CloseHandle 103108->103109 103110 7757eb 103109->103110 103110->103058 103111->103011 103112->103014 103113->103021 103114->103042 103115->103050 103117 777667 59 API calls 103116->103117 103118 7745b1 103117->103118 103119 777667 59 API calls 103118->103119 103120 7745b9 103119->103120 103121 777667 59 API calls 103120->103121 103122 7745c1 103121->103122 103123 777667 59 API calls 103122->103123 103124 7745c9 103123->103124 103125 7ad4d2 103124->103125 103126 7745fd 103124->103126 103127 778047 59 API calls 103125->103127 103128 77784b 59 API calls 103126->103128 103129 7ad4db 103127->103129 103130 77460b 103128->103130 103131 777d8c 59 API calls 103129->103131 103132 777d2c 59 API calls 103130->103132 103134 774640 103131->103134 103133 774615 103132->103133 103133->103134 103135 77784b 59 API calls 103133->103135 103136 774680 103134->103136 103138 77465f 103134->103138 103149 7ad4fb 103134->103149 103139 774636 103135->103139 103137 77784b 59 API calls 103136->103137 103141 774691 103137->103141 103140 7779f2 59 API calls 103138->103140 103143 777d2c 59 API calls 103139->103143 103144 774669 103140->103144 103145 7746a3 103141->103145 103147 778047 59 API calls 103141->103147 103142 7ad5cb 103146 777bcc 59 API calls 103142->103146 103143->103134 103144->103136 103151 77784b 59 API calls 103144->103151 103148 7746b3 103145->103148 103152 778047 59 API calls 103145->103152 103162 7ad588 103146->103162 103147->103145 103150 7746ba 103148->103150 103154 778047 59 API calls 103148->103154 103149->103142 103153 7ad5b4 103149->103153 103161 7ad532 103149->103161 103155 778047 59 API calls 103150->103155 103164 7746c1 Mailbox 103150->103164 103151->103136 103152->103148 103153->103142 103158 7ad59f 103153->103158 103154->103150 103155->103164 103156 7779f2 59 API calls 103156->103162 103157 7ad590 103159 777bcc 59 API calls 103157->103159 103160 777bcc 59 API calls 103158->103160 103159->103162 103160->103162 103161->103157 103165 7ad57b 103161->103165 103162->103136 103162->103156 103192 777924 59 API calls 2 library calls 103162->103192 103164->103040 103166 777bcc 59 API calls 103165->103166 103166->103162 103167->103088 103168->103088 103169->103088 103170->103088 103171->103088 103172->103088 103173->103088 103175 775c79 103174->103175 103176 775c88 103174->103176 103175->103067 103176->103175 103177 775c8d CloseHandle 103176->103177 103177->103175 103178->103012 103179->103018 103180->103045 103181->103096 103182->103096 103183->103096 103184->103096 103185->103096 103186->103096 103187->103070 103188->103073 103189->103095 103190->103074 103191->103079 103192->103162 103194 776d95 103193->103194 103195 776ea9 103193->103195 103194->103195 103196 790db6 Mailbox 59 API calls 103194->103196 103195->102178 103198 776dbc 103196->103198 103197 790db6 Mailbox 59 API calls 103203 776e31 103197->103203 103198->103197 103203->103195 103206 776240 103203->103206 103231 77735d 59 API calls Mailbox 103203->103231 103232 7c6553 59 API calls Mailbox 103203->103232 103233 77750f 59 API calls 2 library calls 103203->103233 103204->102180 103205->102182 103207 777a16 59 API calls 103206->103207 103225 776265 103207->103225 103208 77646a 103236 77750f 59 API calls 2 library calls 103208->103236 103210 776484 Mailbox 103210->103203 103213 7adff6 103239 7cf8aa 92 API calls 4 library calls 103213->103239 103214 777d8c 59 API calls 103214->103225 103215 77750f 59 API calls 103215->103225 103219 7ae004 103240 77750f 59 API calls 2 library calls 103219->103240 103221 7ae01a 103221->103210 103222 776799 _memmove 103241 7cf8aa 92 API calls 4 library calls 103222->103241 103223 7adf92 103224 778029 59 API calls 103223->103224 103226 7adf9d 103224->103226 103225->103208 103225->103213 103225->103214 103225->103215 103225->103222 103225->103223 103228 777e4f 59 API calls 103225->103228 103234 775f6c 60 API calls 103225->103234 103235 775d41 59 API calls Mailbox 103225->103235 103237 775e72 60 API calls 103225->103237 103238 777924 59 API calls 2 library calls 103225->103238 103230 790db6 Mailbox 59 API calls 103226->103230 103229 77643b CharUpperBuffW 103228->103229 103229->103225 103230->103222 103231->103203 103232->103203 103233->103203 103234->103225 103235->103225 103236->103210 103237->103225 103238->103225 103239->103219 103240->103221 103241->103210 103242->102197 103243->102196 103245 77e6d5 103244->103245 103246 7b3aa9 103245->103246 103249 77e73f 103245->103249 103259 77e799 103245->103259 103247 779ea0 332 API calls 103246->103247 103248 7b3abe 103247->103248 103274 77e970 Mailbox 103248->103274 103396 7d9e4a 90 API calls 4 library calls 103248->103396 103252 777667 59 API calls 103249->103252 103249->103259 103250 777667 59 API calls 103250->103259 103253 7b3b04 103252->103253 103256 792d40 __cinit 67 API calls 103253->103256 103254 792d40 __cinit 67 API calls 103254->103259 103255 7b3b26 103255->102269 103256->103259 103257 7d9e4a 90 API calls 103257->103274 103258 7784c0 69 API calls 103258->103274 103259->103250 103259->103254 103259->103255 103261 77e95a 103259->103261 103259->103274 103260 779ea0 332 API calls 103260->103274 103261->103274 103397 7d9e4a 90 API calls 4 library calls 103261->103397 103263 778d40 59 API calls 103263->103274 103271 77f195 103401 7d9e4a 90 API calls 4 library calls 103271->103401 103272 7b3e25 103272->102269 103273 77ea78 103273->102269 103274->103257 103274->103258 103274->103260 103274->103263 103274->103271 103274->103273 103395 777f77 59 API calls 2 library calls 103274->103395 103398 7c6e8f 59 API calls 103274->103398 103399 7ec5c3 332 API calls 103274->103399 103400 7eb53c 332 API calls Mailbox 103274->103400 103402 779c90 59 API calls Mailbox 103274->103402 103403 7e93c6 332 API calls Mailbox 103274->103403 103276 77f650 103275->103276 103277 77f4ba 103275->103277 103280 777de1 59 API calls 103276->103280 103278 77f4c6 103277->103278 103279 7b441e 103277->103279 103496 77f290 332 API calls 2 library calls 103278->103496 103498 7ebc6b 332 API calls Mailbox 103279->103498 103286 77f58c Mailbox 103280->103286 103283 7b442c 103287 77f630 103283->103287 103499 7d9e4a 90 API calls 4 library calls 103283->103499 103285 77f4fd 103285->103283 103285->103286 103285->103287 103293 774e4a 84 API calls 103286->103293 103404 7dcb7a 103286->103404 103484 7d3c37 103286->103484 103487 7e445a 103286->103487 103287->102269 103289 77f5e3 103289->103287 103497 779c90 59 API calls Mailbox 103289->103497 103293->103289 103664 778180 103294->103664 103296 77fd3d 103297 7b472d 103296->103297 103360 7806f6 103296->103360 103669 77f234 103296->103669 103686 7d9e4a 90 API calls 4 library calls 103297->103686 103301 77fe3e 103302 7b488d 103301->103302 103307 77fe4c 103301->103307 103690 7c66ec 59 API calls 2 library calls 103301->103690 103302->103307 103352 7b4742 103302->103352 103692 7ea2d9 86 API calls Mailbox 103302->103692 103303 7b4b53 103303->103352 103703 7d9e4a 90 API calls 4 library calls 103303->103703 103304 780517 103310 790db6 Mailbox 59 API calls 103304->103310 103306 7b47d7 103306->103352 103688 7d9e4a 90 API calls 4 library calls 103306->103688 103307->103303 103314 7b48f9 103307->103314 103673 77837c 103307->103673 103308 7b4755 103308->103306 103687 77f6a3 332 API calls 103308->103687 103324 780545 _memmove 103310->103324 103311 7b4848 103691 7c60ef 59 API calls 2 library calls 103311->103691 103319 7b4917 103314->103319 103694 7785c0 59 API calls Mailbox 103314->103694 103318 77fdd3 103318->103301 103318->103304 103318->103308 103318->103324 103328 790db6 59 API calls Mailbox 103318->103328 103337 779ea0 332 API calls 103318->103337 103346 7b480c 103318->103346 103318->103352 103326 7b4928 103319->103326 103695 7785c0 59 API calls Mailbox 103319->103695 103320 77fea4 103330 77ff32 103320->103330 103331 7b4ad6 103320->103331 103366 780179 Mailbox _memmove 103320->103366 103321 7b486b 103327 779ea0 332 API calls 103321->103327 103322 7b48b2 Mailbox 103322->103307 103693 7c66ec 59 API calls 2 library calls 103322->103693 103332 790db6 Mailbox 59 API calls 103324->103332 103326->103366 103696 7c60ab 59 API calls Mailbox 103326->103696 103327->103302 103328->103318 103334 790db6 Mailbox 59 API calls 103330->103334 103701 7d9ae7 60 API calls 103331->103701 103372 780106 _memmove 103332->103372 103340 77ff39 103334->103340 103337->103318 103338 7b4a4d 103339 779ea0 332 API calls 103338->103339 103342 7b4a87 103339->103342 103341 7809d0 332 API calls 103340->103341 103340->103360 103343 77ffb2 103341->103343 103348 7784c0 69 API calls 103342->103348 103342->103352 103343->103324 103344 77ffe6 103343->103344 103343->103360 103355 778047 59 API calls 103344->103355 103359 780007 103344->103359 103689 7d9e4a 90 API calls 4 library calls 103346->103689 103351 7b4ab2 103348->103351 103700 7d9e4a 90 API calls 4 library calls 103351->103700 103355->103359 103357 780398 103357->102269 103358 790db6 59 API calls Mailbox 103358->103366 103359->103360 103361 7b4b24 103359->103361 103363 78004c 103359->103363 103685 7d9e4a 90 API calls 4 library calls 103360->103685 103702 779d3c 60 API calls Mailbox 103361->103702 103363->103303 103363->103360 103364 7800d8 103363->103364 103680 779d3c 60 API calls Mailbox 103364->103680 103366->103338 103366->103351 103366->103357 103366->103358 103366->103360 103367 7b4a1c 103366->103367 103682 778740 68 API calls __cinit 103366->103682 103683 778660 68 API calls 103366->103683 103697 7d5937 68 API calls 103366->103697 103698 7789b3 69 API calls Mailbox 103366->103698 103699 779d3c 60 API calls Mailbox 103366->103699 103370 790db6 Mailbox 59 API calls 103367->103370 103368 7800eb 103368->103360 103681 7782df 59 API calls Mailbox 103368->103681 103370->103338 103372->103366 103373 780162 103372->103373 103684 779c90 59 API calls Mailbox 103372->103684 103373->102269 103374->102269 103375->102269 103376->102205 103377->102210 103378->102269 103379->102212 103380->102212 103381->102212 103382->102269 103383->102269 103384->102269 103385->102269 103386->102269 103387->102269 103388->102258 103389->102258 103390->102258 103391->102258 103392->102258 103393->102258 103394->102258 103395->103274 103396->103274 103397->103274 103398->103274 103399->103274 103400->103274 103401->103272 103402->103274 103403->103274 103405 777667 59 API calls 103404->103405 103406 7dcbaf 103405->103406 103407 777667 59 API calls 103406->103407 103408 7dcbb8 103407->103408 103409 7dcbcc 103408->103409 103609 779b3c 59 API calls 103408->103609 103411 779837 85 API calls 103409->103411 103412 7dcbe9 103411->103412 103413 7dcc0b 103412->103413 103414 7dccea 103412->103414 103419 7dcd1a Mailbox 103412->103419 103415 779837 85 API calls 103413->103415 103416 774ddd 136 API calls 103414->103416 103417 7dcc17 103415->103417 103418 7dccfe 103416->103418 103420 778047 59 API calls 103417->103420 103421 7dcd16 103418->103421 103424 774ddd 136 API calls 103418->103424 103419->103289 103423 7dcc23 103420->103423 103421->103419 103422 777667 59 API calls 103421->103422 103425 7dcd4b 103422->103425 103428 7dcc69 103423->103428 103429 7dcc37 103423->103429 103424->103421 103426 777667 59 API calls 103425->103426 103427 7dcd54 103426->103427 103431 777667 59 API calls 103427->103431 103430 779837 85 API calls 103428->103430 103432 778047 59 API calls 103429->103432 103433 7dcc76 103430->103433 103434 7dcd5d 103431->103434 103435 7dcc47 103432->103435 103436 778047 59 API calls 103433->103436 103437 777667 59 API calls 103434->103437 103438 777cab 59 API calls 103435->103438 103439 7dcc82 103436->103439 103440 7dcd66 103437->103440 103441 7dcc51 103438->103441 103610 7d4a31 GetFileAttributesW 103439->103610 103444 779837 85 API calls 103440->103444 103442 779837 85 API calls 103441->103442 103445 7dcc5d 103442->103445 103447 7dcd73 103444->103447 103448 777b2e 59 API calls 103445->103448 103446 7dcc8b 103449 7dcc9e 103446->103449 103452 7779f2 59 API calls 103446->103452 103450 77459b 59 API calls 103447->103450 103448->103428 103451 779837 85 API calls 103449->103451 103459 7dcca4 103449->103459 103453 7dcd8e 103450->103453 103454 7dcccb 103451->103454 103452->103449 103455 7779f2 59 API calls 103453->103455 103611 7d37ef 75 API calls Mailbox 103454->103611 103457 7dcd9d 103455->103457 103458 7dcdd1 103457->103458 103460 7779f2 59 API calls 103457->103460 103461 778047 59 API calls 103458->103461 103459->103419 103462 7dcdae 103460->103462 103463 7dcddf 103461->103463 103462->103458 103465 777bcc 59 API calls 103462->103465 103464 777b2e 59 API calls 103463->103464 103466 7dcded 103464->103466 103467 7dcdc3 103465->103467 103468 777b2e 59 API calls 103466->103468 103469 777bcc 59 API calls 103467->103469 103470 7dcdfb 103468->103470 103469->103458 103471 777b2e 59 API calls 103470->103471 103472 7dce09 103471->103472 103473 779837 85 API calls 103472->103473 103474 7dce15 103473->103474 103500 7d4071 103474->103500 103476 7dce26 103477 7d3c37 3 API calls 103476->103477 103478 7dce30 103477->103478 103659 7d445a GetFileAttributesW 103484->103659 103488 779837 85 API calls 103487->103488 103489 7e4494 103488->103489 103490 776240 95 API calls 103489->103490 103491 7e44a4 103490->103491 103492 7e44c9 103491->103492 103493 779ea0 332 API calls 103491->103493 103495 7e44cd 103492->103495 103663 779a98 59 API calls Mailbox 103492->103663 103493->103492 103495->103289 103496->103285 103497->103289 103498->103283 103499->103287 103501 7d408d 103500->103501 103502 7d40a0 103501->103502 103503 7d4092 103501->103503 103505 777667 59 API calls 103502->103505 103504 778047 59 API calls 103503->103504 103507 7d409b Mailbox 103504->103507 103506 7d40a8 103505->103506 103508 777667 59 API calls 103506->103508 103507->103476 103509 7d40b0 103508->103509 103510 777667 59 API calls 103509->103510 103609->103409 103610->103446 103611->103459 103660 7d3c3e 103659->103660 103661 7d4475 FindFirstFileW 103659->103661 103660->103289 103661->103660 103662 7d448a FindClose 103661->103662 103662->103660 103663->103495 103665 77818f 103664->103665 103668 7781aa 103664->103668 103666 777e4f 59 API calls 103665->103666 103667 778197 CharUpperBuffW 103666->103667 103667->103668 103668->103296 103670 77f251 103669->103670 103671 77f272 103670->103671 103704 7d9e4a 90 API calls 4 library calls 103670->103704 103671->103318 103674 7aedbd 103673->103674 103675 77838d 103673->103675 103676 790db6 Mailbox 59 API calls 103675->103676 103677 778394 103676->103677 103678 7783b5 103677->103678 103705 778634 59 API calls Mailbox 103677->103705 103678->103314 103678->103320 103680->103368 103681->103372 103682->103366 103683->103366 103684->103372 103685->103297 103686->103352 103687->103306 103688->103352 103689->103352 103690->103311 103691->103321 103692->103322 103693->103322 103694->103319 103695->103326 103696->103366 103697->103366 103698->103366 103699->103366 103700->103352 103701->103344 103702->103303 103703->103352 103704->103671 103705->103678

                              Control-flow Graph

                              APIs
                              • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00773B68
                              • IsDebuggerPresent.KERNEL32 ref: 00773B7A
                              • GetFullPathNameW.KERNEL32(00007FFF,?,?,008352F8,008352E0,?,?), ref: 00773BEB
                                • Part of subcall function 00777BCC: _memmove.LIBCMT ref: 00777C06
                                • Part of subcall function 0078092D: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,00773C14,008352F8,?,?,?), ref: 0078096E
                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00773C6F
                              • MessageBoxA.USER32(00000000,This is a third-party compiled AutoIt script.,00827770,00000010), ref: 007AD281
                              • SetCurrentDirectoryW.KERNEL32(?,008352F8,?,?,?), ref: 007AD2B9
                              • GetForegroundWindow.USER32(runas,?,?,?,00000001,?,00824260,008352F8,?,?,?), ref: 007AD33F
                              • ShellExecuteW.SHELL32(00000000,?,?), ref: 007AD346
                                • Part of subcall function 00773A46: GetSysColorBrush.USER32(0000000F), ref: 00773A50
                                • Part of subcall function 00773A46: LoadCursorW.USER32(00000000,00007F00), ref: 00773A5F
                                • Part of subcall function 00773A46: LoadIconW.USER32(00000063), ref: 00773A76
                                • Part of subcall function 00773A46: LoadIconW.USER32(000000A4), ref: 00773A88
                                • Part of subcall function 00773A46: LoadIconW.USER32(000000A2), ref: 00773A9A
                                • Part of subcall function 00773A46: LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00773AC0
                                • Part of subcall function 00773A46: RegisterClassExW.USER32(?), ref: 00773B16
                                • Part of subcall function 007739D5: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00773A03
                                • Part of subcall function 007739D5: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00773A24
                                • Part of subcall function 007739D5: ShowWindow.USER32(00000000,?,?), ref: 00773A38
                                • Part of subcall function 007739D5: ShowWindow.USER32(00000000,?,?), ref: 00773A41
                                • Part of subcall function 0077434A: _memset.LIBCMT ref: 00774370
                                • Part of subcall function 0077434A: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00774415
                              Strings
                              • This is a third-party compiled AutoIt script., xrefs: 007AD279
                              • runas, xrefs: 007AD33A
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: LoadWindow$Icon$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__memmove_memset
                              • String ID: This is a third-party compiled AutoIt script.$runas
                              • API String ID: 529118366-3287110873
                              • Opcode ID: fa4288dbeac0c6b747cdb9ebc1c126521741fff44bc2b976c8f6d603ecedeb19
                              • Instruction ID: 27309ba25e15030ed9cbaa8882e0b8b1eaefe22c13b66818f2eb0282d2f67b7f
                              • Opcode Fuzzy Hash: fa4288dbeac0c6b747cdb9ebc1c126521741fff44bc2b976c8f6d603ecedeb19
                              • Instruction Fuzzy Hash: A851E370908108EACF11ABB4DC09AFE7B78BF85780F00C465F429A22A2DA6C5A45DB61

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 998 7749a0-774a00 call 777667 GetVersionExW call 777bcc 1003 774a06 998->1003 1004 774b0b-774b0d 998->1004 1006 774a09-774a0e 1003->1006 1005 7ad767-7ad773 1004->1005 1009 7ad774-7ad778 1005->1009 1007 774a14 1006->1007 1008 774b12-774b13 1006->1008 1012 774a15-774a4c call 777d2c call 777726 1007->1012 1008->1012 1010 7ad77a 1009->1010 1011 7ad77b-7ad787 1009->1011 1010->1011 1011->1009 1013 7ad789-7ad78e 1011->1013 1021 774a52-774a53 1012->1021 1022 7ad864-7ad867 1012->1022 1013->1006 1015 7ad794-7ad79b 1013->1015 1015->1005 1017 7ad79d 1015->1017 1020 7ad7a2-7ad7a5 1017->1020 1023 7ad7ab-7ad7c9 1020->1023 1024 774a93-774aaa GetCurrentProcess IsWow64Process 1020->1024 1021->1020 1025 774a59-774a64 1021->1025 1026 7ad869 1022->1026 1027 7ad880-7ad884 1022->1027 1023->1024 1028 7ad7cf-7ad7d5 1023->1028 1034 774aaf-774ac0 1024->1034 1035 774aac 1024->1035 1029 7ad7ea-7ad7f0 1025->1029 1030 774a6a-774a6c 1025->1030 1031 7ad86c 1026->1031 1032 7ad86f-7ad878 1027->1032 1033 7ad886-7ad88f 1027->1033 1036 7ad7df-7ad7e5 1028->1036 1037 7ad7d7-7ad7da 1028->1037 1040 7ad7fa-7ad800 1029->1040 1041 7ad7f2-7ad7f5 1029->1041 1038 774a72-774a75 1030->1038 1039 7ad805-7ad811 1030->1039 1031->1032 1032->1027 1033->1031 1042 7ad891-7ad894 1033->1042 1043 774ac2-774ad2 call 774b37 1034->1043 1044 774b2b-774b35 GetSystemInfo 1034->1044 1035->1034 1036->1024 1037->1024 1046 7ad831-7ad834 1038->1046 1047 774a7b-774a8a 1038->1047 1049 7ad81b-7ad821 1039->1049 1050 7ad813-7ad816 1039->1050 1040->1024 1041->1024 1042->1032 1055 774ad4-774ae1 call 774b37 1043->1055 1056 774b1f-774b29 GetSystemInfo 1043->1056 1048 774af8-774b08 1044->1048 1046->1024 1052 7ad83a-7ad84f 1046->1052 1053 774a90 1047->1053 1054 7ad826-7ad82c 1047->1054 1049->1024 1050->1024 1057 7ad859-7ad85f 1052->1057 1058 7ad851-7ad854 1052->1058 1053->1024 1054->1024 1063 774ae3-774ae7 GetNativeSystemInfo 1055->1063 1064 774b18-774b1d 1055->1064 1060 774ae9-774aed 1056->1060 1057->1024 1058->1024 1060->1048 1062 774aef-774af2 FreeLibrary 1060->1062 1062->1048 1063->1060 1064->1063
                              APIs
                              • GetVersionExW.KERNEL32(?), ref: 007749CD
                                • Part of subcall function 00777BCC: _memmove.LIBCMT ref: 00777C06
                              • GetCurrentProcess.KERNEL32(?,007FFAEC,00000000,00000000,?), ref: 00774A9A
                              • IsWow64Process.KERNEL32(00000000), ref: 00774AA1
                              • GetNativeSystemInfo.KERNELBASE(00000000), ref: 00774AE7
                              • FreeLibrary.KERNEL32(00000000), ref: 00774AF2
                              • GetSystemInfo.KERNEL32(00000000), ref: 00774B23
                              • GetSystemInfo.KERNEL32(00000000), ref: 00774B2F
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: InfoSystem$Process$CurrentFreeLibraryNativeVersionWow64_memmove
                              • String ID:
                              • API String ID: 1986165174-0
                              • Opcode ID: 58d7d11f81c955b1b0419a2626f3281325e4b5a022c8e4c14e48c83eeb4bdea2
                              • Instruction ID: f8eb252ea6450b5ed143639c42b053220503304f309410c8aa929b595bda22aa
                              • Opcode Fuzzy Hash: 58d7d11f81c955b1b0419a2626f3281325e4b5a022c8e4c14e48c83eeb4bdea2
                              • Instruction Fuzzy Hash: 3191C6319897C0DECB31CB7888545AABFF5AF6A340B44CE5DD0CB93A41D728A908C75E

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1065 774e89-774ea1 CreateStreamOnHGlobal 1066 774ea3-774eba FindResourceExW 1065->1066 1067 774ec1-774ec6 1065->1067 1068 774ec0 1066->1068 1069 7ad933-7ad942 LoadResource 1066->1069 1068->1067 1069->1068 1070 7ad948-7ad956 SizeofResource 1069->1070 1070->1068 1071 7ad95c-7ad967 LockResource 1070->1071 1071->1068 1072 7ad96d-7ad98b 1071->1072 1072->1068
                              APIs
                              • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?,?,?,?,?,00774D8E,?,?,00000000,00000000), ref: 00774E99
                              • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,00774D8E,?,?,00000000,00000000), ref: 00774EB0
                              • LoadResource.KERNEL32(?,00000000,?,?,00774D8E,?,?,00000000,00000000,?,?,?,?,?,?,00774E2F), ref: 007AD937
                              • SizeofResource.KERNEL32(?,00000000,?,?,00774D8E,?,?,00000000,00000000,?,?,?,?,?,?,00774E2F), ref: 007AD94C
                              • LockResource.KERNEL32(00774D8E,?,?,00774D8E,?,?,00000000,00000000,?,?,?,?,?,?,00774E2F,00000000), ref: 007AD95F
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                              • String ID: SCRIPT
                              • API String ID: 3051347437-3967369404
                              • Opcode ID: 012455e3f4fa6b629a50c576646844a3bcd9a4e3d038da7d2b51520c4b5d6a5b
                              • Instruction ID: 827f1f3d21b18cabcbb3b1a47ef2fe67d6fb08a3328997c72413f92a76cd358e
                              • Opcode Fuzzy Hash: 012455e3f4fa6b629a50c576646844a3bcd9a4e3d038da7d2b51520c4b5d6a5b
                              • Instruction Fuzzy Hash: E1114C75240700ABDB218B65EC48F6B7BBAFFC5B61F108268F40A86250DBA5E800C664
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: BuffCharUpper
                              • String ID:
                              • API String ID: 3964851224-0
                              • Opcode ID: ad24e77aa5cd59afc9d00f57fa91805daeb730fa148ca1a8d242f74b91d00e74
                              • Instruction ID: d0d013d5e62ec1af143ad0c00f05fad504319ce65aedef3c2472b513dbde8f47
                              • Opcode Fuzzy Hash: ad24e77aa5cd59afc9d00f57fa91805daeb730fa148ca1a8d242f74b91d00e74
                              • Instruction Fuzzy Hash: 8F928B70608341DFDB60DF24C484B6AB7E1BF85304F14896DE99A8B362D779EC49CB92
                              APIs
                              • GetFileAttributesW.KERNELBASE(?,007AE398), ref: 007D446A
                              • FindFirstFileW.KERNELBASE(?,?), ref: 007D447B
                              • FindClose.KERNEL32(00000000), ref: 007D448B
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: FileFind$AttributesCloseFirst
                              • String ID:
                              • API String ID: 48322524-0
                              • Opcode ID: fc37707d2e6f3b5d28b4091d5e26b86b617f74e429ebe42ace0b5d13939df50f
                              • Instruction ID: 97c73e1249b73b8c8273f5efabbf6e7d28b036e6730f282187ac05231287b8d9
                              • Opcode Fuzzy Hash: fc37707d2e6f3b5d28b4091d5e26b86b617f74e429ebe42ace0b5d13939df50f
                              • Instruction Fuzzy Hash: 21E0D8324105406742106B38EC4D8FD776CAF05335F104716F835C12D0EB7C5940D59A
                              APIs
                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00780A5B
                              • timeGetTime.WINMM ref: 00780D16
                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00780E53
                              • Sleep.KERNEL32(0000000A), ref: 00780E61
                              • LockWindowUpdate.USER32(00000000,?,?), ref: 00780EFA
                              • DestroyWindow.USER32 ref: 00780F06
                              • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00780F20
                              • Sleep.KERNEL32(0000000A,?,?), ref: 007B4E83
                              • TranslateMessage.USER32(?), ref: 007B5C60
                              • DispatchMessageW.USER32(?), ref: 007B5C6E
                              • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 007B5C82
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: Message$PeekSleepWindow$DestroyDispatchLockTimeTranslateUpdatetime
                              • String ID: @COM_EVENTOBJ$@GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE$@TRAY_ID
                              • API String ID: 4212290369-3242690629
                              • Opcode ID: 2bbe6b02e1e9c6ff73f1f3a356a400f06da3fbf4248ccb22c5c720aa6e364412
                              • Instruction ID: e092b3172a286adbc83aad626d9d3c8f76600e64ce4ef5394631b4383ee9bbc4
                              • Opcode Fuzzy Hash: 2bbe6b02e1e9c6ff73f1f3a356a400f06da3fbf4248ccb22c5c720aa6e364412
                              • Instruction Fuzzy Hash: 07B2E570608741DFDB24EF24C888BAAB7E5FF84304F14891DF559972A1DB79E848CB92

                              Control-flow Graph

                              APIs
                                • Part of subcall function 007D8F5F: __time64.LIBCMT ref: 007D8F69
                                • Part of subcall function 00774EE5: _fseek.LIBCMT ref: 00774EFD
                              • __wsplitpath.LIBCMT ref: 007D9234
                                • Part of subcall function 007940FB: __wsplitpath_helper.LIBCMT ref: 0079413B
                              • _wcscpy.LIBCMT ref: 007D9247
                              • _wcscat.LIBCMT ref: 007D925A
                              • __wsplitpath.LIBCMT ref: 007D927F
                              • _wcscat.LIBCMT ref: 007D9295
                              • _wcscat.LIBCMT ref: 007D92A8
                                • Part of subcall function 007D8FA5: _memmove.LIBCMT ref: 007D8FDE
                                • Part of subcall function 007D8FA5: _memmove.LIBCMT ref: 007D8FED
                              • _wcscmp.LIBCMT ref: 007D91EF
                                • Part of subcall function 007D9734: _wcscmp.LIBCMT ref: 007D9824
                                • Part of subcall function 007D9734: _wcscmp.LIBCMT ref: 007D9837
                              • DeleteFileW.KERNEL32(?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 007D9452
                              • _wcsncpy.LIBCMT ref: 007D94C5
                              • DeleteFileW.KERNEL32(?,?), ref: 007D94FB
                              • CopyFileW.KERNELBASE(?,?,00000000,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 007D9511
                              • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 007D9522
                              • DeleteFileW.KERNELBASE(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 007D9534
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: File$Delete$_wcscat_wcscmp$__wsplitpath_memmove$Copy__time64__wsplitpath_helper_fseek_wcscpy_wcsncpy
                              • String ID:
                              • API String ID: 1500180987-0
                              • Opcode ID: 41c69a23c3fcb7edf95bed19660055bb53ebf19521ac2336b43f9928a5f840a3
                              • Instruction ID: 251238f7d25643a8f3f8f76d595bc8e5415ceb342af6bfac40d72ba28b8bf552
                              • Opcode Fuzzy Hash: 41c69a23c3fcb7edf95bed19660055bb53ebf19521ac2336b43f9928a5f840a3
                              • Instruction Fuzzy Hash: 29C14CB1D00219ABDF21DF94DC89EEEB7BCEF45310F0040AAF609E6251DB389A458F65

                              Control-flow Graph

                              APIs
                              • GetSysColorBrush.USER32(0000000F), ref: 00773074
                              • RegisterClassExW.USER32(00000030), ref: 0077309E
                              • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 007730AF
                              • InitCommonControlsEx.COMCTL32(?), ref: 007730CC
                              • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 007730DC
                              • LoadIconW.USER32(000000A9), ref: 007730F2
                              • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00773101
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                              • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                              • API String ID: 2914291525-1005189915
                              • Opcode ID: df1282e06a5072a93a936987679f1464cddf81f4c35c22cfde079329aea22855
                              • Instruction ID: 482d0fab28b514fbf5e0881222551120cc0b89919e463ad41944d20d7aa675d1
                              • Opcode Fuzzy Hash: df1282e06a5072a93a936987679f1464cddf81f4c35c22cfde079329aea22855
                              • Instruction Fuzzy Hash: 153128B1941309AFDB00DFA4DC89AEEBBF4FF09310F10852AE590E62A0D7B94545CF95

                              Control-flow Graph

                              APIs
                              • GetSysColorBrush.USER32(0000000F), ref: 00773074
                              • RegisterClassExW.USER32(00000030), ref: 0077309E
                              • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 007730AF
                              • InitCommonControlsEx.COMCTL32(?), ref: 007730CC
                              • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 007730DC
                              • LoadIconW.USER32(000000A9), ref: 007730F2
                              • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00773101
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                              • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                              • API String ID: 2914291525-1005189915
                              • Opcode ID: c797db447e89c1068dd09b57bd333a54efa99f2eaecca23e98b121932d8b9d54
                              • Instruction ID: 45fec844c0b6381af92b1a641fe799bc998144b0d841f203d4cc14bfe5f826d6
                              • Opcode Fuzzy Hash: c797db447e89c1068dd09b57bd333a54efa99f2eaecca23e98b121932d8b9d54
                              • Instruction Fuzzy Hash: 4021C9B1901618AFDB00DF94EC89B9EBBF4FB08710F00852AF610E62A0DBB54544CFA5

                              Control-flow Graph

                              APIs
                                • Part of subcall function 00774706: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,008352F8,?,007737AE,?), ref: 00774724
                                • Part of subcall function 0079050B: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,00777165), ref: 0079052D
                              • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 007771A8
                              • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 007AE8C8
                              • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 007AE909
                              • RegCloseKey.ADVAPI32(?), ref: 007AE947
                              • _wcscat.LIBCMT ref: 007AE9A0
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: NameQueryValue$CloseFileFullModuleOpenPath_wcscat
                              • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                              • API String ID: 2673923337-2727554177
                              • Opcode ID: 321528fe8ec729730b6ae1ddc19d12f567e540699325a809b3908e6cc4d1e95a
                              • Instruction ID: 45b3e2ab93d051124608c8907b2aecb8ce535c849ec1e952fa2d8c1f8f609a8b
                              • Opcode Fuzzy Hash: 321528fe8ec729730b6ae1ddc19d12f567e540699325a809b3908e6cc4d1e95a
                              • Instruction Fuzzy Hash: 2271BF71508301EEC704EF28EC459ABB7E8FF85350F41892EF548C32A0EB74A958CB92

                              Control-flow Graph

                              APIs
                              • GetSysColorBrush.USER32(0000000F), ref: 00773A50
                              • LoadCursorW.USER32(00000000,00007F00), ref: 00773A5F
                              • LoadIconW.USER32(00000063), ref: 00773A76
                              • LoadIconW.USER32(000000A4), ref: 00773A88
                              • LoadIconW.USER32(000000A2), ref: 00773A9A
                              • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00773AC0
                              • RegisterClassExW.USER32(?), ref: 00773B16
                                • Part of subcall function 00773041: GetSysColorBrush.USER32(0000000F), ref: 00773074
                                • Part of subcall function 00773041: RegisterClassExW.USER32(00000030), ref: 0077309E
                                • Part of subcall function 00773041: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 007730AF
                                • Part of subcall function 00773041: InitCommonControlsEx.COMCTL32(?), ref: 007730CC
                                • Part of subcall function 00773041: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 007730DC
                                • Part of subcall function 00773041: LoadIconW.USER32(000000A9), ref: 007730F2
                                • Part of subcall function 00773041: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00773101
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                              • String ID: #$0$AutoIt v3
                              • API String ID: 423443420-4155596026
                              • Opcode ID: 3069b33ae6494eeb34a33b2dedd9506c4f5b813cccef2ddc4565cece6f40f558
                              • Instruction ID: d7a86896f24d99b30bf70b6034714e8950e9d803b7ae8e50ffcddc8c814eb85d
                              • Opcode Fuzzy Hash: 3069b33ae6494eeb34a33b2dedd9506c4f5b813cccef2ddc4565cece6f40f558
                              • Instruction Fuzzy Hash: F0214B71D00308EFEB10EFA4EC49B9E7BB1FB48711F10452AF904A62A1D7B95650DF94

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 769 773633-773681 771 773683-773686 769->771 772 7736e1-7736e3 769->772 774 7736e7 771->774 775 773688-77368f 771->775 772->771 773 7736e5 772->773 776 7736ca-7736d2 DefWindowProcW 773->776 777 7ad0cc-7ad0fa call 781070 call 781093 774->777 778 7736ed-7736f0 774->778 779 773695-77369a 775->779 780 77374b-773753 PostQuitMessage 775->780 781 7736d8-7736de 776->781 816 7ad0ff-7ad106 777->816 782 773715-77373c SetTimer RegisterWindowMessageW 778->782 783 7736f2-7736f3 778->783 785 7736a0-7736a2 779->785 786 7ad154-7ad168 call 7d2527 779->786 787 773711-773713 780->787 782->787 791 77373e-773749 CreatePopupMenu 782->791 788 7ad06f-7ad072 783->788 789 7736f9-77370c KillTimer call 77443a call 773114 783->789 792 773755-773764 call 7744a0 785->792 793 7736a8-7736ad 785->793 786->787 811 7ad16e 786->811 787->781 795 7ad0a8-7ad0c7 MoveWindow 788->795 796 7ad074-7ad076 788->796 789->787 791->787 792->787 799 7ad139-7ad140 793->799 800 7736b3-7736b8 793->800 795->787 804 7ad078-7ad07b 796->804 805 7ad097-7ad0a3 SetFocus 796->805 799->776 807 7ad146-7ad14f call 7c7c36 799->807 809 7736be-7736c4 800->809 810 7ad124-7ad134 call 7d2d36 800->810 804->809 812 7ad081-7ad092 call 781070 804->812 805->787 807->776 809->776 809->816 810->787 811->776 812->787 816->776 817 7ad10c-7ad11f call 77443a call 77434a 816->817 817->776
                              APIs
                              • DefWindowProcW.USER32(?,?,?,?), ref: 007736D2
                              • KillTimer.USER32(?,00000001), ref: 007736FC
                              • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 0077371F
                              • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 0077372A
                              • CreatePopupMenu.USER32 ref: 0077373E
                              • PostQuitMessage.USER32(00000000), ref: 0077374D
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                              • String ID: TaskbarCreated
                              • API String ID: 129472671-2362178303
                              • Opcode ID: a85524b27a1ca9b7b3916d8a143563e3b2bd9a8690b7544af8ec162768473d0e
                              • Instruction ID: 18989ca370d015eacd68210414d7f617726f60be7f86598aa6807fb4812a52dd
                              • Opcode Fuzzy Hash: a85524b27a1ca9b7b3916d8a143563e3b2bd9a8690b7544af8ec162768473d0e
                              • Instruction Fuzzy Hash: 804157B2200505FBDF246F68DC4DB7A3754FB81380F508935F60AD62A1DB6D9E05A3B5

                              Control-flow Graph

                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: FileLibraryLoadModuleName__wcsicmp_l_memmove
                              • String ID: /AutoIt3ExecuteLine$/AutoIt3ExecuteScript$/AutoIt3OutputDebug$/ErrorStdOut$>>>AUTOIT NO CMDEXECUTE<<<$CMDLINE$CMDLINERAW
                              • API String ID: 1825951767-3513169116
                              • Opcode ID: e8e0df52cbb991e64ab72c5d4eaf5ac2c6ab390b0cc192a5319782ebe5406f13
                              • Instruction ID: b1d9d2056cc0fde8ae94bfc971c6cb16f634d61958af709f5ec2f2478d0ed190
                              • Opcode Fuzzy Hash: e8e0df52cbb991e64ab72c5d4eaf5ac2c6ab390b0cc192a5319782ebe5406f13
                              • Instruction Fuzzy Hash: 14A18F7191021DEACF04EBA0DC99EEEB778BF55340F448429F51AB7191DF786A08CBA1

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 944 1332428-13324d6 call 132fe28 947 13324dd-1332503 call 1333338 CreateFileW 944->947 950 1332505 947->950 951 133250a-133251a 947->951 952 1332655-1332659 950->952 956 1332521-133253b VirtualAlloc 951->956 957 133251c 951->957 954 133269b-133269e 952->954 955 133265b-133265f 952->955 958 13326a1-13326a8 954->958 959 1332661-1332664 955->959 960 133266b-133266f 955->960 963 1332542-1332559 ReadFile 956->963 964 133253d 956->964 957->952 965 13326aa-13326b5 958->965 966 13326fd-1332712 958->966 959->960 961 1332671-133267b 960->961 962 133267f-1332683 960->962 961->962 969 1332693 962->969 970 1332685-133268f 962->970 971 1332560-13325a0 VirtualAlloc 963->971 972 133255b 963->972 964->952 973 13326b7 965->973 974 13326b9-13326c5 965->974 967 1332722-133272a 966->967 968 1332714-133271f VirtualFree 966->968 968->967 969->954 970->969 975 13325a2 971->975 976 13325a7-13325c2 call 1333588 971->976 972->952 973->966 977 13326c7-13326d7 974->977 978 13326d9-13326e5 974->978 975->952 984 13325cd-13325d7 976->984 982 13326fb 977->982 979 13326f2-13326f8 978->979 980 13326e7-13326f0 978->980 979->982 980->982 982->958 985 133260a-133261e call 1333398 984->985 986 13325d9-1332608 call 1333588 984->986 992 1332622-1332626 985->992 993 1332620 985->993 986->984 994 1332632-1332636 992->994 995 1332628-133262c CloseHandle 992->995 993->952 996 1332646-133264f 994->996 997 1332638-1332643 VirtualFree 994->997 995->994 996->947 996->952 997->996
                              APIs
                              • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 013324F9
                              • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 0133271F
                              Memory Dump Source
                              • Source File: 00000000.00000002.1341275835.000000000132F000.00000040.00000020.00020000.00000000.sdmp, Offset: 0132F000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_132f000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: CreateFileFreeVirtual
                              • String ID:
                              • API String ID: 204039940-0
                              • Opcode ID: c604c45430315f2d7ac9edfc96fa3ed3524b16f7139e20e6f85f26396c7b052c
                              • Instruction ID: bea0749dd6e1c2249016c4b25118b2b4035f2a01b57e505cdaadfbd2160c7599
                              • Opcode Fuzzy Hash: c604c45430315f2d7ac9edfc96fa3ed3524b16f7139e20e6f85f26396c7b052c
                              • Instruction Fuzzy Hash: 0EA11A70E00209EBDB14CFA8C894BEEBBB5FF88319F208159E601BB281D7759A41DF54

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1075 7739d5-773a45 CreateWindowExW * 2 ShowWindow * 2
                              APIs
                              • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00773A03
                              • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00773A24
                              • ShowWindow.USER32(00000000,?,?), ref: 00773A38
                              • ShowWindow.USER32(00000000,?,?), ref: 00773A41
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: Window$CreateShow
                              • String ID: AutoIt v3$edit
                              • API String ID: 1584632944-3779509399
                              • Opcode ID: e9762b535a6bbe6b457f33e05f821cac442a354e67cb81149fd658ca4743125f
                              • Instruction ID: 4324f99d0c2035b09db04019692850b7ae7b6f453c07f7457ea78803e6e9a8e7
                              • Opcode Fuzzy Hash: e9762b535a6bbe6b457f33e05f821cac442a354e67cb81149fd658ca4743125f
                              • Instruction Fuzzy Hash: CCF03A70500694BEEA3067276C08E3B2E7DEBC6F50B00442AFA00A2270CA651810CAB0

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1076 13321d8-1332323 call 132fe28 call 13320c8 CreateFileW 1083 1332325 1076->1083 1084 133232a-133233a 1076->1084 1085 13323da-13323df 1083->1085 1087 1332341-133235b VirtualAlloc 1084->1087 1088 133233c 1084->1088 1089 133235f-1332376 ReadFile 1087->1089 1090 133235d 1087->1090 1088->1085 1091 133237a-13323b4 call 1332108 call 13310c8 1089->1091 1092 1332378 1089->1092 1090->1085 1097 13323d0-13323d8 ExitProcess 1091->1097 1098 13323b6-13323cb call 1332158 1091->1098 1092->1085 1097->1085 1098->1097
                              APIs
                                • Part of subcall function 013320C8: Sleep.KERNELBASE(000001F4), ref: 013320D9
                              • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 01332319
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1341275835.000000000132F000.00000040.00000020.00020000.00000000.sdmp, Offset: 0132F000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_132f000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: CreateFileSleep
                              • String ID: N4BFZP5N7RFZPG2STD4LDPJU
                              • API String ID: 2694422964-455372982
                              • Opcode ID: 1748489088c06c5aa1ff8d36be5bafb10b75e725c7913e775106caa2def7c0c8
                              • Instruction ID: 593ddd66a14e078f0159a3876a7528049e8c9b612907513841dbdafa767372ed
                              • Opcode Fuzzy Hash: 1748489088c06c5aa1ff8d36be5bafb10b75e725c7913e775106caa2def7c0c8
                              • Instruction Fuzzy Hash: 9E51A530D04288DAEF11DBB8C854BDFBB78AF55304F104198E2497B2C1D7B91B49CBAA

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1100 77407c-774092 1101 77416f-774173 1100->1101 1102 774098-7740ad call 777a16 1100->1102 1105 7ad3c8-7ad3d7 LoadStringW 1102->1105 1106 7740b3-7740d3 call 777bcc 1102->1106 1109 7ad3e2-7ad3fa call 777b2e call 776fe3 1105->1109 1106->1109 1110 7740d9-7740dd 1106->1110 1120 7740ed-77416a call 792de0 call 77454e call 792dbc Shell_NotifyIconW call 775904 1109->1120 1121 7ad400-7ad41e call 777cab call 776fe3 call 777cab 1109->1121 1112 774174-77417d call 778047 1110->1112 1113 7740e3-7740e8 call 777b2e 1110->1113 1112->1120 1113->1120 1120->1101 1121->1120
                              APIs
                              • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 007AD3D7
                                • Part of subcall function 00777BCC: _memmove.LIBCMT ref: 00777C06
                              • _memset.LIBCMT ref: 007740FC
                              • _wcscpy.LIBCMT ref: 00774150
                              • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00774160
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: IconLoadNotifyShell_String_memmove_memset_wcscpy
                              • String ID: Line:
                              • API String ID: 3942752672-1585850449
                              • Opcode ID: 741f56efaf42cfadeb625e97ee8e41c7e4f7098e6e5ea2d3ef0ca7754008a6d1
                              • Instruction ID: 82fa651eb36aaf61c45c3f84c88b3939faa7653c2a5ae98e720d915140a66f6a
                              • Opcode Fuzzy Hash: 741f56efaf42cfadeb625e97ee8e41c7e4f7098e6e5ea2d3ef0ca7754008a6d1
                              • Instruction Fuzzy Hash: FD31D171008704EFDB25EB60DC4AFEB77D8BF84344F10891AF599920A1DF78A648CB96

