Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
egpTyFpA8v.exe

Overview

General Information

Sample name:egpTyFpA8v.exe
renamed because original name is a hash value
Original sample name:8f42d1e07595808544eed18a45e8d7220dff40597d4d53d0f63fab47554afbdf.exe
Analysis ID:1588713
MD5:bc18b6803a287e63b3668b5817f12419
SHA1:bc21190df092d93629068c705ea8dc630d3db4a4
SHA256:8f42d1e07595808544eed18a45e8d7220dff40597d4d53d0f63fab47554afbdf
Tags:AsyncRATexeuser-adrian__luca
Infos:

Detection

AsyncRAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Drops script at startup location
Yara detected AntiVM3
Yara detected AsyncRAT
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Drops VBS files to the startup folder
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Sigma detected: WScript or CScript Dropper
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Yara detected Generic Downloader
AV process strings found (often used to terminate AV products)
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Extensive use of GetProcAddress (often used to hide API calls)
Found WSH timer for Javascript or VBS script (likely evasive script)
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Queries the volume information (name, serial number etc) of a device
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • egpTyFpA8v.exe (PID: 7732 cmdline: "C:\Users\user\Desktop\egpTyFpA8v.exe" MD5: BC18B6803A287E63B3668B5817F12419)
    • Wausaukee.exe (PID: 7788 cmdline: "C:\Users\user\Desktop\egpTyFpA8v.exe" MD5: BC18B6803A287E63B3668B5817F12419)
      • RegSvcs.exe (PID: 7816 cmdline: "C:\Users\user\Desktop\egpTyFpA8v.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • wscript.exe (PID: 7932 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Wausaukee.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • Wausaukee.exe (PID: 7984 cmdline: "C:\Users\user\AppData\Local\preinhered\Wausaukee.exe" MD5: BC18B6803A287E63B3668B5817F12419)
      • RegSvcs.exe (PID: 8004 cmdline: "C:\Users\user\AppData\Local\preinhered\Wausaukee.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
AsyncRATAsyncRAT is a Remote Access Tool (RAT) designed to remotely monitor and control other computers through a secure encrypted connection. It is an open source remote administration tool, however, it could also be used maliciously because it provides functionality such as keylogger, remote desktop control, and many other functions that may cause harm to the victims computer. In addition, AsyncRAT can be delivered via various methods such as spear-phishing, malvertising, exploit kit and other techniques.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.asyncrat
{"Server": "69.174.100.131", "Port": "6606", "Version": "0.5.8", "MutexName": "abkZfsCYRZhk", "Autorun": "false", "Group": "null"}
SourceRuleDescriptionAuthorStrings
00000006.00000002.1597930274.0000000000532000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
    00000006.00000002.1597930274.0000000000532000.00000040.80000000.00040000.00000000.sdmpINDICATOR_SUSPICIOUS_EXE_ASEP_REG_ReverseDetects file containing reversed ASEP Autorun registry keysditekSHen
    • 0x97ab:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
    00000005.00000002.1485447769.0000000000E60000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
      00000005.00000002.1485447769.0000000000E60000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
        00000005.00000002.1485447769.0000000000E60000.00000004.00001000.00020000.00000000.sdmpWindows_Trojan_Asyncrat_11a11ba1unknownunknown
        • 0x9919:$a1: /c schtasks /create /f /sc onlogon /rl highest /tn "
        • 0xac38:$a2: Stub.exe
        • 0xacc8:$a2: Stub.exe
        • 0x6711:$a3: get_ActivatePong
        • 0x9b31:$a4: vmware
        • 0x99a9:$a5: \nuR\noisreVtnerruC\swodniW\tfosorciM\erawtfoS
        • 0x7460:$a6: get_SslClient
        Click to see the 14 entries
        SourceRuleDescriptionAuthorStrings
        5.2.Wausaukee.exe.e60000.1.raw.unpackJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
          5.2.Wausaukee.exe.e60000.1.raw.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
            5.2.Wausaukee.exe.e60000.1.raw.unpackWindows_Trojan_Asyncrat_11a11ba1unknownunknown
            • 0x9919:$a1: /c schtasks /create /f /sc onlogon /rl highest /tn "
            • 0xac38:$a2: Stub.exe
            • 0xacc8:$a2: Stub.exe
            • 0x6711:$a3: get_ActivatePong
            • 0x9b31:$a4: vmware
            • 0x99a9:$a5: \nuR\noisreVtnerruC\swodniW\tfosorciM\erawtfoS
            • 0x7460:$a6: get_SslClient
            5.2.Wausaukee.exe.e60000.1.raw.unpackrat_win_asyncratDetect AsyncRAT based on specific stringsSekoia.io
            • 0x6711:$str01: get_ActivatePong
            • 0x7460:$str02: get_SslClient
            • 0x747c:$str03: get_TcpClient
            • 0x5d1d:$str04: get_SendSync
            • 0x5d6d:$str05: get_IsConnected
            • 0x649c:$str06: set_UseShellExecute
            • 0x9c4f:$str07: Pastebin
            • 0x9cd1:$str08: Select * from AntivirusProduct
            • 0xac38:$str09: Stub.exe
            • 0xacc8:$str09: Stub.exe
            • 0x9a29:$str10: timeout 3 > NUL
            • 0x9919:$str11: /c schtasks /create /f /sc onlogon /rl highest /tn
            • 0x99a9:$str12: \nuR\noisreVtnerruC\swodniW\tfosorciM\erawtfoS
            5.2.Wausaukee.exe.e60000.1.raw.unpackINDICATOR_SUSPICIOUS_EXE_ASEP_REG_ReverseDetects file containing reversed ASEP Autorun registry keysditekSHen
            • 0x99ab:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
            Click to see the 18 entries

            System Summary

            barindex
            Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Wausaukee.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Wausaukee.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4056