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1135 77686a-776891 call 774ddd 1138 776897-7768a5 call 774ddd 1135->1138 1139 7ae031-7ae041 call 7d955b 1135->1139 1138->1139 1146 7768ab-7768b1 1138->1146 1142 7ae046-7ae048 1139->1142 1144 7ae04a-7ae04d call 774e4a 1142->1144 1145 7ae067-7ae0af call 790db6 1142->1145 1150 7ae052-7ae061 call 7d42f8 1144->1150 1155 7ae0b1-7ae0bb 1145->1155 1156 7ae0d4 1145->1156 1149 7768b7-7768d9 call 776a8c 1146->1149 1146->1150 1150->1145 1158 7ae0cf-7ae0d0 1155->1158 1159 7ae0d6-7ae0e9 1156->1159 1162 7ae0bd-7ae0cc 1158->1162 1163 7ae0d2 1158->1163 1160 7ae0ef 1159->1160 1161 7ae260-7ae263 call 792d55 1159->1161 1164 7ae0f6-7ae0f9 call 777480 1160->1164 1167 7ae268-7ae271 call 774e4a 1161->1167 1162->1158 1163->1159 1168 7ae0fe-7ae120 call 775db2 call 7d73e9 1164->1168 1172 7ae273-7ae283 call 777616 call 775d9b 1167->1172 1179 7ae122-7ae12f 1168->1179 1180 7ae134-7ae13e call 7d73d3 1168->1180 1186 7ae288-7ae2b8 call 7cf7a1 call 790e2c call 792d55 call 774e4a 1172->1186 1182 7ae227-7ae237 call 77750f 1179->1182 1188 7ae158-7ae162 call 7d73bd 1180->1188 1189 7ae140-7ae153 1180->1189 1182->1168 1191 7ae23d-7ae25a call 77735d 1182->1191 1186->1172 1196 7ae176-7ae180 call 775e2a 1188->1196 1197 7ae164-7ae171 1188->1197 1189->1182 1191->1161 1191->1164 1196->1182 1204 7ae186-7ae19e call 7cf73d 1196->1204 1197->1182 1210 7ae1a0-7ae1bf call 777de1 call 775904 1204->1210 1211 7ae1c1-7ae1c4 1204->1211 1235 7ae1e2-7ae1f0 call 775db2 1210->1235 1213 7ae1f2-7ae1f5 1211->1213 1214 7ae1c6-7ae1e1 call 777de1 call 776839 call 775904 1211->1214 1217 7ae1f7-7ae200 call 7cf65e 1213->1217 1218 7ae215-7ae218 call 7d737f 1213->1218 1214->1235 1217->1186 1229 7ae206-7ae210 call 790e2c 1217->1229 1223 7ae21d-7ae226 call 790e2c 1218->1223 1223->1182 1229->1168 1235->1223
                              APIs
                                • Part of subcall function 00774DDD: LoadLibraryExW.KERNEL32(?,00000000,00000002,?,008352F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00774E0F
                              • _free.LIBCMT ref: 007AE263
                              • _free.LIBCMT ref: 007AE2AA
                                • Part of subcall function 00776A8C: SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00776BAD
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: _free$CurrentDirectoryLibraryLoad
                              • String ID: >>>AUTOIT SCRIPT<<<$Bad directive syntax error
                              • API String ID: 2861923089-1757145024
                              • Opcode ID: 96dd4b16e239b202d76bfffc6e78e2132d8a4956d0a8aa0dbda59c8c385b89ad
                              • Instruction ID: 9b4a0c962bb4340924cf31d91e1f0d889fa7a792fae69d5d435d476d7f4210ae
                              • Opcode Fuzzy Hash: 96dd4b16e239b202d76bfffc6e78e2132d8a4956d0a8aa0dbda59c8c385b89ad
                              • Instruction Fuzzy Hash: 85918E71A10219EFCF18EFA4CC959EEB7B4FF45310F10852AF815AB2A1DB78A915CB50
                              APIs
                              • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,00000003,00000000,80000001,80000001,?,007735A1,SwapMouseButtons,00000004,?), ref: 007735D4
                              • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,007735A1,SwapMouseButtons,00000004,?,?,?,?,00772754), ref: 007735F5
                              • RegCloseKey.KERNELBASE(00000000,?,?,007735A1,SwapMouseButtons,00000004,?,?,?,?,00772754), ref: 00773617
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: CloseOpenQueryValue
                              • String ID: Control Panel\Mouse
                              • API String ID: 3677997916-824357125
                              • Opcode ID: a7fda972b1254426e0647ca646441db08ad2a8e747361711f1f6ef457e0340dd
                              • Instruction ID: 6302dfecc0cad6760cf1ece2fcb63672befcfbf6dcfb6653469d59d176864a33
                              • Opcode Fuzzy Hash: a7fda972b1254426e0647ca646441db08ad2a8e747361711f1f6ef457e0340dd
                              • Instruction Fuzzy Hash: A7114571611218BFDF208F64DC80EBEBBB8EF04780F108469E809D7210EA759E40ABA4
                              APIs
                              • CreateProcessW.KERNELBASE(?,00000000), ref: 013318F5
                              • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 01331919
                              • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 0133193B
                              Memory Dump Source
                              • Source File: 00000000.00000002.1341275835.000000000132F000.00000040.00000020.00020000.00000000.sdmp, Offset: 0132F000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_132f000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: Process$ContextCreateMemoryReadThreadWow64
                              • String ID:
                              • API String ID: 2438371351-0
                              • Opcode ID: e8e7a77c1c38f92167ec50984bffac71589908538948dc0fdf133907e09ee162
                              • Instruction ID: f5a213ad9133e95b3072f5fbc7e62d2e7cf0ef9404007b920db70b375f3395b9
                              • Opcode Fuzzy Hash: e8e7a77c1c38f92167ec50984bffac71589908538948dc0fdf133907e09ee162
                              • Instruction Fuzzy Hash: 3B620C30A14258DBEB24CFA4C840BDEB776EF98305F1091A9D10DEB390E7799E81CB59
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                              • String ID:
                              • API String ID: 2782032738-0
                              • Opcode ID: 998aeda2236a74d80706e5f9a46343bd1135ee917ddd04e378ba6ed458c3dace
                              • Instruction ID: b0afd604aabfc32ed630ad7b31aedcf2e25476987c76f7c5529d4d5aaaf9405b
                              • Opcode Fuzzy Hash: 998aeda2236a74d80706e5f9a46343bd1135ee917ddd04e378ba6ed458c3dace
                              • Instruction Fuzzy Hash: 1041D474A00749AFDF28CEA9F884DAE77A5EF46360B24857DE815C7640EB78DD428B40
                              APIs
                              • _memset.LIBCMT ref: 007AEA39
                              • GetOpenFileNameW.COMDLG32(?), ref: 007AEA83
                                • Part of subcall function 00774750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00774743,?,?,007737AE,?), ref: 00774770
                                • Part of subcall function 00790791: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 007907B0
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: Name$Path$FileFullLongOpen_memset
                              • String ID: X
                              • API String ID: 3777226403-3081909835
                              • Opcode ID: 45f3078ba770ed6d844d2cc79a2407d4691dbad6805164b9bc12f707d6f0db47
                              • Instruction ID: 3b58d6b507d1f0ba06f686ab43d6e263fb9b0971df085dcf41acdffb15563692
                              • Opcode Fuzzy Hash: 45f3078ba770ed6d844d2cc79a2407d4691dbad6805164b9bc12f707d6f0db47
                              • Instruction Fuzzy Hash: F521A171A00258DBCF059FD4D849BEE7BF8AF49314F008019E508EB242DBB85989CFA1
                              APIs
                              • GetTempPathW.KERNEL32(00000104,?), ref: 007D98F8
                              • GetTempFileNameW.KERNELBASE(?,aut,00000000,?), ref: 007D990F
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: Temp$FileNamePath
                              • String ID: aut
                              • API String ID: 3285503233-3010740371
                              • Opcode ID: a3e094a786c8c903d3a1f8d2f106e35e242440c170292d1da638f8a47addd7ba
                              • Instruction ID: efce4ff74859158dd6f1bf63f539ef1fe10b0f1fda021e46568d6547f7a97971
                              • Opcode Fuzzy Hash: a3e094a786c8c903d3a1f8d2f106e35e242440c170292d1da638f8a47addd7ba
                              • Instruction Fuzzy Hash: 1AD05E7994030DBBDB50ABA4EC0EFAA773CFB04700F0082B1FA54D11A1EEB49598CB95
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 56ea2041fccea06ead0bd7c01b0cd8f93be8589fc4bb9fdd4dca6a34445ea063
                              • Instruction ID: b20d52b37698c777fb832ed5c98e77bbde1e37de57307c6c2b93efb3fa238eac
                              • Opcode Fuzzy Hash: 56ea2041fccea06ead0bd7c01b0cd8f93be8589fc4bb9fdd4dca6a34445ea063
                              • Instruction Fuzzy Hash: DAF14575608340DFCB14DF29C484A6ABBE5FF89314F14896EF8999B251D738E906CF82
                              APIs
                                • Part of subcall function 00790162: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00790193
                                • Part of subcall function 00790162: MapVirtualKeyW.USER32(00000010,00000000), ref: 0079019B
                                • Part of subcall function 00790162: MapVirtualKeyW.USER32(000000A0,00000000), ref: 007901A6
                                • Part of subcall function 00790162: MapVirtualKeyW.USER32(000000A1,00000000), ref: 007901B1
                                • Part of subcall function 00790162: MapVirtualKeyW.USER32(00000011,00000000), ref: 007901B9
                                • Part of subcall function 00790162: MapVirtualKeyW.USER32(00000012,00000000), ref: 007901C1
                                • Part of subcall function 007860F9: RegisterWindowMessageW.USER32(WM_GETCONTROLNAME,?,0077F930), ref: 00786154
                              • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 0077F9CD
                              • OleInitialize.OLE32(00000000), ref: 0077FA4A
                              • CloseHandle.KERNEL32(00000000), ref: 007B45C8
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                              • String ID:
                              • API String ID: 1986988660-0
                              • Opcode ID: 47e2da2cb6abcee1f7e926cc150db32807547b76e05041e5b72af33400bb9039
                              • Instruction ID: 7cc1b4f028b46ccb62621efaf4b39f5d53bdf1923e3ca107305ab5e56b0dc114
                              • Opcode Fuzzy Hash: 47e2da2cb6abcee1f7e926cc150db32807547b76e05041e5b72af33400bb9039
                              • Instruction Fuzzy Hash: EE81CDF0905A40CFC788EF79E8456587BE5FBD9306B50892AD118CB371EB744588CF59
                              APIs
                              • _memset.LIBCMT ref: 00774370
                              • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00774415
                              • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00774432
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: IconNotifyShell_$_memset
                              • String ID:
                              • API String ID: 1505330794-0
                              • Opcode ID: b2af3e4eb05422b9006a4cdf99b18e813a96fa3d773c8127d417e3cbe5353860
                              • Instruction ID: c83baa03d0c5f4e019b807d611891503c742fa1d89a775d0d42b1b3ebf40b31e
                              • Opcode Fuzzy Hash: b2af3e4eb05422b9006a4cdf99b18e813a96fa3d773c8127d417e3cbe5353860
                              • Instruction Fuzzy Hash: C23193B0504701DFDB21DF24D8846ABBBF8FB88348F004D2EF69E92251D774A944CB52
                              APIs
                              • __FF_MSGBANNER.LIBCMT ref: 00795733
                                • Part of subcall function 0079A16B: __NMSG_WRITE.LIBCMT ref: 0079A192
                                • Part of subcall function 0079A16B: __NMSG_WRITE.LIBCMT ref: 0079A19C
                              • __NMSG_WRITE.LIBCMT ref: 0079573A
                                • Part of subcall function 0079A1C8: GetModuleFileNameW.KERNEL32(00000000,008333BA,00000104,?,00000001,00000000), ref: 0079A25A
                                • Part of subcall function 0079A1C8: ___crtMessageBoxW.LIBCMT ref: 0079A308
                                • Part of subcall function 0079309F: ___crtCorExitProcess.LIBCMT ref: 007930A5
                                • Part of subcall function 0079309F: ExitProcess.KERNEL32 ref: 007930AE
                                • Part of subcall function 00798B28: __getptd_noexit.LIBCMT ref: 00798B28
                              • RtlAllocateHeap.NTDLL(012F0000,00000000,00000001,00000000,?,?,?,00790DD3,?), ref: 0079575F
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: ExitProcess___crt$AllocateFileHeapMessageModuleName__getptd_noexit
                              • String ID:
                              • API String ID: 1372826849-0
                              • Opcode ID: fc0c55e343a2f0662fadcd2bf05b8dfe915039bd182b5c239a9a9419b3f6fc9d
                              • Instruction ID: 74b115816f63289cbdd9f910f7d409d96493afc54c5ac9107614e5b3e7433afc
                              • Opcode Fuzzy Hash: fc0c55e343a2f0662fadcd2bf05b8dfe915039bd182b5c239a9a9419b3f6fc9d
                              • Instruction Fuzzy Hash: C2012471240B21EADE1227B8FC8AB2E7398DF82362F100426F505DB1C1DFBC8E418761
                              APIs
                              • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000,?,?,007D9548,?,?,?,?,?,00000004), ref: 007D98BB
                              • SetFileTime.KERNELBASE(00000000,?,00000000,?,?,007D9548,?,?,?,?,?,00000004,00000001,?,?,00000004), ref: 007D98D1
                              • CloseHandle.KERNEL32(00000000,?,007D9548,?,?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 007D98D8
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: File$CloseCreateHandleTime
                              • String ID:
                              • API String ID: 3397143404-0
                              • Opcode ID: 7c7c783e3ddbb23735007cd077e63827cf94ccfb6b0e7fbbd34a06c555d4a562
                              • Instruction ID: ff759e5a9b4781e24177412ac1884765c2d61be22e5a92d4887e9a8fe72e7794
                              • Opcode Fuzzy Hash: 7c7c783e3ddbb23735007cd077e63827cf94ccfb6b0e7fbbd34a06c555d4a562
                              • Instruction Fuzzy Hash: C3E08632140218BBD7211B54EC09FDE7F29AF06B60F148121FB24690E08BB51521D79C
                              APIs
                              • _free.LIBCMT ref: 007D8D1B
                                • Part of subcall function 00792D55: RtlFreeHeap.NTDLL(00000000,00000000,?,00799A24), ref: 00792D69
                                • Part of subcall function 00792D55: GetLastError.KERNEL32(00000000,?,00799A24), ref: 00792D7B
                              • _free.LIBCMT ref: 007D8D2C
                              • _free.LIBCMT ref: 007D8D3E
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: _free$ErrorFreeHeapLast
                              • String ID:
                              • API String ID: 776569668-0
                              • Opcode ID: 625e2a9df38ff8793e00647abbe9ccf0d6414545c555b0c4696158d27d9f7751
                              • Instruction ID: 03e9b7a1a946971aec7a98331e373fcacdc4b4028d47253c505b46e9dac63641
                              • Opcode Fuzzy Hash: 625e2a9df38ff8793e00647abbe9ccf0d6414545c555b0c4696158d27d9f7751
                              • Instruction Fuzzy Hash: BAE017A1701601A6CF64B6B8B948F9323ED4F9C352B18091EB40DD72CBCE6CF8838128
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID:
                              • String ID: CALL
                              • API String ID: 0-4196123274
                              • Opcode ID: 94d6e9bc3f845269b5477a7255c806eab294d60e2d8b8235d69353aeb3e7e3ec
                              • Instruction ID: 05ee5141ccfa846ad3e5545e9ef8a7f4c7fa2ed99e364312120a26c1f8b93001
                              • Opcode Fuzzy Hash: 94d6e9bc3f845269b5477a7255c806eab294d60e2d8b8235d69353aeb3e7e3ec
                              • Instruction Fuzzy Hash: 90225870608201EFDB24DF24C494B6AB7E1BF85344F15C96DE99A8B362D739ED41CB82
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: _memmove
                              • String ID: EA06
                              • API String ID: 4104443479-3962188686
                              • Opcode ID: 290fd25ac796f0b27147dc21af6079fe586d1f2c681fa18fa547e3f5b841de0b
                              • Instruction ID: ec6756fb4cf9508fb8ee4cb77ff192a5dd3ce3a673c42f57e4f4b92b4cf7f339
                              • Opcode Fuzzy Hash: 290fd25ac796f0b27147dc21af6079fe586d1f2c681fa18fa547e3f5b841de0b
                              • Instruction Fuzzy Hash: C9419F21B00258EBDF329B548C557BE7B66DB46390F28C475EDCE97282D72C5D4483A1
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: _memmove
                              • String ID:
                              • API String ID: 4104443479-0
                              • Opcode ID: 40fbce4a1fea4cfe3bf1a015a5a2827c9472d34ae18aa590b79f6fb0e3b65f37
                              • Instruction ID: a709108d27f0ce0c2eee22203ee314bbe062f6d367e0f43ba8ce2068bbf67e89
                              • Opcode Fuzzy Hash: 40fbce4a1fea4cfe3bf1a015a5a2827c9472d34ae18aa590b79f6fb0e3b65f37
                              • Instruction Fuzzy Hash: 333193B1704606AFDB08DF68D8D1D69B3A9FF48360715C629E519CB391EB38ED20CB90
                              APIs
                              • IsThemeActive.UXTHEME ref: 00774834
                                • Part of subcall function 0079336C: __lock.LIBCMT ref: 00793372
                                • Part of subcall function 0079336C: DecodePointer.KERNEL32(00000001,?,00774849,007C7C74), ref: 0079337E
                                • Part of subcall function 0079336C: EncodePointer.KERNEL32(?,?,00774849,007C7C74), ref: 00793389
                                • Part of subcall function 007748FD: SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 00774915
                                • Part of subcall function 007748FD: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 0077492A
                                • Part of subcall function 00773B3A: GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00773B68
                                • Part of subcall function 00773B3A: IsDebuggerPresent.KERNEL32 ref: 00773B7A
                                • Part of subcall function 00773B3A: GetFullPathNameW.KERNEL32(00007FFF,?,?,008352F8,008352E0,?,?), ref: 00773BEB
                                • Part of subcall function 00773B3A: SetCurrentDirectoryW.KERNEL32(?), ref: 00773C6F
                              • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00774874
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: InfoParametersSystem$CurrentDirectoryPointer$ActiveDebuggerDecodeEncodeFullNamePathPresentTheme__lock
                              • String ID:
                              • API String ID: 1438897964-0
                              • Opcode ID: 19cbb5fec26394969785139329e32ce0dbcb05a9832317e636e3f3b648edc7e5
                              • Instruction ID: 7d6f1e857d43218d52a22c5404ab77e02e9d40f6b308eabd88e962e15ccd0e9f
                              • Opcode Fuzzy Hash: 19cbb5fec26394969785139329e32ce0dbcb05a9832317e636e3f3b648edc7e5
                              • Instruction Fuzzy Hash: A9119D71908705DBCB00EF29EC4991ABBE8FFC5790F10891EF454872B2DB749545CB96
                              APIs
                                • Part of subcall function 0079571C: __FF_MSGBANNER.LIBCMT ref: 00795733
                                • Part of subcall function 0079571C: __NMSG_WRITE.LIBCMT ref: 0079573A
                                • Part of subcall function 0079571C: RtlAllocateHeap.NTDLL(012F0000,00000000,00000001,00000000,?,?,?,00790DD3,?), ref: 0079575F
                              • std::exception::exception.LIBCMT ref: 00790DEC
                              • __CxxThrowException@8.LIBCMT ref: 00790E01
                                • Part of subcall function 0079859B: RaiseException.KERNEL32(?,?,?,00829E78,00000000,?,?,?,?,00790E06,?,00829E78,?,00000001), ref: 007985F0
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: AllocateExceptionException@8HeapRaiseThrowstd::exception::exception
                              • String ID:
                              • API String ID: 3902256705-0
                              • Opcode ID: 7c7005d078cb4d56a1713638bdf4797697cd15eea2ce282fc7cddaf0e4e460a8
                              • Instruction ID: 7e007484bd0538ff61ebe3d6973f10e289fd3278c4372a11b479dc6af3c67271
                              • Opcode Fuzzy Hash: 7c7005d078cb4d56a1713638bdf4797697cd15eea2ce282fc7cddaf0e4e460a8
                              • Instruction Fuzzy Hash: 4DF0813150021DAACF10BAE8FC099DE77A8EF01311F104429FD18D6691DFB99A9496D1
                              APIs
                                • Part of subcall function 00798B28: __getptd_noexit.LIBCMT ref: 00798B28
                              • __lock_file.LIBCMT ref: 007953EB
                                • Part of subcall function 00796C11: __lock.LIBCMT ref: 00796C34
                              • __fclose_nolock.LIBCMT ref: 007953F6
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                              • String ID:
                              • API String ID: 2800547568-0
                              • Opcode ID: f644e840a0ed2bb18706bad8f3150bbf01ccc0a8a1d5dd0a584e9b6220abd9ad
                              • Instruction ID: 85ed9969a6cfee418ebdca011988249a3a7dab0a543b7e8011dd3d82e98626a3
                              • Opcode Fuzzy Hash: f644e840a0ed2bb18706bad8f3150bbf01ccc0a8a1d5dd0a584e9b6220abd9ad
                              • Instruction Fuzzy Hash: 16F0B471900A24DBDF52AF75B80A7AD77E06F42378F258208A424AB1C1CFFC99419B52
                              APIs
                              • CreateProcessW.KERNELBASE(?,00000000), ref: 013318F5
                              • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 01331919
                              • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 0133193B
                              Memory Dump Source
                              • Source File: 00000000.00000002.1341275835.000000000132F000.00000040.00000020.00020000.00000000.sdmp, Offset: 0132F000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_132f000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: Process$ContextCreateMemoryReadThreadWow64
                              • String ID:
                              • API String ID: 2438371351-0
                              • Opcode ID: 45c0bcdfd50c24934144be52d4489c8f4aeee23b26077383fd0484b0fd6f3e51
                              • Instruction ID: cc56d2b51e8e2aa4ee06c74e09c1a80582dcfe99b3bb7c07cc858396d655eed0
                              • Opcode Fuzzy Hash: 45c0bcdfd50c24934144be52d4489c8f4aeee23b26077383fd0484b0fd6f3e51
                              • Instruction Fuzzy Hash: F012BD24E24658C6EB24DF64D8507DEB232EF68300F1090E9910DEB7A5E77A4F81CF5A
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: ProtectVirtual
                              • String ID:
                              • API String ID: 544645111-0
                              • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                              • Instruction ID: 7b9079f42f989adcb481b6543e066d5545e1292a615d633a13c3a7e260cbe92c
                              • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                              • Instruction Fuzzy Hash: 7E31B370A101059FCB18DF58E484AA9F7A6FB5A300B6487A5E80ACB355D735EDC1DBE0
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: ClearVariant
                              • String ID:
                              • API String ID: 1473721057-0
                              • Opcode ID: 42e3411d4f5a0d9ed1e78b33f7562ec5dc0d61f39b8249f02fa58606bef11faf
                              • Instruction ID: 28d893904235fd91abf7c99f4fd76afd2efa78eae4f50a0a5697066b0154b588
                              • Opcode Fuzzy Hash: 42e3411d4f5a0d9ed1e78b33f7562ec5dc0d61f39b8249f02fa58606bef11faf
                              • Instruction Fuzzy Hash: EB411674604341DFDB25DF24C458B1ABBE0BF85358F0989ACE8998B362C739E845CF92
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: _memmove
                              • String ID:
                              • API String ID: 4104443479-0
                              • Opcode ID: fd85cbf4f3c9d0ba37edc810aa685ef02bf099df2b41b305ee14b87bbd7a3dbc
                              • Instruction ID: 75b45cf2119f9b2b89941e96d9bdf7d74593d8ab95537c38a8baa81a81fc3ed2
                              • Opcode Fuzzy Hash: fd85cbf4f3c9d0ba37edc810aa685ef02bf099df2b41b305ee14b87bbd7a3dbc
                              • Instruction Fuzzy Hash: 292178B2A04A08EBCF249F25E8417697BB4FF553A0F21C62EE48AC50A0EB3480D0D755
                              APIs
                                • Part of subcall function 00774BB5: FreeLibrary.KERNEL32(00000000,?), ref: 00774BEF
                                • Part of subcall function 0079525B: __wfsopen.LIBCMT ref: 00795266
                              • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,008352F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00774E0F
                                • Part of subcall function 00774B6A: FreeLibrary.KERNEL32(00000000), ref: 00774BA4
                                • Part of subcall function 00774C70: _memmove.LIBCMT ref: 00774CBA
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: Library$Free$Load__wfsopen_memmove
                              • String ID:
                              • API String ID: 1396898556-0
                              • Opcode ID: dcac9571cac1c9968206fe3f623f9b900008fc4bbe6854130157dcc25601d43a
                              • Instruction ID: 5758749fc8d54972ac7f82bebada95a557685f9b251e2f7c06c9915c34a3c5f5
                              • Opcode Fuzzy Hash: dcac9571cac1c9968206fe3f623f9b900008fc4bbe6854130157dcc25601d43a
                              • Instruction Fuzzy Hash: FE11E732600205EBCF21AF74CC1AFAD77A4AF44790F10C429F54AA7191DFBD9D019751
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: ClearVariant
                              • String ID:
                              • API String ID: 1473721057-0
                              • Opcode ID: 8a42c33f178f8d47531c326c2ce220f839dcf1e64bece4f0b760faf89b776b4f
                              • Instruction ID: 279dc85374e506da371a9e829a6877b3b1e67264561a0c9ec9ce220caed167a3
                              • Opcode Fuzzy Hash: 8a42c33f178f8d47531c326c2ce220f839dcf1e64bece4f0b760faf89b776b4f
                              • Instruction Fuzzy Hash: CC2105B4608341EFDB25DF64C444B2ABBE1BF88354F05896CF98A57722D739E805CB92
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 9e4fc6366d8fcf72684ebe6de8ef8102756bfe5bd03ae5de0aed79c05553b98d
                              • Instruction ID: d6a51ecdc7a47841e6496f1c16091c4d9fc64abf096123023e0c58ed062ebbfc
                              • Opcode Fuzzy Hash: 9e4fc6366d8fcf72684ebe6de8ef8102756bfe5bd03ae5de0aed79c05553b98d
                              • Instruction Fuzzy Hash: 0901F5365152149FEF215AA8FC49AFAB3DDEFC0330F10846EE868D2850D6686C44CED1
                              APIs
                              • __lock_file.LIBCMT ref: 007948A6
                                • Part of subcall function 00798B28: __getptd_noexit.LIBCMT ref: 00798B28
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: __getptd_noexit__lock_file
                              • String ID:
                              • API String ID: 2597487223-0
                              • Opcode ID: c26c56a28b80413d29ad4d0b7e812a2d39b47e21e000b8cc5b11e7d96bc19bb5
                              • Instruction ID: d91bb0c3f1dffb4fcd7af1b7a96b51c5f9203e845e3c5a16ef2069103cda76cd
                              • Opcode Fuzzy Hash: c26c56a28b80413d29ad4d0b7e812a2d39b47e21e000b8cc5b11e7d96bc19bb5
                              • Instruction Fuzzy Hash: EEF0C271900649EBDF51AFB4EC0AFEE37A0AF02325F158514F4249A1D1CB7C9952DB52
                              APIs
                              • FreeLibrary.KERNEL32(?,?,008352F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00774E7E
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: FreeLibrary
                              • String ID:
                              • API String ID: 3664257935-0
                              • Opcode ID: 2e2fc6c0826eb7fe0c8c6a0993d4146a10cb120d4581623944f60ff7b8139555
                              • Instruction ID: e9838af631e2fa8054e3883efb93d10a67403f0be6c9e791ced36668481553c8
                              • Opcode Fuzzy Hash: 2e2fc6c0826eb7fe0c8c6a0993d4146a10cb120d4581623944f60ff7b8139555
                              • Instruction Fuzzy Hash: AAF03971501711DFCF359F64E894822BBE1BF143B9320CA3EE1DA82620C7BA9840DF40
                              APIs
                              • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 007907B0
                                • Part of subcall function 00777BCC: _memmove.LIBCMT ref: 00777C06
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: LongNamePath_memmove
                              • String ID:
                              • API String ID: 2514874351-0
                              • Opcode ID: d975e75f6586d4476992079e59d592908d13dfcff8e537183883acfbe07b8e58
                              • Instruction ID: 11f3146e7a1029bbf5205178c0a202cfbc19b574c389d5d852f07fcfa85edc61
                              • Opcode Fuzzy Hash: d975e75f6586d4476992079e59d592908d13dfcff8e537183883acfbe07b8e58
                              • Instruction Fuzzy Hash: 61E0867690422857C72096589C09FEA779DDF896A0F0441B5FC0CD7214D964AC80C690
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: __wfsopen
                              • String ID:
                              • API String ID: 197181222-0
                              • Opcode ID: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                              • Instruction ID: dea7a27ba767690aee2f910aab1c5ad2b505cfbd17006e02c0de63cc9a28d3a4
                              • Opcode Fuzzy Hash: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                              • Instruction Fuzzy Hash: 5AB092B644020CB7CE022A82FC02A493B19AB41764F408020FB0C18262A677A6649A89
                              APIs
                              • Sleep.KERNELBASE(000001F4), ref: 013320D9
                              Memory Dump Source
                              • Source File: 00000000.00000002.1341275835.000000000132F000.00000040.00000020.00020000.00000000.sdmp, Offset: 0132F000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_132f000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: Sleep
                              • String ID:
                              • API String ID: 3472027048-0
                              • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                              • Instruction ID: 5ddc87024ed26f138b818ff45a8fe043b57305e501d9a6c2c0da31af980998ac
                              • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                              • Instruction Fuzzy Hash: D5E0E67498410EEFDB00DFB4D54969E7BB4EF04301F100261FD01D2280DA309D50DA62
                              APIs
                                • Part of subcall function 00772612: GetWindowLongW.USER32(?,000000EB), ref: 00772623
                              • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 007FCB37
                              • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 007FCB95
                              • GetWindowLongW.USER32(?,000000F0), ref: 007FCBD6
                              • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 007FCC00
                              • SendMessageW.USER32 ref: 007FCC29
                              • _wcsncpy.LIBCMT ref: 007FCC95
                              • GetKeyState.USER32(00000011), ref: 007FCCB6
                              • GetKeyState.USER32(00000009), ref: 007FCCC3
                              • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 007FCCD9
                              • GetKeyState.USER32(00000010), ref: 007FCCE3
                              • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 007FCD0C
                              • SendMessageW.USER32 ref: 007FCD33
                              • SendMessageW.USER32(?,00001030,?,007FB348), ref: 007FCE37
                              • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 007FCE4D
                              • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 007FCE60
                              • SetCapture.USER32(?), ref: 007FCE69
                              • ClientToScreen.USER32(?,?), ref: 007FCECE
                              • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 007FCEDB
                              • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 007FCEF5
                              • ReleaseCapture.USER32 ref: 007FCF00
                              • GetCursorPos.USER32(?), ref: 007FCF3A
                              • ScreenToClient.USER32(?,?), ref: 007FCF47
                              • SendMessageW.USER32(?,00001012,00000000,?), ref: 007FCFA3
                              • SendMessageW.USER32 ref: 007FCFD1
                              • SendMessageW.USER32(?,00001111,00000000,?), ref: 007FD00E
                              • SendMessageW.USER32 ref: 007FD03D
                              • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 007FD05E
                              • SendMessageW.USER32(?,0000110B,00000009,?), ref: 007FD06D
                              • GetCursorPos.USER32(?), ref: 007FD08D
                              • ScreenToClient.USER32(?,?), ref: 007FD09A
                              • GetParent.USER32(?), ref: 007FD0BA
                              • SendMessageW.USER32(?,00001012,00000000,?), ref: 007FD123
                              • SendMessageW.USER32 ref: 007FD154
                              • ClientToScreen.USER32(?,?), ref: 007FD1B2
                              • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 007FD1E2
                              • SendMessageW.USER32(?,00001111,00000000,?), ref: 007FD20C
                              • SendMessageW.USER32 ref: 007FD22F
                              • ClientToScreen.USER32(?,?), ref: 007FD281
                              • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 007FD2B5
                                • Part of subcall function 007725DB: GetWindowLongW.USER32(?,000000EB), ref: 007725EC
                              • GetWindowLongW.USER32(?,000000F0), ref: 007FD351
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease_wcsncpy
                              • String ID: @GUI_DRAGID$F
                              • API String ID: 3977979337-4164748364
                              • Opcode ID: d2dcdcccf710d1ad39ccdfc114bbdcad7c7b5ff092b71e14fdb735e7716514f8
                              • Instruction ID: 6d7ab9c73ec4b0717389827b9e49e879ecb67a8e3138d6e74d735e0641decd19
                              • Opcode Fuzzy Hash: d2dcdcccf710d1ad39ccdfc114bbdcad7c7b5ff092b71e14fdb735e7716514f8
                              • Instruction Fuzzy Hash: 89429C78204288EFDB22CF24C948ABABBE5FF49310F14492DF655C73A1CB399850DB56
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: _memmove$_memset
                              • String ID: 3cx$DEFINE$Q\E$[:<:]]$[:>:]]$\b(?<=\w)$\b(?=\w)$_x
                              • API String ID: 1357608183-4024317189
                              • Opcode ID: 9c796071f1709ccdfb37d6c47c1f3cf0d5909035c7f8d4c9ef7fba0d442ef50f
                              • Instruction ID: 49dfc0d1aeb0d5b298248e355b13285f98480490f9cf4e28acac52a768611e7f
                              • Opcode Fuzzy Hash: 9c796071f1709ccdfb37d6c47c1f3cf0d5909035c7f8d4c9ef7fba0d442ef50f
                              • Instruction Fuzzy Hash: 2C93A375E44219DFDB24DF58C881BADB7B1FF48310F24816EE945AB281E7789E82CB50
                              APIs
                              • GetForegroundWindow.USER32(00000000,?), ref: 007748DF
                              • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 007AD665
                              • IsIconic.USER32(?), ref: 007AD66E
                              • ShowWindow.USER32(?,00000009), ref: 007AD67B
                              • SetForegroundWindow.USER32(?), ref: 007AD685
                              • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 007AD69B
                              • GetCurrentThreadId.KERNEL32 ref: 007AD6A2
                              • GetWindowThreadProcessId.USER32(?,00000000), ref: 007AD6AE
                              • AttachThreadInput.USER32(?,00000000,00000001), ref: 007AD6BF
                              • AttachThreadInput.USER32(?,00000000,00000001), ref: 007AD6C7
                              • AttachThreadInput.USER32(00000000,?,00000001), ref: 007AD6CF
                              • SetForegroundWindow.USER32(?), ref: 007AD6D2
                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 007AD6E7
                              • keybd_event.USER32(00000012,00000000), ref: 007AD6F2
                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 007AD6FC
                              • keybd_event.USER32(00000012,00000000), ref: 007AD701
                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 007AD70A
                              • keybd_event.USER32(00000012,00000000), ref: 007AD70F
                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 007AD719
                              • keybd_event.USER32(00000012,00000000), ref: 007AD71E
                              • SetForegroundWindow.USER32(?), ref: 007AD721
                              • AttachThreadInput.USER32(?,?,00000000), ref: 007AD748
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                              • String ID: Shell_TrayWnd
                              • API String ID: 4125248594-2988720461
                              • Opcode ID: 897c46fdbd20b5152d0622467743a629c3f7e4134999ef446c4ec4ef64b8ba13
                              • Instruction ID: 83aef19270356c5ccfd51cf50e7fcc172d92f862fb7dcf4d515fb0959b5e0ca8
                              • Opcode Fuzzy Hash: 897c46fdbd20b5152d0622467743a629c3f7e4134999ef446c4ec4ef64b8ba13
                              • Instruction Fuzzy Hash: 16317571A40318BAEB206B619C89F7F7F6CEF45B50F108025FA05EA1D1CAB45D11EAA5
                              APIs
                              • FindFirstFileW.KERNEL32(?,?), ref: 007DC78D
                              • FindClose.KERNEL32(00000000), ref: 007DC7E1
                              • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 007DC806
                              • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 007DC81D
                              • FileTimeToSystemTime.KERNEL32(?,?), ref: 007DC844
                              • __swprintf.LIBCMT ref: 007DC890
                              • __swprintf.LIBCMT ref: 007DC8D3
                                • Part of subcall function 00777DE1: _memmove.LIBCMT ref: 00777E22
                              • __swprintf.LIBCMT ref: 007DC927
                                • Part of subcall function 00793698: __woutput_l.LIBCMT ref: 007936F1
                              • __swprintf.LIBCMT ref: 007DC975
                                • Part of subcall function 00793698: __flsbuf.LIBCMT ref: 00793713
                                • Part of subcall function 00793698: __flsbuf.LIBCMT ref: 0079372B
                              • __swprintf.LIBCMT ref: 007DC9C4
                              • __swprintf.LIBCMT ref: 007DCA13
                              • __swprintf.LIBCMT ref: 007DCA62
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem__woutput_l_memmove
                              • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                              • API String ID: 3953360268-2428617273
                              • Opcode ID: f775f13d169fbe49274b709c7e3c741aa2fe55804d6c1c80f12510ea9e8a66ec
                              • Instruction ID: 7d112d01e741131b369eb29aa6db0c44eae4bb0ef23fa3d7fe3dcef02cf975e5
                              • Opcode Fuzzy Hash: f775f13d169fbe49274b709c7e3c741aa2fe55804d6c1c80f12510ea9e8a66ec
                              • Instruction Fuzzy Hash: 41A13EB1505305EBCB54EF94C889DAFB7ECFF94740F40492AF599C6251EA38DA08CB62
                              APIs
                              • FindFirstFileW.KERNEL32(?,?,774C8FB0,?,00000000), ref: 007DEFB6
                              • _wcscmp.LIBCMT ref: 007DEFCB
                              • _wcscmp.LIBCMT ref: 007DEFE2
                              • GetFileAttributesW.KERNEL32(?), ref: 007DEFF4
                              • SetFileAttributesW.KERNEL32(?,?), ref: 007DF00E
                              • FindNextFileW.KERNEL32(00000000,?), ref: 007DF026
                              • FindClose.KERNEL32(00000000), ref: 007DF031
                              • FindFirstFileW.KERNEL32(*.*,?), ref: 007DF04D
                              • _wcscmp.LIBCMT ref: 007DF074
                              • _wcscmp.LIBCMT ref: 007DF08B
                              • SetCurrentDirectoryW.KERNEL32(?), ref: 007DF09D
                              • SetCurrentDirectoryW.KERNEL32(00828920), ref: 007DF0BB
                              • FindNextFileW.KERNEL32(00000000,00000010), ref: 007DF0C5
                              • FindClose.KERNEL32(00000000), ref: 007DF0D2
                              • FindClose.KERNEL32(00000000), ref: 007DF0E4
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: Find$File$_wcscmp$Close$AttributesCurrentDirectoryFirstNext
                              • String ID: *.*
                              • API String ID: 1803514871-438819550
                              • Opcode ID: f1d5bec1471d157ceb1559f2c0c774fc2ba573e23c58e797443f186d70a55049
                              • Instruction ID: ed3a7ce059f93b7468768739760e54ae9b315dd05d6bfc0ba109bc33d3f93100
                              • Opcode Fuzzy Hash: f1d5bec1471d157ceb1559f2c0c774fc2ba573e23c58e797443f186d70a55049
                              • Instruction Fuzzy Hash: F931C332501218AADF149BB4EC48BEE77BCAF48360F144177E805D3291DF78DA84CA65
                              APIs
                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 007F0953
                              • RegCreateKeyExW.ADVAPI32(?,?,00000000,007FF910,00000000,?,00000000,?,?), ref: 007F09C1
                              • RegCloseKey.ADVAPI32(00000000,00000001,00000000,00000000,00000000), ref: 007F0A09
                              • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000002,?), ref: 007F0A92
                              • RegCloseKey.ADVAPI32(?), ref: 007F0DB2
                              • RegCloseKey.ADVAPI32(00000000), ref: 007F0DBF
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: Close$ConnectCreateRegistryValue
                              • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                              • API String ID: 536824911-966354055
                              • Opcode ID: 9c5181d4dbd7c0bfa1f14f4fe4ea84b117fb586e43b24e65ef5a4f1708429bea
                              • Instruction ID: a93964cd78a1ebe4c2f4b12b260ed5d98a929e450b8189374b8f970bb985d6ad
                              • Opcode Fuzzy Hash: 9c5181d4dbd7c0bfa1f14f4fe4ea84b117fb586e43b24e65ef5a4f1708429bea
                              • Instruction Fuzzy Hash: 7C022775600605DFCB14EF14C899A2AB7E5EF89324F048458FA999B362DB38EC41CB82
                              APIs
                              • FindFirstFileW.KERNEL32(?,?,774C8FB0,?,00000000), ref: 007DF113
                              • _wcscmp.LIBCMT ref: 007DF128
                              • _wcscmp.LIBCMT ref: 007DF13F
                                • Part of subcall function 007D4385: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 007D43A0
                              • FindNextFileW.KERNEL32(00000000,?), ref: 007DF16E
                              • FindClose.KERNEL32(00000000), ref: 007DF179
                              • FindFirstFileW.KERNEL32(*.*,?), ref: 007DF195
                              • _wcscmp.LIBCMT ref: 007DF1BC
                              • _wcscmp.LIBCMT ref: 007DF1D3
                              • SetCurrentDirectoryW.KERNEL32(?), ref: 007DF1E5
                              • SetCurrentDirectoryW.KERNEL32(00828920), ref: 007DF203
                              • FindNextFileW.KERNEL32(00000000,00000010), ref: 007DF20D
                              • FindClose.KERNEL32(00000000), ref: 007DF21A
                              • FindClose.KERNEL32(00000000), ref: 007DF22C
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: Find$File$_wcscmp$Close$CurrentDirectoryFirstNext$Create
                              • String ID: *.*
                              • API String ID: 1824444939-438819550
                              • Opcode ID: b76649569fdab61c72bb51b26d8f1d6462692045ff67adcebdbef382c97f1d9f
                              • Instruction ID: 767e757224bcf4f7127aad7f73c16c2f8368a0b2e38c071200e48b7be00c6188
                              • Opcode Fuzzy Hash: b76649569fdab61c72bb51b26d8f1d6462692045ff67adcebdbef382c97f1d9f
                              • Instruction Fuzzy Hash: C331F83650121DAADF109F74EC49EEE77BCAF49360F104176E811E2290DB39DE85CA58
                              APIs
                              • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 007DA20F
                              • __swprintf.LIBCMT ref: 007DA231
                              • CreateDirectoryW.KERNEL32(?,00000000), ref: 007DA26E
                              • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 007DA293
                              • _memset.LIBCMT ref: 007DA2B2
                              • _wcsncpy.LIBCMT ref: 007DA2EE
                              • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 007DA323
                              • CloseHandle.KERNEL32(00000000), ref: 007DA32E
                              • RemoveDirectoryW.KERNEL32(?), ref: 007DA337
                              • CloseHandle.KERNEL32(00000000), ref: 007DA341
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove__swprintf_memset_wcsncpy
                              • String ID: :$\$\??\%s
                              • API String ID: 2733774712-3457252023
                              • Opcode ID: 253c2dd9b541a98fa3f148825a6923f6e72ef00464b928183ab61445a6d799ad
                              • Instruction ID: b1875e2c65bad0c2839bd8bb753f17d8aa6b598237da301788d189a1e85391c1
                              • Opcode Fuzzy Hash: 253c2dd9b541a98fa3f148825a6923f6e72ef00464b928183ab61445a6d799ad
                              • Instruction Fuzzy Hash: 82318DB290010ABBDB219FA0DC49FEB37BDBF89740F1441B6F508D2260EB7896458B25
                              APIs
                                • Part of subcall function 007C8202: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 007C821E
                                • Part of subcall function 007C8202: GetLastError.KERNEL32(?,007C7CE2,?,?,?), ref: 007C8228
                                • Part of subcall function 007C8202: GetProcessHeap.KERNEL32(00000008,?,?,007C7CE2,?,?,?), ref: 007C8237
                                • Part of subcall function 007C8202: HeapAlloc.KERNEL32(00000000,?,007C7CE2,?,?,?), ref: 007C823E
                                • Part of subcall function 007C8202: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 007C8255
                                • Part of subcall function 007C829F: GetProcessHeap.KERNEL32(00000008,007C7CF8,00000000,00000000,?,007C7CF8,?), ref: 007C82AB
                                • Part of subcall function 007C829F: HeapAlloc.KERNEL32(00000000,?,007C7CF8,?), ref: 007C82B2
                                • Part of subcall function 007C829F: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,007C7CF8,?), ref: 007C82C3
                              • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 007C7D13
                              • _memset.LIBCMT ref: 007C7D28
                              • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 007C7D47
                              • GetLengthSid.ADVAPI32(?), ref: 007C7D58
                              • GetAce.ADVAPI32(?,00000000,?), ref: 007C7D95
                              • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 007C7DB1
                              • GetLengthSid.ADVAPI32(?), ref: 007C7DCE
                              • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 007C7DDD
                              • HeapAlloc.KERNEL32(00000000), ref: 007C7DE4
                              • GetLengthSid.ADVAPI32(?,00000008,?), ref: 007C7E05
                              • CopySid.ADVAPI32(00000000), ref: 007C7E0C
                              • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 007C7E3D
                              • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 007C7E63
                              • SetUserObjectSecurity.USER32(?,00000004,?), ref: 007C7E77
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                              • String ID:
                              • API String ID: 3996160137-0
                              • Opcode ID: 2c390b63bed6fe76e17e71cda038039f840b8b943f155224a0c5425134ee0675
                              • Instruction ID: f040cafa3a7cecf087354954febe31d616fba7c2751a9f33f475f5d458f8f7ad
                              • Opcode Fuzzy Hash: 2c390b63bed6fe76e17e71cda038039f840b8b943f155224a0c5425134ee0675
                              • Instruction Fuzzy Hash: B5610871904209EBDF149FA4DC89EAEBBB9FF04300F04816DE915A6291DF399A15CB64
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID:
                              • String ID: 3cx$ANY)$ANYCRLF)$BSR_ANYCRLF)$BSR_UNICODE)$CR)$CRLF)$LF)$LIMIT_MATCH=$LIMIT_RECURSION=$NO_AUTO_POSSESS)$NO_START_OPT)$UCP)$UTF)$UTF16)$_x
                              • API String ID: 0-379136436
                              • Opcode ID: f19e360eb7c2fd155cdb60221cd23ee4a3de16c144d4e71fe6f5ce76de3596d9
                              • Instruction ID: fcc751f5f26307c1ccb2e23c008d684cd1ad5baa0728df45b71086a1ba0a8e0c
                              • Opcode Fuzzy Hash: f19e360eb7c2fd155cdb60221cd23ee4a3de16c144d4e71fe6f5ce76de3596d9
                              • Instruction Fuzzy Hash: B47272B5E00219DBDB14DF58D840BADB7B5FF45310F64816EE945EB281EB389D81CB90
                              APIs
                              • GetKeyboardState.USER32(?), ref: 007D0097
                              • SetKeyboardState.USER32(?), ref: 007D0102
                              • GetAsyncKeyState.USER32(000000A0), ref: 007D0122
                              • GetKeyState.USER32(000000A0), ref: 007D0139
                              • GetAsyncKeyState.USER32(000000A1), ref: 007D0168
                              • GetKeyState.USER32(000000A1), ref: 007D0179
                              • GetAsyncKeyState.USER32(00000011), ref: 007D01A5
                              • GetKeyState.USER32(00000011), ref: 007D01B3
                              • GetAsyncKeyState.USER32(00000012), ref: 007D01DC
                              • GetKeyState.USER32(00000012), ref: 007D01EA
                              • GetAsyncKeyState.USER32(0000005B), ref: 007D0213
                              • GetKeyState.USER32(0000005B), ref: 007D0221
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: State$Async$Keyboard
                              • String ID:
                              • API String ID: 541375521-0
                              • Opcode ID: f9029c82fbb16a0771f770f871ae0b25f3e76479631fbb8582f67147459a8185
                              • Instruction ID: ebfce6fbbcec03e3e2cc9e528c671a65062937ddb5c283f63ad9bc5518cff744
                              • Opcode Fuzzy Hash: f9029c82fbb16a0771f770f871ae0b25f3e76479631fbb8582f67147459a8185
                              • Instruction Fuzzy Hash: C151EA2090478869FB35DBA088547EABFB49F01380F48559FD5C6577C2DAAC9B8CC7E2
                              APIs
                                • Part of subcall function 007F0E1A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,007EFDAD,?,?), ref: 007F0E31
                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 007F04AC
                                • Part of subcall function 00779837: __itow.LIBCMT ref: 00779862
                                • Part of subcall function 00779837: __swprintf.LIBCMT ref: 007798AC
                              • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 007F054B
                              • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 007F05E3
                              • RegCloseKey.ADVAPI32(000000FE,000000FE,00000000,?,00000000), ref: 007F0822
                              • RegCloseKey.ADVAPI32(00000000), ref: 007F082F
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: CloseQueryValue$BuffCharConnectRegistryUpper__itow__swprintf
                              • String ID:
                              • API String ID: 1240663315-0
                              • Opcode ID: 6f021dc88134c2b0b623e802776c6d12d555f455e801128b02e2a386ebceabb2
                              • Instruction ID: d2d30649936869087787052b10adad7b566c57645d2a345d72f7909567ccab7a
                              • Opcode Fuzzy Hash: 6f021dc88134c2b0b623e802776c6d12d555f455e801128b02e2a386ebceabb2
                              • Instruction Fuzzy Hash: D3E13C71604204EFCB14DF28C895E2ABBE5EF89754F04C56DF94ADB362DA34E901CB92
                              APIs
                                • Part of subcall function 00779837: __itow.LIBCMT ref: 00779862
                                • Part of subcall function 00779837: __swprintf.LIBCMT ref: 007798AC
                              • CoInitialize.OLE32 ref: 007E8403
                              • CoUninitialize.OLE32 ref: 007E840E
                              • CoCreateInstance.OLE32(?,00000000,00000017,00802BEC,?), ref: 007E846E
                              • IIDFromString.OLE32(?,?), ref: 007E84E1
                              • VariantInit.OLEAUT32(?), ref: 007E857B
                              • VariantClear.OLEAUT32(?), ref: 007E85DC
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize__itow__swprintf
                              • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                              • API String ID: 834269672-1287834457
                              • Opcode ID: d5f271ae993c49b70e47258260eec4f5506abb1a04fd9b647f55142410ef7f91
                              • Instruction ID: c6761ed711046fa877734a61e8a4c3364d19e8950a420f9d10f5707ba1d2e5b5
                              • Opcode Fuzzy Hash: d5f271ae993c49b70e47258260eec4f5506abb1a04fd9b647f55142410ef7f91
                              • Instruction Fuzzy Hash: 1661897060A392DFCB50DF15C848A6ABBE8EF4A754F044419F9899B291CF78ED44CB93
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                              • String ID:
                              • API String ID: 1737998785-0
                              • Opcode ID: 672c4fa778bedc81e5a698f4a7945068b6ffc2a8e2b6f45f87b7e4191ef4bf90
                              • Instruction ID: aab64edd3a7d284fecdc3578ce18aa6d1ff46dfaffabedf224bcc36c7fe54b8d
                              • Opcode Fuzzy Hash: 672c4fa778bedc81e5a698f4a7945068b6ffc2a8e2b6f45f87b7e4191ef4bf90
                              • Instruction Fuzzy Hash: D4216D352012149FDB10AF65EC49B6E7BA8FF49751F10C02AFA46DB2A1DF38A801CB59
                              APIs
                                • Part of subcall function 00774750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00774743,?,?,007737AE,?), ref: 00774770
                                • Part of subcall function 007D4A31: GetFileAttributesW.KERNEL32(?,007D370B), ref: 007D4A32
                              • FindFirstFileW.KERNEL32(?,?), ref: 007D38A3
                              • DeleteFileW.KERNEL32(?,?,00000000,?,?,?,?), ref: 007D394B
                              • MoveFileW.KERNEL32(?,?), ref: 007D395E
                              • DeleteFileW.KERNEL32(?,?,?,?,?), ref: 007D397B
                              • FindNextFileW.KERNEL32(00000000,00000010), ref: 007D399D
                              • FindClose.KERNEL32(00000000,?,?,?,?), ref: 007D39B9
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: File$Find$Delete$AttributesCloseFirstFullMoveNameNextPath
                              • String ID: \*.*
                              • API String ID: 4002782344-1173974218
                              • Opcode ID: adcd179e2c9b2d6bf7cf855c7a94895f84b91962d6c79a1d9a5ab3c20cc2e84e
                              • Instruction ID: 0966ae52eb0e30d80791a639b53b11054c5cc0a45ec45a02c71431c209e5ffbc
                              • Opcode Fuzzy Hash: adcd179e2c9b2d6bf7cf855c7a94895f84b91962d6c79a1d9a5ab3c20cc2e84e
                              • Instruction Fuzzy Hash: 2D51A23180514DEACF05EBA0C9969FDB778AF15344F60806AE40AB7291EF796F0DCB61
                              APIs
                                • Part of subcall function 00777DE1: _memmove.LIBCMT ref: 00777E22
                              • FindFirstFileW.KERNEL32(?,?,*.*,?,?,00000000,00000000), ref: 007DF440
                              • Sleep.KERNEL32(0000000A), ref: 007DF470
                              • _wcscmp.LIBCMT ref: 007DF484
                              • _wcscmp.LIBCMT ref: 007DF49F
                              • FindNextFileW.KERNEL32(?,?), ref: 007DF53D
                              • FindClose.KERNEL32(00000000), ref: 007DF553
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: Find$File_wcscmp$CloseFirstNextSleep_memmove
                              • String ID: *.*
                              • API String ID: 713712311-438819550
                              • Opcode ID: 7bb8946752dc6f99f3c7a5cc976c1a79fc5ce63ed7e05ae91f88ca93d42d74b2
                              • Instruction ID: 565d896314ed7063ec4a0bc0bd190c338bb9a871d924c7ae1a55c9e0daedc5a6
                              • Opcode Fuzzy Hash: 7bb8946752dc6f99f3c7a5cc976c1a79fc5ce63ed7e05ae91f88ca93d42d74b2
                              • Instruction Fuzzy Hash: 80415E7190025ADFCF14DF64DC49AEEBBB4FF05310F148466E81AA2291DB389A94CF50
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: __itow__swprintf
                              • String ID: 3cx$_x
                              • API String ID: 674341424-2911194521
                              • Opcode ID: 2a2bbe785874149d32f3aa8de859647c553232939f6eb37d337d7450ca8db522
                              • Instruction ID: 0183a543d2b433bbf0050ce97feb850c25bec2f5410f90a0985babe6f354f6dc
                              • Opcode Fuzzy Hash: 2a2bbe785874149d32f3aa8de859647c553232939f6eb37d337d7450ca8db522
                              • Instruction Fuzzy Hash: 3222A071608340DFDB24EF18C885BAEB7E5BF84B10F10492DF59A97291DB79E904CB92
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: _memmove
                              • String ID:
                              • API String ID: 4104443479-0
                              • Opcode ID: 14027d0920ca04e5b943cc17123050c34a8bc42370c601dfb0aa6fbd6363bfc1
                              • Instruction ID: b6dc4daafa62c883334ee461538b640c05d0604cc1ca78ca8dd62468d775cde6
                              • Opcode Fuzzy Hash: 14027d0920ca04e5b943cc17123050c34a8bc42370c601dfb0aa6fbd6363bfc1
                              • Instruction Fuzzy Hash: 04128A70A00609DFDF14EFA5D985AAEB7F5FF48310F108529E44AE7250EB39AD21CB91
                              APIs
                                • Part of subcall function 00774750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00774743,?,?,007737AE,?), ref: 00774770
                                • Part of subcall function 007D4A31: GetFileAttributesW.KERNEL32(?,007D370B), ref: 007D4A32
                              • FindFirstFileW.KERNEL32(?,?), ref: 007D3B89
                              • DeleteFileW.KERNEL32(?,?,?,?), ref: 007D3BD9
                              • FindNextFileW.KERNEL32(00000000,00000010), ref: 007D3BEA
                              • FindClose.KERNEL32(00000000), ref: 007D3C01
                              • FindClose.KERNEL32(00000000), ref: 007D3C0A
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                              • String ID: \*.*
                              • API String ID: 2649000838-1173974218
                              • Opcode ID: e87e0aa58e860f480efb8d12b0ff938d7231956163af08977e3c748435b67ac0
                              • Instruction ID: b7fb4afc3a94c9204528778af365e23f974ca067e7e8a8c3c499ac2965965f28
                              • Opcode Fuzzy Hash: e87e0aa58e860f480efb8d12b0ff938d7231956163af08977e3c748435b67ac0
                              • Instruction Fuzzy Hash: 5F31A431008385DBC705EF64C8998AFB7B8BE95314F408D2EF4D992291EB28DA08C767
                              APIs
                                • Part of subcall function 007C87E1: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 007C882B
                                • Part of subcall function 007C87E1: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 007C8858
                                • Part of subcall function 007C87E1: GetLastError.KERNEL32 ref: 007C8865
                              • ExitWindowsEx.USER32(?,00000000), ref: 007D51F9
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                              • String ID: $@$SeShutdownPrivilege
                              • API String ID: 2234035333-194228
                              • Opcode ID: cec1815e35e4de408385ba3217cae71218a34343b59a8e8ec0da87463e4d5bba
                              • Instruction ID: b000cc32717ab616c4c2b52b7301abf49e1a463cd8daa55e8aabbc40455fb4e7
                              • Opcode Fuzzy Hash: cec1815e35e4de408385ba3217cae71218a34343b59a8e8ec0da87463e4d5bba
                              • Instruction Fuzzy Hash: D801F7B1791615ABF7286268AC8BFBB7378FB04340F24042BF913E22D2DD5D3C048594
                              APIs
                              • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 007E62DC
                              • WSAGetLastError.WSOCK32(00000000), ref: 007E62EB
                              • bind.WSOCK32(00000000,?,00000010), ref: 007E6307
                              • listen.WSOCK32(00000000,00000005), ref: 007E6316
                              • WSAGetLastError.WSOCK32(00000000), ref: 007E6330
                              • closesocket.WSOCK32(00000000,00000000), ref: 007E6344
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: ErrorLast$bindclosesocketlistensocket
                              • String ID:
                              • API String ID: 1279440585-0
                              • Opcode ID: 0c31669aff459ca4aabfe96efe6c661ee62976e32f6b2a18c5979c00c01243fd
                              • Instruction ID: 302ab7d317571c48f008f28a1c90f7a24e3a37ce191507535c14c4e03014aaeb
                              • Opcode Fuzzy Hash: 0c31669aff459ca4aabfe96efe6c661ee62976e32f6b2a18c5979c00c01243fd
                              • Instruction Fuzzy Hash: 8A219E716012049FCB10EF64DC89B7EB7E9EF49760F148159E926A7391CB78AD01CB51
                              APIs
                              • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 007C85E2
                              • OpenProcessToken.ADVAPI32(00000000), ref: 007C85E9
                              • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 007C85F8
                              • CloseHandle.KERNEL32(00000004), ref: 007C8603
                              • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 007C8632
                              • DestroyEnvironmentBlock.USERENV(00000000), ref: 007C8646
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                              • String ID:
                              • API String ID: 1413079979-0
                              • Opcode ID: eaa3aaa319b68d93421b42b4f342df5a8036cac5934ebf317beb9901dd5b66c6
                              • Instruction ID: 471fa612b16fe38595f219bcb55c22f1896bf492bf9070af8c0cff1c1365f990
                              • Opcode Fuzzy Hash: eaa3aaa319b68d93421b42b4f342df5a8036cac5934ebf317beb9901dd5b66c6
                              • Instruction Fuzzy Hash: 9A113A72501149AFDF019FA4ED48FEE7BA9EF48304F044069F905A2161CA7A8D60EB25
                              APIs
                                • Part of subcall function 00790DB6: std::exception::exception.LIBCMT ref: 00790DEC
                                • Part of subcall function 00790DB6: __CxxThrowException@8.LIBCMT ref: 00790E01
                              • _memmove.LIBCMT ref: 007C0258
                              • _memmove.LIBCMT ref: 007C036D
                              • _memmove.LIBCMT ref: 007C0414
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: _memmove$Exception@8Throwstd::exception::exception
                              • String ID:
                              • API String ID: 1300846289-0
                              • Opcode ID: 47df60d8b53ea4bfabc34dfd93443b0c9a5c453806aae777f855e901eb748bfe
                              • Instruction ID: ded15265678778bf4354f95f27072986db6e4127980eefe37af54f4fa044aaa0
                              • Opcode Fuzzy Hash: 47df60d8b53ea4bfabc34dfd93443b0c9a5c453806aae777f855e901eb748bfe
                              • Instruction Fuzzy Hash: 3D028EB0A00209DFCF04EF64D985AAEBBB5FF44310F54806DE80ADB255EB39DA55CB91
                              APIs
                                • Part of subcall function 00772612: GetWindowLongW.USER32(?,000000EB), ref: 00772623
                              • DefDlgProcW.USER32(?,?,?,?,?), ref: 007719FA
                              • GetSysColor.USER32(0000000F), ref: 00771A4E
                              • SetBkColor.GDI32(?,00000000), ref: 00771A61
                                • Part of subcall function 00771290: DefDlgProcW.USER32(?,00000020,?), ref: 007712D8
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: ColorProc$LongWindow
                              • String ID:
                              • API String ID: 3744519093-0
                              • Opcode ID: 80ee62c8752979ad9c4d4a3822eea43ff1c0938f1392bcabdc95518b3a71c6ef
                              • Instruction ID: 2a21beb0ca55b1cc304e7620cc7b8151d9fb860f105c5572804d84871da0e95e
                              • Opcode Fuzzy Hash: 80ee62c8752979ad9c4d4a3822eea43ff1c0938f1392bcabdc95518b3a71c6ef
                              • Instruction Fuzzy Hash: FEA13B71106588FADE28AB3C8C48D7F265DEF823C1B95C619F60AD6193DA2CED01D7B1
                              APIs
                              • FindFirstFileW.KERNEL32(?,?), ref: 007DBCE6
                              • _wcscmp.LIBCMT ref: 007DBD16
                              • _wcscmp.LIBCMT ref: 007DBD2B
                              • FindNextFileW.KERNEL32(00000000,?), ref: 007DBD3C
                              • FindClose.KERNEL32(00000000,00000001,00000000), ref: 007DBD6C
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: Find$File_wcscmp$CloseFirstNext
                              • String ID:
                              • API String ID: 2387731787-0
                              • Opcode ID: ace2f1e7a5cc13442cb115d979b7cb08feef99dfd67980f7595dce24d56b7149
                              • Instruction ID: 96c1159cd340b1a060085e7ba1d9b7fe8d5d29d2ce198dacfa90b2902434d11b
                              • Opcode Fuzzy Hash: ace2f1e7a5cc13442cb115d979b7cb08feef99dfd67980f7595dce24d56b7149
                              • Instruction Fuzzy Hash: 84518835604602DFCB18DF28D494EAAB3F5EF49320F11865EE95A873A1DB38ED04CB91
                              APIs
                                • Part of subcall function 007E7D8B: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 007E7DB6
                              • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 007E679E
                              • WSAGetLastError.WSOCK32(00000000), ref: 007E67C7
                              • bind.WSOCK32(00000000,?,00000010), ref: 007E6800
                              • WSAGetLastError.WSOCK32(00000000), ref: 007E680D
                              • closesocket.WSOCK32(00000000,00000000), ref: 007E6821
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: ErrorLast$bindclosesocketinet_addrsocket
                              • String ID:
                              • API String ID: 99427753-0
                              • Opcode ID: 8a5dd30803ceb405901be345e92434887da1029b9e4b76f6a47342aacad6e879
                              • Instruction ID: 47a112468b3bd2bf6381d90df28a8f8e02947f739733952d5718e5a4bbf5994e
                              • Opcode Fuzzy Hash: 8a5dd30803ceb405901be345e92434887da1029b9e4b76f6a47342aacad6e879
                              • Instruction Fuzzy Hash: A9419175B40210AFDF50AF248C8AF7E77E89F09794F04C458FA19AB3D2DA789D008792
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: Window$EnabledForegroundIconicVisibleZoomed
                              • String ID:
                              • API String ID: 292994002-0
                              • Opcode ID: fdd716a638ff44b273841720a5f1fda5b64b3788bbf90de233aa5be505a1eeee
                              • Instruction ID: 0ce91cb9c1564a5b179464a8c2279ce7425f0bc7f1052f233cae9e198e0ed7cb
                              • Opcode Fuzzy Hash: fdd716a638ff44b273841720a5f1fda5b64b3788bbf90de233aa5be505a1eeee
                              • Instruction Fuzzy Hash: E511B231300A19AFDB216F2ADC88B7EBB99EF457A5B508029FA45D3341CF789C01C6A5
                              APIs
                              • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 007C80C0
                              • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 007C80CA
                              • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 007C80D9
                              • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 007C80E0
                              • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 007C80F6
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: HeapInformationToken$AllocErrorLastProcess
                              • String ID:
                              • API String ID: 44706859-0
                              • Opcode ID: 21a337cf1c4f30ac37b788f1598c981dae17a366169b600bf23cd5637a72ef12
                              • Instruction ID: 6525c2eb6b5248c780a579eb759a9fa6500cf01618108e30373ded09378fe284
                              • Opcode Fuzzy Hash: 21a337cf1c4f30ac37b788f1598c981dae17a366169b600bf23cd5637a72ef12
                              • Instruction Fuzzy Hash: DCF03731240208AFEB101FA5EC89E7B3BACEF89755B14402DF949C6250CF699C42DA65
                              APIs
                              • LoadLibraryA.KERNEL32(kernel32.dll,?,00774AD0), ref: 00774B45
                              • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00774B57
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: AddressLibraryLoadProc
                              • String ID: GetNativeSystemInfo$kernel32.dll
                              • API String ID: 2574300362-192647395
                              • Opcode ID: 4575a30917675a6be534d26a65f6c719e3c8b1a47339376623eccc6632cc861c
                              • Instruction ID: 56b233a92ae12332fcf90e93757f43945e0c72f0efb500c7e04e0a0eb951ea17
                              • Opcode Fuzzy Hash: 4575a30917675a6be534d26a65f6c719e3c8b1a47339376623eccc6632cc861c
                              • Instruction Fuzzy Hash: C9D012B4A1071BDFDB209F31D858B1676E5AF05395B11C839D485D6260DB78D880C659
                              APIs
                              • CreateToolhelp32Snapshot.KERNEL32 ref: 007EEE3D
                              • Process32FirstW.KERNEL32(00000000,?), ref: 007EEE4B
                                • Part of subcall function 00777DE1: _memmove.LIBCMT ref: 00777E22
                              • Process32NextW.KERNEL32(00000000,?), ref: 007EEF0B
                              • CloseHandle.KERNEL32(00000000,?,?,?), ref: 007EEF1A
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32_memmove
                              • String ID:
                              • API String ID: 2576544623-0
                              • Opcode ID: 42addb853e0d8ef573298e7c0596635683aa288dd0213a43c0c8358d1fede334
                              • Instruction ID: 9438a2088cad2976d39f01af5a5f1c60123d50cd8df6902a084f84954a8575d7
                              • Opcode Fuzzy Hash: 42addb853e0d8ef573298e7c0596635683aa288dd0213a43c0c8358d1fede334
                              • Instruction Fuzzy Hash: C5519071505301EFD710EF20DC89E6BB7E8EF88750F10882DF599972A1EB74A904CB92
                              APIs
                              • lstrlenW.KERNEL32(?,?,?,00000000), ref: 007CE628
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: lstrlen
                              • String ID: ($|
                              • API String ID: 1659193697-1631851259
                              • Opcode ID: 4e542efd44914975773cd0938fbb663d053a85d36b588e3675198cce6df6dcc2
                              • Instruction ID: 188b0e6c90b0dec1be6791fe76d07de799862581fee848857a571c4a6afb85a5
                              • Opcode Fuzzy Hash: 4e542efd44914975773cd0938fbb663d053a85d36b588e3675198cce6df6dcc2
                              • Instruction Fuzzy Hash: 26321275A006059FDB28CF19C481E6AB7F1FF48320B15C46EE89ADB3A1E774E941CB40
                              APIs
                              • InternetQueryDataAvailable.WININET(00000001,?,00000000,00000000,00000000,?,?,?,?,?,?,?,?,007E180A,00000000), ref: 007E23E1
                              • InternetReadFile.WININET(00000001,00000000,00000001,00000001), ref: 007E2418
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: Internet$AvailableDataFileQueryRead
                              • String ID:
                              • API String ID: 599397726-0
                              • Opcode ID: 894da0456767ed0026125d5b1c23cde0d3608160d6f12059f65000d72daa544a
                              • Instruction ID: 36e13ae57a235ab0c64e8c08a18199f415ee72bc8a6b563615b3ad2e5e311946
                              • Opcode Fuzzy Hash: 894da0456767ed0026125d5b1c23cde0d3608160d6f12059f65000d72daa544a
                              • Instruction Fuzzy Hash: D641F871505289FFEF10DE96DC85EBBB7BCEB49314F10402AF601A6182DA7C9E429A60
                              APIs
                              • SetErrorMode.KERNEL32(00000001), ref: 007DB343
                              • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 007DB39D
                              • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 007DB3EA
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: ErrorMode$DiskFreeSpace
                              • String ID:
                              • API String ID: 1682464887-0
                              • Opcode ID: d2230cb0f459cd90547eb4d7fbf2804f9bf7954f30ea937271a5c2ee1660b049
                              • Instruction ID: 75e7aa365aa2d73fec1536b1735f9321fffdab0523bab277042d2e066fda7fd1
                              • Opcode Fuzzy Hash: d2230cb0f459cd90547eb4d7fbf2804f9bf7954f30ea937271a5c2ee1660b049
                              • Instruction Fuzzy Hash: 1B216035A00208EFCF00EFA5D885EEDBBB8FF49310F1480AAE905AB351CB35A915CB51
                              APIs
                                • Part of subcall function 00790DB6: std::exception::exception.LIBCMT ref: 00790DEC
                                • Part of subcall function 00790DB6: __CxxThrowException@8.LIBCMT ref: 00790E01
                              • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 007C882B
                              • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 007C8858
                              • GetLastError.KERNEL32 ref: 007C8865
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: AdjustErrorException@8LastLookupPrivilegePrivilegesThrowTokenValuestd::exception::exception
                              • String ID:
                              • API String ID: 1922334811-0
                              • Opcode ID: fbc3ea18c3d8f34f557b87780ca65b75e378d052f1bf5849d03fb3d07190880e
                              • Instruction ID: b009e0edbcdb026298642043db985ec89bf12de0c6cfd3bc5e6888e359c09156
                              • Opcode Fuzzy Hash: fbc3ea18c3d8f34f557b87780ca65b75e378d052f1bf5849d03fb3d07190880e
                              • Instruction Fuzzy Hash: D0116DB2524204AFEB18EFA4EC85D6BB7E8EF44711B20852EE45597641EE34AC408B64
                              APIs
                              • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 007C8774
                              • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 007C878B
                              • FreeSid.ADVAPI32(?), ref: 007C879B
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: AllocateCheckFreeInitializeMembershipToken
                              • String ID:
                              • API String ID: 3429775523-0
                              • Opcode ID: 549869dc768664127715495444dd74abfa23099c17e59df42ac4f3f376957e90
                              • Instruction ID: 4abe0cd0465b9e334d9de0180e1ad739ba93d10267e3c16081230bc2e1dbf58d
                              • Opcode Fuzzy Hash: 549869dc768664127715495444dd74abfa23099c17e59df42ac4f3f376957e90
                              • Instruction Fuzzy Hash: B5F03775A11208BBDB00DFE49C89ABEBBB8EF08201F1084A9E901E2181EA756A048B54
                              APIs
                              • mouse_event.USER32(00000800,00000000,00000000,00000088,00000000), ref: 007D4CB3
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: mouse_event
                              • String ID: DOWN
                              • API String ID: 2434400541-711622031
                              • Opcode ID: d07fb7dc2626e21f39d9a6c4ae59e91ee80921249938be4de2f9a06e58f2dfd3
                              • Instruction ID: 4e05246e3d0c323d928b0989a9e78af9c5a17fb68a6e77866066452795fb8b95
                              • Opcode Fuzzy Hash: d07fb7dc2626e21f39d9a6c4ae59e91ee80921249938be4de2f9a06e58f2dfd3
                              • Instruction Fuzzy Hash: 77E04F221A973179A9143618FC0BEF7075C8B163317500107F814D52C1EDAC1C8268B8
                              APIs
                              • FindFirstFileW.KERNEL32(?,?), ref: 007DC6FB
                              • FindClose.KERNEL32(00000000), ref: 007DC72B
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: Find$CloseFileFirst
                              • String ID:
                              • API String ID: 2295610775-0
                              • Opcode ID: bf773fc2bb9e2ff52a38167626abd7fcddae4ddc1f7911ed93f205057b6741d2
                              • Instruction ID: 387d841fc0efa7affcdbd4ffe89811c0ae7e739046711292b4bb058a757c5300
                              • Opcode Fuzzy Hash: bf773fc2bb9e2ff52a38167626abd7fcddae4ddc1f7911ed93f205057b6741d2
                              • Instruction Fuzzy Hash: EF115E726006049FDB10DF29D889A2AF7E9FF85364F10C55EF9A9D7391DB34A805CB81
                              APIs
                              • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,00000016,?,007E9468,?,007FFB84,?), ref: 007DA097
                              • FormatMessageW.KERNEL32(00001000,00000000,000000FF,00000000,?,00000FFF,00000000,00000016,?,007E9468,?,007FFB84,?), ref: 007DA0A9
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: ErrorFormatLastMessage
                              • String ID:
                              • API String ID: 3479602957-0
                              • Opcode ID: 0d195a93ca4c69f14ce18bd18f90079dc16cb606c2cece29c4d8da9d082feb63
                              • Instruction ID: dfa0cdc34d471cb12f005443c68b2090be4cf74f6621e4910aa2a6c53abbf221
                              • Opcode Fuzzy Hash: 0d195a93ca4c69f14ce18bd18f90079dc16cb606c2cece29c4d8da9d082feb63
                              • Instruction Fuzzy Hash: 14F0823510522DBBDB21AFA4CC48FEA776CBF09361F008266F909D6281DA749940CBA1
                              APIs
                              • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,007C8309), ref: 007C81E0
                              • CloseHandle.KERNEL32(?,?,007C8309), ref: 007C81F2
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: AdjustCloseHandlePrivilegesToken
                              • String ID:
                              • API String ID: 81990902-0
                              • Opcode ID: f2226e4c000a73a893866d16b387b5459f25181b4704a962ea729313ebd9e674
                              • Instruction ID: 87b7ae839e3573bc53dd2ffadacf8d700bded5a427f203ee3b47b8220684c0bf
                              • Opcode Fuzzy Hash: f2226e4c000a73a893866d16b387b5459f25181b4704a962ea729313ebd9e674
                              • Instruction Fuzzy Hash: F9E0B672010611EFEB256B74FC09E777BEAEF04310714882DF8A684470DB66AC91DB54
                              APIs
                              • SetUnhandledExceptionFilter.KERNEL32(00000000,?,00798D57,?,?,?,00000001), ref: 0079A15A
                              • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 0079A163
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: ExceptionFilterUnhandled
                              • String ID:
                              • API String ID: 3192549508-0
                              • Opcode ID: d2882755e8b234ae5a54a142f587dca1eb44d4e36a135d99b909151ca8de2e2c
                              • Instruction ID: c86c6c654cecb55e989d2ed6a0d9d28f5884f137ee333d914fb3f5f45bd488ef
                              • Opcode Fuzzy Hash: d2882755e8b234ae5a54a142f587dca1eb44d4e36a135d99b909151ca8de2e2c
                              • Instruction Fuzzy Hash: CEB09231054208ABCA102B91EC09BA83F6AEF44AA2F408020F60D84060CF665450CA99
                              Strings
                              • Variable must be of type 'Object'., xrefs: 007B3E62
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID:
                              • String ID: Variable must be of type 'Object'.
                              • API String ID: 0-109567571
                              • Opcode ID: dea78afb0911082dbfe3e03ed43e2f91e052f6d630aa93417d311dbbbdb7a47b
                              • Instruction ID: ee272409c1cab71c52e39e260af17278300ff90cf9e6f057e8995d43ffc44fed
                              • Opcode Fuzzy Hash: dea78afb0911082dbfe3e03ed43e2f91e052f6d630aa93417d311dbbbdb7a47b
                              • Instruction Fuzzy Hash: 70A28B75A00205DFCF24CF58C484AAAB7B2FF59354F24C4A9E909AB351D778ED82CB91
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 8953b4374d1d07391f760557d2521c65e1584041f02bd12fc3150cc07b2e79ca
                              • Instruction ID: 48e7437fa3ddd27d03019f5173058f2750e562cc6e5fac2a78353e6a5359f069
                              • Opcode Fuzzy Hash: 8953b4374d1d07391f760557d2521c65e1584041f02bd12fc3150cc07b2e79ca
                              • Instruction Fuzzy Hash: 4E32F362D29F414DDB639634D832336A249BFB73E4F15D737E81AF5AA6EB28D4834100
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: c47d9014470771eb7955be7751e5871602dd9ced32511ec4af770dc3541a0841
                              • Instruction ID: 9622312bd94ac6a29c914c16658c38bd3af033241984f4b34756a0e8da0be9aa
                              • Opcode Fuzzy Hash: c47d9014470771eb7955be7751e5871602dd9ced32511ec4af770dc3541a0841
                              • Instruction Fuzzy Hash: 65B10F21E2AF404DD36796398831336BA5CBFBB6D5F52D71BFC2670E62EB2185834141
                              APIs
                              • __time64.LIBCMT ref: 007D889B
                                • Part of subcall function 0079520A: GetSystemTimeAsFileTime.KERNEL32(00000000,?,?,?,007D8F6E,00000000,?,?,?,?,007D911F,00000000,?), ref: 00795213
                                • Part of subcall function 0079520A: __aulldiv.LIBCMT ref: 00795233
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: Time$FileSystem__aulldiv__time64
                              • String ID:
                              • API String ID: 2893107130-0
                              • Opcode ID: 23878dd2747311df4e5467e7d60cc499202872ecaa5bf7b2b8d6ef3ec75a9aea
                              • Instruction ID: 7a4a5d24e1447aefeef7574ab645a2fe5511c94ec55a953401e1cda3447ff098
                              • Opcode Fuzzy Hash: 23878dd2747311df4e5467e7d60cc499202872ecaa5bf7b2b8d6ef3ec75a9aea
                              • Instruction Fuzzy Hash: 1A21AF72635610CBC729CF29D841A52B3E1EBA5311B688E6DE1F5CB2C0DA38B905DB94
                              APIs
                              • LogonUserW.ADVAPI32(?,00000001,?,?,00000000,007C8389), ref: 007C87D1
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: LogonUser
                              • String ID:
                              • API String ID: 1244722697-0
                              • Opcode ID: ada548a1507e9b155c22a6f4f9225892dc479a249dd38c11ed93de64c7a4e4f4
                              • Instruction ID: a7069c5790cca633f56aa038a197fbdb5761d4cb84eda0dc98882d36bf7f040c
                              • Opcode Fuzzy Hash: ada548a1507e9b155c22a6f4f9225892dc479a249dd38c11ed93de64c7a4e4f4
                              • Instruction Fuzzy Hash: ECD05E3226050EABEF018EA4DC01EBE3B69EB04B01F408111FE15C50A1CB75D835EB60
                              APIs
                              • SetUnhandledExceptionFilter.KERNEL32(?), ref: 0079A12A
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: ExceptionFilterUnhandled
                              • String ID:
                              • API String ID: 3192549508-0
                              • Opcode ID: 199bae77c952c1063dca6b289d8a7823840934d806520333e2c57c1031870e58
                              • Instruction ID: f5fcb1f8bf6b5f1228b8e4defa6afb61b61419c6b4a8142c82eb532e1c40cd3e
                              • Opcode Fuzzy Hash: 199bae77c952c1063dca6b289d8a7823840934d806520333e2c57c1031870e58
                              • Instruction Fuzzy Hash: BCA0113000020CABCA002B82EC088A8BFAEEE002A0B008020F80C800228B32A8208A88
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 2c36556ab628d87c6347623b62e62b0cff497d2ad22b32a81ecfbccfdd55f1f0
                              • Instruction ID: 44c535d6af7408af062e1b0f312500e5d420fb045d2c765334adb914a1ddd784
                              • Opcode Fuzzy Hash: 2c36556ab628d87c6347623b62e62b0cff497d2ad22b32a81ecfbccfdd55f1f0
                              • Instruction Fuzzy Hash: E2223330A44506CBDF7CAA24C894B7CB7A1FB41344FA8806ED9528B592EB7DADD1C743
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                              • Instruction ID: bc925b0ce5eec8b748766370d66c77dfe5a67d6698db595b014b28c0a68da4a7
                              • Opcode Fuzzy Hash: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                              • Instruction Fuzzy Hash: CAC198322051930ADF2D5639E43403EFBA15EA27B135A07ADD4B3CB5D5EE18CA76D620
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                              • Instruction ID: a2603ba697587157b26a82533df9651e4faab12582df95c61519a02e6b23032c
                              • Opcode Fuzzy Hash: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                              • Instruction Fuzzy Hash: 05C1A73320519309DF2D5639D43403EBBA15EA27B135A07ADD4B3DB5D5EE18CA35D620
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                              • Instruction ID: 7d5afb5827451b32c2fb75f25e15cec0e3a88a8db9d7c448d5e370a650a1d7b0
                              • Opcode Fuzzy Hash: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                              • Instruction Fuzzy Hash: 62C1833230519309DF2D4639E47413EBBA19EA27B139A07ADD4B3CB5D4EE28CA75D620
                              Memory Dump Source
                              • Source File: 00000000.00000002.1341275835.000000000132F000.00000040.00000020.00020000.00000000.sdmp, Offset: 0132F000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_132f000_of5HklY9qP.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                              • Instruction ID: 81ade41b1a6918c83d86128f362171126d53fec2f88241d93656863bbb721f7a
                              • Opcode Fuzzy Hash: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                              • Instruction Fuzzy Hash: 9941D371D1051CEBDF48CFADC991AEEBBF2AF88201F548299D516AB345D730AB41DB80
                              Memory Dump Source
                              • Source File: 00000000.00000002.1341275835.000000000132F000.00000040.00000020.00020000.00000000.sdmp, Offset: 0132F000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_132f000_of5HklY9qP.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                              • Instruction ID: 6584f2fd24b8b76d7524ce6ed47d3a1756f0f5f181021a0a747cecc340253a40
                              • Opcode Fuzzy Hash: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                              • Instruction Fuzzy Hash: 00019D78A01209EFCB44DF98C5909AEF7F5FB88324F20C699E809A7701D730AE41DB84
                              Memory Dump Source
                              • Source File: 00000000.00000002.1341275835.000000000132F000.00000040.00000020.00020000.00000000.sdmp, Offset: 0132F000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_132f000_of5HklY9qP.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                              • Instruction ID: c68ff8bc54533326f78dfdb6421922209a63f002c792d72a6305e64615c2d212
                              • Opcode Fuzzy Hash: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                              • Instruction Fuzzy Hash: 8E019D78E01209EFCB48DF98C5909AEF7B5FB88324F20C599E809A7701D730AE41DB84
                              Memory Dump Source
                              • Source File: 00000000.00000002.1341275835.000000000132F000.00000040.00000020.00020000.00000000.sdmp, Offset: 0132F000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_132f000_of5HklY9qP.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                              • Instruction ID: 2052e7d0eb43af8a57a5c2d707c06396f1b84aee57587abda472ed480d51124b
                              • Opcode Fuzzy Hash: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                              • Instruction Fuzzy Hash: 1AB012310527488BC2118B89E008B1073ECA308E04F1000B0D40C07B01827874008D48
                              APIs
                              • CharUpperBuffW.USER32(?,?,007FF910), ref: 007F3627
                              • IsWindowVisible.USER32(?), ref: 007F364B
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: BuffCharUpperVisibleWindow
                              • String ID: ADDSTRING$CHECK$CURRENTTAB$DELSTRING$EDITPASTE$FINDSTRING$GETCURRENTCOL$GETCURRENTLINE$GETCURRENTSELECTION$GETLINE$GETLINECOUNT$GETSELECTED$HIDEDROPDOWN$ISCHECKED$ISENABLED$ISVISIBLE$SELECTSTRING$SENDCOMMANDID$SETCURRENTSELECTION$SHOWDROPDOWN$TABLEFT$TABRIGHT$UNCHECK
                              • API String ID: 4105515805-45149045
                              • Opcode ID: 12b64cc26f33c5c363ffc391cb410adcabf6d3821359e1fa74691af57bd6f0a3
                              • Instruction ID: d31c010876f1cd3db2935a11f40fa9cab0c52cd2ce9ea9f49d35db958583f11c
                              • Opcode Fuzzy Hash: 12b64cc26f33c5c363ffc391cb410adcabf6d3821359e1fa74691af57bd6f0a3
                              • Instruction Fuzzy Hash: 5FD18070214305DFCB04EF10C459A7E77A1EF95394F14845CFA869B3A2DB29EE4ACB92
                              APIs
                              • SetTextColor.GDI32(?,00000000), ref: 007FA630
                              • GetSysColorBrush.USER32(0000000F), ref: 007FA661
                              • GetSysColor.USER32(0000000F), ref: 007FA66D
                              • SetBkColor.GDI32(?,000000FF), ref: 007FA687
                              • SelectObject.GDI32(?,00000000), ref: 007FA696
                              • InflateRect.USER32(?,000000FF,000000FF), ref: 007FA6C1
                              • GetSysColor.USER32(00000010), ref: 007FA6C9
                              • CreateSolidBrush.GDI32(00000000), ref: 007FA6D0
                              • FrameRect.USER32(?,?,00000000), ref: 007FA6DF
                              • DeleteObject.GDI32(00000000), ref: 007FA6E6
                              • InflateRect.USER32(?,000000FE,000000FE), ref: 007FA731
                              • FillRect.USER32(?,?,00000000), ref: 007FA763
                              • GetWindowLongW.USER32(?,000000F0), ref: 007FA78E
                                • Part of subcall function 007FA8CA: GetSysColor.USER32(00000012), ref: 007FA903
                                • Part of subcall function 007FA8CA: SetTextColor.GDI32(?,?), ref: 007FA907
                                • Part of subcall function 007FA8CA: GetSysColorBrush.USER32(0000000F), ref: 007FA91D
                                • Part of subcall function 007FA8CA: GetSysColor.USER32(0000000F), ref: 007FA928
                                • Part of subcall function 007FA8CA: GetSysColor.USER32(00000011), ref: 007FA945
                                • Part of subcall function 007FA8CA: CreatePen.GDI32(00000000,00000001,00743C00), ref: 007FA953
                                • Part of subcall function 007FA8CA: SelectObject.GDI32(?,00000000), ref: 007FA964
                                • Part of subcall function 007FA8CA: SetBkColor.GDI32(?,00000000), ref: 007FA96D
                                • Part of subcall function 007FA8CA: SelectObject.GDI32(?,?), ref: 007FA97A
                                • Part of subcall function 007FA8CA: InflateRect.USER32(?,000000FF,000000FF), ref: 007FA999
                                • Part of subcall function 007FA8CA: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 007FA9B0
                                • Part of subcall function 007FA8CA: GetWindowLongW.USER32(00000000,000000F0), ref: 007FA9C5
                                • Part of subcall function 007FA8CA: SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 007FA9ED
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameMessageRoundSendSolid
                              • String ID:
                              • API String ID: 3521893082-0
                              • Opcode ID: eaa2fb9f846ad6eeb657cef20d6b0a601acd6bf19562784469fcafc8742e4812
                              • Instruction ID: 247a603c13a14a816edae0d9935e757ff2921e4c71d5a4c9a391607f6ac688c5
                              • Opcode Fuzzy Hash: eaa2fb9f846ad6eeb657cef20d6b0a601acd6bf19562784469fcafc8742e4812
                              • Instruction Fuzzy Hash: CD9180B1408305FFC7119F64DC08E6B7BA9FF48321F104A29FA66D62A0DB79D944CB56
                              APIs
                              • DestroyWindow.USER32(?,?,?), ref: 00772CA2
                              • DeleteObject.GDI32(00000000), ref: 00772CE8
                              • DeleteObject.GDI32(00000000), ref: 00772CF3
                              • DestroyIcon.USER32(00000000,?,?,?), ref: 00772CFE
                              • DestroyWindow.USER32(00000000,?,?,?), ref: 00772D09
                              • SendMessageW.USER32(?,00001308,?,00000000), ref: 007AC43B
                              • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 007AC474
                              • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 007AC89D
                                • Part of subcall function 00771B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00772036,?,00000000,?,?,?,?,007716CB,00000000,?), ref: 00771B9A
                              • SendMessageW.USER32(?,00001053), ref: 007AC8DA
                              • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 007AC8F1
                              • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 007AC907
                              • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 007AC912
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: Destroy$ImageList_MessageSendWindow$DeleteObject$IconInvalidateMoveRectRemove
                              • String ID: 0
                              • API String ID: 464785882-4108050209
                              • Opcode ID: 387daf623c384c3329218807cf0fd4e85373cc948118ef3f1d562b885f232f85
                              • Instruction ID: e9ed43066676236232100ebbd39bfe154689ed8eb3283daeeafd5ae6f2d4a168
                              • Opcode Fuzzy Hash: 387daf623c384c3329218807cf0fd4e85373cc948118ef3f1d562b885f232f85
                              • Instruction Fuzzy Hash: 9612A230600201EFDB16CF24C988B69B7E5FF96340F548669F559CB262CB39EC52CB61
                              APIs
                              • DestroyWindow.USER32(00000000), ref: 007E74DE
                              • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 007E759D
                              • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 007E75DB
                              • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000006), ref: 007E75ED
                              • CreateWindowExW.USER32(00000006,AutoIt v3,?,88C00000,?,?,?,?,00000000,00000000,00000000), ref: 007E7633
                              • GetClientRect.USER32(00000000,?), ref: 007E763F
                              • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000), ref: 007E7683
                              • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 007E7692
                              • GetStockObject.GDI32(00000011), ref: 007E76A2
                              • SelectObject.GDI32(00000000,00000000), ref: 007E76A6
                              • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?), ref: 007E76B6
                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 007E76BF
                              • DeleteDC.GDI32(00000000), ref: 007E76C8
                              • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 007E76F4
                              • SendMessageW.USER32(00000030,00000000,00000001), ref: 007E770B
                              • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,00000000,00000000,00000000), ref: 007E7746
                              • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 007E775A
                              • SendMessageW.USER32(00000404,00000001,00000000), ref: 007E776B
                              • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,00000000,00000000,00000000), ref: 007E779B
                              • GetStockObject.GDI32(00000011), ref: 007E77A6
                              • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 007E77B1
                              • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?,?,?,?), ref: 007E77BB
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                              • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                              • API String ID: 2910397461-517079104
                              • Opcode ID: 2a2282b20767954db4b6d8f32dff553754ed0d6635767eebde5a60c37140c40b
                              • Instruction ID: 7617a7664b84b04a433e3cf7175e8df55c4f0626c8bf758160b12e4dac280286
                              • Opcode Fuzzy Hash: 2a2282b20767954db4b6d8f32dff553754ed0d6635767eebde5a60c37140c40b
                              • Instruction Fuzzy Hash: FBA14071A41619BFEB14DBA4DC4AFAF7BA9EF48710F008114FA15E72E0DA74AD10CB64
                              APIs
                              • SetErrorMode.KERNEL32(00000001), ref: 007DAD1E
                              • GetDriveTypeW.KERNEL32(?,007FFAC0,?,\\.\,007FF910), ref: 007DADFB
                              • SetErrorMode.KERNEL32(00000000,007FFAC0,?,\\.\,007FF910), ref: 007DAF59
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: ErrorMode$DriveType
                              • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                              • API String ID: 2907320926-4222207086
                              • Opcode ID: 0d41a148b71a7e6534454d88073f8f54abb5f0822a2fd72e5c89cdfd8362f0cd
                              • Instruction ID: 376e818f40b8065351349282a01ca2921f87a3bf7b51c573b04ef702fb9bfefc
                              • Opcode Fuzzy Hash: 0d41a148b71a7e6534454d88073f8f54abb5f0822a2fd72e5c89cdfd8362f0cd
                              • Instruction Fuzzy Hash: 0E5168B164A219FA8F00EB10D986CB973B1FB08750B2084ABE417E7391DE7DD981DB53
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: __wcsnicmp
                              • String ID: #OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                              • API String ID: 1038674560-86951937
                              • Opcode ID: b7a70946c6bf2bcce682a7af38aeb2f82fbdc2b037c9f6f80aa8a94387dfdd86
                              • Instruction ID: 27ab78d8557a304551407c1d840e767e9b3297ed2d8495df565b9bfdc4a6d6ca
                              • Opcode Fuzzy Hash: b7a70946c6bf2bcce682a7af38aeb2f82fbdc2b037c9f6f80aa8a94387dfdd86
                              • Instruction Fuzzy Hash: BC812BB1600605FACF10BB60EC46FBF37A8EF15750F04C125F909AA29AEB6CDE45C691
                              APIs
                              • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000103,?,?,?), ref: 007F9AD2
                              • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 007F9B8B
                              • SendMessageW.USER32(?,00001102,00000002,?), ref: 007F9BA7
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: MessageSend$Window
                              • String ID: 0
                              • API String ID: 2326795674-4108050209
                              • Opcode ID: 66efbfbc2cf6155caee738087f02b45f7233ee192793ffe3b098b138180f8153
                              • Instruction ID: c24f082ac64c4830515eba1045fa1ce6410d92df3670bf5108f912f07e19b13d
                              • Opcode Fuzzy Hash: 66efbfbc2cf6155caee738087f02b45f7233ee192793ffe3b098b138180f8153
                              • Instruction Fuzzy Hash: 1C029C71108209ABD7258F24C848BBABBE5FF89314F04852DFB99D63A1DB39D944CB52
                              APIs
                              • GetSysColor.USER32(00000012), ref: 007FA903
                              • SetTextColor.GDI32(?,?), ref: 007FA907
                              • GetSysColorBrush.USER32(0000000F), ref: 007FA91D
                              • GetSysColor.USER32(0000000F), ref: 007FA928
                              • CreateSolidBrush.GDI32(?), ref: 007FA92D
                              • GetSysColor.USER32(00000011), ref: 007FA945
                              • CreatePen.GDI32(00000000,00000001,00743C00), ref: 007FA953
                              • SelectObject.GDI32(?,00000000), ref: 007FA964
                              • SetBkColor.GDI32(?,00000000), ref: 007FA96D
                              • SelectObject.GDI32(?,?), ref: 007FA97A
                              • InflateRect.USER32(?,000000FF,000000FF), ref: 007FA999
                              • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 007FA9B0
                              • GetWindowLongW.USER32(00000000,000000F0), ref: 007FA9C5
                              • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 007FA9ED
                              • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 007FAA14
                              • InflateRect.USER32(?,000000FD,000000FD), ref: 007FAA32
                              • DrawFocusRect.USER32(?,?), ref: 007FAA3D
                              • GetSysColor.USER32(00000011), ref: 007FAA4B
                              • SetTextColor.GDI32(?,00000000), ref: 007FAA53
                              • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 007FAA67
                              • SelectObject.GDI32(?,007FA5FA), ref: 007FAA7E
                              • DeleteObject.GDI32(?), ref: 007FAA89
                              • SelectObject.GDI32(?,?), ref: 007FAA8F
                              • DeleteObject.GDI32(?), ref: 007FAA94
                              • SetTextColor.GDI32(?,?), ref: 007FAA9A
                              • SetBkColor.GDI32(?,?), ref: 007FAAA4
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                              • String ID:
                              • API String ID: 1996641542-0
                              • Opcode ID: 9dced28ade77269903df81e3de9f54a98d7d73d5d15b857f2c260cd51edbf4b1
                              • Instruction ID: 00242e65da828b411fde4f9ec741f87899d9c3db52f4c05a96903bdb04c2de5f
                              • Opcode Fuzzy Hash: 9dced28ade77269903df81e3de9f54a98d7d73d5d15b857f2c260cd51edbf4b1
                              • Instruction Fuzzy Hash: 64511DB1900208FFDF11DFA4DC48EAE7B79EF48320F118525FA15AB2A1DB799940DB94
                              APIs
                              • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 007F8AC1
                              • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 007F8AD2
                              • CharNextW.USER32(0000014E), ref: 007F8B01
                              • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 007F8B42
                              • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 007F8B58
                              • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 007F8B69
                              • SendMessageW.USER32(?,000000C2,00000001,0000014E), ref: 007F8B86
                              • SetWindowTextW.USER32(?,0000014E), ref: 007F8BD8
                              • SendMessageW.USER32(?,000000B1,000F4240,000F423F), ref: 007F8BEE
                              • SendMessageW.USER32(?,00001002,00000000,?), ref: 007F8C1F
                              • _memset.LIBCMT ref: 007F8C44
                              • SendMessageW.USER32(00000000,00001060,00000001,00000004), ref: 007F8C8D
                              • _memset.LIBCMT ref: 007F8CEC
                              • SendMessageW.USER32(?,00001053,000000FF,?), ref: 007F8D16
                              • SendMessageW.USER32(?,00001074,?,00000001), ref: 007F8D6E
                              • SendMessageW.USER32(?,0000133D,?,?), ref: 007F8E1B
                              • InvalidateRect.USER32(?,00000000,00000001), ref: 007F8E3D
                              • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 007F8E87
                              • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 007F8EB4
                              • DrawMenuBar.USER32(?), ref: 007F8EC3
                              • SetWindowTextW.USER32(?,0000014E), ref: 007F8EEB
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: MessageSend$Menu$InfoItemTextWindow_memset$CharDrawInvalidateNextRect
                              • String ID: 0
                              • API String ID: 1073566785-4108050209
                              • Opcode ID: fb9f82f7915ddf8242d28dc35b1b84002c0e0e102af2bfc07bb6b518b26e90c7
                              • Instruction ID: 02493ad6f0f1c88eba2243ee1881ac433536a9a958c06f9e7efa63c711ac9601
                              • Opcode Fuzzy Hash: fb9f82f7915ddf8242d28dc35b1b84002c0e0e102af2bfc07bb6b518b26e90c7
                              • Instruction Fuzzy Hash: 56E14D71900208EEDF609F64CC88AFE7BB9FF05710F108156FA25AA291DF788981DF61
                              APIs
                              • GetCursorPos.USER32(?), ref: 007F49CA
                              • GetDesktopWindow.USER32 ref: 007F49DF
                              • GetWindowRect.USER32(00000000), ref: 007F49E6
                              • GetWindowLongW.USER32(?,000000F0), ref: 007F4A48
                              • DestroyWindow.USER32(?), ref: 007F4A74
                              • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 007F4A9D
                              • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 007F4ABB
                              • SendMessageW.USER32(?,00000439,00000000,00000030), ref: 007F4AE1
                              • SendMessageW.USER32(?,00000421,?,?), ref: 007F4AF6
                              • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 007F4B09
                              • IsWindowVisible.USER32(?), ref: 007F4B29
                              • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 007F4B44
                              • SendMessageW.USER32(?,00000411,00000001,00000030), ref: 007F4B58
                              • GetWindowRect.USER32(?,?), ref: 007F4B70
                              • MonitorFromPoint.USER32(?,?,00000002), ref: 007F4B96
                              • GetMonitorInfoW.USER32(00000000,?), ref: 007F4BB0
                              • CopyRect.USER32(?,?), ref: 007F4BC7
                              • SendMessageW.USER32(?,00000412,00000000), ref: 007F4C32
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                              • String ID: ($0$tooltips_class32
                              • API String ID: 698492251-4156429822
                              • Opcode ID: 70574a7c0d0b0ed324014c0762ce2d47ae57f4fab3daca06aa71ada6feb9ab31
                              • Instruction ID: 277a1eb3fee8ad9fb26b07613a6f03acdb390a74843dd623f11097b1b3802d52
                              • Opcode Fuzzy Hash: 70574a7c0d0b0ed324014c0762ce2d47ae57f4fab3daca06aa71ada6feb9ab31
                              • Instruction Fuzzy Hash: 35B16A71604340AFDB04DF64C888B6BBBE4FF88354F00891CF6999B2A1DB79E805CB56
                              APIs
                              • GetFileVersionInfoSizeW.VERSION(?,?), ref: 007D44AC
                              • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 007D44D2
                              • _wcscpy.LIBCMT ref: 007D4500
                              • _wcscmp.LIBCMT ref: 007D450B
                              • _wcscat.LIBCMT ref: 007D4521
                              • _wcsstr.LIBCMT ref: 007D452C
                              • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 007D4548
                              • _wcscat.LIBCMT ref: 007D4591
                              • _wcscat.LIBCMT ref: 007D4598
                              • _wcsncpy.LIBCMT ref: 007D45C3
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: _wcscat$FileInfoVersion$QuerySizeValue_wcscmp_wcscpy_wcsncpy_wcsstr
                              • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                              • API String ID: 699586101-1459072770
                              • Opcode ID: 708be4a209e53de8bbdae62a7d5bb7fbd74740b2990e9576eb4426cb4955642f
                              • Instruction ID: 260ed42f94f152937631a696a46d0694e523dd8f0404997506ff4bd0c4557c61
                              • Opcode Fuzzy Hash: 708be4a209e53de8bbdae62a7d5bb7fbd74740b2990e9576eb4426cb4955642f
                              • Instruction Fuzzy Hash: 4F419372600214BBDF10BB74EC4BEBF776CDF45710F14446AF905A6282EF3C9A1196A5
                              APIs
                              • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 007728BC
                              • GetSystemMetrics.USER32(00000007), ref: 007728C4
                              • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 007728EF
                              • GetSystemMetrics.USER32(00000008), ref: 007728F7
                              • GetSystemMetrics.USER32(00000004), ref: 0077291C
                              • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 00772939
                              • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 00772949
                              • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 0077297C
                              • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00772990
                              • GetClientRect.USER32(00000000,000000FF), ref: 007729AE
                              • GetStockObject.GDI32(00000011), ref: 007729CA
                              • SendMessageW.USER32(00000000,00000030,00000000), ref: 007729D5
                                • Part of subcall function 00772344: GetCursorPos.USER32(?), ref: 00772357
                                • Part of subcall function 00772344: ScreenToClient.USER32(008357B0,?), ref: 00772374
                                • Part of subcall function 00772344: GetAsyncKeyState.USER32(00000001), ref: 00772399
                                • Part of subcall function 00772344: GetAsyncKeyState.USER32(00000002), ref: 007723A7
                              • SetTimer.USER32(00000000,00000000,00000028,00771256), ref: 007729FC
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                              • String ID: AutoIt v3 GUI
                              • API String ID: 1458621304-248962490
                              • Opcode ID: 4a9560e2d472d1cbc49f78bf7732e35ecf68ea0a002bdeca9fc740ecabcb04b2
                              • Instruction ID: 0f5def7a108d037adce5a5189f37bd7456bc4211dd41f596f66123378df7f8c4
                              • Opcode Fuzzy Hash: 4a9560e2d472d1cbc49f78bf7732e35ecf68ea0a002bdeca9fc740ecabcb04b2
                              • Instruction Fuzzy Hash: 0DB16E7160020AEFDF14DFA8DC45BAE7BB4FB48354F108229FA19E7291DB78A851CB54
                              APIs
                              • GetClassNameW.USER32(?,?,00000100), ref: 007CA47A
                              • __swprintf.LIBCMT ref: 007CA51B
                              • _wcscmp.LIBCMT ref: 007CA52E
                              • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 007CA583
                              • _wcscmp.LIBCMT ref: 007CA5BF
                              • GetClassNameW.USER32(?,?,00000400), ref: 007CA5F6
                              • GetDlgCtrlID.USER32(?), ref: 007CA648
                              • GetWindowRect.USER32(?,?), ref: 007CA67E
                              • GetParent.USER32(?), ref: 007CA69C
                              • ScreenToClient.USER32(00000000), ref: 007CA6A3
                              • GetClassNameW.USER32(?,?,00000100), ref: 007CA71D
                              • _wcscmp.LIBCMT ref: 007CA731
                              • GetWindowTextW.USER32(?,?,00000400), ref: 007CA757
                              • _wcscmp.LIBCMT ref: 007CA76B
                                • Part of subcall function 0079362C: _iswctype.LIBCMT ref: 00793634
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: _wcscmp$ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_iswctype
                              • String ID: %s%u
                              • API String ID: 3744389584-679674701
                              • Opcode ID: 886cfe797ea2d31599ff921856a2c21be5e82870b47341a6166b23da11bcf2ec
                              • Instruction ID: 2c56980a66d0a6f59af1dcf9ce7763d2fdf5ecf6bd4e7bea577c15972ec2b7fb
                              • Opcode Fuzzy Hash: 886cfe797ea2d31599ff921856a2c21be5e82870b47341a6166b23da11bcf2ec
                              • Instruction Fuzzy Hash: B2A1B17120460AFBDB14DF64C888FAAB7E8FF4431AF10852DF999D2150DB38E955CB92
                              APIs
                              • GetClassNameW.USER32(00000008,?,00000400), ref: 007CAF18
                              • _wcscmp.LIBCMT ref: 007CAF29
                              • GetWindowTextW.USER32(00000001,?,00000400), ref: 007CAF51
                              • CharUpperBuffW.USER32(?,00000000), ref: 007CAF6E
                              • _wcscmp.LIBCMT ref: 007CAF8C
                              • _wcsstr.LIBCMT ref: 007CAF9D
                              • GetClassNameW.USER32(00000018,?,00000400), ref: 007CAFD5
                              • _wcscmp.LIBCMT ref: 007CAFE5
                              • GetWindowTextW.USER32(00000002,?,00000400), ref: 007CB00C
                              • GetClassNameW.USER32(00000018,?,00000400), ref: 007CB055
                              • _wcscmp.LIBCMT ref: 007CB065
                              • GetClassNameW.USER32(00000010,?,00000400), ref: 007CB08D
                              • GetWindowRect.USER32(00000004,?), ref: 007CB0F6
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: ClassName_wcscmp$Window$Text$BuffCharRectUpper_wcsstr
                              • String ID: @$ThumbnailClass
                              • API String ID: 1788623398-1539354611
                              • Opcode ID: da96a16b0f4f0595847c8822c5225e2c06dad1966633e0464b51b3b5dcf63495
                              • Instruction ID: b23a40564f80ab85bc30270090b67948e91437ec3602e7bfd86f7154aeaea87b
                              • Opcode Fuzzy Hash: da96a16b0f4f0595847c8822c5225e2c06dad1966633e0464b51b3b5dcf63495
                              • Instruction Fuzzy Hash: 6B819071108209EBDB15DF14C886FBAB7E8EF44319F18846DFD859A092DB38DD85CB61
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: __wcsnicmp
                              • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:
                              • API String ID: 1038674560-1810252412
                              • Opcode ID: cd1348b6b464b33b15bee2755b38006685c6d744ae791f390af6d92c2ee738d0
                              • Instruction ID: b4668e6522a434c760088e6db75db42a2d01378be763e54398cf366d72e94024
                              • Opcode Fuzzy Hash: cd1348b6b464b33b15bee2755b38006685c6d744ae791f390af6d92c2ee738d0
                              • Instruction Fuzzy Hash: 0031D230A48219F6CF14FB60ED4BFAE73A4AB20765F20402CF41AB11D1EB5D6F04C662
                              APIs
                              • LoadCursorW.USER32(00000000,00007F8A), ref: 007E5013
                              • LoadCursorW.USER32(00000000,00007F00), ref: 007E501E
                              • LoadCursorW.USER32(00000000,00007F03), ref: 007E5029
                              • LoadCursorW.USER32(00000000,00007F8B), ref: 007E5034
                              • LoadCursorW.USER32(00000000,00007F01), ref: 007E503F
                              • LoadCursorW.USER32(00000000,00007F81), ref: 007E504A
                              • LoadCursorW.USER32(00000000,00007F88), ref: 007E5055
                              • LoadCursorW.USER32(00000000,00007F80), ref: 007E5060
                              • LoadCursorW.USER32(00000000,00007F86), ref: 007E506B
                              • LoadCursorW.USER32(00000000,00007F83), ref: 007E5076
                              • LoadCursorW.USER32(00000000,00007F85), ref: 007E5081
                              • LoadCursorW.USER32(00000000,00007F82), ref: 007E508C
                              • LoadCursorW.USER32(00000000,00007F84), ref: 007E5097
                              • LoadCursorW.USER32(00000000,00007F04), ref: 007E50A2
                              • LoadCursorW.USER32(00000000,00007F02), ref: 007E50AD
                              • LoadCursorW.USER32(00000000,00007F89), ref: 007E50B8
                              • GetCursorInfo.USER32(?), ref: 007E50C8
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: Cursor$Load$Info
                              • String ID:
                              • API String ID: 2577412497-0
                              • Opcode ID: bfbfae6e7415b4052ceb8b87da80b3f9fbf460a351703c9d9f4d3ba5668111b4
                              • Instruction ID: 84a743d20f6edfcf383323f4e2628e4254fd8424e1575c49a23a041880fdf639
                              • Opcode Fuzzy Hash: bfbfae6e7415b4052ceb8b87da80b3f9fbf460a351703c9d9f4d3ba5668111b4
                              • Instruction Fuzzy Hash: F53103B1D0931D6ADF109FB68C8996EBFE8FF08754F50452AA50CE7280DA7865008EA1
                              APIs
                              • _memset.LIBCMT ref: 007FA259
                              • DestroyWindow.USER32(?,?), ref: 007FA2D3
                                • Part of subcall function 00777BCC: _memmove.LIBCMT ref: 00777C06
                              • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 007FA34D
                              • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 007FA36F
                              • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 007FA382
                              • DestroyWindow.USER32(00000000), ref: 007FA3A4
                              • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00770000,00000000), ref: 007FA3DB
                              • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 007FA3F4
                              • GetDesktopWindow.USER32 ref: 007FA40D
                              • GetWindowRect.USER32(00000000), ref: 007FA414
                              • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 007FA42C
                              • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 007FA444
                                • Part of subcall function 007725DB: GetWindowLongW.USER32(?,000000EB), ref: 007725EC
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_memmove_memset
                              • String ID: 0$tooltips_class32
                              • API String ID: 1297703922-3619404913
                              • Opcode ID: 369010303ac5408e753f3447357227b69c2d877c1456cb43e5cc36fecd57afa1
                              • Instruction ID: e35092d87e5d156909aae109d76462845aeb2803f458bb328de396e366c8c7f6
                              • Opcode Fuzzy Hash: 369010303ac5408e753f3447357227b69c2d877c1456cb43e5cc36fecd57afa1
                              • Instruction Fuzzy Hash: 16717BB0144249AFDB25CF28CC49F7677E5FB88300F04492DFA89873A1DB78A902CB56
                              APIs
                                • Part of subcall function 00772612: GetWindowLongW.USER32(?,000000EB), ref: 00772623
                              • DragQueryPoint.SHELL32(?,?), ref: 007FC627
                                • Part of subcall function 007FAB37: ClientToScreen.USER32(?,?), ref: 007FAB60
                                • Part of subcall function 007FAB37: GetWindowRect.USER32(?,?), ref: 007FABD6
                                • Part of subcall function 007FAB37: PtInRect.USER32(?,?,007FC014), ref: 007FABE6
                              • SendMessageW.USER32(?,000000B0,?,?), ref: 007FC690
                              • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 007FC69B
                              • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 007FC6BE
                              • _wcscat.LIBCMT ref: 007FC6EE
                              • SendMessageW.USER32(?,000000C2,00000001,?), ref: 007FC705
                              • SendMessageW.USER32(?,000000B0,?,?), ref: 007FC71E
                              • SendMessageW.USER32(?,000000B1,?,?), ref: 007FC735
                              • SendMessageW.USER32(?,000000B1,?,?), ref: 007FC757
                              • DragFinish.SHELL32(?), ref: 007FC75E
                              • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 007FC851
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen_wcscat
                              • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
                              • API String ID: 169749273-3440237614
                              • Opcode ID: 15186ff6670116bf987405eb8933237a30321662e63227e06a121f9049b70c01
                              • Instruction ID: 7d209d3b15bace199d4d553a98f9df4e0356ef49f2542f5c83797cf154655592
                              • Opcode Fuzzy Hash: 15186ff6670116bf987405eb8933237a30321662e63227e06a121f9049b70c01
                              • Instruction Fuzzy Hash: 4C618D71108304EFCB01EF64DC89DABBBE8FF89350F00492EF695922A1DB749949CB56
                              APIs
                              • VariantInit.OLEAUT32(00000000), ref: 007D7D5F
                              • VariantCopy.OLEAUT32(00000000,?), ref: 007D7D68
                              • VariantClear.OLEAUT32(00000000), ref: 007D7D74
                              • VariantTimeToSystemTime.OLEAUT32(?,?,?), ref: 007D7E62
                              • __swprintf.LIBCMT ref: 007D7E92
                              • VarR8FromDec.OLEAUT32(?,?), ref: 007D7EBE
                              • VariantInit.OLEAUT32(?), ref: 007D7F6F
                              • SysFreeString.OLEAUT32(00000016), ref: 007D8003
                              • VariantClear.OLEAUT32(?), ref: 007D805D
                              • VariantClear.OLEAUT32(?), ref: 007D806C
                              • VariantInit.OLEAUT32(00000000), ref: 007D80AA
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: Variant$ClearInit$Time$CopyFreeFromStringSystem__swprintf
                              • String ID: %4d%02d%02d%02d%02d%02d$Default
                              • API String ID: 3730832054-3931177956
                              • Opcode ID: ab68481f0f62a728da31a5bd08211d8855bda1fec5611367412811759df0c857
                              • Instruction ID: 32a31a7e9bdc3b971192fddbf9a4babb1c3ad9a82e8627d07e1805fb001db3ee
                              • Opcode Fuzzy Hash: ab68481f0f62a728da31a5bd08211d8855bda1fec5611367412811759df0c857
                              • Instruction Fuzzy Hash: 59D1D071608615EBCF189F65D889B7AB7B5BF04700F248497E8059B380EB7CEC44DBA1
                              APIs
                              • CharUpperBuffW.USER32(?,?), ref: 007F4424
                              • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 007F446F
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: BuffCharMessageSendUpper
                              • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                              • API String ID: 3974292440-4258414348
                              • Opcode ID: 07b8535d360274965339c96dc2ebd0901bd1b4704ce860459277e1b7319c7fbb
                              • Instruction ID: fb47ac15cc5c565945700924eb1ffe8446f128c5e3e5435ed30dcc3b792d579b
                              • Opcode Fuzzy Hash: 07b8535d360274965339c96dc2ebd0901bd1b4704ce860459277e1b7319c7fbb
                              • Instruction Fuzzy Hash: AD914C71204315DFCB04EF10C455A7EB7A1AF95350F04886CFA969B3A2CB39ED49CB91
                              APIs
                              • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 007FB8B4
                              • LoadLibraryExW.KERNEL32(?,00000000,00000032,00000000,?,?,?,?,?,007F91C2), ref: 007FB910
                              • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 007FB949
                              • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 007FB98C
                              • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 007FB9C3
                              • FreeLibrary.KERNEL32(?), ref: 007FB9CF
                              • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 007FB9DF
                              • DestroyIcon.USER32(?,?,?,?,?,007F91C2), ref: 007FB9EE
                              • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 007FBA0B
                              • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 007FBA17
                                • Part of subcall function 00792EFD: __wcsicmp_l.LIBCMT ref: 00792F86
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: Load$Image$IconLibraryMessageSend$DestroyExtractFree__wcsicmp_l
                              • String ID: .dll$.exe$.icl
                              • API String ID: 1212759294-1154884017
                              • Opcode ID: 47249d1d49dd400616555e1ebf397bffcf6942301750fda1454e670c4f11e968
                              • Instruction ID: f3d8b833b1cd822afd93562e25e1eae592dc11c34b7651893c2fe5046171de3a
                              • Opcode Fuzzy Hash: 47249d1d49dd400616555e1ebf397bffcf6942301750fda1454e670c4f11e968
                              • Instruction Fuzzy Hash: 9261B071900219FAEB14EF64DC86FBE77A8FF08710F108115FA15D62D1DBB8A981DBA0
                              APIs
                              • GetLocalTime.KERNEL32(?), ref: 007DDCDC
                              • SystemTimeToFileTime.KERNEL32(?,?), ref: 007DDCEC
                              • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 007DDCF8
                              • __wsplitpath.LIBCMT ref: 007DDD56
                              • _wcscat.LIBCMT ref: 007DDD6E
                              • _wcscat.LIBCMT ref: 007DDD80
                              • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 007DDD95
                              • SetCurrentDirectoryW.KERNEL32(?), ref: 007DDDA9
                              • SetCurrentDirectoryW.KERNEL32(?), ref: 007DDDDB
                              • SetCurrentDirectoryW.KERNEL32(?), ref: 007DDDFC
                              • _wcscpy.LIBCMT ref: 007DDE08
                              • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 007DDE47
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: CurrentDirectoryTime$File$Local_wcscat$System__wsplitpath_wcscpy
                              • String ID: *.*
                              • API String ID: 3566783562-438819550
                              • Opcode ID: 3fe30440b3764e429317e9e7c28eb5b11b111947a9d157e1c651691761eb6c77
                              • Instruction ID: 3f7852f4654811135965b42f2b15ee6fd6eeb5224a59dc66dacf0b207e32872a
                              • Opcode Fuzzy Hash: 3fe30440b3764e429317e9e7c28eb5b11b111947a9d157e1c651691761eb6c77
                              • Instruction Fuzzy Hash: A7614A725043459FCB20EF64C8489AEB3F8FF89310F04891EE99997251EB39ED45CB92
                              APIs
                              • LoadStringW.USER32(00000066,?,00000FFF,00000016), ref: 007D9C7F
                                • Part of subcall function 00777DE1: _memmove.LIBCMT ref: 00777E22
                              • LoadStringW.USER32(00000072,?,00000FFF,?), ref: 007D9CA0
                              • __swprintf.LIBCMT ref: 007D9CF9
                              • __swprintf.LIBCMT ref: 007D9D12
                              • _wprintf.LIBCMT ref: 007D9DB9
                              • _wprintf.LIBCMT ref: 007D9DD7
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: LoadString__swprintf_wprintf$_memmove
                              • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Incorrect parameters to object property !$Line %d (File "%s"):$^ ERROR
                              • API String ID: 311963372-3080491070
                              • Opcode ID: cd6ec02083debd15690ef9b047549b5f9d6133f61b5cbed6da1ee528790f2608
                              • Instruction ID: 962e84b1950c2bd67fef1179293c0f725b388e2e591f2b367ee67228fca81928
                              • Opcode Fuzzy Hash: cd6ec02083debd15690ef9b047549b5f9d6133f61b5cbed6da1ee528790f2608
                              • Instruction Fuzzy Hash: B4518231901609EACF19EBE0DD4AEEEB779EF14340F504465F509B21A1EB792F58CB60
                              APIs
                                • Part of subcall function 00779837: __itow.LIBCMT ref: 00779862
                                • Part of subcall function 00779837: __swprintf.LIBCMT ref: 007798AC
                              • CharLowerBuffW.USER32(?,?), ref: 007DA3CB
                              • GetDriveTypeW.KERNEL32 ref: 007DA418
                              • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 007DA460
                              • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 007DA497
                              • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 007DA4C5
                                • Part of subcall function 00777BCC: _memmove.LIBCMT ref: 00777C06
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: SendString$BuffCharDriveLowerType__itow__swprintf_memmove
                              • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                              • API String ID: 2698844021-4113822522
                              • Opcode ID: 8b43963666b3f493bc8f0d018d257dd9dcf397607a503c7def7b41ba4219642f
                              • Instruction ID: e90927b88c1a733ce7a42a48f9566e8305f38121dad908b210c3a00410ed7e79
                              • Opcode Fuzzy Hash: 8b43963666b3f493bc8f0d018d257dd9dcf397607a503c7def7b41ba4219642f
                              • Instruction Fuzzy Hash: DC515B71104305DFCB04EF14C88586AB7F4FF99758F00886DF89A97261DB79AD49CB92
                              APIs
                              • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000001,00000000,00000000,?,007AE029,00000001,0000138C,00000001,00000000,00000001,?,00000000,00000000), ref: 007CF8DF
                              • LoadStringW.USER32(00000000,?,007AE029,00000001), ref: 007CF8E8
                                • Part of subcall function 00777DE1: _memmove.LIBCMT ref: 00777E22
                              • GetModuleHandleW.KERNEL32(00000000,00835310,?,00000FFF,?,?,007AE029,00000001,0000138C,00000001,00000000,00000001,?,00000000,00000000,00000001), ref: 007CF90A
                              • LoadStringW.USER32(00000000,?,007AE029,00000001), ref: 007CF90D
                              • __swprintf.LIBCMT ref: 007CF95D
                              • __swprintf.LIBCMT ref: 007CF96E
                              • _wprintf.LIBCMT ref: 007CFA17
                              • MessageBoxW.USER32(00000000,?,?,00011010), ref: 007CFA2E
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: HandleLoadModuleString__swprintf$Message_memmove_wprintf
                              • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                              • API String ID: 984253442-2268648507
                              • Opcode ID: c9e9578a2b4cdb3bbafcd696a01ef36e35489f99e76b21ec7cdeb15dc112d1a8
                              • Instruction ID: 7c39d788b2d1416e11a1adcb20f73080c76f10b498d087950928605ae08c2d68
                              • Opcode Fuzzy Hash: c9e9578a2b4cdb3bbafcd696a01ef36e35489f99e76b21ec7cdeb15dc112d1a8
                              • Instruction Fuzzy Hash: B1414F72900219EACF05FBE0DD4AEEEB778EF19340F104469F509B2091EA796F49CB60
                              APIs
                              • CreateFileW.KERNEL32(00000000,80000000,00000000,00000000,00000003,00000000,00000000,00000000,?,?,?,?,?,007F9207,?,?), ref: 007FBA56
                              • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,007F9207,?,?,00000000,?), ref: 007FBA6D
                              • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,007F9207,?,?,00000000,?), ref: 007FBA78
                              • CloseHandle.KERNEL32(00000000,?,?,?,?,007F9207,?,?,00000000,?), ref: 007FBA85
                              • GlobalLock.KERNEL32(00000000), ref: 007FBA8E
                              • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,?,?,?,007F9207,?,?,00000000,?), ref: 007FBA9D
                              • GlobalUnlock.KERNEL32(00000000), ref: 007FBAA6
                              • CloseHandle.KERNEL32(00000000,?,?,?,?,007F9207,?,?,00000000,?), ref: 007FBAAD
                              • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,007F9207,?,?,00000000,?), ref: 007FBABE
                              • OleLoadPicture.OLEAUT32(?,00000000,00000000,00802CAC,?), ref: 007FBAD7
                              • GlobalFree.KERNEL32(00000000), ref: 007FBAE7
                              • GetObjectW.GDI32(00000000,00000018,?), ref: 007FBB0B
                              • CopyImage.USER32(00000000,00000000,?,?,00002000), ref: 007FBB36
                              • DeleteObject.GDI32(00000000), ref: 007FBB5E
                              • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 007FBB74
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                              • String ID:
                              • API String ID: 3840717409-0
                              • Opcode ID: 989c8d36cd2ad1f14cb8488411a8505e31f212b0caf927f1aeae092c8e0b4d6d
                              • Instruction ID: 68617a63550ed542b99ef61adba6ba6ce527f244da79641989de826c7aacdd21
                              • Opcode Fuzzy Hash: 989c8d36cd2ad1f14cb8488411a8505e31f212b0caf927f1aeae092c8e0b4d6d
                              • Instruction Fuzzy Hash: B6411575600209EFDB119F65DC88EBEBBB9FF89711F108069FA05D7260DB389A01CB64
                              APIs
                              • __wsplitpath.LIBCMT ref: 007DDA10
                              • _wcscat.LIBCMT ref: 007DDA28
                              • _wcscat.LIBCMT ref: 007DDA3A
                              • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 007DDA4F
                              • SetCurrentDirectoryW.KERNEL32(?), ref: 007DDA63
                              • GetFileAttributesW.KERNEL32(?), ref: 007DDA7B
                              • SetFileAttributesW.KERNEL32(?,00000000), ref: 007DDA95
                              • SetCurrentDirectoryW.KERNEL32(?), ref: 007DDAA7
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: CurrentDirectory$AttributesFile_wcscat$__wsplitpath
                              • String ID: *.*
                              • API String ID: 34673085-438819550
                              • Opcode ID: 8a6800624f1600654a038edb214ba0728c33d832b5f51e1749fadf29a6d70dbd
                              • Instruction ID: 2d7ade06e5adf484c538271bf605869f34bfb9e75e5dc1b2e9800f63bd8f042d
                              • Opcode Fuzzy Hash: 8a6800624f1600654a038edb214ba0728c33d832b5f51e1749fadf29a6d70dbd
                              • Instruction Fuzzy Hash: 23816EB15042419FCB34EF64C8549AAB7F8EF89354F14882BF889C7351EA39ED45CB52
                              APIs
                                • Part of subcall function 00772612: GetWindowLongW.USER32(?,000000EB), ref: 00772623
                              • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 007FC1FC
                              • GetFocus.USER32 ref: 007FC20C
                              • GetDlgCtrlID.USER32(00000000), ref: 007FC217
                              • _memset.LIBCMT ref: 007FC342
                              • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 007FC36D
                              • GetMenuItemCount.USER32(?), ref: 007FC38D
                              • GetMenuItemID.USER32(?,00000000), ref: 007FC3A0
                              • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 007FC3D4
                              • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 007FC41C
                              • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 007FC454
                              • DefDlgProcW.USER32(?,00000111,?,?,?,?,?,?,?), ref: 007FC489
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow_memset
                              • String ID: 0
                              • API String ID: 1296962147-4108050209
                              • Opcode ID: 4f5a4e53d04296373bf01d636af8b3de38e2459fcad0687347224619b0b8e49b
                              • Instruction ID: 8d970bee0316badd48a11e420292da8d00f10ebda9a0b7341957409ccf731131
                              • Opcode Fuzzy Hash: 4f5a4e53d04296373bf01d636af8b3de38e2459fcad0687347224619b0b8e49b
                              • Instruction Fuzzy Hash: AB816D706083499FDB11CF14C994A7ABBE8FF88754F00492EFA9597391C738D905DBA2
                              APIs
                              • GetDC.USER32(00000000), ref: 007E738F
                              • CreateCompatibleBitmap.GDI32(00000000,00000007,?), ref: 007E739B
                              • CreateCompatibleDC.GDI32(?), ref: 007E73A7
                              • SelectObject.GDI32(00000000,?), ref: 007E73B4
                              • StretchBlt.GDI32(00000006,00000000,00000000,00000007,?,?,?,?,00000007,?,00CC0020), ref: 007E7408
                              • GetDIBits.GDI32(00000006,?,00000000,00000000,00000000,00000028,00000000), ref: 007E7444
                              • GetDIBits.GDI32(00000006,?,00000000,?,00000000,00000028,00000000), ref: 007E7468
                              • SelectObject.GDI32(00000006,?), ref: 007E7470
                              • DeleteObject.GDI32(?), ref: 007E7479
                              • DeleteDC.GDI32(00000006), ref: 007E7480
                              • ReleaseDC.USER32(00000000,?), ref: 007E748B
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                              • String ID: (
                              • API String ID: 2598888154-3887548279
                              • Opcode ID: 7ac7a260800e75401a6234958fa9e1692f3de7f21d046a46d1efde0a52de806c
                              • Instruction ID: 564ce4939822c0db71707ed44f7da183a6bab35c836bea506eda4e24610bfd5a
                              • Opcode Fuzzy Hash: 7ac7a260800e75401a6234958fa9e1692f3de7f21d046a46d1efde0a52de806c
                              • Instruction Fuzzy Hash: DF517B71904349EFCB14CFA9CC88EAEBBB9EF48310F14842DF95997210CB35A840CB54
                              APIs
                                • Part of subcall function 00790957: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,00776B0C,?,00008000), ref: 00790973
                                • Part of subcall function 00774750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00774743,?,?,007737AE,?), ref: 00774770
                              • SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00776BAD
                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00776CFA
                                • Part of subcall function 0077586D: _wcscpy.LIBCMT ref: 007758A5
                                • Part of subcall function 0079363D: _iswctype.LIBCMT ref: 00793645
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: CurrentDirectory$FullNamePath_iswctype_wcscpy
                              • String ID: #include depth exceeded. Make sure there are no recursive includes$>>>AUTOIT SCRIPT<<<$AU3!$Bad directive syntax error$EA06$Error opening the file$Unterminated string
                              • API String ID: 537147316-1018226102
                              • Opcode ID: bd3ac899614c4ee785a691a2fa49cb4ebf47f8648f13e10081685154298591b7
                              • Instruction ID: 28567123bf7dba16227e455c414219c4c876d609b2a787d4768de5bf2d99edcc
                              • Opcode Fuzzy Hash: bd3ac899614c4ee785a691a2fa49cb4ebf47f8648f13e10081685154298591b7
                              • Instruction Fuzzy Hash: 4C02AC30108341DFCB24EF24C885AAFBBE5EF99354F10891DF499972A1DB78E949CB52
                              APIs
                              • _memset.LIBCMT ref: 007D2D50
                              • GetMenuItemInfoW.USER32(00000000,00000007,00000000,00000030), ref: 007D2DDD
                              • GetMenuItemCount.USER32(00835890), ref: 007D2E66
                              • DeleteMenu.USER32(00835890,00000005,00000000,000000F5,?,?), ref: 007D2EF6
                              • DeleteMenu.USER32(00835890,00000004,00000000), ref: 007D2EFE
                              • DeleteMenu.USER32(00835890,00000006,00000000), ref: 007D2F06
                              • DeleteMenu.USER32(00835890,00000003,00000000), ref: 007D2F0E
                              • GetMenuItemCount.USER32(00835890), ref: 007D2F16
                              • SetMenuItemInfoW.USER32(00835890,00000004,00000000,00000030), ref: 007D2F4C
                              • GetCursorPos.USER32(?), ref: 007D2F56
                              • SetForegroundWindow.USER32(00000000), ref: 007D2F5F
                              • TrackPopupMenuEx.USER32(00835890,00000000,?,00000000,00000000,00000000), ref: 007D2F72
                              • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 007D2F7E
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: Menu$DeleteItem$CountInfo$CursorForegroundMessagePopupPostTrackWindow_memset
                              • String ID:
                              • API String ID: 3993528054-0
                              • Opcode ID: 833ef1cfd704524973d1985790540867526ec950bcd4c67eedaff3a82743bbff
                              • Instruction ID: 3ea389fd88e2376e195c9dbb40c836946b780adc43ebe83a5e1041c39781bfe5
                              • Opcode Fuzzy Hash: 833ef1cfd704524973d1985790540867526ec950bcd4c67eedaff3a82743bbff
                              • Instruction Fuzzy Hash: A971D570601205BEEB218F54DC49FAABF75FF14364F104217F625A63E2CB796822D7A4
                              APIs
                              • CharUpperBuffW.USER32(?,?,?,?,?,?,?,007EFDAD,?,?), ref: 007F0E31
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: BuffCharUpper
                              • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                              • API String ID: 3964851224-909552448
                              • Opcode ID: 7f77402577da17a9cf13d41fab54c958f9e76eb7ab80938db9eca307d3eea37d
                              • Instruction ID: 674db94e9d5c1344b37cf3f742b8f33e59afce183fe9c18c2785c5b4bb1a1572
                              • Opcode Fuzzy Hash: 7f77402577da17a9cf13d41fab54c958f9e76eb7ab80938db9eca307d3eea37d
                              • Instruction Fuzzy Hash: AA41253111025ACBCF10EE50E859AFE37A4FF11344F548454FE955B392DB38A95ACBE0
                              APIs
                              • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,007AE2A0,00000010,?,Bad directive syntax error,007FF910,00000000,?,?,?,>>>AUTOIT SCRIPT<<<), ref: 007CF7C2
                              • LoadStringW.USER32(00000000,?,007AE2A0,00000010), ref: 007CF7C9
                                • Part of subcall function 00777DE1: _memmove.LIBCMT ref: 00777E22
                              • _wprintf.LIBCMT ref: 007CF7FC
                              • __swprintf.LIBCMT ref: 007CF81E
                              • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 007CF88D
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: HandleLoadMessageModuleString__swprintf_memmove_wprintf
                              • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                              • API String ID: 1506413516-4153970271
                              • Opcode ID: 027dddb01e52d976cf57aabd8dce64d8df656984f9f648629cddec22ce2d8655
                              • Instruction ID: f546852e9265fe488edac6da549e9e0086cc9dd3e7f7f6040e762bd0f81893f8
                              • Opcode Fuzzy Hash: 027dddb01e52d976cf57aabd8dce64d8df656984f9f648629cddec22ce2d8655
                              • Instruction Fuzzy Hash: CC21513190021EEBCF16EF90DC4AEFE7779FF18300F044869F519661A1EA79A658DB50
                              APIs
                                • Part of subcall function 00777BCC: _memmove.LIBCMT ref: 00777C06
                                • Part of subcall function 00777924: _memmove.LIBCMT ref: 007779AD
                              • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 007D5330
                              • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 007D5346
                              • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 007D5357
                              • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 007D5369
                              • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 007D537A
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: SendString$_memmove
                              • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                              • API String ID: 2279737902-1007645807
                              • Opcode ID: 1b9e58134f0c31b6e8fa54c1556e14f4a240b609931a3d9b5c2adf85e37cb47b
                              • Instruction ID: 38ad3c23f0e375515132404b4789df6558c872438feee55ff99c04de9c4ba3e8
                              • Opcode Fuzzy Hash: 1b9e58134f0c31b6e8fa54c1556e14f4a240b609931a3d9b5c2adf85e37cb47b
                              • Instruction Fuzzy Hash: E511E620951229BADF24B761DC4DDFF7BBCFB92B84F00442AB415D21D0DEA81C44C970
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: _wcscpy$CleanupStartup_memmove_strcatgethostbynamegethostnameinet_ntoa
                              • String ID: 0.0.0.0
                              • API String ID: 208665112-3771769585
                              • Opcode ID: 2fe4e98484f780fc0aa2af35c36f8421c41b96ef5c1712082ea4772e59d2ef8e
                              • Instruction ID: 3416029413b86ef3ec18210049c3782d71a6bdba042070985204037deebed5ea
                              • Opcode Fuzzy Hash: 2fe4e98484f780fc0aa2af35c36f8421c41b96ef5c1712082ea4772e59d2ef8e
                              • Instruction Fuzzy Hash: 5711C031900114BFCF20BB30EC4AEEA77BCEF02721F0441BAF44596291EF789A81CA65
                              APIs
                              • timeGetTime.WINMM ref: 007D4F7A
                                • Part of subcall function 0079049F: timeGetTime.WINMM(?,7707B400,00780E7B), ref: 007904A3
                              • Sleep.KERNEL32(0000000A), ref: 007D4FA6
                              • EnumThreadWindows.USER32(?,Function_00064F28,00000000), ref: 007D4FCA
                              • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 007D4FEC
                              • SetActiveWindow.USER32 ref: 007D500B
                              • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 007D5019
                              • SendMessageW.USER32(00000010,00000000,00000000), ref: 007D5038
                              • Sleep.KERNEL32(000000FA), ref: 007D5043
                              • IsWindow.USER32 ref: 007D504F
                              • EndDialog.USER32(00000000), ref: 007D5060
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                              • String ID: BUTTON
                              • API String ID: 1194449130-3405671355
                              • Opcode ID: f05847783bf27b4faf747f54b59076d915926a5bf4908d6374f053d0c86c1893
                              • Instruction ID: 58bd874db67609d8871f7eff048818be04e570bcb454262f570032bb9deec2fd
                              • Opcode Fuzzy Hash: f05847783bf27b4faf747f54b59076d915926a5bf4908d6374f053d0c86c1893
                              • Instruction Fuzzy Hash: 38214971205605BFEB105F34EC89A363B79FB85746B089835F511822B1EF798D60CA76
                              APIs
                                • Part of subcall function 00779837: __itow.LIBCMT ref: 00779862
                                • Part of subcall function 00779837: __swprintf.LIBCMT ref: 007798AC
                              • CoInitialize.OLE32(00000000), ref: 007DD5EA
                              • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 007DD67D
                              • SHGetDesktopFolder.SHELL32(?), ref: 007DD691
                              • CoCreateInstance.OLE32(00802D7C,00000000,00000001,00828C1C,?), ref: 007DD6DD
                              • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 007DD74C
                              • CoTaskMemFree.OLE32(?,?), ref: 007DD7A4
                              • _memset.LIBCMT ref: 007DD7E1
                              • SHBrowseForFolderW.SHELL32(?), ref: 007DD81D
                              • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 007DD840
                              • CoTaskMemFree.OLE32(00000000), ref: 007DD847
                              • CoTaskMemFree.OLE32(00000000,00000001,00000000), ref: 007DD87E
                              • CoUninitialize.OLE32(00000001,00000000), ref: 007DD880
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize__itow__swprintf_memset
                              • String ID:
                              • API String ID: 1246142700-0
                              • Opcode ID: ff1597633340088a13f8b736580a04708baf325dc7d7f64149c98f67f3c653f1
                              • Instruction ID: 36cece88c59d97a817961cdff6e513cefcda173b8aa4258cb5bab477628f2cd2
                              • Opcode Fuzzy Hash: ff1597633340088a13f8b736580a04708baf325dc7d7f64149c98f67f3c653f1
                              • Instruction Fuzzy Hash: 7DB1E775A00109EFDB14DFA4C888DAEBBB9FF48354B1484A9E909EB361DB34ED45CB50
                              APIs
                              • GetDlgItem.USER32(?,00000001), ref: 007CC283
                              • GetWindowRect.USER32(00000000,?), ref: 007CC295
                              • MoveWindow.USER32(00000001,0000000A,?,00000001,?,00000000), ref: 007CC2F3
                              • GetDlgItem.USER32(?,00000002), ref: 007CC2FE
                              • GetWindowRect.USER32(00000000,?), ref: 007CC310
                              • MoveWindow.USER32(00000001,?,00000000,00000001,?,00000000), ref: 007CC364
                              • GetDlgItem.USER32(?,000003E9), ref: 007CC372
                              • GetWindowRect.USER32(00000000,?), ref: 007CC383
                              • MoveWindow.USER32(00000000,0000000A,00000000,?,?,00000000), ref: 007CC3C6
                              • GetDlgItem.USER32(?,000003EA), ref: 007CC3D4
                              • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 007CC3F1
                              • InvalidateRect.USER32(?,00000000,00000001), ref: 007CC3FE
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: Window$ItemMoveRect$Invalidate
                              • String ID:
                              • API String ID: 3096461208-0
                              • Opcode ID: 7376b0f4f7f3fff963c53fa17b359d13cf790a125a2adbababe5441e83bb4eec
                              • Instruction ID: 97d3bff26dba557a5557dd0cdcdde3e2cb5c54764f3b479af1e4c4e303968a2c
                              • Opcode Fuzzy Hash: 7376b0f4f7f3fff963c53fa17b359d13cf790a125a2adbababe5441e83bb4eec
                              • Instruction Fuzzy Hash: 58512E71B00205ABDB18CFA9DD99FAEBBBAEF88710F14812DF519D6290DB749D00CB14
                              APIs
                                • Part of subcall function 00771B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00772036,?,00000000,?,?,?,?,007716CB,00000000,?), ref: 00771B9A
                              • DestroyWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,?), ref: 007720D3
                              • KillTimer.USER32(-00000001,?,?,?,?,007716CB,00000000,?,?,00771AE2,?,?), ref: 0077216E
                              • DestroyAcceleratorTable.USER32(00000000), ref: 007ABCA6
                              • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,007716CB,00000000,?,?,00771AE2,?,?), ref: 007ABCD7
                              • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,007716CB,00000000,?,?,00771AE2,?,?), ref: 007ABCEE
                              • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,007716CB,00000000,?,?,00771AE2,?,?), ref: 007ABD0A
                              • DeleteObject.GDI32(00000000), ref: 007ABD1C
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                              • String ID:
                              • API String ID: 641708696-0
                              • Opcode ID: 24745fb8d387181067b051902dfb19452b13b1af8bf3e303dab48489c6874977
                              • Instruction ID: 9f81d73e787bd27d408e52d0f473970680413c15d90a11acbe683da73adecb17
                              • Opcode Fuzzy Hash: 24745fb8d387181067b051902dfb19452b13b1af8bf3e303dab48489c6874977
                              • Instruction Fuzzy Hash: 48618D31210A00DFCB359F14D948B3AB7F1FF81352F50C928E5568B972CB78A892DBA0
                              APIs
                                • Part of subcall function 007725DB: GetWindowLongW.USER32(?,000000EB), ref: 007725EC
                              • GetSysColor.USER32(0000000F), ref: 007721D3
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: ColorLongWindow
                              • String ID:
                              • API String ID: 259745315-0
                              • Opcode ID: d7680538dd9b0106e88814d6ac9fc585d084dba0b2164409e98739451f697cc8
                              • Instruction ID: d26e0d7750ccc45f697eedbf6586f608d7097f55121ed2ee3fb0dfcd3f77910d
                              • Opcode Fuzzy Hash: d7680538dd9b0106e88814d6ac9fc585d084dba0b2164409e98739451f697cc8
                              • Instruction Fuzzy Hash: 5B418031104144EADF215F289C88BB93B65FB46371F298265FE798A1E3CB398D42DB15
                              APIs
                              • CharLowerBuffW.USER32(?,?,007FF910), ref: 007DA90B
                              • GetDriveTypeW.KERNEL32(00000061,008289A0,00000061), ref: 007DA9D5
                              • _wcscpy.LIBCMT ref: 007DA9FF
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: BuffCharDriveLowerType_wcscpy
                              • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                              • API String ID: 2820617543-1000479233
                              • Opcode ID: f0ecb7313a4ec53ab1dc21e8eef9153da5b3167e3e3de18be5d38ca8baf7593c
                              • Instruction ID: a22f31f43e01bf89aae95b09e07faa9f9297151b67851d3276ac51db52a26e22
                              • Opcode Fuzzy Hash: f0ecb7313a4ec53ab1dc21e8eef9153da5b3167e3e3de18be5d38ca8baf7593c
                              • Instruction Fuzzy Hash: 7851AE31118301EFCB04EF14D896A6EB7B5FF84340F10882EF59997392DB79A949CA93
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: __i64tow__itow__swprintf
                              • String ID: %.15g$0x%p$False$True
                              • API String ID: 421087845-2263619337
                              • Opcode ID: d471ff57930e4ca55b50f5fad7ded3e4f9580a9b4e60c4714bac8a2ce067bf58
                              • Instruction ID: 5fdbf40c197739051b4cbcfe44b983024a5c3d4d1efdddf410e464ff2030f2c0
                              • Opcode Fuzzy Hash: d471ff57930e4ca55b50f5fad7ded3e4f9580a9b4e60c4714bac8a2ce067bf58
                              • Instruction Fuzzy Hash: EA41E571A01205EEDF24DF74D846E7A73E8FF46300F20857EE54DDA292EA3999418B11
                              APIs
                              • _memset.LIBCMT ref: 007F716A
                              • CreateMenu.USER32 ref: 007F7185
                              • SetMenu.USER32(?,00000000), ref: 007F7194
                              • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 007F7221
                              • IsMenu.USER32(?), ref: 007F7237
                              • CreatePopupMenu.USER32 ref: 007F7241
                              • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 007F726E
                              • DrawMenuBar.USER32 ref: 007F7276
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: Menu$CreateItem$DrawInfoInsertPopup_memset
                              • String ID: 0$F
                              • API String ID: 176399719-3044882817
                              • Opcode ID: cd7b588eb779008d16ec246a7a642a31a27b5da8c55189e2bd7a28e5789ddf42
                              • Instruction ID: aaf20265cab86ef0d08f47fdfd3ee5e8faa598dab62432c172d5782ed1359cf5
                              • Opcode Fuzzy Hash: cd7b588eb779008d16ec246a7a642a31a27b5da8c55189e2bd7a28e5789ddf42
                              • Instruction Fuzzy Hash: 46416A75A01209EFDB24DFA4D884EAABBF5FF48310F144029FA05A7361D735A920CF90
                              APIs
                              • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 007F755E
                              • CreateCompatibleDC.GDI32(00000000), ref: 007F7565
                              • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 007F7578
                              • SelectObject.GDI32(00000000,00000000), ref: 007F7580
                              • GetPixel.GDI32(00000000,00000000,00000000), ref: 007F758B
                              • DeleteDC.GDI32(00000000), ref: 007F7594
                              • GetWindowLongW.USER32(?,000000EC), ref: 007F759E
                              • SetLayeredWindowAttributes.USER32(?,00000000,00000000,00000001), ref: 007F75B2
                              • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?,?), ref: 007F75BE
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                              • String ID: static
                              • API String ID: 2559357485-2160076837
                              • Opcode ID: 2da6e1e26b7eadf202e3d80b8379b5e1b267e7c407ebf4e6256ca864c7993bfb
                              • Instruction ID: f8c327428744cfe4769a8114ddfdd8314a01d5d9363566d2f6bb58388f2aba0f
                              • Opcode Fuzzy Hash: 2da6e1e26b7eadf202e3d80b8379b5e1b267e7c407ebf4e6256ca864c7993bfb
                              • Instruction Fuzzy Hash: CD314D72105219BBDF159F64DC49FFA3B69FF09360F114224FA15962A0CB39D821DBA8
                              APIs
                              • _memset.LIBCMT ref: 00796E3E
                                • Part of subcall function 00798B28: __getptd_noexit.LIBCMT ref: 00798B28
                              • __gmtime64_s.LIBCMT ref: 00796ED7
                              • __gmtime64_s.LIBCMT ref: 00796F0D
                              • __gmtime64_s.LIBCMT ref: 00796F2A
                              • __allrem.LIBCMT ref: 00796F80
                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00796F9C
                              • __allrem.LIBCMT ref: 00796FB3
                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00796FD1
                              • __allrem.LIBCMT ref: 00796FE8
                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00797006
                              • __invoke_watson.LIBCMT ref: 00797077
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@__gmtime64_s$__getptd_noexit__invoke_watson_memset
                              • String ID:
                              • API String ID: 384356119-0
                              • Opcode ID: 1572197e9c4cf49d3ac3c19b6e82465e4eefa01e3d88f7bbd38cf7a66862b9c5
                              • Instruction ID: e184e0029a45db4bda2d25b8be4727daae20e71245525f6bb84d0c7ac93633f0
                              • Opcode Fuzzy Hash: 1572197e9c4cf49d3ac3c19b6e82465e4eefa01e3d88f7bbd38cf7a66862b9c5
                              • Instruction Fuzzy Hash: F971F576A00B16EBDF18AE6CEC45B6AB7A9BF45720F148329F514D7281F778DD008790
                              APIs
                              • _memset.LIBCMT ref: 007D2542
                              • GetMenuItemInfoW.USER32(00835890,000000FF,00000000,00000030), ref: 007D25A3
                              • SetMenuItemInfoW.USER32(00835890,00000004,00000000,00000030), ref: 007D25D9
                              • Sleep.KERNEL32(000001F4), ref: 007D25EB
                              • GetMenuItemCount.USER32(?), ref: 007D262F
                              • GetMenuItemID.USER32(?,00000000), ref: 007D264B
                              • GetMenuItemID.USER32(?,-00000001), ref: 007D2675
                              • GetMenuItemID.USER32(?,?), ref: 007D26BA
                              • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 007D2700
                              • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 007D2714
                              • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 007D2735
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: ItemMenu$Info$CheckCountRadioSleep_memset
                              • String ID:
                              • API String ID: 4176008265-0
                              • Opcode ID: dd6337625678a0017991a36f462972603b281f1b06c87f21af9c3a9d51cc84b7
                              • Instruction ID: 28f95f6f5ab3ae5d7b8f847881bb151cc1083daba9c9d01d4862e24919620113
                              • Opcode Fuzzy Hash: dd6337625678a0017991a36f462972603b281f1b06c87f21af9c3a9d51cc84b7
                              • Instruction Fuzzy Hash: 0A618B70900249AFDB21CF64DC88DBE7BB8FB51314F14445AE942A7352DB39AD17DB20
                              APIs
                              • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 007F6FA5
                              • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 007F6FA8
                              • GetWindowLongW.USER32(?,000000F0), ref: 007F6FCC
                              • _memset.LIBCMT ref: 007F6FDD
                              • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 007F6FEF
                              • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 007F7067
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: MessageSend$LongWindow_memset
                              • String ID:
                              • API String ID: 830647256-0
                              • Opcode ID: 8192492faa7dd97659abe9ca3b2e3733d4d7a3c7254c91e6ffdd688fa97e687d
                              • Instruction ID: dfc1837fd7d25f6e53f58682e07a064add08aa3ac285118ec44274cadc3e7254
                              • Opcode Fuzzy Hash: 8192492faa7dd97659abe9ca3b2e3733d4d7a3c7254c91e6ffdd688fa97e687d
                              • Instruction Fuzzy Hash: C2615875900208AFDB10DFA4CC81EFE77B8AF49710F1041AAFA14AB3A1C775A945DBA0
                              APIs
                              • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 007C6BBF
                              • SafeArrayAllocData.OLEAUT32(?), ref: 007C6C18
                              • VariantInit.OLEAUT32(?), ref: 007C6C2A
                              • SafeArrayAccessData.OLEAUT32(?,?), ref: 007C6C4A
                              • VariantCopy.OLEAUT32(?,?), ref: 007C6C9D
                              • SafeArrayUnaccessData.OLEAUT32(?), ref: 007C6CB1
                              • VariantClear.OLEAUT32(?), ref: 007C6CC6
                              • SafeArrayDestroyData.OLEAUT32(?), ref: 007C6CD3
                              • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 007C6CDC
                              • VariantClear.OLEAUT32(?), ref: 007C6CEE
                              • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 007C6CF9
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                              • String ID:
                              • API String ID: 2706829360-0
                              • Opcode ID: 3fb2d3432adcf6551ee08812bab715d491a28703abda79d8fb94f3cf336767ad
                              • Instruction ID: ce581c287e86a21ca87f89bb44a4b9698a01ff9f2e2f55398d614db872e7c09e
                              • Opcode Fuzzy Hash: 3fb2d3432adcf6551ee08812bab715d491a28703abda79d8fb94f3cf336767ad
                              • Instruction Fuzzy Hash: F8414075A00219DFCF10DF64D888EAEBBB9EF08350F00C06DE955A7261CB38E945CBA5
                              APIs
                              • WSAStartup.WSOCK32(00000101,?), ref: 007E5793
                              • inet_addr.WSOCK32(?,?,?), ref: 007E57D8
                              • gethostbyname.WSOCK32(?), ref: 007E57E4
                              • IcmpCreateFile.IPHLPAPI ref: 007E57F2
                              • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 007E5862
                              • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 007E5878
                              • IcmpCloseHandle.IPHLPAPI(00000000), ref: 007E58ED
                              • WSACleanup.WSOCK32 ref: 007E58F3
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                              • String ID: Ping
                              • API String ID: 1028309954-2246546115
                              • Opcode ID: 886bfdfea70e2f306831fc2747e7234d1993d87ed66639cdea0477c4781ab1a6
                              • Instruction ID: def73966f2d2abb08d30b97603bdf07a07bcd16ca6f419b36aacc66558ae0c55
                              • Opcode Fuzzy Hash: 886bfdfea70e2f306831fc2747e7234d1993d87ed66639cdea0477c4781ab1a6
                              • Instruction Fuzzy Hash: 60518F31605744DFDB10AF25DC49B2AB7E4EF48764F048929F95ADB2A1DB78E800CB42
                              APIs
                              • SetErrorMode.KERNEL32(00000001), ref: 007DB4D0
                              • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 007DB546
                              • GetLastError.KERNEL32 ref: 007DB550
                              • SetErrorMode.KERNEL32(00000000,READY), ref: 007DB5BD
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: Error$Mode$DiskFreeLastSpace
                              • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                              • API String ID: 4194297153-14809454
                              • Opcode ID: a8ff07adf6540be4932466330a44e319acf92bfaf6a6b9ee92dee5ca78afed97
                              • Instruction ID: 85a2f214e77ab3d61e5c8a525d3990f58b1d111608cb2c27d2cd07d60ec0daf4
                              • Opcode Fuzzy Hash: a8ff07adf6540be4932466330a44e319acf92bfaf6a6b9ee92dee5ca78afed97
                              • Instruction Fuzzy Hash: 22317E75A00209DFCB00EF68E889ABD7BB4FF08310F11816AF606D7391DB799A51CB51
                              APIs
                                • Part of subcall function 00777DE1: _memmove.LIBCMT ref: 00777E22
                                • Part of subcall function 007CAA99: GetClassNameW.USER32(?,?,000000FF), ref: 007CAABC
                              • SendMessageW.USER32(?,0000018C,000000FF,00000002), ref: 007C9014
                              • GetDlgCtrlID.USER32 ref: 007C901F
                              • GetParent.USER32 ref: 007C903B
                              • SendMessageW.USER32(00000000,?,00000111,?), ref: 007C903E
                              • GetDlgCtrlID.USER32(?), ref: 007C9047
                              • GetParent.USER32(?), ref: 007C9063
                              • SendMessageW.USER32(00000000,?,?,00000111), ref: 007C9066
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: MessageSend$CtrlParent$ClassName_memmove
                              • String ID: ComboBox$ListBox
                              • API String ID: 1536045017-1403004172
                              • Opcode ID: 9871288d80aaa88aa15822c560f8d75770108c0bd9cc87ec8db38caac2350077
                              • Instruction ID: 814096fc3f8988da7f9eb52c2fe0d07f560ca88b5f46032bdc41e776bcddbc06
                              • Opcode Fuzzy Hash: 9871288d80aaa88aa15822c560f8d75770108c0bd9cc87ec8db38caac2350077
                              • Instruction Fuzzy Hash: 0A21B070A00109FBDF04ABA0CC89EBEBB74EF49310F10816DFA21972A1DF7D9855DA24
                              APIs
                                • Part of subcall function 00777DE1: _memmove.LIBCMT ref: 00777E22
                                • Part of subcall function 007CAA99: GetClassNameW.USER32(?,?,000000FF), ref: 007CAABC
                              • SendMessageW.USER32(?,00000186,00000002,00000000), ref: 007C90FD
                              • GetDlgCtrlID.USER32 ref: 007C9108
                              • GetParent.USER32 ref: 007C9124
                              • SendMessageW.USER32(00000000,?,00000111,?), ref: 007C9127
                              • GetDlgCtrlID.USER32(?), ref: 007C9130
                              • GetParent.USER32(?), ref: 007C914C
                              • SendMessageW.USER32(00000000,?,?,00000111), ref: 007C914F
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: MessageSend$CtrlParent$ClassName_memmove
                              • String ID: ComboBox$ListBox
                              • API String ID: 1536045017-1403004172
                              • Opcode ID: b8d11a79dc54494bc093b061fd09d71a4f4bf83f219a66300fce39c3979e77a9
                              • Instruction ID: 931d6a3e259dc0ee42b3d64867da172697d45169b37d26f3744668504bbc60a2
                              • Opcode Fuzzy Hash: b8d11a79dc54494bc093b061fd09d71a4f4bf83f219a66300fce39c3979e77a9
                              • Instruction Fuzzy Hash: 1F219074A00109FBDF15ABA4CC89FFEBB64EF48300F108059FA55972A1DA7D5855DA24
                              APIs
                              • GetParent.USER32 ref: 007C916F
                              • GetClassNameW.USER32(00000000,?,00000100), ref: 007C9184
                              • _wcscmp.LIBCMT ref: 007C9196
                              • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 007C9211
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: ClassMessageNameParentSend_wcscmp
                              • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                              • API String ID: 1704125052-3381328864
                              • Opcode ID: a90834fa4cb99d053807b2e20f2f4d4d55a20007bbc5680665912783c194e0e2
                              • Instruction ID: c549e1e916959dd956adfa38d5b18b7cf11c637f614f11f9fc521d2e602fde52
                              • Opcode Fuzzy Hash: a90834fa4cb99d053807b2e20f2f4d4d55a20007bbc5680665912783c194e0e2
                              • Instruction Fuzzy Hash: F311E776648317FAFA113624FC0FEA77B9CFF15720B20002EFA10E45D2EE6D58919554
                              APIs
                              • VariantInit.OLEAUT32(?), ref: 007E88D7
                              • CoInitialize.OLE32(00000000), ref: 007E8904
                              • CoUninitialize.OLE32 ref: 007E890E
                              • GetRunningObjectTable.OLE32(00000000,?), ref: 007E8A0E
                              • SetErrorMode.KERNEL32(00000001,00000029), ref: 007E8B3B
                              • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,00802C0C), ref: 007E8B6F
                              • CoGetObject.OLE32(?,00000000,00802C0C,?), ref: 007E8B92
                              • SetErrorMode.KERNEL32(00000000), ref: 007E8BA5
                              • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 007E8C25
                              • VariantClear.OLEAUT32(?), ref: 007E8C35
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize
                              • String ID:
                              • API String ID: 2395222682-0
                              • Opcode ID: 838c356aee0b47a93d33b865b6ab2ead394e155b89ef5a7462b06ebcf307ffdf
                              • Instruction ID: 6efc67fbba378c056cee2b408c310c7a341da7a245b6f579a328595a366bc50b
                              • Opcode Fuzzy Hash: 838c356aee0b47a93d33b865b6ab2ead394e155b89ef5a7462b06ebcf307ffdf
                              • Instruction Fuzzy Hash: 17C153B1209345EFC740DF25C88492AB7E9FF89348F00896DF98A9B261DB75ED05CB52
                              APIs
                              • SafeArrayGetVartype.OLEAUT32(00000000,?), ref: 007D7A6C
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: ArraySafeVartype
                              • String ID:
                              • API String ID: 1725837607-0
                              • Opcode ID: e73c40bd7f0cae4d0ee4d9fec1bbabe6e91b8c4d15c9e02bf3c0abd9c18629dd
                              • Instruction ID: 085567609dbbe96fd7128ff31ba6489064e15fbdbbba3015c2f10c7ed614c456
                              • Opcode Fuzzy Hash: e73c40bd7f0cae4d0ee4d9fec1bbabe6e91b8c4d15c9e02bf3c0abd9c18629dd
                              • Instruction Fuzzy Hash: 20B19E71914219DFDB04DFA4D885BBEB7B8FF09321F24442AE605E7351E738A941CBA0
                              APIs
                              • GetCurrentThreadId.KERNEL32 ref: 007D11F0
                              • GetForegroundWindow.USER32(00000000,?,?,?,?,?,007D0268,?,00000001), ref: 007D1204
                              • GetWindowThreadProcessId.USER32(00000000), ref: 007D120B
                              • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,007D0268,?,00000001), ref: 007D121A
                              • GetWindowThreadProcessId.USER32(?,00000000), ref: 007D122C
                              • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,007D0268,?,00000001), ref: 007D1245
                              • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,007D0268,?,00000001), ref: 007D1257
                              • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,007D0268,?,00000001), ref: 007D129C
                              • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,007D0268,?,00000001), ref: 007D12B1
                              • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,007D0268,?,00000001), ref: 007D12BC
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                              • String ID:
                              • API String ID: 2156557900-0
                              • Opcode ID: e61794d186cb354a6a5c920d490a46e6c911ca96e2871fc1c7097178dbcf5c41
                              • Instruction ID: 5c7ab2c888bab46a1e416725166472e16d71838fe84161e5937c9fec30f0d4fc
                              • Opcode Fuzzy Hash: e61794d186cb354a6a5c920d490a46e6c911ca96e2871fc1c7097178dbcf5c41
                              • Instruction Fuzzy Hash: 09318D75700204FBEB10DF58ED88B797BB9BF98311F508526F900CA2A0EB79AD40CB65
                              APIs
                              • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 0077FAA6
                              • OleUninitialize.OLE32(?,00000000), ref: 0077FB45
                              • UnregisterHotKey.USER32(?), ref: 0077FC9C
                              • DestroyWindow.USER32(?), ref: 007B45D6
                              • FreeLibrary.KERNEL32(?), ref: 007B463B
                              • VirtualFree.KERNEL32(?,00000000,00008000), ref: 007B4668
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                              • String ID: close all
                              • API String ID: 469580280-3243417748
                              • Opcode ID: 24da08859ab9ff91db7aeef3d57ca1549e0acadbe236254ac54149be9ea1112e
                              • Instruction ID: c9746acae675eab6420c853cd7e594e1a82b670e3d2223a60ed4226e0541eed6
                              • Opcode Fuzzy Hash: 24da08859ab9ff91db7aeef3d57ca1549e0acadbe236254ac54149be9ea1112e
                              • Instruction Fuzzy Hash: 36A15C70701212CFCB29EF14C999B69F364BF05754F1582ADE90AAB262DB38AC16CF50
                              APIs
                              • EnumChildWindows.USER32(?,007CA439), ref: 007CA377
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: ChildEnumWindows
                              • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                              • API String ID: 3555792229-1603158881
                              • Opcode ID: 14447006cc543b58e43102e9e0d1e2e3b7bb9722e50532e89f98558d7975e0a8
                              • Instruction ID: 1b68b3ec5a384aa45bde6d9ea431b83e2738da6e375511dea02dd9475f9c6069
                              • Opcode Fuzzy Hash: 14447006cc543b58e43102e9e0d1e2e3b7bb9722e50532e89f98558d7975e0a8
                              • Instruction Fuzzy Hash: 3B919E30A0061AEACF08EFA0D45AFEDBBB4FF04309F54811DE949A3141DB386999DBD1
                              APIs
                              • SetWindowLongW.USER32(?,000000EB), ref: 00772EAE
                                • Part of subcall function 00771DB3: GetClientRect.USER32(?,?), ref: 00771DDC
                                • Part of subcall function 00771DB3: GetWindowRect.USER32(?,?), ref: 00771E1D
                                • Part of subcall function 00771DB3: ScreenToClient.USER32(?,?), ref: 00771E45
                              • GetDC.USER32 ref: 007ACD32
                              • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 007ACD45
                              • SelectObject.GDI32(00000000,00000000), ref: 007ACD53
                              • SelectObject.GDI32(00000000,00000000), ref: 007ACD68
                              • ReleaseDC.USER32(?,00000000), ref: 007ACD70
                              • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 007ACDFB
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                              • String ID: U
                              • API String ID: 4009187628-3372436214
                              • Opcode ID: d22c3123f4084e143fa3d1b4a9c3c5df50cf4f0372fada7e9e86ec12cbf01713
                              • Instruction ID: 3acefa4043120405d3cd42d7322399da53594a50ebad933838b4c3d5f943d4b4
                              • Opcode Fuzzy Hash: d22c3123f4084e143fa3d1b4a9c3c5df50cf4f0372fada7e9e86ec12cbf01713
                              • Instruction Fuzzy Hash: B971E831500205EFCF268F64CC84ABA7BB5FF8A360F14877AED595A266C7398C51DB60
                              APIs
                              • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 007E1A50
                              • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 007E1A7C
                              • InternetQueryOptionW.WININET(00000000,0000001F,00000000,?), ref: 007E1ABE
                              • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 007E1AD3
                              • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 007E1AE0
                              • HttpQueryInfoW.WININET(00000000,00000005,?,?,00000000), ref: 007E1B10
                              • InternetCloseHandle.WININET(00000000), ref: 007E1B57
                                • Part of subcall function 007E2483: GetLastError.KERNEL32(?,?,007E1817,00000000,00000000,00000001), ref: 007E2498
                                • Part of subcall function 007E2483: SetEvent.KERNEL32(?,?,007E1817,00000000,00000000,00000001), ref: 007E24AD
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: Internet$Http$OptionQueryRequest$CloseConnectErrorEventHandleInfoLastOpenSend
                              • String ID:
                              • API String ID: 2603140658-3916222277
                              • Opcode ID: 2cb9893f3e5d2a53c2ccb6c16135e828121dfa87cce8bc2dabeb2745cfb7f589
                              • Instruction ID: d7484ecb838977d7a0333fb2a9307368c9f774277986a9fe2cc0a78672d0636a
                              • Opcode Fuzzy Hash: 2cb9893f3e5d2a53c2ccb6c16135e828121dfa87cce8bc2dabeb2745cfb7f589
                              • Instruction Fuzzy Hash: A64162B1502258BFEB119F61CC8AFBA77ACFF08354F408126F9059A141EB789E44DBA4
                              APIs
                              • GetModuleFileNameW.KERNEL32(?,?,00000104,?,007FF910), ref: 007E8D28
                              • FreeLibrary.KERNEL32(00000000,00000001,00000000,?,007FF910), ref: 007E8D5C
                              • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 007E8ED6
                              • SysFreeString.OLEAUT32(?), ref: 007E8F00
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: Free$FileLibraryModuleNamePathQueryStringType
                              • String ID:
                              • API String ID: 560350794-0
                              • Opcode ID: 4824c2ede9f8e34b5168470e559d4216193ba334b170773f8ca4b77ba1f262ca
                              • Instruction ID: 48a941eec5d8529565a588bbe9f59f94627338c76d68a9e44f78e5fd1729fdae
                              • Opcode Fuzzy Hash: 4824c2ede9f8e34b5168470e559d4216193ba334b170773f8ca4b77ba1f262ca
                              • Instruction Fuzzy Hash: 5EF16D71A01209EFCF44DF95C888EAEB7B9FF49314F108498FA09AB251DB35AE45CB51
                              APIs
                              • _memset.LIBCMT ref: 007EF6B5
                              • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 007EF848
                              • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 007EF86C
                              • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 007EF8AC
                              • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 007EF8CE
                              • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 007EFA4A
                              • GetLastError.KERNEL32(00000000,00000001,00000000), ref: 007EFA7C
                              • CloseHandle.KERNEL32(?), ref: 007EFAAB
                              • CloseHandle.KERNEL32(?), ref: 007EFB22
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: Directory$CloseCurrentHandleSystem$CreateErrorLastProcess_memset
                              • String ID:
                              • API String ID: 4090791747-0
                              • Opcode ID: 702313f29d7ba0ec3ee8afd8ebb9954e377f439f926284bfd03b7aa45bade6fd
                              • Instruction ID: c2ad4b511cacc599d9ad6680668a94c2a0acae49c9d8229df687622f3fb04a34
                              • Opcode Fuzzy Hash: 702313f29d7ba0ec3ee8afd8ebb9954e377f439f926284bfd03b7aa45bade6fd
                              • Instruction Fuzzy Hash: CBE1BE71205340DFCB14EF25C885B6ABBE1EF89354F14856DF8998B2A2DB39EC41CB52
                              APIs
                                • Part of subcall function 007D466E: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,007D3697,?), ref: 007D468B
                                • Part of subcall function 007D466E: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,007D3697,?), ref: 007D46A4
                                • Part of subcall function 007D4A31: GetFileAttributesW.KERNEL32(?,007D370B), ref: 007D4A32
                              • lstrcmpiW.KERNEL32(?,?), ref: 007D4D40
                              • _wcscmp.LIBCMT ref: 007D4D5A
                              • MoveFileW.KERNEL32(?,?), ref: 007D4D75
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: FileFullNamePath$AttributesMove_wcscmplstrcmpi
                              • String ID:
                              • API String ID: 793581249-0
                              • Opcode ID: 30f4fb0df5080d3a8d38b35551d80ae513608765aafef5348109a2b759066f92
                              • Instruction ID: 6ba237c84d753ffd9da661249b8ddc25cdb4c9120fd518be43c0588d2563eba1
                              • Opcode Fuzzy Hash: 30f4fb0df5080d3a8d38b35551d80ae513608765aafef5348109a2b759066f92
                              • Instruction Fuzzy Hash: A95165B25083859BC724EBA0D8859DF73ECAF85350F40492FF289D3251EF78A588C766
                              APIs
                              • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 007F86FF
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: InvalidateRect
                              • String ID:
                              • API String ID: 634782764-0
                              • Opcode ID: cded31c83bcc56c16ea5afd4765adc33e1e9d767d4d2d071670fa58825d6a0af
                              • Instruction ID: 3259d20ebc46a59642da0d3537018eff6870abcfcc20aa7b4fd4e5fa030c3372
                              • Opcode Fuzzy Hash: cded31c83bcc56c16ea5afd4765adc33e1e9d767d4d2d071670fa58825d6a0af
                              • Instruction Fuzzy Hash: F2518131610248FEDF609B68CC89FB97B64FB05360F604115FB14EA3A2CF79A990DB56
                              APIs
                              • LoadImageW.USER32(00000000,?,00000001,00000010,00000010,00000010), ref: 007AC2F7
                              • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 007AC319
                              • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 007AC331
                              • ExtractIconExW.SHELL32(?,00000000,?,00000000,00000001), ref: 007AC34F
                              • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 007AC370
                              • DestroyIcon.USER32(00000000), ref: 007AC37F
                              • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 007AC39C
                              • DestroyIcon.USER32(?), ref: 007AC3AB
                                • Part of subcall function 007FA4AF: DeleteObject.GDI32(00000000), ref: 007FA4E8
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: Icon$DestroyExtractImageLoadMessageSend$DeleteObject
                              • String ID:
                              • API String ID: 2819616528-0
                              • Opcode ID: 7863fd4a19821f1dd4524cfd0d338c53676cc85846422fab82e873eb3433f980
                              • Instruction ID: f91cf8ade211bc935270fa3a75b87aef0a414bc70fc44115c92ea20ae58e0595
                              • Opcode Fuzzy Hash: 7863fd4a19821f1dd4524cfd0d338c53676cc85846422fab82e873eb3433f980
                              • Instruction Fuzzy Hash: 2E517970A00209EFDF20DF64CC45BAA7BA5FF58350F108628F916972A1DB78AD91DB60
                              APIs
                                • Part of subcall function 007CA82C: GetWindowThreadProcessId.USER32(?,00000000), ref: 007CA84C
                                • Part of subcall function 007CA82C: GetCurrentThreadId.KERNEL32 ref: 007CA853
                                • Part of subcall function 007CA82C: AttachThreadInput.USER32(00000000,?,007C9683,?,00000001), ref: 007CA85A
                              • MapVirtualKeyW.USER32(00000025,00000000), ref: 007C968E
                              • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 007C96AB
                              • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000,?,00000001), ref: 007C96AE
                              • MapVirtualKeyW.USER32(00000025,00000000), ref: 007C96B7
                              • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 007C96D5
                              • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 007C96D8
                              • MapVirtualKeyW.USER32(00000025,00000000), ref: 007C96E1
                              • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 007C96F8
                              • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 007C96FB
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                              • String ID:
                              • API String ID: 2014098862-0
                              • Opcode ID: 3e3cbf1b9338559fe6500924df054b5b8cd148a0b01954ee256ce8f78ccd8769
                              • Instruction ID: 0f0a0a85e41418291b82a1c7af30aabc717c603c4790330014aceb46e85feccf
                              • Opcode Fuzzy Hash: 3e3cbf1b9338559fe6500924df054b5b8cd148a0b01954ee256ce8f78ccd8769
                              • Instruction Fuzzy Hash: 7A11ACB1910218BBF6106B609C89F7A3B2DEF4C755F104429F244AB1A0CDB65C10DAA8
                              APIs
                              • GetProcessHeap.KERNEL32(00000008,0000000C), ref: 007C892A
                              • HeapAlloc.KERNEL32(00000000), ref: 007C8931
                              • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002), ref: 007C8946
                              • GetCurrentProcess.KERNEL32(?,00000000), ref: 007C894E
                              • DuplicateHandle.KERNEL32(00000000), ref: 007C8951
                              • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002), ref: 007C8961
                              • GetCurrentProcess.KERNEL32(?,00000000), ref: 007C8969
                              • DuplicateHandle.KERNEL32(00000000), ref: 007C896C
                              • CreateThread.KERNEL32(00000000,00000000,007C8992,00000000,00000000,00000000), ref: 007C8986
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                              • String ID:
                              • API String ID: 1957940570-0
                              • Opcode ID: ea325faa6987d3bb7e0c072ff07e3f9ef17b2d61a770c53bbc678c3352f4aab7
                              • Instruction ID: 33e15ad81b58785bb86dbebaf27507040df07920949da0a0f030dc58ee26d01d
                              • Opcode Fuzzy Hash: ea325faa6987d3bb7e0c072ff07e3f9ef17b2d61a770c53bbc678c3352f4aab7
                              • Instruction Fuzzy Hash: F401A8B5240308FFE610ABA5DC89F6B3BACEF89711F408425FA05DB2A1CA749C10CA25
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID:
                              • String ID: NULL Pointer assignment$Not an Object type
                              • API String ID: 0-572801152
                              • Opcode ID: 072aceb3d2d5b064454d8e6c618d313e83c4ed715e10c7f529f517f3710958f8
                              • Instruction ID: cad4ec7177fd3b88dd6611aca6b2b76929ed03e8851562bb7310fe1e1527b0d9
                              • Opcode Fuzzy Hash: 072aceb3d2d5b064454d8e6c618d313e83c4ed715e10c7f529f517f3710958f8
                              • Instruction Fuzzy Hash: 45C1B372A012599FDF10DF69D884BAEB7F5FF48314F148469EA05EB280E774AD40CBA0
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: Variant$ClearInit$_memset
                              • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                              • API String ID: 2862541840-625585964
                              • Opcode ID: 57379187f7185baca919029877b7f7b4636b1d57bc54e90cf3dfce022aa1f361
                              • Instruction ID: c51d299aaecfef469fd5294927227c6c68809538afc29a39d574065d0e94f6ef
                              • Opcode Fuzzy Hash: 57379187f7185baca919029877b7f7b4636b1d57bc54e90cf3dfce022aa1f361
                              • Instruction Fuzzy Hash: 4891B372A01255EBDF24CFA6C848FAEB7B8FF49710F108119F615AB280D7789944CBA0
                              APIs
                                • Part of subcall function 007C710A: CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,007C7044,80070057,?,?,?,007C7455), ref: 007C7127
                                • Part of subcall function 007C710A: ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,007C7044,80070057,?,?), ref: 007C7142
                                • Part of subcall function 007C710A: lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,007C7044,80070057,?,?), ref: 007C7150
                                • Part of subcall function 007C710A: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,007C7044,80070057,?), ref: 007C7160
                              • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,?,?,?), ref: 007E9806
                              • _memset.LIBCMT ref: 007E9813
                              • _memset.LIBCMT ref: 007E9956
                              • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,00000000), ref: 007E9982
                              • CoTaskMemFree.OLE32(?), ref: 007E998D
                              Strings
                              • NULL Pointer assignment, xrefs: 007E99DB
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: FreeFromProgTask_memset$CreateInitializeInstanceSecuritylstrcmpi
                              • String ID: NULL Pointer assignment
                              • API String ID: 1300414916-2785691316
                              • Opcode ID: f11b3c25e17c718a91bbdd9362abde2773e3d358f4afdcfb8d6238a7c8b1da8b
                              • Instruction ID: a71454d13eeec8e17268d219c5ea4d01b1131f9e563116dd15a3a67ae92fd7a9
                              • Opcode Fuzzy Hash: f11b3c25e17c718a91bbdd9362abde2773e3d358f4afdcfb8d6238a7c8b1da8b
                              • Instruction Fuzzy Hash: 8D915972D01219EBDF10DFA5DC84EDEBBB9AF08350F10802AF519A7251DB75AA44CFA0
                              APIs
                              • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 007F6E24
                              • SendMessageW.USER32(?,00001036,00000000,?), ref: 007F6E38
                              • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 007F6E52
                              • _wcscat.LIBCMT ref: 007F6EAD
                              • SendMessageW.USER32(?,00001057,00000000,?), ref: 007F6EC4
                              • SendMessageW.USER32(?,00001061,?,0000000F), ref: 007F6EF2
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: MessageSend$Window_wcscat
                              • String ID: SysListView32
                              • API String ID: 307300125-78025650
                              • Opcode ID: 13d1bb484520c1a4cc9397fd88a8f61d4250726cc726efed897a4f799d394422
                              • Instruction ID: ae2ef781715c34f364194a0bb57eb0c3e9bcc2af5547b3902bd7805e7bc3c268
                              • Opcode Fuzzy Hash: 13d1bb484520c1a4cc9397fd88a8f61d4250726cc726efed897a4f799d394422
                              • Instruction Fuzzy Hash: AD418F75A00348EBDF219F64CC85BFA77E8EF08350F10442AF694E7291D6799D84CB64
                              APIs
                                • Part of subcall function 007D3C55: CreateToolhelp32Snapshot.KERNEL32 ref: 007D3C7A
                                • Part of subcall function 007D3C55: Process32FirstW.KERNEL32(00000000,?), ref: 007D3C88
                                • Part of subcall function 007D3C55: CloseHandle.KERNEL32(00000000), ref: 007D3D52
                              • OpenProcess.KERNEL32(00000001,00000000,?), ref: 007EE9A4
                              • GetLastError.KERNEL32 ref: 007EE9B7
                              • OpenProcess.KERNEL32(00000001,00000000,?), ref: 007EE9E6
                              • TerminateProcess.KERNEL32(00000000,00000000), ref: 007EEA63
                              • GetLastError.KERNEL32(00000000), ref: 007EEA6E
                              • CloseHandle.KERNEL32(00000000), ref: 007EEAA3
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                              • String ID: SeDebugPrivilege
                              • API String ID: 2533919879-2896544425
                              • Opcode ID: 51893cc542ae820d8c7cb975444ca914717971007ea1c4f7582674f35751c3fb
                              • Instruction ID: 22543c59c65fda35e2d25290aa651ce7e0a31cb422153f506f48e3f0b57a1a60
                              • Opcode Fuzzy Hash: 51893cc542ae820d8c7cb975444ca914717971007ea1c4f7582674f35751c3fb
                              • Instruction Fuzzy Hash: 83419931200201DFDB10EF14CCA9F79B7A5AF44314F14C86CF9469B2C2CB78A804CB96
                              APIs
                              • LoadIconW.USER32(00000000,00007F03), ref: 007D3033
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: IconLoad
                              • String ID: blank$info$question$stop$warning
                              • API String ID: 2457776203-404129466
                              • Opcode ID: 5e013ac4fe51a5701ae2f86542b7495bc17284a37714fc58c3fa35623cbb77f4
                              • Instruction ID: d79adb1f2003f452188e4eaf23cc9eeef426bc01d4a09d7afbaa5e79afa9155a
                              • Opcode Fuzzy Hash: 5e013ac4fe51a5701ae2f86542b7495bc17284a37714fc58c3fa35623cbb77f4
                              • Instruction Fuzzy Hash: BA112B31749346FEEB14AB54EC86CAB77BCDF15360B50002BF900A6382DB7D5F4155A6
                              APIs
                              • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 007D4312
                              • LoadStringW.USER32(00000000), ref: 007D4319
                              • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 007D432F
                              • LoadStringW.USER32(00000000), ref: 007D4336
                              • _wprintf.LIBCMT ref: 007D435C
                              • MessageBoxW.USER32(00000000,?,?,00011010), ref: 007D437A
                              Strings
                              • %s (%d) : ==> %s: %s %s, xrefs: 007D4357
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: HandleLoadModuleString$Message_wprintf
                              • String ID: %s (%d) : ==> %s: %s %s
                              • API String ID: 3648134473-3128320259
                              • Opcode ID: 27fdef8454f6962b1a8469100b2607e6d1c89f302d55d5dd5d4e146edc9813de
                              • Instruction ID: dea67ae5438241b58525a796cecce5119978d44d0488f0335dccdf9f81170bcf
                              • Opcode Fuzzy Hash: 27fdef8454f6962b1a8469100b2607e6d1c89f302d55d5dd5d4e146edc9813de
                              • Instruction Fuzzy Hash: CB014FF290020CBFE71197A4DD89EF6776CEB08301F0045A2F745E2151EE785E858B78
                              APIs
                                • Part of subcall function 00772612: GetWindowLongW.USER32(?,000000EB), ref: 00772623
                              • GetSystemMetrics.USER32(0000000F), ref: 007FD47C
                              • GetSystemMetrics.USER32(0000000F), ref: 007FD49C
                              • MoveWindow.USER32(00000003,?,?,?,?,00000000,?,?,?), ref: 007FD6D7
                              • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 007FD6F5
                              • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 007FD716
                              • ShowWindow.USER32(00000003,00000000), ref: 007FD735
                              • InvalidateRect.USER32(?,00000000,00000001), ref: 007FD75A
                              • DefDlgProcW.USER32(?,00000005,?,?), ref: 007FD77D
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: Window$MessageMetricsSendSystem$InvalidateLongMoveProcRectShow
                              • String ID:
                              • API String ID: 1211466189-0
                              • Opcode ID: 5add6150753d9f8264302cf8e488f6264933c6b811da987d71602dace6e1d6cc
                              • Instruction ID: 4d046f68c6720f25e2bc5a66e29718e1a6c8eaef833b9518437eada84f0629f9
                              • Opcode Fuzzy Hash: 5add6150753d9f8264302cf8e488f6264933c6b811da987d71602dace6e1d6cc
                              • Instruction Fuzzy Hash: 5BB17C75600219EBDF24DF68C9857BD7BB2BF04711F088069EE489F295DB78AD50CB60
                              APIs
                              • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,007AC1C7,00000004,00000000,00000000,00000000), ref: 00772ACF
                              • ShowWindow.USER32(FFFFFFFF,00000000,00000000,00000000,?,007AC1C7,00000004,00000000,00000000,00000000,000000FF), ref: 00772B17
                              • ShowWindow.USER32(FFFFFFFF,00000006,00000000,00000000,?,007AC1C7,00000004,00000000,00000000,00000000), ref: 007AC21A
                              • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,007AC1C7,00000004,00000000,00000000,00000000), ref: 007AC286
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: ShowWindow
                              • String ID:
                              • API String ID: 1268545403-0
                              • Opcode ID: 537bc7af1abcc18357c722d52669e367ce088075485cc10c9f376d510e8b5f2c
                              • Instruction ID: b6487e0b086c7f6f1af8d816d53ac9cc10514579a77de547f682ad2467332c6e
                              • Opcode Fuzzy Hash: 537bc7af1abcc18357c722d52669e367ce088075485cc10c9f376d510e8b5f2c
                              • Instruction Fuzzy Hash: D7411B30604780FACF369B288C8DB7B7B92BF86350F65C919E46F86562CA3D9847D711
                              APIs
                              • InterlockedExchange.KERNEL32(?,000001F5), ref: 007D70DD
                                • Part of subcall function 00790DB6: std::exception::exception.LIBCMT ref: 00790DEC
                                • Part of subcall function 00790DB6: __CxxThrowException@8.LIBCMT ref: 00790E01
                              • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,?,00000000), ref: 007D7114
                              • EnterCriticalSection.KERNEL32(?), ref: 007D7130
                              • _memmove.LIBCMT ref: 007D717E
                              • _memmove.LIBCMT ref: 007D719B
                              • LeaveCriticalSection.KERNEL32(?), ref: 007D71AA
                              • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,00000000,00000000), ref: 007D71BF
                              • InterlockedExchange.KERNEL32(?,000001F6), ref: 007D71DE
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterException@8LeaveThrowstd::exception::exception
                              • String ID:
                              • API String ID: 256516436-0
                              • Opcode ID: c5575afbf2ba0d7ae2e7ca2d430d3a1f08d969171006c4bfac0382e234c273c8
                              • Instruction ID: 9cf6300836ce834bd10b1405d0c8f6bf08f416037dc0c235a8e266808b144b22
                              • Opcode Fuzzy Hash: c5575afbf2ba0d7ae2e7ca2d430d3a1f08d969171006c4bfac0382e234c273c8
                              • Instruction Fuzzy Hash: ED315071900205EFCF10EFA5DC89AAEB778FF45710F1481A5E9049B256EB78DE14CBA4
                              APIs
                              • DeleteObject.GDI32(00000000), ref: 007F61EB
                              • GetDC.USER32(00000000), ref: 007F61F3
                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 007F61FE
                              • ReleaseDC.USER32(00000000,00000000), ref: 007F620A
                              • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 007F6246
                              • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 007F6257
                              • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,007F902A,?,?,000000FF,00000000,?,000000FF,?), ref: 007F6291
                              • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 007F62B1
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                              • String ID:
                              • API String ID: 3864802216-0
                              • Opcode ID: b83767fa54b2a420a500fe76d6036a5505f19c0b44b0e04a869a9fe657ab17b7
                              • Instruction ID: 41c64f8b293eddcc6145305bd666b98f99596e69b08b4e5e302dd9b15907f55c
                              • Opcode Fuzzy Hash: b83767fa54b2a420a500fe76d6036a5505f19c0b44b0e04a869a9fe657ab17b7
                              • Instruction Fuzzy Hash: C5312D72101214BFEF118F54DC8AFFA3BA9FF49765F044065FE08DA291DA799841CB68
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: _memcmp
                              • String ID:
                              • API String ID: 2931989736-0
                              • Opcode ID: 80a2a7581dbd38ad6104edc5d3028806d30ef30cc6e223f1e8491e72f39bde8b
                              • Instruction ID: f14e8b4c42a956d22bf7d35df46f1f9c68c20adf8921158caaf99918a8e411b8
                              • Opcode Fuzzy Hash: 80a2a7581dbd38ad6104edc5d3028806d30ef30cc6e223f1e8491e72f39bde8b
                              • Instruction Fuzzy Hash: 2C2104A160121ABBEA156B21AD47FBB735CEE14348F44402DFD0496A87EB6CDE2181F1
                              APIs
                                • Part of subcall function 00779837: __itow.LIBCMT ref: 00779862
                                • Part of subcall function 00779837: __swprintf.LIBCMT ref: 007798AC
                                • Part of subcall function 0078FC86: _wcscpy.LIBCMT ref: 0078FCA9
                              • _wcstok.LIBCMT ref: 007DEC94
                              • _wcscpy.LIBCMT ref: 007DED23
                              • _memset.LIBCMT ref: 007DED56
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: _wcscpy$__itow__swprintf_memset_wcstok
                              • String ID: X
                              • API String ID: 774024439-3081909835
                              • Opcode ID: 9561ad1bcabf497a0ea868989b43835d82a819a6b7c643fd4042a18993fbdf8b
                              • Instruction ID: dcc12c2b75276f3fabb7736b8d5e2863c6f6c0c29771a9af20a7cb4cc3994c1f
                              • Opcode Fuzzy Hash: 9561ad1bcabf497a0ea868989b43835d82a819a6b7c643fd4042a18993fbdf8b
                              • Instruction Fuzzy Hash: 4DC17C71608300DFCB55EF24D849A5AB7F4EF45350F00892DF9999B3A2DB78E845CB92
                              APIs
                              • __WSAFDIsSet.WSOCK32(00000000,?,00000000,00000000,?,00000064,00000000), ref: 007E6C00
                              • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 007E6C21
                              • WSAGetLastError.WSOCK32(00000000), ref: 007E6C34
                              • htons.WSOCK32(?,?,?,00000000,?), ref: 007E6CEA
                              • inet_ntoa.WSOCK32(?), ref: 007E6CA7
                                • Part of subcall function 007CA7E9: _strlen.LIBCMT ref: 007CA7F3
                                • Part of subcall function 007CA7E9: _memmove.LIBCMT ref: 007CA815
                              • _strlen.LIBCMT ref: 007E6D44
                              • _memmove.LIBCMT ref: 007E6DAD
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: _memmove_strlen$ErrorLasthtonsinet_ntoa
                              • String ID:
                              • API String ID: 3619996494-0
                              • Opcode ID: 5a526148d6d66cfbeae8ae785ea856a04723a55871af1f30016d420e67c29383
                              • Instruction ID: 8d6d8ec9f4e476e91acfd57a0051f283f1f8da2e20aaa8ab94cf98585fd0c56f
                              • Opcode Fuzzy Hash: 5a526148d6d66cfbeae8ae785ea856a04723a55871af1f30016d420e67c29383
                              • Instruction Fuzzy Hash: C881E471204340EFCB10EF25CC89E6AB7A9EF98754F54891CF5599B292DB78ED00CB92
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 39ee05e5e3813fc489c2049bf2879bac6fe6bb23acd18271d12ff7a9ddc4a638
                              • Instruction ID: 4311deac3d65911dc51a75498914a5a4aac61f2b7bbe3cbcdac45ee01a0e4db5
                              • Opcode Fuzzy Hash: 39ee05e5e3813fc489c2049bf2879bac6fe6bb23acd18271d12ff7a9ddc4a638
                              • Instruction Fuzzy Hash: 46715C30900109EFCF14CF98CC89ABEBB79FF86350F54C159F919AA251C738AA51CB64
                              APIs
                              • IsWindow.USER32(013061F0), ref: 007FB3EB
                              • IsWindowEnabled.USER32(013061F0), ref: 007FB3F7
                              • SendMessageW.USER32(?,0000041C,00000000,00000000), ref: 007FB4DB
                              • SendMessageW.USER32(013061F0,000000B0,?,?), ref: 007FB512
                              • IsDlgButtonChecked.USER32(?,?), ref: 007FB54F
                              • GetWindowLongW.USER32(013061F0,000000EC), ref: 007FB571
                              • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 007FB589
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                              • String ID:
                              • API String ID: 4072528602-0
                              • Opcode ID: abcadb30ae778058bd756271fbd687b4092bd61b75b82decdff5f011dba6d46f
                              • Instruction ID: c8d91dcf31a79e42a9d1ac84f01f9eb6f57996cefdd859ad336de3d59dda9d48
                              • Opcode Fuzzy Hash: abcadb30ae778058bd756271fbd687b4092bd61b75b82decdff5f011dba6d46f
                              • Instruction Fuzzy Hash: 03719034605248EFDB209F94C994FBABBB9FF49300F148469FB55973A2CB39A950CB50
                              APIs
                              • _memset.LIBCMT ref: 007EF448
                              • _memset.LIBCMT ref: 007EF511
                              • ShellExecuteExW.SHELL32(?), ref: 007EF556
                                • Part of subcall function 00779837: __itow.LIBCMT ref: 00779862
                                • Part of subcall function 00779837: __swprintf.LIBCMT ref: 007798AC
                                • Part of subcall function 0078FC86: _wcscpy.LIBCMT ref: 0078FCA9
                              • GetProcessId.KERNEL32(00000000), ref: 007EF5CD
                              • CloseHandle.KERNEL32(00000000), ref: 007EF5FC
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: _memset$CloseExecuteHandleProcessShell__itow__swprintf_wcscpy
                              • String ID: @
                              • API String ID: 3522835683-2766056989
                              • Opcode ID: 17c29938eaec4545fcd59bb6c6ee40f5eb94d71b39a75cd40285380d75f9bc0d
                              • Instruction ID: 0b851fbde290c4f457600d4952614b5d0179ac84c62ae7c221f25e3c55bba0ac
                              • Opcode Fuzzy Hash: 17c29938eaec4545fcd59bb6c6ee40f5eb94d71b39a75cd40285380d75f9bc0d
                              • Instruction Fuzzy Hash: 6761CD71A01659DFCF14EF65C8889AEBBF5FF49310F148069E819AB751CB38AD41CB90
                              APIs
                              • GetParent.USER32(?), ref: 007D0F8C
                              • GetKeyboardState.USER32(?), ref: 007D0FA1
                              • SetKeyboardState.USER32(?), ref: 007D1002
                              • PostMessageW.USER32(?,00000101,00000010,?), ref: 007D1030
                              • PostMessageW.USER32(?,00000101,00000011,?), ref: 007D104F
                              • PostMessageW.USER32(?,00000101,00000012,?), ref: 007D1095
                              • PostMessageW.USER32(?,00000101,0000005B,?), ref: 007D10B8
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: MessagePost$KeyboardState$Parent
                              • String ID:
                              • API String ID: 87235514-0
                              • Opcode ID: 9d9ef461a67a316de086c50f57335a8a95e0510f3500c7d3bab1d221a136e822
                              • Instruction ID: c57a0d8dd5abcc9f2dfb8e71955e07eadc3499286be6f4da9e2943ccac00369a
                              • Opcode Fuzzy Hash: 9d9ef461a67a316de086c50f57335a8a95e0510f3500c7d3bab1d221a136e822
                              • Instruction Fuzzy Hash: 3851E1A06047D57DFB3653348C49BBABFB96B06304F48858AE1D486AC2C29DECD8D761
                              APIs
                              • GetParent.USER32(00000000), ref: 007D0DA5
                              • GetKeyboardState.USER32(?), ref: 007D0DBA
                              • SetKeyboardState.USER32(?), ref: 007D0E1B
                              • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 007D0E47
                              • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 007D0E64
                              • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 007D0EA8
                              • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 007D0EC9
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: MessagePost$KeyboardState$Parent
                              • String ID:
                              • API String ID: 87235514-0
                              • Opcode ID: ebbff8921978b4261c91d2d26cf11770e343eaf073c6a9f3e5c2cad698324380
                              • Instruction ID: d03a00a5f16c8b3249c0c8c39beeeb632a6aa76d63732795ed33854a252997f9
                              • Opcode Fuzzy Hash: ebbff8921978b4261c91d2d26cf11770e343eaf073c6a9f3e5c2cad698324380
                              • Instruction Fuzzy Hash: 5551E7A06447D57DFB3293748C45B7ABFB96F06300F08988EE1D4466C2D799EC94D7A0
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: _wcsncpy$LocalTime
                              • String ID:
                              • API String ID: 2945705084-0
                              • Opcode ID: a6359cefc825e017601cf427de2440ace0c1b81dfd85bd0162d00bf5b8803ef0
                              • Instruction ID: 9680b01688fa00b2cba294f74281a1657d23a9153dbf080cc3491252d79f6b0d
                              • Opcode Fuzzy Hash: a6359cefc825e017601cf427de2440ace0c1b81dfd85bd0162d00bf5b8803ef0
                              • Instruction Fuzzy Hash: 1D415675C10614B6CF11FBB4DC4AACFB7B89F05310F508566E514E3222FA38E656C7A6
                              APIs
                                • Part of subcall function 007D466E: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,007D3697,?), ref: 007D468B
                                • Part of subcall function 007D466E: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,007D3697,?), ref: 007D46A4
                              • lstrcmpiW.KERNEL32(?,?), ref: 007D36B7
                              • _wcscmp.LIBCMT ref: 007D36D3
                              • MoveFileW.KERNEL32(?,?), ref: 007D36EB
                              • _wcscat.LIBCMT ref: 007D3733
                              • SHFileOperationW.SHELL32(?), ref: 007D379F
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: FileFullNamePath$MoveOperation_wcscat_wcscmplstrcmpi
                              • String ID: \*.*
                              • API String ID: 1377345388-1173974218
                              • Opcode ID: e6d5a8ec5be9ded980051cbf50373614a777e643741bcce6e4f7c570da6d9fc9
                              • Instruction ID: 7004e59733dca6cdf5b71c4165b336137bcef5c7903303fb6c815344c8c1405e
                              • Opcode Fuzzy Hash: e6d5a8ec5be9ded980051cbf50373614a777e643741bcce6e4f7c570da6d9fc9
                              • Instruction Fuzzy Hash: 524191B1508344AEC751EF64D4499DF77F8AF89380F00486FF49AC3251EA38D689C756
                              APIs
                              • _memset.LIBCMT ref: 007F72AA
                              • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 007F7351
                              • IsMenu.USER32(?), ref: 007F7369
                              • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 007F73B1
                              • DrawMenuBar.USER32 ref: 007F73C4
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: Menu$Item$DrawInfoInsert_memset
                              • String ID: 0
                              • API String ID: 3866635326-4108050209
                              • Opcode ID: 8c9302da4f52813e0f70874829bf37c0d139e5c3b91fe3683a5c15f0f2668beb
                              • Instruction ID: 41472d221e1e819f4b309c60c13d402d15500a43d27577e772a73aea2adf8fb3
                              • Opcode Fuzzy Hash: 8c9302da4f52813e0f70874829bf37c0d139e5c3b91fe3683a5c15f0f2668beb
                              • Instruction Fuzzy Hash: 09411375A04248EFDB24DF54D884AAABBF9FF08350F148529FE15AB350D738AD50DBA0
                              APIs
                              • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?), ref: 007F0FD4
                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 007F0FFE
                              • FreeLibrary.KERNEL32(00000000), ref: 007F10B5
                                • Part of subcall function 007F0FA5: RegCloseKey.ADVAPI32(?), ref: 007F101B
                                • Part of subcall function 007F0FA5: FreeLibrary.KERNEL32(?), ref: 007F106D
                                • Part of subcall function 007F0FA5: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 007F1090
                              • RegDeleteKeyW.ADVAPI32(?,?), ref: 007F1058
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: EnumFreeLibrary$CloseDeleteOpen
                              • String ID:
                              • API String ID: 395352322-0
                              • Opcode ID: 4201cf4ef8cc8e16ec3860f9aa8b203e5a4163d40eb3557a041d50a923e7abc1
                              • Instruction ID: c745636a76a8e32c5efa1dbf8b7c62730b56b691dd381cca209b42c53fc199b4
                              • Opcode Fuzzy Hash: 4201cf4ef8cc8e16ec3860f9aa8b203e5a4163d40eb3557a041d50a923e7abc1
                              • Instruction Fuzzy Hash: A731197190110DFFDB25DB94DC89AFEB7BCEF08310F50416AE601E2251EA789E859AA4
                              APIs
                              • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 007F62EC
                              • GetWindowLongW.USER32(013061F0,000000F0), ref: 007F631F
                              • GetWindowLongW.USER32(013061F0,000000F0), ref: 007F6354
                              • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 007F6386
                              • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 007F63B0
                              • GetWindowLongW.USER32(00000000,000000F0), ref: 007F63C1
                              • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 007F63DB
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: LongWindow$MessageSend
                              • String ID:
                              • API String ID: 2178440468-0
                              • Opcode ID: 6db60183bf77b3e0d4e922a27ea007f111bcda50b0cc141c1de4adba4527211b
                              • Instruction ID: 35685a1b608bc56b9ac2f95f76faa117d5b38681e8a3c90a4f9e067b97934afa
                              • Opcode Fuzzy Hash: 6db60183bf77b3e0d4e922a27ea007f111bcda50b0cc141c1de4adba4527211b
                              • Instruction Fuzzy Hash: 9D31FE35644258EFDB208F18DC85F6937E1BF4A714F1941A8F611CB2B2CB7AA840DB51
                              APIs
                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 007CDB2E
                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 007CDB54
                              • SysAllocString.OLEAUT32(00000000), ref: 007CDB57
                              • SysAllocString.OLEAUT32(?), ref: 007CDB75
                              • SysFreeString.OLEAUT32(?), ref: 007CDB7E
                              • StringFromGUID2.OLE32(?,?,00000028), ref: 007CDBA3
                              • SysAllocString.OLEAUT32(?), ref: 007CDBB1
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                              • String ID:
                              • API String ID: 3761583154-0
                              • Opcode ID: 9fc33dd078b3c0640406803407f9f8d52a40ff5a95267bb7ec7474b83a3575d1
                              • Instruction ID: aa4c41120d84e4c0c5f04f74656b617a6fce0acee0dec5804205001042538db5
                              • Opcode Fuzzy Hash: 9fc33dd078b3c0640406803407f9f8d52a40ff5a95267bb7ec7474b83a3575d1
                              • Instruction Fuzzy Hash: E4214F76600219AF9F20DFA8DC88DBB77ACEF09360B15857DFD14DB250DA789C4187A8
                              APIs
                                • Part of subcall function 007E7D8B: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 007E7DB6
                              • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 007E61C6
                              • WSAGetLastError.WSOCK32(00000000), ref: 007E61D5
                              • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 007E620E
                              • connect.WSOCK32(00000000,?,00000010), ref: 007E6217
                              • WSAGetLastError.WSOCK32 ref: 007E6221
                              • closesocket.WSOCK32(00000000), ref: 007E624A
                              • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 007E6263
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: ErrorLastioctlsocket$closesocketconnectinet_addrsocket
                              • String ID:
                              • API String ID: 910771015-0
                              • Opcode ID: d8d5753e6cc3b5172456bd1c3eca2c7dc1cba998a56151b74dd6fccf87da6112
                              • Instruction ID: d138b64852ae06e010d60beaf82c3e36b9d0a769b6a240a27f821492c812f1e1
                              • Opcode Fuzzy Hash: d8d5753e6cc3b5172456bd1c3eca2c7dc1cba998a56151b74dd6fccf87da6112
                              • Instruction Fuzzy Hash: FD31A471601218ABDF10AF25CC89BBD77ADEF59790F048069FA0597291CB78AC04CB61
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: __wcsnicmp
                              • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                              • API String ID: 1038674560-2734436370
                              • Opcode ID: ef51bd3377bc0a27b78e0bb860aad049e59ef5116265f3e530ff202085679e80
                              • Instruction ID: 40dd68e9fe21fd128de99487bb8f8b69e964b5f01e9e3eeafa6b6593661ae010
                              • Opcode Fuzzy Hash: ef51bd3377bc0a27b78e0bb860aad049e59ef5116265f3e530ff202085679e80
                              • Instruction Fuzzy Hash: 6B214672204611EAD620BB34AC06FA773DAEF55350F50803EF89A97191EB9D9D42C395
                              APIs
                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 007CDC09
                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 007CDC2F
                              • SysAllocString.OLEAUT32(00000000), ref: 007CDC32
                              • SysAllocString.OLEAUT32 ref: 007CDC53
                              • SysFreeString.OLEAUT32 ref: 007CDC5C
                              • StringFromGUID2.OLE32(?,?,00000028), ref: 007CDC76
                              • SysAllocString.OLEAUT32(?), ref: 007CDC84
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                              • String ID:
                              • API String ID: 3761583154-0
                              • Opcode ID: 43daf7600f1d7670ab13b1b631c311a1b5cba66eb937ed7dead4a3adb9bc332a
                              • Instruction ID: 0aad4ddeaf5ac05100be59a8331605b06ba5927c7123aa478e1ec33bc4da6186
                              • Opcode Fuzzy Hash: 43daf7600f1d7670ab13b1b631c311a1b5cba66eb937ed7dead4a3adb9bc332a
                              • Instruction Fuzzy Hash: 96211276604204AF9B20DFA8DC89DBB77ACEF09360B14813DF915CB261DA78DC41C768
                              APIs
                                • Part of subcall function 00771D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00771D73
                                • Part of subcall function 00771D35: GetStockObject.GDI32(00000011), ref: 00771D87
                                • Part of subcall function 00771D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00771D91
                              • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 007F7632
                              • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 007F763F
                              • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 007F764A
                              • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 007F7659
                              • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 007F7665
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: MessageSend$CreateObjectStockWindow
                              • String ID: Msctls_Progress32
                              • API String ID: 1025951953-3636473452
                              • Opcode ID: 364bc33051b32f5c6ccf4cca29556df25cac32272f5934f4187937b8823064bd
                              • Instruction ID: efb422e4f6ca93084131e68524067a52aabd6cddab9df65e601e00942f7c0c2f
                              • Opcode Fuzzy Hash: 364bc33051b32f5c6ccf4cca29556df25cac32272f5934f4187937b8823064bd
                              • Instruction Fuzzy Hash: 7E1181B111011DBEEF159F64CC85EF77F6DEF08798F014114BB04A6150CA769C21DBA4
                              APIs
                              • __init_pointers.LIBCMT ref: 00799AE6
                                • Part of subcall function 00793187: EncodePointer.KERNEL32(00000000), ref: 0079318A
                                • Part of subcall function 00793187: __initp_misc_winsig.LIBCMT ref: 007931A5
                                • Part of subcall function 00793187: GetModuleHandleW.KERNEL32(kernel32.dll), ref: 00799EA0
                                • Part of subcall function 00793187: GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00799EB4
                                • Part of subcall function 00793187: GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00799EC7
                                • Part of subcall function 00793187: GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00799EDA
                                • Part of subcall function 00793187: GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00799EED
                                • Part of subcall function 00793187: GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 00799F00
                                • Part of subcall function 00793187: GetProcAddress.KERNEL32(00000000,CreateEventExW), ref: 00799F13
                                • Part of subcall function 00793187: GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 00799F26
                                • Part of subcall function 00793187: GetProcAddress.KERNEL32(00000000,SetThreadStackGuarantee), ref: 00799F39
                                • Part of subcall function 00793187: GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 00799F4C
                                • Part of subcall function 00793187: GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 00799F5F
                                • Part of subcall function 00793187: GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 00799F72
                                • Part of subcall function 00793187: GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 00799F85
                                • Part of subcall function 00793187: GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 00799F98
                                • Part of subcall function 00793187: GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 00799FAB
                                • Part of subcall function 00793187: GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 00799FBE
                              • __mtinitlocks.LIBCMT ref: 00799AEB
                              • __mtterm.LIBCMT ref: 00799AF4
                                • Part of subcall function 00799B5C: DeleteCriticalSection.KERNEL32(00000000,00000000,?,?,00799AF9,00797CD0,0082A0B8,00000014), ref: 00799C56
                                • Part of subcall function 00799B5C: _free.LIBCMT ref: 00799C5D
                                • Part of subcall function 00799B5C: DeleteCriticalSection.KERNEL32(0082EC00,?,?,00799AF9,00797CD0,0082A0B8,00000014), ref: 00799C7F
                              • __calloc_crt.LIBCMT ref: 00799B19
                              • __initptd.LIBCMT ref: 00799B3B
                              • GetCurrentThreadId.KERNEL32 ref: 00799B42
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: AddressProc$CriticalDeleteSection$CurrentEncodeHandleModulePointerThread__calloc_crt__init_pointers__initp_misc_winsig__initptd__mtinitlocks__mtterm_free
                              • String ID:
                              • API String ID: 3567560977-0
                              • Opcode ID: ba5b8340fe44cbe4de959839ea58e4899bca0580a5e3fdba237d6fd605833664
                              • Instruction ID: 9d34913611a1d434fa9764f7a5433f86b4b86a7feffbcfd1dc8d35d6d124ab87
                              • Opcode Fuzzy Hash: ba5b8340fe44cbe4de959839ea58e4899bca0580a5e3fdba237d6fd605833664
                              • Instruction Fuzzy Hash: 61F09672609711AAFE34777DBC0B64A3790EF02734F20861EF650C51D2FF1D88418165
                              APIs
                              • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,00793F85), ref: 00794085
                              • GetProcAddress.KERNEL32(00000000), ref: 0079408C
                              • EncodePointer.KERNEL32(00000000), ref: 00794097
                              • DecodePointer.KERNEL32(00793F85), ref: 007940B2
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                              • String ID: RoUninitialize$combase.dll
                              • API String ID: 3489934621-2819208100
                              • Opcode ID: f0acf60d6ef72d4bccec10332ed04ff748a4738558a7e25e25a9a31a90986c30
                              • Instruction ID: 4dc1be5982e96ff7359bf00f9c3173eec5ec64e7e43d275f90552d8769a8df44
                              • Opcode Fuzzy Hash: f0acf60d6ef72d4bccec10332ed04ff748a4738558a7e25e25a9a31a90986c30
                              • Instruction Fuzzy Hash: 6FE0B670581304EFEF60AF65EC0DB193BA4BF44742F108826F511E11A0CFBE4640EA18
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: _memmove$__itow__swprintf
                              • String ID:
                              • API String ID: 3253778849-0
                              • Opcode ID: 06c3e0da596de7e5ebd166ea91c544cb533233ce1895cc83c049d75c6dd0b7a7
                              • Instruction ID: 1e9d2b562339f347b1143c768e7c1a93e648469318311736b43a6f0fa2bf1ead
                              • Opcode Fuzzy Hash: 06c3e0da596de7e5ebd166ea91c544cb533233ce1895cc83c049d75c6dd0b7a7
                              • Instruction Fuzzy Hash: 8861793050025ADBCF01EF64CC8AAFE3BB5AF05348F04855AF9596B292DB38ED05CB91
                              APIs
                                • Part of subcall function 00777DE1: _memmove.LIBCMT ref: 00777E22
                                • Part of subcall function 007F0E1A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,007EFDAD,?,?), ref: 007F0E31
                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 007F02BD
                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 007F02FD
                              • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 007F0320
                              • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 007F0349
                              • RegCloseKey.ADVAPI32(?,?,00000000), ref: 007F038C
                              • RegCloseKey.ADVAPI32(00000000), ref: 007F0399
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: Close$BuffCharConnectEnumOpenRegistryUpperValue_memmove
                              • String ID:
                              • API String ID: 4046560759-0
                              • Opcode ID: 1ac651abe9660b4b53749232b2c70d985bb724f3d878461ab39bd37d7980826f
                              • Instruction ID: 5944881279b63ab6f6af3b519daec7485625c81f086bcd39be0a10d02e46abcf
                              • Opcode Fuzzy Hash: 1ac651abe9660b4b53749232b2c70d985bb724f3d878461ab39bd37d7980826f
                              • Instruction Fuzzy Hash: 2E513C71208204EFCB14EF64C889E6EBBE5FF84314F04891DF559872A2DB39E905CB92
                              APIs
                              • GetMenu.USER32(?), ref: 007F57FB
                              • GetMenuItemCount.USER32(00000000), ref: 007F5832
                              • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 007F585A
                              • GetMenuItemID.USER32(?,?), ref: 007F58C9
                              • GetSubMenu.USER32(?,?), ref: 007F58D7
                              • PostMessageW.USER32(?,00000111,?,00000000), ref: 007F5928
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: Menu$Item$CountMessagePostString
                              • String ID:
                              • API String ID: 650687236-0
                              • Opcode ID: 0b4d2acef38da6ffa91c7e38ac2028e05345bcf227030a115bbb93e11f8424c3
                              • Instruction ID: 0fb316dfc78a08344e245f4c63124a5d5dd3067d23f95885b0a253436290feb7
                              • Opcode Fuzzy Hash: 0b4d2acef38da6ffa91c7e38ac2028e05345bcf227030a115bbb93e11f8424c3
                              • Instruction Fuzzy Hash: DE515B31A00619EFCF15EF64C845ABEB7B4EF48360F108069EA15AB351CB78AE41CB95
                              APIs
                              • VariantInit.OLEAUT32(?), ref: 007CEF06
                              • VariantClear.OLEAUT32(00000013), ref: 007CEF78
                              • VariantClear.OLEAUT32(00000000), ref: 007CEFD3
                              • _memmove.LIBCMT ref: 007CEFFD
                              • VariantClear.OLEAUT32(?), ref: 007CF04A
                              • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 007CF078
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: Variant$Clear$ChangeInitType_memmove
                              • String ID:
                              • API String ID: 1101466143-0
                              • Opcode ID: 59c307eca0e7dad9daa3a075ec68d8be8c55891f03fab93d9f558ad8734c1439
                              • Instruction ID: 83e5fa35086e4f76ef5f3cd5f59bc864c05cd4699bc8191538fc37c28ad7daaf
                              • Opcode Fuzzy Hash: 59c307eca0e7dad9daa3a075ec68d8be8c55891f03fab93d9f558ad8734c1439
                              • Instruction Fuzzy Hash: 185149B5A00209EFCB14DF58C884EAABBB9FF48314B15856DED59DB301E734E951CBA0
                              APIs
                              • _memset.LIBCMT ref: 007D2258
                              • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 007D22A3
                              • IsMenu.USER32(00000000), ref: 007D22C3
                              • CreatePopupMenu.USER32 ref: 007D22F7
                              • GetMenuItemCount.USER32(000000FF), ref: 007D2355
                              • InsertMenuItemW.USER32(00000000,?,00000001,00000030), ref: 007D2386
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: Menu$Item$CountCreateInfoInsertPopup_memset
                              • String ID:
                              • API String ID: 3311875123-0
                              • Opcode ID: 6cc0e5a177b003a33ea1ffc525ac8228c4d55f480afc5801b75f85a7bbbda008
                              • Instruction ID: 0329dc3b6a9ec3e0cf2981afcbf1197e5273bf93026115dad1be90168b855bcd
                              • Opcode Fuzzy Hash: 6cc0e5a177b003a33ea1ffc525ac8228c4d55f480afc5801b75f85a7bbbda008
                              • Instruction Fuzzy Hash: 5451DF30600249EBCF21DF68C988BADBBF4BF65314F10816AE851A7392D77D9907CB51
                              APIs
                                • Part of subcall function 00772612: GetWindowLongW.USER32(?,000000EB), ref: 00772623
                              • BeginPaint.USER32(?,?,?,?,?,?), ref: 0077179A
                              • GetWindowRect.USER32(?,?), ref: 007717FE
                              • ScreenToClient.USER32(?,?), ref: 0077181B
                              • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 0077182C
                              • EndPaint.USER32(?,?), ref: 00771876
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: PaintWindow$BeginClientLongRectScreenViewport
                              • String ID:
                              • API String ID: 1827037458-0
                              • Opcode ID: 33f35866cff796eab754b42901757e8180a06441ba2ed4eb32aaf110cd317aff
                              • Instruction ID: 7e77e9e1147f1b071762fe22613c30fd51f98828a46b9756c7324ea648378141
                              • Opcode Fuzzy Hash: 33f35866cff796eab754b42901757e8180a06441ba2ed4eb32aaf110cd317aff
                              • Instruction Fuzzy Hash: 6B416071504700DFDB10DF29CC84BB67BE8FB46764F148669F5A8872A2CB389845DB62
                              APIs
                              • ShowWindow.USER32(008357B0,00000000,013061F0,?,?,008357B0,?,007FB5A8,?,?), ref: 007FB712
                              • EnableWindow.USER32(00000000,00000000), ref: 007FB736
                              • ShowWindow.USER32(008357B0,00000000,013061F0,?,?,008357B0,?,007FB5A8,?,?), ref: 007FB796
                              • ShowWindow.USER32(00000000,00000004,?,007FB5A8,?,?), ref: 007FB7A8
                              • EnableWindow.USER32(00000000,00000001), ref: 007FB7CC
                              • SendMessageW.USER32(?,0000130C,?,00000000), ref: 007FB7EF
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: Window$Show$Enable$MessageSend
                              • String ID:
                              • API String ID: 642888154-0
                              • Opcode ID: 02fc7cfd79df5b6994acbbec799fcaf2a21d8b7fac3f280019fa349281e659db
                              • Instruction ID: 66179b2b431377d557b65c16cbc85975d0799ebf69da98aeddd29c70d79c6666
                              • Opcode Fuzzy Hash: 02fc7cfd79df5b6994acbbec799fcaf2a21d8b7fac3f280019fa349281e659db
                              • Instruction Fuzzy Hash: 62415434600148EFDB25EF24C499BA47BE1FF49310F5881BAEA488F762C735A856DB61
                              APIs
                              • GetForegroundWindow.USER32(?,?,?,?,?,?,007E4E41,?,?,00000000,00000001), ref: 007E70AC
                                • Part of subcall function 007E39A0: GetWindowRect.USER32(?,?), ref: 007E39B3
                              • GetDesktopWindow.USER32 ref: 007E70D6
                              • GetWindowRect.USER32(00000000), ref: 007E70DD
                              • mouse_event.USER32(00008001,?,?,00000001,00000001), ref: 007E710F
                                • Part of subcall function 007D5244: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 007D52BC
                              • GetCursorPos.USER32(?), ref: 007E713B
                              • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 007E7199
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: Window$Rectmouse_event$CursorDesktopForegroundSleep
                              • String ID:
                              • API String ID: 4137160315-0
                              • Opcode ID: 5d101cd9eca2a5ad29380fda9b3efdd78e9bba71a17d0015e738b3c0a59d16cd
                              • Instruction ID: cb6b81708c3dcb4a1ae7b1a4f373e9bdb204511b3ceb9e9c2453d106cdacc246
                              • Opcode Fuzzy Hash: 5d101cd9eca2a5ad29380fda9b3efdd78e9bba71a17d0015e738b3c0a59d16cd
                              • Instruction Fuzzy Hash: 3531E472509349ABD724DF15C849F9BB7E9FFC8314F00091AF58597191CB38EA09CB96
                              APIs
                                • Part of subcall function 007C80A9: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 007C80C0
                                • Part of subcall function 007C80A9: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 007C80CA
                                • Part of subcall function 007C80A9: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 007C80D9
                                • Part of subcall function 007C80A9: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 007C80E0
                                • Part of subcall function 007C80A9: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 007C80F6
                              • GetLengthSid.ADVAPI32(?,00000000,007C842F), ref: 007C88CA
                              • GetProcessHeap.KERNEL32(00000008,00000000), ref: 007C88D6
                              • HeapAlloc.KERNEL32(00000000), ref: 007C88DD
                              • CopySid.ADVAPI32(00000000,00000000,?), ref: 007C88F6
                              • GetProcessHeap.KERNEL32(00000000,00000000,007C842F), ref: 007C890A
                              • HeapFree.KERNEL32(00000000), ref: 007C8911
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                              • String ID:
                              • API String ID: 3008561057-0
                              • Opcode ID: 17e56db4776e0b598594e469cce93709049a78f990e2f5cc5755024becb2b367
                              • Instruction ID: 5121de14478b22580c0cb617f914238f1293f3a224d46f369dbeb1bfdd594393
                              • Opcode Fuzzy Hash: 17e56db4776e0b598594e469cce93709049a78f990e2f5cc5755024becb2b367
                              • Instruction Fuzzy Hash: D711AC32611209FFDB509FA4DC4AFBE7BA8EF45311F10802DE89597210CB3AAD50DB66
                              APIs
                              • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 007C85E2
                              • OpenProcessToken.ADVAPI32(00000000), ref: 007C85E9
                              • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 007C85F8
                              • CloseHandle.KERNEL32(00000004), ref: 007C8603
                              • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 007C8632
                              • DestroyEnvironmentBlock.USERENV(00000000), ref: 007C8646
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                              • String ID:
                              • API String ID: 1413079979-0
                              • Opcode ID: 38ddc9fb793634b71626174f67a79b1be7bcd3e92ef561ab06875f17e00008a3
                              • Instruction ID: 9f3563679728d7c84b4ffd541ee1d79ce14583ba38a4267a993b940307748319
                              • Opcode Fuzzy Hash: 38ddc9fb793634b71626174f67a79b1be7bcd3e92ef561ab06875f17e00008a3
                              • Instruction Fuzzy Hash: FB11607250020DABDF01DF94ED49FEE7BA9EF48304F044069FD05A2161CB799D60DB65
                              APIs
                              • GetDC.USER32(00000000), ref: 007CB7B5
                              • GetDeviceCaps.GDI32(00000000,00000058), ref: 007CB7C6
                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 007CB7CD
                              • ReleaseDC.USER32(00000000,00000000), ref: 007CB7D5
                              • MulDiv.KERNEL32(000009EC,?,00000000), ref: 007CB7EC
                              • MulDiv.KERNEL32(000009EC,?,?), ref: 007CB7FE
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: CapsDevice$Release
                              • String ID:
                              • API String ID: 1035833867-0
                              • Opcode ID: c11482cb747148227cbe9ffeb25e7eef6bf838120d6db88f9074eae2387731dc
                              • Instruction ID: 52837c3b51aa7b7840c06a2c57f6bc46b478d145ac4305526d373498147328be
                              • Opcode Fuzzy Hash: c11482cb747148227cbe9ffeb25e7eef6bf838120d6db88f9074eae2387731dc
                              • Instruction Fuzzy Hash: F3017175A00209BBEF109BA69C49F5EBFA8EF48711F00806AFA04A7291DA349C00CF95
                              APIs
                              • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00790193
                              • MapVirtualKeyW.USER32(00000010,00000000), ref: 0079019B
                              • MapVirtualKeyW.USER32(000000A0,00000000), ref: 007901A6
                              • MapVirtualKeyW.USER32(000000A1,00000000), ref: 007901B1
                              • MapVirtualKeyW.USER32(00000011,00000000), ref: 007901B9
                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 007901C1
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: Virtual
                              • String ID:
                              • API String ID: 4278518827-0
                              • Opcode ID: 559347b3c8c01c27a8a01c52f9bf9f34be1d590f801e3e1d5a7ef6573767074a
                              • Instruction ID: 3cb68814c8bee7ed0c9ee629c0b128b21aecb5e5c7fdbba9adacf4260968adbe
                              • Opcode Fuzzy Hash: 559347b3c8c01c27a8a01c52f9bf9f34be1d590f801e3e1d5a7ef6573767074a
                              • Instruction Fuzzy Hash: 6E016CB0901759BDE3008F5A8C85B52FFA8FF19354F00411BE15C87941C7F5A864CBE5
                              APIs
                              • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 007D53F9
                              • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 007D540F
                              • GetWindowThreadProcessId.USER32(?,?), ref: 007D541E
                              • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 007D542D
                              • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 007D5437
                              • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 007D543E
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                              • String ID:
                              • API String ID: 839392675-0
                              • Opcode ID: e03b91ba63b8affe3742baff92bff3e2336d2967f9d7b85ef1e10162de9ca2e2
                              • Instruction ID: e47c65c12c6cd4d4678cbf304671da21c5fab2f0a4c3dda4cd18502c979f917a
                              • Opcode Fuzzy Hash: e03b91ba63b8affe3742baff92bff3e2336d2967f9d7b85ef1e10162de9ca2e2
                              • Instruction Fuzzy Hash: 3BF01D32241558BBE7215BA29C0DEFB7B7CEFC6B11F004169FA04D11519EA91A01C6B9
                              APIs
                              • InterlockedExchange.KERNEL32(?,?), ref: 007D7243
                              • EnterCriticalSection.KERNEL32(?,?,00780EE4,?,?), ref: 007D7254
                              • TerminateThread.KERNEL32(00000000,000001F6,?,00780EE4,?,?), ref: 007D7261
                              • WaitForSingleObject.KERNEL32(00000000,000003E8,?,00780EE4,?,?), ref: 007D726E
                                • Part of subcall function 007D6C35: CloseHandle.KERNEL32(00000000,?,007D727B,?,00780EE4,?,?), ref: 007D6C3F
                              • InterlockedExchange.KERNEL32(?,000001F6), ref: 007D7281
                              • LeaveCriticalSection.KERNEL32(?,?,00780EE4,?,?), ref: 007D7288
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                              • String ID:
                              • API String ID: 3495660284-0
                              • Opcode ID: 360819c2a2686113f96c5dfd83a356be03ad1341ebeb1b8499e4bb2d76c5367d
                              • Instruction ID: 93c21d821b1065c630181428e263e58b03014a2182bf8ae0c535a20c1228fcba
                              • Opcode Fuzzy Hash: 360819c2a2686113f96c5dfd83a356be03ad1341ebeb1b8499e4bb2d76c5367d
                              • Instruction Fuzzy Hash: B6F05E36540612EBD7151B64ED8C9EE7739FF45712B104532F503911A0DF7E6801CB64
                              APIs
                              • WaitForSingleObject.KERNEL32(?,000000FF), ref: 007C899D
                              • UnloadUserProfile.USERENV(?,?), ref: 007C89A9
                              • CloseHandle.KERNEL32(?), ref: 007C89B2
                              • CloseHandle.KERNEL32(?), ref: 007C89BA
                              • GetProcessHeap.KERNEL32(00000000,?), ref: 007C89C3
                              • HeapFree.KERNEL32(00000000), ref: 007C89CA
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                              • String ID:
                              • API String ID: 146765662-0
                              • Opcode ID: df428b0ec7bbde894decd8bf4c80888691f5dd29303daf87bdacd909d3858fe4
                              • Instruction ID: f0cff4565bbef61f72a5d1e9b0f846c356b8203bc9a8ef5770bab2d3ee3bd095
                              • Opcode Fuzzy Hash: df428b0ec7bbde894decd8bf4c80888691f5dd29303daf87bdacd909d3858fe4
                              • Instruction Fuzzy Hash: 44E05277104506FBDA012FE6EC0C96ABF69FF89762B548631F21981470CF3A9861DB68
                              APIs
                              • VariantInit.OLEAUT32(?), ref: 007E8613
                              • CharUpperBuffW.USER32(?,?), ref: 007E8722
                              • VariantClear.OLEAUT32(?), ref: 007E889A
                                • Part of subcall function 007D7562: VariantInit.OLEAUT32(00000000), ref: 007D75A2
                                • Part of subcall function 007D7562: VariantCopy.OLEAUT32(00000000,?), ref: 007D75AB
                                • Part of subcall function 007D7562: VariantClear.OLEAUT32(00000000), ref: 007D75B7
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: Variant$ClearInit$BuffCharCopyUpper
                              • String ID: AUTOIT.ERROR$Incorrect Parameter format
                              • API String ID: 4237274167-1221869570
                              • Opcode ID: 26bf5fbe36f798c6408024b4837d15fc2dcb65d387771a04340f502479f815e7
                              • Instruction ID: aa7e375f5cbd24f5f58c9da30147cafeb3c6066ddfbc31b7df0ca6edef3c267a
                              • Opcode Fuzzy Hash: 26bf5fbe36f798c6408024b4837d15fc2dcb65d387771a04340f502479f815e7
                              • Instruction Fuzzy Hash: 6A91BD71605341DFCB40DF25C48496ABBE4EF89354F04892EF99A8B362DB34E905CB92
                              APIs
                                • Part of subcall function 0078FC86: _wcscpy.LIBCMT ref: 0078FCA9
                              • _memset.LIBCMT ref: 007D2B87
                              • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 007D2BB6
                              • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 007D2C69
                              • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 007D2C97
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: ItemMenu$Info$Default_memset_wcscpy
                              • String ID: 0
                              • API String ID: 4152858687-4108050209
                              • Opcode ID: 5c8749d178fd3aae25ac63c4d4f1a4b856e8fe65e2c7bdc6aef71ef05a12c26c
                              • Instruction ID: dd8875073de6c42f5d1569a3fded9e57f678d7f8c28d1e5a97e9d00312409607
                              • Opcode Fuzzy Hash: 5c8749d178fd3aae25ac63c4d4f1a4b856e8fe65e2c7bdc6aef71ef05a12c26c
                              • Instruction Fuzzy Hash: 7D51AF716283009AD7249F28D84566F77F4EFA5350F044A2FF899D33A2DB68CD0797A2
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: _memmove$_free
                              • String ID: 3cx$_x
                              • API String ID: 2620147621-2911194521
                              • Opcode ID: 2a810420eeb1a3cb3ebcbce003ea6f00512a6b3fa7579ad3d1e56e37378a11fc
                              • Instruction ID: c4927a9ebdbe73ee00b80c5d03c62b56cfb81dfba3dcc35fe23bfee94bb8e4e5
                              • Opcode Fuzzy Hash: 2a810420eeb1a3cb3ebcbce003ea6f00512a6b3fa7579ad3d1e56e37378a11fc
                              • Instruction Fuzzy Hash: 68516C71A043818FDB25DF28C484B6EBBE5FF85710F04482DE99987351EB39E901CB82
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: _memset$_memmove
                              • String ID: 3cx$ERCP
                              • API String ID: 2532777613-1958986756
                              • Opcode ID: b0085190fa381d7bc84803c55374a2fd8ad11d25742af09d5adc53125c10714f
                              • Instruction ID: a537c2b40750986a284a63ea80564e201abf16119f2ad9c15fd0272aae3309dd
                              • Opcode Fuzzy Hash: b0085190fa381d7bc84803c55374a2fd8ad11d25742af09d5adc53125c10714f
                              • Instruction Fuzzy Hash: E5519F71A40305EBDB24EFA5C945BAAB7F4FF04314F2045AEE54AC7241E778AA44CB80
                              APIs
                              • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 007CD5D4
                              • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 007CD60A
                              • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 007CD61B
                              • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 007CD69D
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: ErrorMode$AddressCreateInstanceProc
                              • String ID: DllGetClassObject
                              • API String ID: 753597075-1075368562
                              • Opcode ID: b15d854941070ff317117f168a5be85707c37f0e257d8b0bd4c08fbddd76ed3b
                              • Instruction ID: c02d72f191762f8e4c29209ab194f98c7dc7e7e644018c79777e38c5779a4d27
                              • Opcode Fuzzy Hash: b15d854941070ff317117f168a5be85707c37f0e257d8b0bd4c08fbddd76ed3b
                              • Instruction Fuzzy Hash: F4417CB1600204EFDB25CF64C888FAA7BA9EF44754F1580BDE909AF205D7B9DD44CBA0
                              APIs
                              • _memset.LIBCMT ref: 007D27C0
                              • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 007D27DC
                              • DeleteMenu.USER32(?,00000007,00000000), ref: 007D2822
                              • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00835890,00000000), ref: 007D286B
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: Menu$Delete$InfoItem_memset
                              • String ID: 0
                              • API String ID: 1173514356-4108050209
                              • Opcode ID: 1d320fd3648b7e7bdd6f34e9fcce9926f0d4cf29fac8581e0d91118aa1e5519a
                              • Instruction ID: b52eb3c8d6d9a542f3c08c2b904e0f959ad35db8a13bcc10959c43f124d0b279
                              • Opcode Fuzzy Hash: 1d320fd3648b7e7bdd6f34e9fcce9926f0d4cf29fac8581e0d91118aa1e5519a
                              • Instruction Fuzzy Hash: EC4180706043419FDB24DF24C844B2ABBF4EF95314F14892EF96597392DB38A907DB62
                              APIs
                              • CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 007ED7C5
                                • Part of subcall function 0077784B: _memmove.LIBCMT ref: 00777899
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: BuffCharLower_memmove
                              • String ID: cdecl$none$stdcall$winapi
                              • API String ID: 3425801089-567219261
                              • Opcode ID: 93749733d0d873107147c259f70a71ef765ebd4dc6a3555411edea8d644153f3
                              • Instruction ID: 33f422f592be9c06e63f844acdac721ac4dea3197cf60c6b16f665e8146793dd
                              • Opcode Fuzzy Hash: 93749733d0d873107147c259f70a71ef765ebd4dc6a3555411edea8d644153f3
                              • Instruction Fuzzy Hash: 7C31CD71904219EFCF10EF95C8459AEB3B4FF08320B008629E879A73D1DB79AD05CB80
                              APIs
                                • Part of subcall function 00777DE1: _memmove.LIBCMT ref: 00777E22
                                • Part of subcall function 007CAA99: GetClassNameW.USER32(?,?,000000FF), ref: 007CAABC
                              • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 007C8F14
                              • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 007C8F27
                              • SendMessageW.USER32(?,00000189,?,00000000), ref: 007C8F57
                                • Part of subcall function 00777BCC: _memmove.LIBCMT ref: 00777C06
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: MessageSend$_memmove$ClassName
                              • String ID: ComboBox$ListBox
                              • API String ID: 365058703-1403004172
                              • Opcode ID: 02319f647098fb5b5bbf237e6b8365fc764c813929e55d6ee3e24ff60462a6bb
                              • Instruction ID: 45471d84b6c47b7931171e7067c64ba8b3c3ab9cbc8bf90e1a692bcc3f59dae6
                              • Opcode Fuzzy Hash: 02319f647098fb5b5bbf237e6b8365fc764c813929e55d6ee3e24ff60462a6bb
                              • Instruction Fuzzy Hash: 1A21BD71A04108BADB18ABB09C8AEFFB769EF05360F14852DF425A62E1DF7D5809D660
                              APIs
                              • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 007E184C
                              • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 007E1872
                              • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 007E18A2
                              • InternetCloseHandle.WININET(00000000), ref: 007E18E9
                                • Part of subcall function 007E2483: GetLastError.KERNEL32(?,?,007E1817,00000000,00000000,00000001), ref: 007E2498
                                • Part of subcall function 007E2483: SetEvent.KERNEL32(?,?,007E1817,00000000,00000000,00000001), ref: 007E24AD
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                              • String ID:
                              • API String ID: 3113390036-3916222277
                              • Opcode ID: 9bbc90f73f7a68a0d2d097112fee4be39e8901aad6482b80f697035b1fe99b79
                              • Instruction ID: 0d48c677ded2042d7520dbc16c6be8f9a1d489f6efe28f350636babc1f77ecfd
                              • Opcode Fuzzy Hash: 9bbc90f73f7a68a0d2d097112fee4be39e8901aad6482b80f697035b1fe99b79
                              • Instruction Fuzzy Hash: 8C21D0B1501348BFEB119B62CC8AEBB77ECEB4C754F50412AF405E2240DB389D0597B1
                              APIs
                                • Part of subcall function 00771D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00771D73
                                • Part of subcall function 00771D35: GetStockObject.GDI32(00000011), ref: 00771D87
                                • Part of subcall function 00771D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00771D91
                              • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 007F6461
                              • LoadLibraryW.KERNEL32(?), ref: 007F6468
                              • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 007F647D
                              • DestroyWindow.USER32(?), ref: 007F6485
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: MessageSend$Window$CreateDestroyLibraryLoadObjectStock
                              • String ID: SysAnimate32
                              • API String ID: 4146253029-1011021900
                              • Opcode ID: 9deffba6597c7d98b5a54b831486516853ec6fc03ee243b5b0b5175adec5e885
                              • Instruction ID: ef64354a8a7976ebb266b61f2b3a3c154ea086f1b080db8674027d367d230d8b
                              • Opcode Fuzzy Hash: 9deffba6597c7d98b5a54b831486516853ec6fc03ee243b5b0b5175adec5e885
                              • Instruction Fuzzy Hash: E8218B71200249FBEF106F64DC84EBA37A9EF59764F108629FA10D2290DB39DC41A760
                              APIs
                              • GetStdHandle.KERNEL32(0000000C), ref: 007D6DBC
                              • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 007D6DEF
                              • GetStdHandle.KERNEL32(0000000C), ref: 007D6E01
                              • CreateFileW.KERNEL32(nul,40000000,00000002,0000000C,00000003,00000080,00000000), ref: 007D6E3B
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: CreateHandle$FilePipe
                              • String ID: nul
                              • API String ID: 4209266947-2873401336
                              • Opcode ID: 5de82b37448d9d8582443a4a29d003a923f6919f3911c5b0e86e21b792ace4d5
                              • Instruction ID: 7e6dad534a17d720bb0cb44b7babc8027c0cb6403bfa4730f79c5f2b6ffd5a2a
                              • Opcode Fuzzy Hash: 5de82b37448d9d8582443a4a29d003a923f6919f3911c5b0e86e21b792ace4d5
                              • Instruction Fuzzy Hash: B2217F75600209ABDF209F29E804A9A77B5FF44720F20461AF9A0D73D0DB74A950CB64
                              APIs
                              • GetStdHandle.KERNEL32(000000F6), ref: 007D6E89
                              • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 007D6EBB
                              • GetStdHandle.KERNEL32(000000F6), ref: 007D6ECC
                              • CreateFileW.KERNEL32(nul,80000000,00000001,0000000C,00000003,00000080,00000000), ref: 007D6F06
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: CreateHandle$FilePipe
                              • String ID: nul
                              • API String ID: 4209266947-2873401336
                              • Opcode ID: 7d7e5b18ac29a4d2ccb6349e30da1629fb68111dd58c5e2706da07d92c4bec06
                              • Instruction ID: a0ec85adc423edd397a88968d2b3102d4e112cca08777dcab036c9899ea6585d
                              • Opcode Fuzzy Hash: 7d7e5b18ac29a4d2ccb6349e30da1629fb68111dd58c5e2706da07d92c4bec06
                              • Instruction Fuzzy Hash: DC215C796003059BDB209F69D844AAA77B8BF55720F204A1BFCA1D73D0EB78A851CB64
                              APIs
                              • SetErrorMode.KERNEL32(00000001), ref: 007DAC54
                              • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 007DACA8
                              • __swprintf.LIBCMT ref: 007DACC1
                              • SetErrorMode.KERNEL32(00000000,00000001,00000000,007FF910), ref: 007DACFF
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: ErrorMode$InformationVolume__swprintf
                              • String ID: %lu
                              • API String ID: 3164766367-685833217
                              • Opcode ID: 73c7d0f028258842f188a31d9edef5365efa046e52a6eed2556639f085746c54
                              • Instruction ID: 70f6e946f1c1d4f5cfa2feba56260c11fc1945dfaf17554d5b88c51d93055750
                              • Opcode Fuzzy Hash: 73c7d0f028258842f188a31d9edef5365efa046e52a6eed2556639f085746c54
                              • Instruction Fuzzy Hash: BF217F74A00109EFCB10DF64DD89DAE7BB8FF89714B0080A9F909EB351DA75EA41CB21
                              APIs
                              • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,007CFCED,?,007D0D40,?,00008000), ref: 007D115F
                              • Sleep.KERNEL32(00000000,?,?,?,?,?,?,007CFCED,?,007D0D40,?,00008000), ref: 007D1184
                              • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,007CFCED,?,007D0D40,?,00008000), ref: 007D118E
                              • Sleep.KERNEL32(?,?,?,?,?,?,?,007CFCED,?,007D0D40,?,00008000), ref: 007D11C1
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: CounterPerformanceQuerySleep
                              • String ID: @}
                              • API String ID: 2875609808-348202782
                              • Opcode ID: 84fa5ac91610ad4b00bb63b6306fe4b0cbaefa4f9f5388d6f8090d7921347970
                              • Instruction ID: ae1981bb41c25b44f9c2d65b42e2259de213e5c28cc116eb41fec7f0ac463456
                              • Opcode Fuzzy Hash: 84fa5ac91610ad4b00bb63b6306fe4b0cbaefa4f9f5388d6f8090d7921347970
                              • Instruction Fuzzy Hash: 84113C31D0051DEBCF009FA5D848AEEFB78FF09711F418156EA81B2240CB799560CB95
                              APIs
                              • CharUpperBuffW.USER32(?,?), ref: 007D1B19
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: BuffCharUpper
                              • String ID: APPEND$EXISTS$KEYS$REMOVE
                              • API String ID: 3964851224-769500911
                              • Opcode ID: 2660c3068453b0ec465a1aefba3471dc8d69d46df9852302212b07ef6e6ee024
                              • Instruction ID: 14cc7b5d3bfdec31d026862d9a759d3f6c3fc96c2bf2385403674eb25103b1f3
                              • Opcode Fuzzy Hash: 2660c3068453b0ec465a1aefba3471dc8d69d46df9852302212b07ef6e6ee024
                              • Instruction Fuzzy Hash: C3116171910119DFCF00EFA4E9558FEB7B4FF25304B508466D814AB391EB365D0ADB90
                              APIs
                              • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 007EEC07
                              • GetProcessIoCounters.KERNEL32(00000000,?), ref: 007EEC37
                              • GetProcessMemoryInfo.PSAPI(00000000,?,00000028), ref: 007EED6A
                              • CloseHandle.KERNEL32(?), ref: 007EEDEB
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: Process$CloseCountersHandleInfoMemoryOpen
                              • String ID:
                              • API String ID: 2364364464-0
                              • Opcode ID: dd83f4d55c3b09e9923acfa76ffce09ff9e0dee88a6b6f22be8072ebe3e794e8
                              • Instruction ID: 84592dc8227bf924a17724cc15be07aa8cfaf2bfaccd43b7dc38928a0ae74d5b
                              • Opcode Fuzzy Hash: dd83f4d55c3b09e9923acfa76ffce09ff9e0dee88a6b6f22be8072ebe3e794e8
                              • Instruction Fuzzy Hash: 0E8171716013009FDB60EF29CC8AF2AB7E5AF48750F04C85DF959DB292DA74AC40CB52
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: _memset$__filbuf__getptd_noexit__read_nolock_memcpy_s
                              • String ID:
                              • API String ID: 1559183368-0
                              • Opcode ID: 1d92f2bce51b0a0de234b56dfad0c5d103c922ba67c2ed527f53aae8e5802bd0
                              • Instruction ID: 791563e2dc5a67e5cb6dcf5ae270d884ce5a7d17d2be01c3ee876aca48a621a0
                              • Opcode Fuzzy Hash: 1d92f2bce51b0a0de234b56dfad0c5d103c922ba67c2ed527f53aae8e5802bd0
                              • Instruction Fuzzy Hash: 2151E770A00B15DBCF269F69F88456E77B3AF41330F248729F835962D2D7789D618B40
                              APIs
                                • Part of subcall function 00777DE1: _memmove.LIBCMT ref: 00777E22
                                • Part of subcall function 007F0E1A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,007EFDAD,?,?), ref: 007F0E31
                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 007F00FD
                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 007F013C
                              • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 007F0183
                              • RegCloseKey.ADVAPI32(?,?), ref: 007F01AF
                              • RegCloseKey.ADVAPI32(00000000), ref: 007F01BC
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: Close$BuffCharConnectEnumOpenRegistryUpper_memmove
                              • String ID:
                              • API String ID: 3440857362-0
                              • Opcode ID: 5c179d9493bffd473727e921dbcceae39c056f415703f4301679ac670b41fe41
                              • Instruction ID: 8fca76705073342a679e7bba296eea367dcbe9132f2cb988519153cdd6057593
                              • Opcode Fuzzy Hash: 5c179d9493bffd473727e921dbcceae39c056f415703f4301679ac670b41fe41
                              • Instruction Fuzzy Hash: CA512B71204208EFDB14EF58C885E7EB7E9AF84314F50891DF65987292DB39E904CB52
                              APIs
                                • Part of subcall function 00779837: __itow.LIBCMT ref: 00779862
                                • Part of subcall function 00779837: __swprintf.LIBCMT ref: 007798AC
                              • LoadLibraryW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 007ED927
                              • GetProcAddress.KERNEL32(00000000,?), ref: 007ED9AA
                              • GetProcAddress.KERNEL32(00000000,00000000), ref: 007ED9C6
                              • GetProcAddress.KERNEL32(00000000,?), ref: 007EDA07
                              • FreeLibrary.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,?,?), ref: 007EDA21
                                • Part of subcall function 00775A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,007D7896,?,?,00000000), ref: 00775A2C
                                • Part of subcall function 00775A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,007D7896,?,?,00000000,?,?), ref: 00775A50
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad__itow__swprintf
                              • String ID:
                              • API String ID: 327935632-0
                              • Opcode ID: 7084916bbfd10039ab3bbc32f815febaeb69719e781979d154533db4eae41709
                              • Instruction ID: 9d737b05163e1a42c43bc40561fcfd3a3941a89060f17679c228d0a471149e3f
                              • Opcode Fuzzy Hash: 7084916bbfd10039ab3bbc32f815febaeb69719e781979d154533db4eae41709
                              • Instruction Fuzzy Hash: E6513975A01209DFCB10EFA8C8889ADB7F5FF09310B04C069E919AB322DB78AD45CF51
                              APIs
                              • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 007DE61F
                              • GetPrivateProfileSectionW.KERNEL32(?,00000001,00000003,?), ref: 007DE648
                              • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 007DE687
                                • Part of subcall function 00779837: __itow.LIBCMT ref: 00779862
                                • Part of subcall function 00779837: __swprintf.LIBCMT ref: 007798AC
                              • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 007DE6AC
                              • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 007DE6B4
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: PrivateProfile$SectionWrite$String$__itow__swprintf
                              • String ID:
                              • API String ID: 1389676194-0
                              • Opcode ID: 2322183be3fd19dd6455a525cb630cdf7ac6746620fb3f13fa3807781916dcea
                              • Instruction ID: e80ccad41ffe18e5e6c850beb274e081466378ece726bd552f6246217de60024
                              • Opcode Fuzzy Hash: 2322183be3fd19dd6455a525cb630cdf7ac6746620fb3f13fa3807781916dcea
                              • Instruction Fuzzy Hash: B3510A35A00205DFCF01EF64C985AADBBF5FF09354B1480A9E909AB362DB39ED11DB51
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 26a637f5916e463310fc3660e086c7a011a9b8811d4d6b6ac73bf7c187b4f537
                              • Instruction ID: 0f3835cced31d310d19bab48f6439798a8ec4e1bf41ca61e562a1074d1d172a4
                              • Opcode Fuzzy Hash: 26a637f5916e463310fc3660e086c7a011a9b8811d4d6b6ac73bf7c187b4f537
                              • Instruction Fuzzy Hash: ED4193B590410CBFD720DB28DC88FB9BBB4EB09360F154165EA19A73E1DB38AD41DA51
                              APIs
                              • GetCursorPos.USER32(?), ref: 00772357
                              • ScreenToClient.USER32(008357B0,?), ref: 00772374
                              • GetAsyncKeyState.USER32(00000001), ref: 00772399
                              • GetAsyncKeyState.USER32(00000002), ref: 007723A7
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: AsyncState$ClientCursorScreen
                              • String ID:
                              • API String ID: 4210589936-0
                              • Opcode ID: 614fe0dd464837ad9aad12aefcf809c251daf1ae0e87db3f4067955698d3b3cd
                              • Instruction ID: 9e202f7d4b8deefe0da891300e25675d728cd47cd64a58751060ae59fa23ba3c
                              • Opcode Fuzzy Hash: 614fe0dd464837ad9aad12aefcf809c251daf1ae0e87db3f4067955698d3b3cd
                              • Instruction Fuzzy Hash: 0A419235604109FFDF198F68CC48AEABB74FB46360F208319F838922A1CB399950DF90
                              APIs
                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 007C63E7
                              • TranslateAcceleratorW.USER32(?,?,?), ref: 007C6433
                              • TranslateMessage.USER32(?), ref: 007C645C
                              • DispatchMessageW.USER32(?), ref: 007C6466
                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 007C6475
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: Message$PeekTranslate$AcceleratorDispatch
                              • String ID:
                              • API String ID: 2108273632-0
                              • Opcode ID: 6598a1d97944d124ba7189db4a4c0e40771d9891d422498bd6703762613424f8
                              • Instruction ID: 04e16b9c4c235a9c3a8ea3874c9ceb552ee9aa8352da5276bb8f160a3ea6cf3d
                              • Opcode Fuzzy Hash: 6598a1d97944d124ba7189db4a4c0e40771d9891d422498bd6703762613424f8
                              • Instruction Fuzzy Hash: 5131C371900686AFDB68CFB4DC84FB67BACBB41300F14457DE425C21A0EB2D9A89D760
                              APIs
                              • GetWindowRect.USER32(?,?), ref: 007C8A30
                              • PostMessageW.USER32(?,00000201,00000001), ref: 007C8ADA
                              • Sleep.KERNEL32(00000000,?,00000201,00000001,?,?,?), ref: 007C8AE2
                              • PostMessageW.USER32(?,00000202,00000000), ref: 007C8AF0
                              • Sleep.KERNEL32(00000000,?,00000202,00000000,?,?,00000201,00000001,?,?,?), ref: 007C8AF8
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: MessagePostSleep$RectWindow
                              • String ID:
                              • API String ID: 3382505437-0
                              • Opcode ID: 92045dec73d19b3be4910d9d0029efdcd38c0f700ed88bdf3c6cd031fa237f18
                              • Instruction ID: a4fb42bb0df18d3def079849c630f2df1b69bdc194fe9f228cc4fab6cfb609c1
                              • Opcode Fuzzy Hash: 92045dec73d19b3be4910d9d0029efdcd38c0f700ed88bdf3c6cd031fa237f18
                              • Instruction Fuzzy Hash: 4431BC71500219EBDB14CFA8D94CBAE3BB5EF04315F10822EF925EA2D0CBB89914DB91
                              APIs
                              • IsWindowVisible.USER32(?), ref: 007CB204
                              • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 007CB221
                              • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 007CB259
                              • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 007CB27F
                              • _wcsstr.LIBCMT ref: 007CB289
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: MessageSend$BuffCharUpperVisibleWindow_wcsstr
                              • String ID:
                              • API String ID: 3902887630-0
                              • Opcode ID: a1b2acccd305be55c73e5498244749ee7c9d6fc3d72159096f4b70b1014eb891
                              • Instruction ID: 83dbcb9eda06083587fe9d40aab72858768a5f2c584fdbd462377ac345583c2f
                              • Opcode Fuzzy Hash: a1b2acccd305be55c73e5498244749ee7c9d6fc3d72159096f4b70b1014eb891
                              • Instruction Fuzzy Hash: 5621C572604204BBEB259B79EC4AF7F7B98EF49760F00812DF805DA161EF69DC41D6A0
                              APIs
                                • Part of subcall function 00772612: GetWindowLongW.USER32(?,000000EB), ref: 00772623
                              • GetWindowLongW.USER32(?,000000F0), ref: 007FB192
                              • SetWindowLongW.USER32(00000000,000000F0,00000001), ref: 007FB1B7
                              • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 007FB1CF
                              • GetSystemMetrics.USER32(00000004), ref: 007FB1F8
                              • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000047,?,?,?,?,?,?,?,007E0E90,00000000), ref: 007FB216
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: Window$Long$MetricsSystem
                              • String ID:
                              • API String ID: 2294984445-0
                              • Opcode ID: a3b7177112e04f475047aec70baea9db24eb2782c35dd2fd1db168c9b32e4ccd
                              • Instruction ID: 944f246ddb6a5c69d3d71f74e1887abaf419f2373668de157460e9e2cd358a5a
                              • Opcode Fuzzy Hash: a3b7177112e04f475047aec70baea9db24eb2782c35dd2fd1db168c9b32e4ccd
                              • Instruction Fuzzy Hash: 6E216071A20659AFCB109F38DC14A7A37A4FB45361F154B39FA32D72E0D7349920CB90
                              APIs
                              • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 007C9320
                                • Part of subcall function 00777BCC: _memmove.LIBCMT ref: 00777C06
                              • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 007C9352
                              • __itow.LIBCMT ref: 007C936A
                              • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 007C9392
                              • __itow.LIBCMT ref: 007C93A3
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: MessageSend$__itow$_memmove
                              • String ID:
                              • API String ID: 2983881199-0
                              • Opcode ID: 9d7ec60bc102cb3be39e9cc77a645de6ad0aea1a03af8a4eff7abd1ef09f49df
                              • Instruction ID: 9981bee933908c63d20755e481e6f9588cabe994886df9e49ce202a9758510c4
                              • Opcode Fuzzy Hash: 9d7ec60bc102cb3be39e9cc77a645de6ad0aea1a03af8a4eff7abd1ef09f49df
                              • Instruction Fuzzy Hash: E521B631700248ABDB119A649C8DFAE7BA9EF49710F04802DFA05D7291DBB8C941C7A5
                              APIs
                              • IsWindow.USER32(00000000), ref: 007E5A6E
                              • GetForegroundWindow.USER32 ref: 007E5A85
                              • GetDC.USER32(00000000), ref: 007E5AC1
                              • GetPixel.GDI32(00000000,?,00000003), ref: 007E5ACD
                              • ReleaseDC.USER32(00000000,00000003), ref: 007E5B08
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: Window$ForegroundPixelRelease
                              • String ID:
                              • API String ID: 4156661090-0
                              • Opcode ID: 2bc7ddbe6d5570879ad751818f22676fd8df245f365cea6466786a70b3f286b7
                              • Instruction ID: 44e608e3223e0606bbbfe5a7871db282d07947dab4034dc250e7e6505e81b097
                              • Opcode Fuzzy Hash: 2bc7ddbe6d5570879ad751818f22676fd8df245f365cea6466786a70b3f286b7
                              • Instruction Fuzzy Hash: D7218075A01204EFDB00EF65DC88A6ABBE5EF48350F14C079E819D7362CE38AC00CB55
                              APIs
                              • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 0077134D
                              • SelectObject.GDI32(?,00000000), ref: 0077135C
                              • BeginPath.GDI32(?), ref: 00771373
                              • SelectObject.GDI32(?,00000000), ref: 0077139C
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: ObjectSelect$BeginCreatePath
                              • String ID:
                              • API String ID: 3225163088-0
                              • Opcode ID: bd73de3436733972e1a7d8bfada879b552c02fe7ca9ca77003ff3ec32d435f62
                              • Instruction ID: daba8098f5870700ebc00698b77527baac970c16b1b6aa6b952d5eea8feae92c
                              • Opcode Fuzzy Hash: bd73de3436733972e1a7d8bfada879b552c02fe7ca9ca77003ff3ec32d435f62
                              • Instruction Fuzzy Hash: 30218030800608EFDF109F29DC04B6A7BE8FB407A1F54CA36F818965B1DB789891DF95
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: _memcmp
                              • String ID:
                              • API String ID: 2931989736-0
                              • Opcode ID: f6730149414d7f8cf92f6d7911971a1e803d67c16fc6c96849ef7b8567ef0c1a
                              • Instruction ID: 7f15cbe451d92cec0dacdbfd65cd9c4c6a4fe30cbef5fe0e62b9820c69676f67
                              • Opcode Fuzzy Hash: f6730149414d7f8cf92f6d7911971a1e803d67c16fc6c96849ef7b8567ef0c1a
                              • Instruction Fuzzy Hash: D601B57174010ABBEA156B11AD87FBBB75CEE15398F04402DFD1596382EB5CEE2082F1
                              APIs
                              • GetCurrentThreadId.KERNEL32 ref: 007D4ABA
                              • __beginthreadex.LIBCMT ref: 007D4AD8
                              • MessageBoxW.USER32(?,?,?,?), ref: 007D4AED
                              • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 007D4B03
                              • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 007D4B0A
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: CloseCurrentHandleMessageObjectSingleThreadWait__beginthreadex
                              • String ID:
                              • API String ID: 3824534824-0
                              • Opcode ID: 97e9defb5ae31d94fb15cc57c6957a4be9cb45a88d453341a78cbfe95f57e8d3
                              • Instruction ID: 2b31ca4d25ae3aebebb2550384c2c671214950618e85bd986b3e3e0be74768ae
                              • Opcode Fuzzy Hash: 97e9defb5ae31d94fb15cc57c6957a4be9cb45a88d453341a78cbfe95f57e8d3
                              • Instruction Fuzzy Hash: 7311C8B6905658BBC7119FA8EC08AAB7FBDFF85320F148266F914D3350DA79C90487A1
                              APIs
                              • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 007C821E
                              • GetLastError.KERNEL32(?,007C7CE2,?,?,?), ref: 007C8228
                              • GetProcessHeap.KERNEL32(00000008,?,?,007C7CE2,?,?,?), ref: 007C8237
                              • HeapAlloc.KERNEL32(00000000,?,007C7CE2,?,?,?), ref: 007C823E
                              • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 007C8255
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                              • String ID:
                              • API String ID: 842720411-0
                              • Opcode ID: cd7f32b4e21e020fe33c130085f370b1cdc7e2a80dd8a0bfe0dc92c1803ee1f6
                              • Instruction ID: 3eaab2df802b52b2291d32a5990da82aeffacccc2e615684874e23437a34f1c9
                              • Opcode Fuzzy Hash: cd7f32b4e21e020fe33c130085f370b1cdc7e2a80dd8a0bfe0dc92c1803ee1f6
                              • Instruction Fuzzy Hash: 8C016971200608BFDB204FAADC8CEBB7BACFF8A754B50452DF909C2220DE358C00CA60
                              APIs
                              • CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,007C7044,80070057,?,?,?,007C7455), ref: 007C7127
                              • ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,007C7044,80070057,?,?), ref: 007C7142
                              • lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,007C7044,80070057,?,?), ref: 007C7150
                              • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,007C7044,80070057,?), ref: 007C7160
                              • CLSIDFromString.OLE32(?,?,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,007C7044,80070057,?,?), ref: 007C716C
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: From$Prog$FreeStringTasklstrcmpi
                              • String ID:
                              • API String ID: 3897988419-0
                              • Opcode ID: abf92fa03b7af06dd5b1e38356d48f6dd42ad7a2ec325e7450b0e7b92e292bda
                              • Instruction ID: a812b881a17314839477b4386133a18dc260ea2c8247ac97a20f890d0984f4c9
                              • Opcode Fuzzy Hash: abf92fa03b7af06dd5b1e38356d48f6dd42ad7a2ec325e7450b0e7b92e292bda
                              • Instruction Fuzzy Hash: CE015A72601208ABDB154F65DC44FAA7BADEF847A1F18806CFD04D6220DF39DD40EBA0
                              APIs
                              • QueryPerformanceCounter.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 007D5260
                              • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 007D526E
                              • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?), ref: 007D5276
                              • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 007D5280
                              • Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 007D52BC
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: PerformanceQuery$CounterSleep$Frequency
                              • String ID:
                              • API String ID: 2833360925-0
                              • Opcode ID: 2e7cd3f15575541fa8ab8bd138d65930d0d2380c48ed3954d65ec42c1afdf7b5
                              • Instruction ID: 0507ee3aa8d050ffade97f7f8aea483bca5fd5f4f18e328949e8313b1c192712
                              • Opcode Fuzzy Hash: 2e7cd3f15575541fa8ab8bd138d65930d0d2380c48ed3954d65ec42c1afdf7b5
                              • Instruction Fuzzy Hash: A9010571D01A1DDBCF00AFA4E8499EEBB78BF0D711F404156E941B2245DF386958C7A5
                              APIs
                              • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 007C8121
                              • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 007C812B
                              • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 007C813A
                              • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 007C8141
                              • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 007C8157
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: HeapInformationToken$AllocErrorLastProcess
                              • String ID:
                              • API String ID: 44706859-0
                              • Opcode ID: 7041cd43e6fc7bc4173e2813b46a5e125784a94a3bdb9d088378aca785c2d818
                              • Instruction ID: d9050a9959a06e818e853ccdeaaadc67c303f869ea090071dfb099b77185183d
                              • Opcode Fuzzy Hash: 7041cd43e6fc7bc4173e2813b46a5e125784a94a3bdb9d088378aca785c2d818
                              • Instruction Fuzzy Hash: 46F06271200308AFEB511FA5EC88F773BACFF49754B04402DF945C6150CF699D41DA65
                              APIs
                              • GetDlgItem.USER32(?,000003E9), ref: 007CC1F7
                              • GetWindowTextW.USER32(00000000,?,00000100), ref: 007CC20E
                              • MessageBeep.USER32(00000000), ref: 007CC226
                              • KillTimer.USER32(?,0000040A), ref: 007CC242
                              • EndDialog.USER32(?,00000001), ref: 007CC25C
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: BeepDialogItemKillMessageTextTimerWindow
                              • String ID:
                              • API String ID: 3741023627-0
                              • Opcode ID: 8e8f905d298a053dff2f84cb6cd00bb3e94916be1ab71a52325d813699ea6516
                              • Instruction ID: b4b9496798d1c6330e5b10fd0fe1fb7fcc138714de0ce6818425805477b1dae1
                              • Opcode Fuzzy Hash: 8e8f905d298a053dff2f84cb6cd00bb3e94916be1ab71a52325d813699ea6516
                              • Instruction Fuzzy Hash: 6501A230404704ABEB215B60ED4EFA677B8FF00B06F00426DE546E14E0DFE86944CB94
                              APIs
                              • EndPath.GDI32(?), ref: 007713BF
                              • StrokeAndFillPath.GDI32(?,?,007AB888,00000000,?), ref: 007713DB
                              • SelectObject.GDI32(?,00000000), ref: 007713EE
                              • DeleteObject.GDI32 ref: 00771401
                              • StrokePath.GDI32(?), ref: 0077141C
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: Path$ObjectStroke$DeleteFillSelect
                              • String ID:
                              • API String ID: 2625713937-0
                              • Opcode ID: 590cbb3c3399a125f2221899da746b31664a31878df0d322694450f2f0a342db
                              • Instruction ID: 58fd07a1b62e7e252049d7bb85d5efc2226ff3a4a7fc54c61f96030b055bb91a
                              • Opcode Fuzzy Hash: 590cbb3c3399a125f2221899da746b31664a31878df0d322694450f2f0a342db
                              • Instruction Fuzzy Hash: D3F03730004B48EBDB115F2AEC4CB693FA5BB41366F58CA35E529880F1CB3C8995DF14
                              APIs
                              • CoInitialize.OLE32(00000000), ref: 007DC432
                              • CoCreateInstance.OLE32(00802D6C,00000000,00000001,00802BDC,?), ref: 007DC44A
                                • Part of subcall function 00777DE1: _memmove.LIBCMT ref: 00777E22
                              • CoUninitialize.OLE32 ref: 007DC6B7
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: CreateInitializeInstanceUninitialize_memmove
                              • String ID: .lnk
                              • API String ID: 2683427295-24824748
                              • Opcode ID: e39eb550528a292f754bd08644f1827ed6182c0fc36b0afe6a1241d3d88c203d
                              • Instruction ID: 866997a8ccdd21231381b31a3346c00a756619fd80841ee81d6d172fc65d6f21
                              • Opcode Fuzzy Hash: e39eb550528a292f754bd08644f1827ed6182c0fc36b0afe6a1241d3d88c203d
                              • Instruction Fuzzy Hash: 95A13B71204205AFD700EF54C885EABB7E8FF85394F00896DF15997292DB75E909CB52
                              APIs
                                • Part of subcall function 00790DB6: std::exception::exception.LIBCMT ref: 00790DEC
                                • Part of subcall function 00790DB6: __CxxThrowException@8.LIBCMT ref: 00790E01
                                • Part of subcall function 00777DE1: _memmove.LIBCMT ref: 00777E22
                                • Part of subcall function 00777A51: _memmove.LIBCMT ref: 00777AAB
                              • __swprintf.LIBCMT ref: 00782ECD
                              Strings
                              • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 00782D66
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: _memmove$Exception@8Throw__swprintfstd::exception::exception
                              • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                              • API String ID: 1943609520-557222456
                              • Opcode ID: fb87990a44efd7a3b30f077e6c2e31dc6628ac8733c236d3a4dccf6e7e238add
                              • Instruction ID: 4a9b0912465eed00c793e409a2309ceeb039fd35ff995bb0a798315dea8d7401
                              • Opcode Fuzzy Hash: fb87990a44efd7a3b30f077e6c2e31dc6628ac8733c236d3a4dccf6e7e238add
                              • Instruction Fuzzy Hash: 65917C71108201DFCB18FF28C889D6FB7B4EF85750F14891DF5499B2A2EA28ED45CB56
                              APIs
                                • Part of subcall function 00774750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00774743,?,?,007737AE,?), ref: 00774770
                              • CoInitialize.OLE32(00000000), ref: 007DB9BB
                              • CoCreateInstance.OLE32(00802D6C,00000000,00000001,00802BDC,?), ref: 007DB9D4
                              • CoUninitialize.OLE32 ref: 007DB9F1
                                • Part of subcall function 00779837: __itow.LIBCMT ref: 00779862
                                • Part of subcall function 00779837: __swprintf.LIBCMT ref: 007798AC
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: CreateFullInitializeInstanceNamePathUninitialize__itow__swprintf
                              • String ID: .lnk
                              • API String ID: 2126378814-24824748
                              • Opcode ID: b5dfb63200b8a374bdc5f4336580643bf4e2e0b8361920733d6ae24c349d8483
                              • Instruction ID: 51cbacebca902f901d65df9dcc69b6317d9c80877f9bae612232effeda5ead3e
                              • Opcode Fuzzy Hash: b5dfb63200b8a374bdc5f4336580643bf4e2e0b8361920733d6ae24c349d8483
                              • Instruction Fuzzy Hash: 5AA12275604201DFCB00DF14C888D2ABBE5FF89324F158999F9999B3A1CB35EC45CB92
                              APIs
                              • __startOneArgErrorHandling.LIBCMT ref: 007950AD
                                • Part of subcall function 007A00F0: __87except.LIBCMT ref: 007A012B
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: ErrorHandling__87except__start
                              • String ID: pow
                              • API String ID: 2905807303-2276729525
                              • Opcode ID: f637d73740e43c34c19b1ca87818ff7eb775134a4a82fb7da30f2787d84fda78
                              • Instruction ID: 8b9e8ff3270d7b0dc8c05b6be23838c66bb6b03e8336a29b96a09e9d6c47b6d0
                              • Opcode Fuzzy Hash: f637d73740e43c34c19b1ca87818ff7eb775134a4a82fb7da30f2787d84fda78
                              • Instruction Fuzzy Hash: BD516D21D08605C7DF127738D95537E2B94BB82700F208E59E4D5862E9EE3C8DC89BC6
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: _memmove
                              • String ID: 3cx$_x
                              • API String ID: 4104443479-2911194521
                              • Opcode ID: a2b88d98cdad8c9c9f9e98f2566032a9b469875d73b1d21e14f8276b899ab8ad
                              • Instruction ID: 12c6571c329b44c2400fa93bbb6f13f76cd31b9c9fe981ef53c93587b9d32baa
                              • Opcode Fuzzy Hash: a2b88d98cdad8c9c9f9e98f2566032a9b469875d73b1d21e14f8276b899ab8ad
                              • Instruction Fuzzy Hash: C2515DB0900609DFCF64DF68D884AEEB7F5FF44304F248529E85AD7250EB38A955CB51
                              APIs
                                • Part of subcall function 007D14BC: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,007C9296,?,?,00000034,00000800,?,00000034), ref: 007D14E6
                              • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 007C983F
                                • Part of subcall function 007D1487: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,007C92C5,?,?,00000800,?,00001073,00000000,?,?), ref: 007D14B1
                                • Part of subcall function 007D13DE: GetWindowThreadProcessId.USER32(?,?), ref: 007D1409
                                • Part of subcall function 007D13DE: OpenProcess.KERNEL32(00000438,00000000,?,?,?,007C925A,00000034,?,?,00001004,00000000,00000000), ref: 007D1419
                                • Part of subcall function 007D13DE: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,007C925A,00000034,?,?,00001004,00000000,00000000), ref: 007D142F
                              • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 007C98AC
                              • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 007C98F9
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                              • String ID: @
                              • API String ID: 4150878124-2766056989
                              • Opcode ID: 053e506d823af4d7d6eab790fb529da7e6548a360b4dd30f190dab24bcd716ab
                              • Instruction ID: 5a472be4cfd8d0b731e4b4284d7acfb0ada029a422d1a9bf0798cc3a93c43319
                              • Opcode Fuzzy Hash: 053e506d823af4d7d6eab790fb529da7e6548a360b4dd30f190dab24bcd716ab
                              • Instruction Fuzzy Hash: 20414B76900218BECB10DFA4CD89EDEBBB8EF49700F004099FA45B7291DA746E45CBA0
                              APIs
                              • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,007FF910,00000000,?,?,?,?), ref: 007F79DF
                              • GetWindowLongW.USER32 ref: 007F79FC
                              • SetWindowLongW.USER32(?,000000F0,00000000), ref: 007F7A0C
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: Window$Long
                              • String ID: SysTreeView32
                              • API String ID: 847901565-1698111956
                              • Opcode ID: a7de89343e912b2f9aa64a6b66472359b2e95ad2e346177b3ff4349eb602545e
                              • Instruction ID: 6f620b4911e90877af6c0deae6ab7ed7d8600407cf0ee87127e51390cb1974f7
                              • Opcode Fuzzy Hash: a7de89343e912b2f9aa64a6b66472359b2e95ad2e346177b3ff4349eb602545e
                              • Instruction Fuzzy Hash: 3731BD3120460AABDB158E38CC45BEA77A9EF04324F208725FA75922E0D778E951CB50
                              APIs
                              • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 007F7461
                              • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 007F7475
                              • SendMessageW.USER32(?,00001002,00000000,?), ref: 007F7499
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: MessageSend$Window
                              • String ID: SysMonthCal32
                              • API String ID: 2326795674-1439706946
                              • Opcode ID: a5e7aa3e87cefd2e584aa10af7c6663f7c2d3a8a04a0205a7abb788000669a13
                              • Instruction ID: f8316f7d7f1b5f57545d20356b9ec5e865ae43ccf311eec3fc40a95dc81f2327
                              • Opcode Fuzzy Hash: a5e7aa3e87cefd2e584aa10af7c6663f7c2d3a8a04a0205a7abb788000669a13
                              • Instruction Fuzzy Hash: 63219132500258ABDF158E94CC46FFA3B79FF48724F110114FE556B290DA79AC51DBA0
                              APIs
                              • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 007F7C4A
                              • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 007F7C58
                              • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 007F7C5F
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: MessageSend$DestroyWindow
                              • String ID: msctls_updown32
                              • API String ID: 4014797782-2298589950
                              • Opcode ID: f5bd31162e3091b3dcd750051c9ea791a2de6819f1e52fe604fdd2400023b083
                              • Instruction ID: da072022d9b63264bd4849aabba8b96943c00a89fe05e5b291b4f1514f85a73d
                              • Opcode Fuzzy Hash: f5bd31162e3091b3dcd750051c9ea791a2de6819f1e52fe604fdd2400023b083
                              • Instruction Fuzzy Hash: 772169B1204208AFEB14DF28DCC5CB737ACEF4A3A4B544459FA159B3A1CB35EC11CAA0
                              APIs
                              • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 007F6D3B
                              • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 007F6D4B
                              • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 007F6D70
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: MessageSend$MoveWindow
                              • String ID: Listbox
                              • API String ID: 3315199576-2633736733
                              • Opcode ID: 59425645b92e90bd51d2932d6396d8c8a14a1c1673a6ceabeb6b86cf5ef4cbf2
                              • Instruction ID: 7df5b911f306f742f3414400c45632cff29caa448e9a488c6c8ad6e508bbaa8b
                              • Opcode Fuzzy Hash: 59425645b92e90bd51d2932d6396d8c8a14a1c1673a6ceabeb6b86cf5ef4cbf2
                              • Instruction Fuzzy Hash: 24217F3261011CABDF118F54DC45EBB3BBAEF89750F018124FA559B2A0CA79AC51DBA0
                              APIs
                              • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 007F7772
                              • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 007F7787
                              • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 007F7794
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: MessageSend
                              • String ID: msctls_trackbar32
                              • API String ID: 3850602802-1010561917
                              • Opcode ID: 1608d918128f0269d1f5aa6746bcab16c638872eae07bffa04298f3e52859a00
                              • Instruction ID: c6d7e7462c6f02ae91ede665410f2a16fd3b4a2646c6e59019e810b438c49a40
                              • Opcode Fuzzy Hash: 1608d918128f0269d1f5aa6746bcab16c638872eae07bffa04298f3e52859a00
                              • Instruction Fuzzy Hash: F0112732210208BAEF246F65CC05FE73769EF88B64F014118F741921A0C675E811CB20
                              APIs
                              • LoadLibraryA.KERNEL32(kernel32.dll,?,00774B83,?), ref: 00774C44
                              • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00774C56
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: AddressLibraryLoadProc
                              • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                              • API String ID: 2574300362-1355242751
                              • Opcode ID: 90e10e8a7850dd35f9eb33cefaf0851df14177691c83da8632cf854628e132b2
                              • Instruction ID: 874a939129ee28d6242a02e0a9c50d3a7c059fc77a57c6793351e19a36b7a4a9
                              • Opcode Fuzzy Hash: 90e10e8a7850dd35f9eb33cefaf0851df14177691c83da8632cf854628e132b2
                              • Instruction Fuzzy Hash: 79D01270611717CFDB205F31D948626B7E9AF05391B21C839D595D6260EB78D480C660
                              APIs
                              • LoadLibraryA.KERNEL32(kernel32.dll,?,00774BD0,?,00774DEF,?,008352F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00774C11
                              • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00774C23
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: AddressLibraryLoadProc
                              • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                              • API String ID: 2574300362-3689287502
                              • Opcode ID: a01b2decb317188311e5d39e2080fb161a9afb69cd5e05e80650820e896f32e4
                              • Instruction ID: 295bd7083303cc8657fe26b0aa128d178d07a921d8652f5fa3b79e39538d963d
                              • Opcode Fuzzy Hash: a01b2decb317188311e5d39e2080fb161a9afb69cd5e05e80650820e896f32e4
                              • Instruction Fuzzy Hash: 57D01270511717CFDB205F71D948616B6E6EF09391B11CC3AD495D6250EBB8D480C660
                              APIs
                              • LoadLibraryA.KERNEL32(advapi32.dll,?,007F1039), ref: 007F0DF5
                              • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 007F0E07
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: AddressLibraryLoadProc
                              • String ID: RegDeleteKeyExW$advapi32.dll
                              • API String ID: 2574300362-4033151799
                              • Opcode ID: 9120ff044c0a52f8a06d083ea0eb9d31a875ebdb5c3e681ea865672bd91756fa
                              • Instruction ID: 88dc3dcfae76e5e195c059f5a72b926ac06fd09ef97ed57d8c24ef2456cb851c
                              • Opcode Fuzzy Hash: 9120ff044c0a52f8a06d083ea0eb9d31a875ebdb5c3e681ea865672bd91756fa
                              • Instruction Fuzzy Hash: 4ED0827060032ACFC320AF70D8082A272E5AF00362F00CC2ED592C2350EABCD890CA84
                              APIs
                              • LoadLibraryA.KERNEL32(kernel32.dll,00000001,007E8CF4,?,007FF910), ref: 007E90EE
                              • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 007E9100
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: AddressLibraryLoadProc
                              • String ID: GetModuleHandleExW$kernel32.dll
                              • API String ID: 2574300362-199464113
                              • Opcode ID: e1e6ee028e8cb36817bc0c232c9bc6ea4269155170e90ef978c588218500d065
                              • Instruction ID: 937e147f8c9121703fcf6d9b3eb7d5880d111e2ab46535bc79706eb3cd533869
                              • Opcode Fuzzy Hash: e1e6ee028e8cb36817bc0c232c9bc6ea4269155170e90ef978c588218500d065
                              • Instruction Fuzzy Hash: 26D0C77151172BCFCB208F32D80821273E5AF08351B22C83AD582C2290EE78C880CA90
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: LocalTime__swprintf
                              • String ID: %.3d$WIN_XPe
                              • API String ID: 2070861257-2409531811
                              • Opcode ID: 69b03eab9690cb5a5cc111647211d7c99ebf9d56405b9838d02b97f49f0ab571
                              • Instruction ID: 18b1ab40be97b7255fd077fa7455fbef4dde8859b1822b96988ad3b34280d965
                              • Opcode Fuzzy Hash: 69b03eab9690cb5a5cc111647211d7c99ebf9d56405b9838d02b97f49f0ab571
                              • Instruction Fuzzy Hash: 9AD05B71804118FACB0097919C9DDFD737CBB08301FD404A2F406D3040EA3D8B94D725
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 45968ed35f7c8bbee9486a52ef76c1928cbdf3d4be1465ade22cf23c6915e54c
                              • Instruction ID: 79e48312f76228603941af31a70b45a90035c83733ed79e19f518fc61216f192
                              • Opcode Fuzzy Hash: 45968ed35f7c8bbee9486a52ef76c1928cbdf3d4be1465ade22cf23c6915e54c
                              • Instruction Fuzzy Hash: 53C14A75A04256EFCB18CFA4C884EAEBBB5FF48314B14859CE805DB251DB34EE81DB90
                              APIs
                              • CharLowerBuffW.USER32(?,?), ref: 007EE0BE
                              • CharLowerBuffW.USER32(?,?), ref: 007EE101
                                • Part of subcall function 007ED7A5: CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 007ED7C5
                              • VirtualAlloc.KERNEL32(00000000,00000077,00003000,00000040), ref: 007EE301
                              • _memmove.LIBCMT ref: 007EE314
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: BuffCharLower$AllocVirtual_memmove
                              • String ID:
                              • API String ID: 3659485706-0
                              • Opcode ID: c719145087acf05bae96eb67cdaf391c7597d3bebbe65332406cea17506b7794
                              • Instruction ID: 0eec84255cc140a35ad7d9d7d45c4e55954dad16294f47de61c1a7b8c03f3cc8
                              • Opcode Fuzzy Hash: c719145087acf05bae96eb67cdaf391c7597d3bebbe65332406cea17506b7794
                              • Instruction Fuzzy Hash: D7C18871609341CFCB04DF29C484A6ABBE4FF89314F04896EF9998B351D734E946CB82
                              APIs
                              • CoInitialize.OLE32(00000000), ref: 007E80C3
                              • CoUninitialize.OLE32 ref: 007E80CE
                                • Part of subcall function 007CD56C: CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 007CD5D4
                              • VariantInit.OLEAUT32(?), ref: 007E80D9
                              • VariantClear.OLEAUT32(?), ref: 007E83AA
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: Variant$ClearCreateInitInitializeInstanceUninitialize
                              • String ID:
                              • API String ID: 780911581-0
                              • Opcode ID: 142d80372f1c167574eb01a592ef7199cb8d616f16c785792c74b2ca23803ed2
                              • Instruction ID: e76e5cfcf726c997eba159fc6c671be1466926eeab006b057f9095de5ea5a17b
                              • Opcode Fuzzy Hash: 142d80372f1c167574eb01a592ef7199cb8d616f16c785792c74b2ca23803ed2
                              • Instruction Fuzzy Hash: DFA14575605741DFCB40DF65C885A2EB7E4BF89764F048458FA9A9B3A1CB38EC05CB82
                              APIs
                              • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,00802C7C,?), ref: 007C76EA
                              • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,00802C7C,?), ref: 007C7702
                              • CLSIDFromProgID.OLE32(?,?,00000000,007FFB80,000000FF,?,00000000,00000800,00000000,?,00802C7C,?), ref: 007C7727
                              • _memcmp.LIBCMT ref: 007C7748
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: FromProg$FreeTask_memcmp
                              • String ID:
                              • API String ID: 314563124-0
                              • Opcode ID: 7f9e07993be3235de708a94f37678fd4ce554916c0f77f5beebf4cc8acc68b0d
                              • Instruction ID: e6d9e3d66ef5d6e9df5028691054376c2eea05428594a90300906c9724aa37b7
                              • Opcode Fuzzy Hash: 7f9e07993be3235de708a94f37678fd4ce554916c0f77f5beebf4cc8acc68b0d
                              • Instruction Fuzzy Hash: CC81D875A00109EFCB04DFA4C988EEEB7B9FF89315B20459DE505AB250DB75AE06CF60
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: Variant$AllocClearCopyInitString
                              • String ID:
                              • API String ID: 2808897238-0
                              • Opcode ID: c7ec6fb3a7f235f0dd2d5a4997e1b403d2fbd2a1693d7e6c4c53041e939874b2
                              • Instruction ID: 1571c60d09012b8c30c22a9220657336ff055402dd7644a29b5185b759298b9d
                              • Opcode Fuzzy Hash: c7ec6fb3a7f235f0dd2d5a4997e1b403d2fbd2a1693d7e6c4c53041e939874b2
                              • Instruction Fuzzy Hash: 96519C64704701DACF24AF65D8D5F3EB3E5AF44310F20C81FE58AEB292EA38D8808B45
                              APIs
                                • Part of subcall function 00774EE5: _fseek.LIBCMT ref: 00774EFD
                                • Part of subcall function 007D9734: _wcscmp.LIBCMT ref: 007D9824
                                • Part of subcall function 007D9734: _wcscmp.LIBCMT ref: 007D9837
                              • _free.LIBCMT ref: 007D96A2
                              • _free.LIBCMT ref: 007D96A9
                              • _free.LIBCMT ref: 007D9714
                                • Part of subcall function 00792D55: RtlFreeHeap.NTDLL(00000000,00000000,?,00799A24), ref: 00792D69
                                • Part of subcall function 00792D55: GetLastError.KERNEL32(00000000,?,00799A24), ref: 00792D7B
                              • _free.LIBCMT ref: 007D971C
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: _free$_wcscmp$ErrorFreeHeapLast_fseek
                              • String ID:
                              • API String ID: 1552873950-0
                              • Opcode ID: e2ce0b96e6b1abb55426e352800b72169fd29c8898a44df292391a94a629668e
                              • Instruction ID: 7eeaf65cf3a394bae244b90c0d503baa7e18ae3dc196388e22d04d3772684ca3
                              • Opcode Fuzzy Hash: e2ce0b96e6b1abb55426e352800b72169fd29c8898a44df292391a94a629668e
                              • Instruction Fuzzy Hash: 74514EB1904218EFDF259F64DC85AAEBB79EF48310F10449EF209A3351DB755A81CF58
                              APIs
                              • GetWindowRect.USER32(0130ED30,?), ref: 007F9863
                              • ScreenToClient.USER32(00000002,00000002), ref: 007F9896
                              • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,00000002,?,?), ref: 007F9903
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: Window$ClientMoveRectScreen
                              • String ID:
                              • API String ID: 3880355969-0
                              • Opcode ID: 3a6e155786aa978c4e0a5b0a22a756faf218339b101051e7f36e16d1b29d0c29
                              • Instruction ID: 4cce42496c14df03f8b4922a44305f6abba4c519e2bc20b88dc37e26742e9b0d
                              • Opcode Fuzzy Hash: 3a6e155786aa978c4e0a5b0a22a756faf218339b101051e7f36e16d1b29d0c29
                              • Instruction Fuzzy Hash: 37512A34A00208EFCF14CF68C884ABE7BA5FF95360F108569FA659B3A0D774AD41CB90
                              APIs
                              • SendMessageW.USER32(?,0000110A,00000004,00000000), ref: 007C9AD2
                              • __itow.LIBCMT ref: 007C9B03
                                • Part of subcall function 007C9D53: SendMessageW.USER32(?,0000113E,00000000,00000000), ref: 007C9DBE
                              • SendMessageW.USER32(?,0000110A,00000001,?), ref: 007C9B6C
                              • __itow.LIBCMT ref: 007C9BC3
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: MessageSend$__itow
                              • String ID:
                              • API String ID: 3379773720-0
                              • Opcode ID: 179d0d00ec8d0b51a97ed9b2ac5ef25663c65d76a89b7aeeb91c7598afe1a5f6
                              • Instruction ID: 323789f26dd66f0d6e8f6dddc3cbf232a1c7a8812ad71a1e164252c37e33f357
                              • Opcode Fuzzy Hash: 179d0d00ec8d0b51a97ed9b2ac5ef25663c65d76a89b7aeeb91c7598afe1a5f6
                              • Instruction Fuzzy Hash: FF416FB0A00208ABDF15DF54D849FEE7BB9EF49750F00405DFA09A6291DB789E44CB61
                              APIs
                              • socket.WSOCK32(00000002,00000002,00000011), ref: 007E69D1
                              • WSAGetLastError.WSOCK32(00000000), ref: 007E69E1
                                • Part of subcall function 00779837: __itow.LIBCMT ref: 00779862
                                • Part of subcall function 00779837: __swprintf.LIBCMT ref: 007798AC
                              • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 007E6A45
                              • WSAGetLastError.WSOCK32(00000000), ref: 007E6A51
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: ErrorLast$__itow__swprintfsocket
                              • String ID:
                              • API String ID: 2214342067-0
                              • Opcode ID: a44665b824fcba6309479e791e45c914d7eeb1efcbeb5d68d1e2fc5a5e39695e
                              • Instruction ID: 370132dedcdfbb9e4b947390e9070d3d694c0fc5663be53af6809a0fa95055e4
                              • Opcode Fuzzy Hash: a44665b824fcba6309479e791e45c914d7eeb1efcbeb5d68d1e2fc5a5e39695e
                              • Instruction Fuzzy Hash: 00418275740200AFEB60AF24CC8AF3D77E49F19B94F44C468FA5D9B2D2DA789D008752
                              APIs
                              • #16.WSOCK32(?,?,00000000,00000000,00000000,00000000,?,?,00000000,007FF910), ref: 007E64A7
                              • _strlen.LIBCMT ref: 007E64D9
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: _strlen
                              • String ID:
                              • API String ID: 4218353326-0
                              • Opcode ID: e40e9d0611b093ba7445c960b719fdf1e5b2102f1f2ffdec84b8175f8ba206ec
                              • Instruction ID: 6c7bc1d047fae0d2ff214646622d45ea46c17837edf12657f92803941f3250eb
                              • Opcode Fuzzy Hash: e40e9d0611b093ba7445c960b719fdf1e5b2102f1f2ffdec84b8175f8ba206ec
                              • Instruction Fuzzy Hash: 0C41C671A01144EFCF14EBA9ECC9FBEB7A9AF18350F108159F91997296DB38AD10CB50
                              APIs
                              • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 007DB89E
                              • GetLastError.KERNEL32(?,00000000), ref: 007DB8C4
                              • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 007DB8E9
                              • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 007DB915
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: CreateHardLink$DeleteErrorFileLast
                              • String ID:
                              • API String ID: 3321077145-0
                              • Opcode ID: 0ba8f1ebbbead7917aa345ce44b4233b48b5e2d2d037a0c382f224cd8ec7aafa
                              • Instruction ID: f870e576b625e0b81ead210b0897e6235946e65d2105b3e67af619e75ccc8441
                              • Opcode Fuzzy Hash: 0ba8f1ebbbead7917aa345ce44b4233b48b5e2d2d037a0c382f224cd8ec7aafa
                              • Instruction Fuzzy Hash: C541F735601650DFCB10EF15C488A5DBBB1AF4A350B09C099ED4A9B362CB38FD01DB92
                              APIs
                              • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 007F88DE
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: InvalidateRect
                              • String ID:
                              • API String ID: 634782764-0
                              • Opcode ID: 772e7c8966253a82420f5af62295e1037f1ef1bdac1c48ada28260342b6eacad
                              • Instruction ID: efebc86eb44aecdf2941e923391aab5c98d7fd70c314a1f9c74693a5c2b07b67
                              • Opcode Fuzzy Hash: 772e7c8966253a82420f5af62295e1037f1ef1bdac1c48ada28260342b6eacad
                              • Instruction Fuzzy Hash: E131903461010CEEEFA0DB68CC45BBD77A5FB05350F944512FB15E63A1CEB8A9809757
                              APIs
                              • ClientToScreen.USER32(?,?), ref: 007FAB60
                              • GetWindowRect.USER32(?,?), ref: 007FABD6
                              • PtInRect.USER32(?,?,007FC014), ref: 007FABE6
                              • MessageBeep.USER32(00000000), ref: 007FAC57
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: Rect$BeepClientMessageScreenWindow
                              • String ID:
                              • API String ID: 1352109105-0
                              • Opcode ID: 88f6d5a76c135dd02eff6911a5d037bda9dfec20ad84dad4f02cd5766bbbd413
                              • Instruction ID: 5b8be7b5da6388d0c559d12dda818494f81d9bb898d329f8f77754a0e44cfee2
                              • Opcode Fuzzy Hash: 88f6d5a76c135dd02eff6911a5d037bda9dfec20ad84dad4f02cd5766bbbd413
                              • Instruction Fuzzy Hash: 04416CB460011DEFCB11DF58D884A797BF5FF89310F1884A9EA199B360D734E941CBA2
                              APIs
                              • GetKeyboardState.USER32(?,00000000,?,00000001), ref: 007D0B27
                              • SetKeyboardState.USER32(00000080,?,00000001), ref: 007D0B43
                              • PostMessageW.USER32(00000000,00000102,00000001,00000001), ref: 007D0BA9
                              • SendInput.USER32(00000001,00000000,0000001C,00000000,?,00000001), ref: 007D0BFB
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: KeyboardState$InputMessagePostSend
                              • String ID:
                              • API String ID: 432972143-0
                              • Opcode ID: c7eb9c9c882f9d9746a553ff555785e3809465a74fc6363e73a9ae0138cace45
                              • Instruction ID: 21b2dfbcd6660590f40e25b009ac23832aa3ff16879fdb9da3943bcce4839ed1
                              • Opcode Fuzzy Hash: c7eb9c9c882f9d9746a553ff555785e3809465a74fc6363e73a9ae0138cace45
                              • Instruction Fuzzy Hash: 37314BB0948608AEFB308F258C09BF9BBB5AB45314F04925FE491523D1C77D8950D7E5
                              APIs
                              • GetKeyboardState.USER32(?,7707C0D0,?,00008000), ref: 007D0C66
                              • SetKeyboardState.USER32(00000080,?,00008000), ref: 007D0C82
                              • PostMessageW.USER32(00000000,00000101,00000000), ref: 007D0CE1
                              • SendInput.USER32(00000001,?,0000001C,7707C0D0,?,00008000), ref: 007D0D33
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: KeyboardState$InputMessagePostSend
                              • String ID:
                              • API String ID: 432972143-0
                              • Opcode ID: 2d6944e82dc9100c2c89461a0939905dc819a593f75672c669fe74f42c8f1a9e
                              • Instruction ID: 55a964b398b24d86c241ad8a33e1e8afe5739a2add471fa646295b2e22c3d30b
                              • Opcode Fuzzy Hash: 2d6944e82dc9100c2c89461a0939905dc819a593f75672c669fe74f42c8f1a9e
                              • Instruction Fuzzy Hash: 4D312630A50618AEFF308A658808BFEBB76AB45310F08931FE489622D1C37D9955D7F5
                              APIs
                              • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 007A61FB
                              • __isleadbyte_l.LIBCMT ref: 007A6229
                              • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 007A6257
                              • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 007A628D
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                              • String ID:
                              • API String ID: 3058430110-0
                              • Opcode ID: b7738d40ed01e6667c76226587c7f866d88b1c5cd20c4ce60dbc399719b675d1
                              • Instruction ID: 5722c1a95082104cb133ca914bea5d91e929a3f5deb32f711b14e24607b0e28f
                              • Opcode Fuzzy Hash: b7738d40ed01e6667c76226587c7f866d88b1c5cd20c4ce60dbc399719b675d1
                              • Instruction Fuzzy Hash: 4631C13160024AEFDF218F64CC48BBA7FA9FF82310F194229E824871D1E738D951DB51
                              APIs
                              • GetForegroundWindow.USER32 ref: 007F4F02
                                • Part of subcall function 007D3641: GetWindowThreadProcessId.USER32(00000000,00000000), ref: 007D365B
                                • Part of subcall function 007D3641: GetCurrentThreadId.KERNEL32 ref: 007D3662
                                • Part of subcall function 007D3641: AttachThreadInput.USER32(00000000,?,007D5005), ref: 007D3669
                              • GetCaretPos.USER32(?), ref: 007F4F13
                              • ClientToScreen.USER32(00000000,?), ref: 007F4F4E
                              • GetForegroundWindow.USER32 ref: 007F4F54
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                              • String ID:
                              • API String ID: 2759813231-0
                              • Opcode ID: 7f302fcff33497944de4a2c4b614d1903a61d907d47ae24532f7dd51e0dc5b5e
                              • Instruction ID: d6b05ca8561894b0118e3780dc58f328660b01460ef076182005422789d59f4b
                              • Opcode Fuzzy Hash: 7f302fcff33497944de4a2c4b614d1903a61d907d47ae24532f7dd51e0dc5b5e
                              • Instruction Fuzzy Hash: CF311071D00208AFDB00EFA5C889DEFB7F9EF99300F10806AE515E7241DA799E45CBA1
                              APIs
                              • CreateToolhelp32Snapshot.KERNEL32 ref: 007D3C7A
                              • Process32FirstW.KERNEL32(00000000,?), ref: 007D3C88
                              • Process32NextW.KERNEL32(00000000,?), ref: 007D3CA8
                              • CloseHandle.KERNEL32(00000000), ref: 007D3D52
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                              • String ID:
                              • API String ID: 420147892-0
                              • Opcode ID: f25b4501771fe682e795238042e4de442d4a8046ea90a96a289505f75d14eea2
                              • Instruction ID: 74cd8ea399d31ef954cb52e2037b22cc07392b4ff980699f6e9bf2296ceb7dd0
                              • Opcode Fuzzy Hash: f25b4501771fe682e795238042e4de442d4a8046ea90a96a289505f75d14eea2
                              • Instruction Fuzzy Hash: F131AF31108305DFD704EF50C885ABABBF8AF85354F50482DF599862A1EB79AA49CB52
                              APIs
                                • Part of subcall function 00772612: GetWindowLongW.USER32(?,000000EB), ref: 00772623
                              • GetCursorPos.USER32(?), ref: 007FC4D2
                              • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,007AB9AB,?,?,?,?,?), ref: 007FC4E7
                              • GetCursorPos.USER32(?), ref: 007FC534
                              • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,007AB9AB,?,?,?), ref: 007FC56E
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: Cursor$LongMenuPopupProcTrackWindow
                              • String ID:
                              • API String ID: 2864067406-0
                              • Opcode ID: a808366b9f2186c550a42b4323ab5fd3977e1ca96f5ec4873463f7f9abd21dd9
                              • Instruction ID: 6c6c60569cd6de31bf0d1c03cc62cb9a58290f811eab77c51d3060e4574ebfe4
                              • Opcode Fuzzy Hash: a808366b9f2186c550a42b4323ab5fd3977e1ca96f5ec4873463f7f9abd21dd9
                              • Instruction Fuzzy Hash: 8931913560005CEFCB168F58C898EBA7BB5FF49310F144469FA058B361CB39AD60DBA4
                              APIs
                                • Part of subcall function 007C810A: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 007C8121
                                • Part of subcall function 007C810A: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 007C812B
                                • Part of subcall function 007C810A: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 007C813A
                                • Part of subcall function 007C810A: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 007C8141
                                • Part of subcall function 007C810A: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 007C8157
                              • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 007C86A3
                              • _memcmp.LIBCMT ref: 007C86C6
                              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 007C86FC
                              • HeapFree.KERNEL32(00000000), ref: 007C8703
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                              • String ID:
                              • API String ID: 1592001646-0
                              • Opcode ID: 00219e966128f15e59fc7ac549a5fd87204801b7e87510a2d5943d89f1230015
                              • Instruction ID: 677bd1f7954c1edc46cb8ea3ae43bfd280f43ebf6cf8544880154b0a15980355
                              • Opcode Fuzzy Hash: 00219e966128f15e59fc7ac549a5fd87204801b7e87510a2d5943d89f1230015
                              • Instruction Fuzzy Hash: 1F216B71E00109EBDB10DFA4C949BEEB7B8EF44304F15805DE454A7242EB38AE05CB95
                              APIs
                              • __setmode.LIBCMT ref: 007909AE
                                • Part of subcall function 00775A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,007D7896,?,?,00000000), ref: 00775A2C
                                • Part of subcall function 00775A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,007D7896,?,?,00000000,?,?), ref: 00775A50
                              • _fprintf.LIBCMT ref: 007909E5
                              • OutputDebugStringW.KERNEL32(?), ref: 007C5DBB
                                • Part of subcall function 00794AAA: _flsall.LIBCMT ref: 00794AC3
                              • __setmode.LIBCMT ref: 00790A1A
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: ByteCharMultiWide__setmode$DebugOutputString_flsall_fprintf
                              • String ID:
                              • API String ID: 521402451-0
                              • Opcode ID: cccaa23043d2cc602cb8b9eced120d119e3ce65093dae07e206780a2739e946c
                              • Instruction ID: bcb7b8b0670cb3f9ed2ac986582eadf2250877707b8d0e59b01e3e5a7bd0f84d
                              • Opcode Fuzzy Hash: cccaa23043d2cc602cb8b9eced120d119e3ce65093dae07e206780a2739e946c
                              • Instruction Fuzzy Hash: E6112771904204EFDF04B7B4AC4EDBE7B68DF46360F108159F20957282EE6D5C5297E5
                              APIs
                              • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 007E17A3
                                • Part of subcall function 007E182D: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 007E184C
                                • Part of subcall function 007E182D: InternetCloseHandle.WININET(00000000), ref: 007E18E9
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: Internet$CloseConnectHandleOpen
                              • String ID:
                              • API String ID: 1463438336-0
                              • Opcode ID: cc59ad592fa6a690cde94c9a9b9885acfb5d9f78ee215c6a992271a831b3ac65
                              • Instruction ID: dd130f93ca9993f25047d89539eda25162ccf85976908b5c14dd0391fb98048f
                              • Opcode Fuzzy Hash: cc59ad592fa6a690cde94c9a9b9885acfb5d9f78ee215c6a992271a831b3ac65
                              • Instruction Fuzzy Hash: 9621D431202641BFEB129F61CC02FBABBEDFF4C720F50402AFA1196650DB799811D7A0
                              APIs
                              • GetFileAttributesW.KERNEL32(?,007FFAC0), ref: 007D3A64
                              • GetLastError.KERNEL32 ref: 007D3A73
                              • CreateDirectoryW.KERNEL32(?,00000000), ref: 007D3A82
                              • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,007FFAC0), ref: 007D3ADF
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: CreateDirectory$AttributesErrorFileLast
                              • String ID:
                              • API String ID: 2267087916-0
                              • Opcode ID: 9a47d84ce8844b9e9af7a579ef94577db5027b597c4b4f61e9ffb49dcc93ca6d
                              • Instruction ID: d4a59a8233c502281801ed2b547c304d758b49da795ea6a80bc52e03f8f87dee
                              • Opcode Fuzzy Hash: 9a47d84ce8844b9e9af7a579ef94577db5027b597c4b4f61e9ffb49dcc93ca6d
                              • Instruction Fuzzy Hash: B62191746082019F8710EF28C88586A77F8BF56364F108A2BF499D73A1DB39DE45CB93
                              APIs
                                • Part of subcall function 007CF0BC: lstrlenW.KERNEL32(?,00000002,?,?,000000EF,?,007CDCD3,?,?,?,007CEAC6,00000000,000000EF,00000119,?,?), ref: 007CF0CB
                                • Part of subcall function 007CF0BC: lstrcpyW.KERNEL32(00000000,?,?,007CDCD3,?,?,?,007CEAC6,00000000,000000EF,00000119,?,?,00000000), ref: 007CF0F1
                                • Part of subcall function 007CF0BC: lstrcmpiW.KERNEL32(00000000,?,007CDCD3,?,?,?,007CEAC6,00000000,000000EF,00000119,?,?), ref: 007CF122
                              • lstrlenW.KERNEL32(?,00000002,?,?,?,?,007CEAC6,00000000,000000EF,00000119,?,?,00000000), ref: 007CDCEC
                              • lstrcpyW.KERNEL32(00000000,?,?,007CEAC6,00000000,000000EF,00000119,?,?,00000000), ref: 007CDD12
                              • lstrcmpiW.KERNEL32(00000002,cdecl,?,007CEAC6,00000000,000000EF,00000119,?,?,00000000), ref: 007CDD46
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: lstrcmpilstrcpylstrlen
                              • String ID: cdecl
                              • API String ID: 4031866154-3896280584
                              • Opcode ID: e4dac03a5f99cdbb1e00ff3fe753fa3fd437754a1cab41f4f346954a7d3f1b74
                              • Instruction ID: caa2730bde4f4dcbd20f5f0bbbb00e63469aedb5f0e2f47163635e55dcd5d16b
                              • Opcode Fuzzy Hash: e4dac03a5f99cdbb1e00ff3fe753fa3fd437754a1cab41f4f346954a7d3f1b74
                              • Instruction Fuzzy Hash: FE11AC3A200305EBCB25AF74D849E7A77A9FF45710B40803EE906CB2A0EB799C51C7E4
                              APIs
                              • _free.LIBCMT ref: 007A5101
                                • Part of subcall function 0079571C: __FF_MSGBANNER.LIBCMT ref: 00795733
                                • Part of subcall function 0079571C: __NMSG_WRITE.LIBCMT ref: 0079573A
                                • Part of subcall function 0079571C: RtlAllocateHeap.NTDLL(012F0000,00000000,00000001,00000000,?,?,?,00790DD3,?), ref: 0079575F
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: AllocateHeap_free
                              • String ID:
                              • API String ID: 614378929-0
                              • Opcode ID: ae7232b9ec4bf283833eb6c997246cc4761ba4dfdb97f34ed4e1bd1f4367c3a2
                              • Instruction ID: f7e2693caca0e4b883153086ad2f25b9d9949672a349014e65f16ec533298f90
                              • Opcode Fuzzy Hash: ae7232b9ec4bf283833eb6c997246cc4761ba4dfdb97f34ed4e1bd1f4367c3a2
                              • Instruction Fuzzy Hash: 8611C6B2505A19EECF313F74FC49B7E3798AF96361B24462AF90496251DE3C89408791
                              APIs
                              • _memset.LIBCMT ref: 007744CF
                                • Part of subcall function 0077407C: _memset.LIBCMT ref: 007740FC
                                • Part of subcall function 0077407C: _wcscpy.LIBCMT ref: 00774150
                                • Part of subcall function 0077407C: Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00774160
                              • KillTimer.USER32(?,00000001,?,?), ref: 00774524
                              • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00774533
                              • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 007AD4B9
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: IconNotifyShell_Timer_memset$Kill_wcscpy
                              • String ID:
                              • API String ID: 1378193009-0
                              • Opcode ID: 4deba7a90cf1f4acea4ae8bf6a8ed083c7a919b63b9ee1ffd7e284ba5f03d78e
                              • Instruction ID: 736045e411ed08d108ab05bb3286c388ffe606f187c1b2d4e9f51c8e5047d998
                              • Opcode Fuzzy Hash: 4deba7a90cf1f4acea4ae8bf6a8ed083c7a919b63b9ee1ffd7e284ba5f03d78e
                              • Instruction Fuzzy Hash: 1121F5B0504784AFEB329B24C849BE7BBECAF46314F04409DE68E56141C7782E84CB51
                              APIs
                                • Part of subcall function 00775A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,007D7896,?,?,00000000), ref: 00775A2C
                                • Part of subcall function 00775A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,007D7896,?,?,00000000,?,?), ref: 00775A50
                              • gethostbyname.WSOCK32(?,?,?), ref: 007E6399
                              • WSAGetLastError.WSOCK32(00000000), ref: 007E63A4
                              • _memmove.LIBCMT ref: 007E63D1
                              • inet_ntoa.WSOCK32(?), ref: 007E63DC
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: ByteCharMultiWide$ErrorLast_memmovegethostbynameinet_ntoa
                              • String ID:
                              • API String ID: 1504782959-0
                              • Opcode ID: e55e4071dedf5cb25a7a84b3f8dadd27702b0a26bf039794d763c324c00f1748
                              • Instruction ID: cdf3e5469439c33eff4939d18986b3e8c95f853abd3a649e763c766c13ecbe89
                              • Opcode Fuzzy Hash: e55e4071dedf5cb25a7a84b3f8dadd27702b0a26bf039794d763c324c00f1748
                              • Instruction Fuzzy Hash: 8F115171901109EFCF04FBA4DD8ACAE77B8AF09360B148065F509A7261DF78AE14CB61
                              APIs
                              • SendMessageW.USER32(?,000000B0,?,?), ref: 007C8B61
                              • SendMessageW.USER32(?,000000C9,?,00000000), ref: 007C8B73
                              • SendMessageW.USER32(?,000000C9,?,00000000), ref: 007C8B89
                              • SendMessageW.USER32(?,000000C9,?,00000000), ref: 007C8BA4
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: MessageSend
                              • String ID:
                              • API String ID: 3850602802-0
                              • Opcode ID: 447d9a743dcafb61bc28c2858f12661bc1092cf75db90b412c357d37a203f695
                              • Instruction ID: abad0b46fd3e098d6e98da82c66376a0e3f80b39c0d25d9325b8bcb7d9b82650
                              • Opcode Fuzzy Hash: 447d9a743dcafb61bc28c2858f12661bc1092cf75db90b412c357d37a203f695
                              • Instruction Fuzzy Hash: 4E110AB9901218FFDB11DF95C885FADBB74FB48710F204099E900B7250DA716E11DB94
                              APIs
                                • Part of subcall function 00772612: GetWindowLongW.USER32(?,000000EB), ref: 00772623
                              • DefDlgProcW.USER32(?,00000020,?), ref: 007712D8
                              • GetClientRect.USER32(?,?), ref: 007AB5FB
                              • GetCursorPos.USER32(?), ref: 007AB605
                              • ScreenToClient.USER32(?,?), ref: 007AB610
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: Client$CursorLongProcRectScreenWindow
                              • String ID:
                              • API String ID: 4127811313-0
                              • Opcode ID: 6db029753583b34483aa4460192040b7d7b07bc03ab289153692d99a3fa24719
                              • Instruction ID: 5fd96167e30aa2381bcf3018f308de8a153de809f12b696ff42ce2df0ea8f08b
                              • Opcode Fuzzy Hash: 6db029753583b34483aa4460192040b7d7b07bc03ab289153692d99a3fa24719
                              • Instruction Fuzzy Hash: 63112B36600119EBCF00DF98D8899BE77B8FF05340F408455FA05E7242CB38BA55CBA9
                              APIs
                              • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00771D73
                              • GetStockObject.GDI32(00000011), ref: 00771D87
                              • SendMessageW.USER32(00000000,00000030,00000000), ref: 00771D91
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: CreateMessageObjectSendStockWindow
                              • String ID:
                              • API String ID: 3970641297-0
                              • Opcode ID: a46de2eafa3815ec2279c01d2bdbe3b9b5aa23f3e3c1724d263330d5957e0155
                              • Instruction ID: e3d4f7c259e98150c44822a85264c10bfb64d7493cd29a168784226df6c4c718
                              • Opcode Fuzzy Hash: a46de2eafa3815ec2279c01d2bdbe3b9b5aa23f3e3c1724d263330d5957e0155
                              • Instruction Fuzzy Hash: FF115E72601518BFDF119F94DC44EEABB69FF093A4F448115FA0856220CB799C60DFA0
                              APIs
                              • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000,00000000), ref: 007CD84D
                              • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 007CD864
                              • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 007CD879
                              • RegisterTypeLibForUser.OLEAUT32(?,?,00000000), ref: 007CD897
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: Type$Register$FileLoadModuleNameUser
                              • String ID:
                              • API String ID: 1352324309-0
                              • Opcode ID: 6f21e00130c462a0aeb62d8a43720e27b06b2199e7ae3f650d469bcc039a4363
                              • Instruction ID: 5877cc6a83b2a775186fa4e5d2a392e08b220483973f7472ebc4d5c09aad7e67
                              • Opcode Fuzzy Hash: 6f21e00130c462a0aeb62d8a43720e27b06b2199e7ae3f650d469bcc039a4363
                              • Instruction Fuzzy Hash: 34113CB5605304EBE3308F50DC48FA2BBE8EF40B10F10857DAA16D6050D7B9E949EBA5
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                              • String ID:
                              • API String ID: 3016257755-0
                              • Opcode ID: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                              • Instruction ID: 03645a884e2e81f7d18bd28082e562a17b58f3bf5e0fabec466267813b25cb5b
                              • Opcode Fuzzy Hash: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                              • Instruction Fuzzy Hash: 7A014B7654814AFBCF1A5F84CC05CEE3F66BB6A351B588615FA1858031D23AC9B2EB81
                              APIs
                              • GetWindowRect.USER32(?,?), ref: 007FB2E4
                              • ScreenToClient.USER32(?,?), ref: 007FB2FC
                              • ScreenToClient.USER32(?,?), ref: 007FB320
                              • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 007FB33B
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: ClientRectScreen$InvalidateWindow
                              • String ID:
                              • API String ID: 357397906-0
                              • Opcode ID: 649943f1c3e1cd43f524c4b3b77c04c16fb48bd34d6c7b3bc6a7b4ff75f254a1
                              • Instruction ID: 9ee278eecf9a46571be93ba32b8a46f0322443cc192baf06dbbb1e26e14529b5
                              • Opcode Fuzzy Hash: 649943f1c3e1cd43f524c4b3b77c04c16fb48bd34d6c7b3bc6a7b4ff75f254a1
                              • Instruction Fuzzy Hash: 2B1143B9D00209EFDB41CFA9C8849EEBBB9FF08310F108166E914E3220DB35AA55CF54
                              APIs
                              • _memset.LIBCMT ref: 007FB644
                              • _memset.LIBCMT ref: 007FB653
                              • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,00836F20,00836F64), ref: 007FB682
                              • CloseHandle.KERNEL32 ref: 007FB694
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: _memset$CloseCreateHandleProcess
                              • String ID:
                              • API String ID: 3277943733-0
                              • Opcode ID: 9e322001e33cde49b6aeb8304aa4f1a57cd2db882c70d4e279e4217442e3087c
                              • Instruction ID: 57d09343f05e8ea2fb7cfb6244f582ae6a362716a215976bf29974ab0f10749a
                              • Opcode Fuzzy Hash: 9e322001e33cde49b6aeb8304aa4f1a57cd2db882c70d4e279e4217442e3087c
                              • Instruction Fuzzy Hash: 2BF0F4B2640304BBE6102769BC05F7B7A5CFF45755F008421FB08E5192EB795C20C7B8
                              APIs
                              • EnterCriticalSection.KERNEL32(?), ref: 007D6BE6
                                • Part of subcall function 007D76C4: _memset.LIBCMT ref: 007D76F9
                              • _memmove.LIBCMT ref: 007D6C09
                              • _memset.LIBCMT ref: 007D6C16
                              • LeaveCriticalSection.KERNEL32(?), ref: 007D6C26
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: CriticalSection_memset$EnterLeave_memmove
                              • String ID:
                              • API String ID: 48991266-0
                              • Opcode ID: 87141ddb72bb46d47b3236999fbb46cb54c50f444abab166f2d2a30ad57a42f2
                              • Instruction ID: a9fb912b39af550c032b4722b52a918ec5741ce2ed142cac63ec66d90fc8deb2
                              • Opcode Fuzzy Hash: 87141ddb72bb46d47b3236999fbb46cb54c50f444abab166f2d2a30ad57a42f2
                              • Instruction Fuzzy Hash: CDF0303A200100FBCF056F55EC89A5ABB29EF45320B04C061FE085E227DB35E811CBB4
                              APIs
                                • Part of subcall function 007712F3: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 0077134D
                                • Part of subcall function 007712F3: SelectObject.GDI32(?,00000000), ref: 0077135C
                                • Part of subcall function 007712F3: BeginPath.GDI32(?), ref: 00771373
                                • Part of subcall function 007712F3: SelectObject.GDI32(?,00000000), ref: 0077139C
                              • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 007FBD40
                              • LineTo.GDI32(00000000,?,?), ref: 007FBD4D
                              • EndPath.GDI32(00000000), ref: 007FBD5D
                              • StrokePath.GDI32(00000000), ref: 007FBD6B
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                              • String ID:
                              • API String ID: 1539411459-0
                              • Opcode ID: 7ae25917ec15050de2400a7b6e94c99bf1824f8416343c3d7f579a38e2bc2c8c
                              • Instruction ID: 59a9e029ea1e2b2ad049c8bded0c14d1e00404dc5617cfdaaf31073eb8699898
                              • Opcode Fuzzy Hash: 7ae25917ec15050de2400a7b6e94c99bf1824f8416343c3d7f579a38e2bc2c8c
                              • Instruction Fuzzy Hash: AEF05E31105659FADB126F54EC09FEE3F59BF06311F148010FB21611E28B7C5551DB99
                              APIs
                              • GetSysColor.USER32(00000008), ref: 00772231
                              • SetTextColor.GDI32(?,000000FF), ref: 0077223B
                              • SetBkMode.GDI32(?,00000001), ref: 00772250
                              • GetStockObject.GDI32(00000005), ref: 00772258
                              • GetWindowDC.USER32(?,00000000), ref: 007ABE83
                              • GetPixel.GDI32(00000000,00000000,00000000), ref: 007ABE90
                              • GetPixel.GDI32(00000000,?,00000000), ref: 007ABEA9
                              • GetPixel.GDI32(00000000,00000000,?), ref: 007ABEC2
                              • GetPixel.GDI32(00000000,?,?), ref: 007ABEE2
                              • ReleaseDC.USER32(?,00000000), ref: 007ABEED
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: Pixel$Color$ModeObjectReleaseStockTextWindow
                              • String ID:
                              • API String ID: 1946975507-0
                              • Opcode ID: d4fde19a06e7c281744a812f7a364c3d6e39451d0b9b60a7ea59f921187f894d
                              • Instruction ID: dbae2da522d78cb83701d03341867b74fbe2a27ef33f485623e12360d91a1859
                              • Opcode Fuzzy Hash: d4fde19a06e7c281744a812f7a364c3d6e39451d0b9b60a7ea59f921187f894d
                              • Instruction Fuzzy Hash: C3E03932104248EADF215F64EC4D7E83B20EB46332F04C366FA69880E28B7A4990DB16
                              APIs
                              • GetCurrentThread.KERNEL32 ref: 007C871B
                              • OpenThreadToken.ADVAPI32(00000000,?,?,?,007C82E6), ref: 007C8722
                              • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,007C82E6), ref: 007C872F
                              • OpenProcessToken.ADVAPI32(00000000,?,?,?,007C82E6), ref: 007C8736
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: CurrentOpenProcessThreadToken
                              • String ID:
                              • API String ID: 3974789173-0
                              • Opcode ID: 739649b7a2b1825e31d2a9733cf725f4255ded958e528a09d03d523febf93cbd
                              • Instruction ID: 4164fdc6f58974d03be0b29277361e1638e4192a1332230f7f42925cc67907b8
                              • Opcode Fuzzy Hash: 739649b7a2b1825e31d2a9733cf725f4255ded958e528a09d03d523febf93cbd
                              • Instruction Fuzzy Hash: F2E086366112119BD7605FF05D0CF663BACEF50791F18C82CF245C9040EE3C8441DB55
                              APIs
                              • GetDesktopWindow.USER32 ref: 007B1D5D
                              • GetDC.USER32(00000000), ref: 007B1D67
                              • GetDeviceCaps.GDI32(00000000,0000000C), ref: 007B1D87
                              • ReleaseDC.USER32(?), ref: 007B1DA8
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: CapsDesktopDeviceReleaseWindow
                              • String ID:
                              • API String ID: 2889604237-0
                              • Opcode ID: 45575bf5f296f84ad1b5cf5e749904a2a6970edde8d395530e9baed9c0cffed0
                              • Instruction ID: e85cd170dcde3571722fa3e469dc62772a7df6355dd7da8f7030c7f1bbcd218f
                              • Opcode Fuzzy Hash: 45575bf5f296f84ad1b5cf5e749904a2a6970edde8d395530e9baed9c0cffed0
                              • Instruction Fuzzy Hash: 89E0CAB5800204EFCF01AF60D888AAD7BB1AF48391F10C42AE95AE6220CE3C8241DF49
                              APIs
                              • GetDesktopWindow.USER32 ref: 007B1D71
                              • GetDC.USER32(00000000), ref: 007B1D7B
                              • GetDeviceCaps.GDI32(00000000,0000000C), ref: 007B1D87
                              • ReleaseDC.USER32(?), ref: 007B1DA8
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: CapsDesktopDeviceReleaseWindow
                              • String ID:
                              • API String ID: 2889604237-0
                              • Opcode ID: a639bc14635fd164ee9081b661a96d7bf887d81fc568151171cf80f86796e6d4
                              • Instruction ID: 8261ecf896c866d88f7c3f2f786b7e4167f87aafccfedc86b689354888e74d08
                              • Opcode Fuzzy Hash: a639bc14635fd164ee9081b661a96d7bf887d81fc568151171cf80f86796e6d4
                              • Instruction Fuzzy Hash: B6E05AB5800204AFCF11AF6098886AD7BA5AF58391B11C429E95AE6260DF7C9541DF49
                              APIs
                              • OleSetContainedObject.OLE32(?,00000001), ref: 007CB4BE
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: ContainedObject
                              • String ID: AutoIt3GUI$Container
                              • API String ID: 3565006973-3941886329
                              • Opcode ID: ee5ed23ec58bc3c889e58eade189879170ec8940b6f9aaded07e72c9c189b4ee
                              • Instruction ID: b7544e02b86e372be6d58e19f751421c6949647ec2904f28ec2e0728b3979d53
                              • Opcode Fuzzy Hash: ee5ed23ec58bc3c889e58eade189879170ec8940b6f9aaded07e72c9c189b4ee
                              • Instruction Fuzzy Hash: F4912470600601AFDB14DF64D885F6ABBE9FF48710F20856EF94ACB2A1DB74E845CB60
                              APIs
                                • Part of subcall function 0078FC86: _wcscpy.LIBCMT ref: 0078FCA9
                                • Part of subcall function 00779837: __itow.LIBCMT ref: 00779862
                                • Part of subcall function 00779837: __swprintf.LIBCMT ref: 007798AC
                              • __wcsnicmp.LIBCMT ref: 007DB02D
                              • WNetUseConnectionW.MPR(00000000,?,?,00000000,?,?,00000100,?), ref: 007DB0F6
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: Connection__itow__swprintf__wcsnicmp_wcscpy
                              • String ID: LPT
                              • API String ID: 3222508074-1350329615
                              • Opcode ID: 7564533d852053ba37c16a94f00f85ebe14f7895b8d48bbab65f549d2c78b131
                              • Instruction ID: 464fe9b4a25d51382c553195f15bed8364cb1fc7d7e6e55912bbe69925aa1fe0
                              • Opcode Fuzzy Hash: 7564533d852053ba37c16a94f00f85ebe14f7895b8d48bbab65f549d2c78b131
                              • Instruction Fuzzy Hash: FC619275A00219EFCF14DF94C895EAEB7B4EF09310F11806AF916AB391D778AE44CB91
                              APIs
                              • Sleep.KERNEL32(00000000), ref: 00782968
                              • GlobalMemoryStatusEx.KERNEL32(?), ref: 00782981
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: GlobalMemorySleepStatus
                              • String ID: @
                              • API String ID: 2783356886-2766056989
                              • Opcode ID: c5ad127dc179d50395e09da2e5fba1e2f4d7be571f03d619cf78a233b7ebe18a
                              • Instruction ID: 2f36eeb377b4013ce8815c1b80a754523365fc22635b7b1b43ef92fe79310850
                              • Opcode Fuzzy Hash: c5ad127dc179d50395e09da2e5fba1e2f4d7be571f03d619cf78a233b7ebe18a
                              • Instruction Fuzzy Hash: 015157724187449BE720EF10D88ABAFBBE8FF85390F41885DF2D9411A1DB748529CB67
                              APIs
                                • Part of subcall function 00774F0B: __fread_nolock.LIBCMT ref: 00774F29
                              • _wcscmp.LIBCMT ref: 007D9824
                              • _wcscmp.LIBCMT ref: 007D9837
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: _wcscmp$__fread_nolock
                              • String ID: FILE
                              • API String ID: 4029003684-3121273764
                              • Opcode ID: b02f32830049d48956b83d33c4ccae220b4f2b9f5ee478d1d1ca3187c334eb4a
                              • Instruction ID: c3fe3b81f35e3974d5a7cbd12a12679da11a4ccf1dfecf35fb8e540ad0d225db
                              • Opcode Fuzzy Hash: b02f32830049d48956b83d33c4ccae220b4f2b9f5ee478d1d1ca3187c334eb4a
                              • Instruction Fuzzy Hash: 6741B871A00219FADF219AA0DC49FEFB7BDDF85710F01446AFA04F7291D779AA048B61
                              APIs
                              • _memset.LIBCMT ref: 007E259E
                              • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 007E25D4
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: CrackInternet_memset
                              • String ID: |
                              • API String ID: 1413715105-2343686810
                              • Opcode ID: 27a1384bac74533a7a289d4b5b6d4a2e9eb12ff5225eb6d2bca7eed5923938c2
                              • Instruction ID: df5c35c7c506a9b14ed36857cac68d6b6d12337dbdaf4269281c4c34ed6867ff
                              • Opcode Fuzzy Hash: 27a1384bac74533a7a289d4b5b6d4a2e9eb12ff5225eb6d2bca7eed5923938c2
                              • Instruction Fuzzy Hash: 3E315A71801109EBCF05EFA5CC89EEEBFB8FF08340F104059F918A6162EB395916DBA0
                              APIs
                              • SendMessageW.USER32(?,00001132,00000000,?), ref: 007F7B61
                              • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 007F7B76
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: MessageSend
                              • String ID: '
                              • API String ID: 3850602802-1997036262
                              • Opcode ID: 6cc623b4c99687e003d76e69716c3ccace106d5df4c3297f728c65fe94cd1346
                              • Instruction ID: 6613756d6ecb5ab19092cf81531606b6e07e88178623d69030b43488f1a71304
                              • Opcode Fuzzy Hash: 6cc623b4c99687e003d76e69716c3ccace106d5df4c3297f728c65fe94cd1346
                              • Instruction Fuzzy Hash: EC410874A0520D9FDB14CF69C881BEABBB5FF09300F11416AEA04EB351E774A951DF90
                              APIs
                              • DestroyWindow.USER32(?,?,?,?), ref: 007F6B17
                              • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 007F6B53
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: Window$DestroyMove
                              • String ID: static
                              • API String ID: 2139405536-2160076837
                              • Opcode ID: 98489d84d4b4e88595d7b2260bad16f9cba2adb344add191d731d37102c735c9
                              • Instruction ID: 2139cb4fca769b7eaa7c639515ec2e13855206bf8b0a19c6a6e46ae14cc247db
                              • Opcode Fuzzy Hash: 98489d84d4b4e88595d7b2260bad16f9cba2adb344add191d731d37102c735c9
                              • Instruction Fuzzy Hash: 9F316FB1200608AEDB109F64CC41AFB77B9FF48760F108619FAA9D7290DA39AC51DB60
                              APIs
                              • _memset.LIBCMT ref: 007D2911
                              • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 007D294C
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: InfoItemMenu_memset
                              • String ID: 0
                              • API String ID: 2223754486-4108050209
                              • Opcode ID: cdafaed062f4d0337bec59440596d3b1f7297287a82f8b9b7be5b439dda873f2
                              • Instruction ID: cdb798f8e8284c8ed7eb81c5ef5d7b7d3fe479528299dafe93c7beb562ee0f9a
                              • Opcode Fuzzy Hash: cdafaed062f4d0337bec59440596d3b1f7297287a82f8b9b7be5b439dda873f2
                              • Instruction Fuzzy Hash: F831E331600305AFEB24DF58C985BAEBBB8EF55350F14002AE9C1B62A2D778A943DB51
                              APIs
                              • __snwprintf.LIBCMT ref: 007E3A66
                                • Part of subcall function 00777DE1: _memmove.LIBCMT ref: 00777E22
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: __snwprintf_memmove
                              • String ID: , $$AUTOITCALLVARIABLE%d
                              • API String ID: 3506404897-2584243854
                              • Opcode ID: c385ae123d1b1358c46485b1c9fa0ac82afa9afa56b876c94ae65eb78c10ccbc
                              • Instruction ID: c30f5d8412eccc98e336bc3f6f31131fb2b8d03a86ce689f2cbe02bbc7ca0210
                              • Opcode Fuzzy Hash: c385ae123d1b1358c46485b1c9fa0ac82afa9afa56b876c94ae65eb78c10ccbc
                              • Instruction Fuzzy Hash: 70219531601119EBCF14EF65CC89EAD77B5FF49340F408468F559A7281DB38EA81CB61
                              APIs
                              • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 007F6761
                              • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 007F676C
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: MessageSend
                              • String ID: Combobox
                              • API String ID: 3850602802-2096851135
                              • Opcode ID: 2a044eccc88536475b551da13bf7541efa180b42feb49b356a2935095c33b705
                              • Instruction ID: fab73f51282491084fa38f6a9c8f71df0f1dd1cdbaf2bb48c1ef9af4a8082587
                              • Opcode Fuzzy Hash: 2a044eccc88536475b551da13bf7541efa180b42feb49b356a2935095c33b705
                              • Instruction Fuzzy Hash: 3F11867530020CAFEF11AF54DC85EBB376AEB54368F104125FA1497390D6799C5187B0
                              APIs
                                • Part of subcall function 00771D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00771D73
                                • Part of subcall function 00771D35: GetStockObject.GDI32(00000011), ref: 00771D87
                                • Part of subcall function 00771D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00771D91
                              • GetWindowRect.USER32(00000000,?), ref: 007F6C71
                              • GetSysColor.USER32(00000012), ref: 007F6C8B
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: Window$ColorCreateMessageObjectRectSendStock
                              • String ID: static
                              • API String ID: 1983116058-2160076837
                              • Opcode ID: 7880a92de4129fcb134a49a56d88cf5557e1ef5c272e06c9730c7cd23e03bcbc
                              • Instruction ID: ed31ba28b542354c4801fcd8eb7f0871a825b7c2bddc7b72689de6a3429f3e94
                              • Opcode Fuzzy Hash: 7880a92de4129fcb134a49a56d88cf5557e1ef5c272e06c9730c7cd23e03bcbc
                              • Instruction Fuzzy Hash: E121FC72510209AFDF14DFB9CC45AFA7BB8FB08315F004529FA95D3250D639E851DB60
                              APIs
                              • GetWindowTextLengthW.USER32(00000000), ref: 007F69A2
                              • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 007F69B1
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: LengthMessageSendTextWindow
                              • String ID: edit
                              • API String ID: 2978978980-2167791130
                              • Opcode ID: efc867e39d3f39fc347346e175d236d4716e0be6a7288ab6f54e14f80b3c2ab1
                              • Instruction ID: ae9e1728ccca04391363537342e6730405b4fbe166be739517451d96013805b2
                              • Opcode Fuzzy Hash: efc867e39d3f39fc347346e175d236d4716e0be6a7288ab6f54e14f80b3c2ab1
                              • Instruction Fuzzy Hash: F0116D71110108ABEB108E64DC45ABB3BA9EF05374F504728FAA5972E0CAB9EC50AB60
                              APIs
                              • _memset.LIBCMT ref: 007D2A22
                              • GetMenuItemInfoW.USER32(00000030,?,00000000,00000030), ref: 007D2A41
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: InfoItemMenu_memset
                              • String ID: 0
                              • API String ID: 2223754486-4108050209
                              • Opcode ID: cce9bbc8afd8c45d823e2aa3df93b96b9bebf3fac8568ff683512293d182bb3b
                              • Instruction ID: 8091580ff5db508c6eda828e9bf00429cf3020600dc13aaed3136bdd8336f9d8
                              • Opcode Fuzzy Hash: cce9bbc8afd8c45d823e2aa3df93b96b9bebf3fac8568ff683512293d182bb3b
                              • Instruction Fuzzy Hash: D511D032901124ABCB30DAA8D844BAA73B8EBD5300F048023EC55F73A2D738AD0BC791
                              APIs
                              • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 007E222C
                              • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 007E2255
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: Internet$OpenOption
                              • String ID: <local>
                              • API String ID: 942729171-4266983199
                              • Opcode ID: 2f831266a84a60b63d87a8f428dbcaaf14af9d94af57d35422c77cfe99c64cbc
                              • Instruction ID: 78310d6b84a0acf6e25ae9ad3543424529997319de835ed150fbfae982347e68
                              • Opcode Fuzzy Hash: 2f831266a84a60b63d87a8f428dbcaaf14af9d94af57d35422c77cfe99c64cbc
                              • Instruction Fuzzy Hash: 671102705422A5BADB248F528C84EBBFBACFF0A351F10822AFA1586001D3785992D6F0
                              APIs
                                • Part of subcall function 00777DE1: _memmove.LIBCMT ref: 00777E22
                                • Part of subcall function 007CAA99: GetClassNameW.USER32(?,?,000000FF), ref: 007CAABC
                              • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 007C8E73
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: ClassMessageNameSend_memmove
                              • String ID: ComboBox$ListBox
                              • API String ID: 372448540-1403004172
                              • Opcode ID: 0efcb94e4b36ff0d2a0afa32b4fb60dff0a9e9ec2685ed41073329175aa1a79b
                              • Instruction ID: 76615664dffbdd18f0e3aeb145054ab73f990fc7bdc47ef864ff4cd90f810f30
                              • Opcode Fuzzy Hash: 0efcb94e4b36ff0d2a0afa32b4fb60dff0a9e9ec2685ed41073329175aa1a79b
                              • Instruction Fuzzy Hash: ED01B171A01229EB8F18EBA4CC5AEFE7369FF05360B544A1DF839972E1DE395808C751
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: __fread_nolock_memmove
                              • String ID: EA06
                              • API String ID: 1988441806-3962188686
                              • Opcode ID: ac61b943517a01858447d4454f55064842df7ea2e09cb61eae20a3080e8985dd
                              • Instruction ID: 73e13544a1dea8d3259accf039f6265303d8dfa284e95864a0d0334c201023e7
                              • Opcode Fuzzy Hash: ac61b943517a01858447d4454f55064842df7ea2e09cb61eae20a3080e8985dd
                              • Instruction Fuzzy Hash: 7D01F971904228BEDF18CAA8D81AEFE7BF8DB15301F00419BF552D22C1E878A60887A0
                              APIs
                                • Part of subcall function 00777DE1: _memmove.LIBCMT ref: 00777E22
                                • Part of subcall function 007CAA99: GetClassNameW.USER32(?,?,000000FF), ref: 007CAABC
                              • SendMessageW.USER32(?,00000180,00000000,?), ref: 007C8D6B
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: ClassMessageNameSend_memmove
                              • String ID: ComboBox$ListBox
                              • API String ID: 372448540-1403004172
                              • Opcode ID: 7dc8b5cb18bdcf447f7fea1ebd954cf827fd9495f0e9cefb8d0d3cbd0fef72e2
                              • Instruction ID: 923ad6764b7fafd8b3400f34fe38e0bda69bf1aab865c30f6cf05e6516aecdcb
                              • Opcode Fuzzy Hash: 7dc8b5cb18bdcf447f7fea1ebd954cf827fd9495f0e9cefb8d0d3cbd0fef72e2
                              • Instruction Fuzzy Hash: C801B171B41109EBCF18EBA0C95AFFE73A8DF19340F10442DB80AA32D1DE585A08D766
                              APIs
                                • Part of subcall function 00777DE1: _memmove.LIBCMT ref: 00777E22
                                • Part of subcall function 007CAA99: GetClassNameW.USER32(?,?,000000FF), ref: 007CAABC
                              • SendMessageW.USER32(?,00000182,?,00000000), ref: 007C8DEE
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: ClassMessageNameSend_memmove
                              • String ID: ComboBox$ListBox
                              • API String ID: 372448540-1403004172
                              • Opcode ID: 17e6f4f7ceab8658e4f95dabc5214f278283ae0fc96f315221ba4299bf50e97d
                              • Instruction ID: 27984a6da4367704876203fb75b2eea3261eda1d89085ebc39acf40fbdb735f9
                              • Opcode Fuzzy Hash: 17e6f4f7ceab8658e4f95dabc5214f278283ae0fc96f315221ba4299bf50e97d
                              • Instruction Fuzzy Hash: 6201D471B41109F7CF14EBA4C946FFE73A8DF15340F10802DB80AA3291DE195E08D676
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: ClassName_wcscmp
                              • String ID: #32770
                              • API String ID: 2292705959-463685578
                              • Opcode ID: 244eb67ae6680c482a9ae08e06cb60d04c8dce934eed0e0decf63db9e4b00abd
                              • Instruction ID: 312ff3204bc13b3afe1a64dadd630a775fbc27f8a46dcb677c77144613bb3337
                              • Opcode Fuzzy Hash: 244eb67ae6680c482a9ae08e06cb60d04c8dce934eed0e0decf63db9e4b00abd
                              • Instruction Fuzzy Hash: 17E09B3250422867D710A759AC49AA7F7ACEB45B61F010067FD04D2151D9649A5587E4
                              APIs
                                • Part of subcall function 007AB314: _memset.LIBCMT ref: 007AB321
                                • Part of subcall function 00790940: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,007AB2F0,?,?,?,0077100A), ref: 00790945
                              • IsDebuggerPresent.KERNEL32(?,?,?,0077100A), ref: 007AB2F4
                              • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,0077100A), ref: 007AB303
                              Strings
                              • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 007AB2FE
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString_memset
                              • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                              • API String ID: 3158253471-631824599
                              • Opcode ID: 9e29caf516df870aa06ce331ea6aa22771c5faa2e1a82d16d3c480e3846634d2
                              • Instruction ID: 474b60bc31a942e6720bacffc551a8d8c5c2339f125f7797717c7a1f6eb88e37
                              • Opcode Fuzzy Hash: 9e29caf516df870aa06ce331ea6aa22771c5faa2e1a82d16d3c480e3846634d2
                              • Instruction Fuzzy Hash: CCE0C9702007118ADB609F68E5086567BE8FF85754F008A6DE456C6652EBBCA444CBA1
                              APIs
                              • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 007C7C82
                                • Part of subcall function 00793358: _doexit.LIBCMT ref: 00793362
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: Message_doexit
                              • String ID: AutoIt$Error allocating memory.
                              • API String ID: 1993061046-4017498283
                              • Opcode ID: f16d909e980797ce8916b2c6fefb0ed5a5e508fbbb717c969e67fa3bb5eb8cde
                              • Instruction ID: 6ccc901ea86efa0433861980ddd6134e996f230617001e3786095ac38d7aeb8b
                              • Opcode Fuzzy Hash: f16d909e980797ce8916b2c6fefb0ed5a5e508fbbb717c969e67fa3bb5eb8cde
                              • Instruction Fuzzy Hash: 63D012323C431876D51532A97C0AFDA6A488F15B62F04446AFB18995D34DDD898181E9
                              APIs
                              • GetSystemDirectoryW.KERNEL32(?), ref: 007B1775
                                • Part of subcall function 007EBFF0: LoadLibraryA.KERNEL32(kernel32.dll,?,007B195E,?), ref: 007EBFFE
                                • Part of subcall function 007EBFF0: GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 007EC010
                              • FreeLibrary.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00000104), ref: 007B196D
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: Library$AddressDirectoryFreeLoadProcSystem
                              • String ID: WIN_XPe
                              • API String ID: 582185067-3257408948
                              • Opcode ID: de72b4f4e95c1a7f0286e423e1533e26ef1607b5ebe7ddacafd1fa55030b56fe
                              • Instruction ID: f427496b26176d99d59c76b3997fdc17ac8614a52a6e7a8182352379fa00e426
                              • Opcode Fuzzy Hash: de72b4f4e95c1a7f0286e423e1533e26ef1607b5ebe7ddacafd1fa55030b56fe
                              • Instruction Fuzzy Hash: 3FF0ED70801109DFDB15DB95C998BECBBF8BF08305FA44095E102A3190DB795F84DF64
                              APIs
                              • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 007F596E
                              • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 007F5981
                                • Part of subcall function 007D5244: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 007D52BC
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: FindMessagePostSleepWindow
                              • String ID: Shell_TrayWnd
                              • API String ID: 529655941-2988720461
                              • Opcode ID: 70cfa173fa95b010a09120186865c554f46622c44a56bca73352af1516b2c8bd
                              • Instruction ID: ee704c1114d62661d745d09883c156feaf5f2a981d7098706768a72fad12adec
                              • Opcode Fuzzy Hash: 70cfa173fa95b010a09120186865c554f46622c44a56bca73352af1516b2c8bd
                              • Instruction Fuzzy Hash: EAD0C931384311B7E664AB70AC0FFA66A24BF10B50F004825F259EA2D0CDE8A804C658
                              APIs
                              • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 007F59AE
                              • PostMessageW.USER32(00000000), ref: 007F59B5
                                • Part of subcall function 007D5244: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 007D52BC
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1340023439.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                              • Associated: 00000000.00000002.1339983409.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.00000000007FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340215308.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340269176.000000000082E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1340293319.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_770000_of5HklY9qP.jbxd
                              Similarity
                              • API ID: FindMessagePostSleepWindow
                              • String ID: Shell_TrayWnd
                              • API String ID: 529655941-2988720461
                              • Opcode ID: a9218f56ae05ae5d26a993ac038db975e69e5c6e1eb334e71b51db532179987f
                              • Instruction ID: 22cef95112b7d1e685299c9d5a70ed916a480731a517cf623a86457cc1b9fdf7
                              • Opcode Fuzzy Hash: a9218f56ae05ae5d26a993ac038db975e69e5c6e1eb334e71b51db532179987f
                              • Instruction Fuzzy Hash: 19D0C931381311BBE664AB70AC0FFA66624BF14B50F004825F255EA2D0CDE8A804C658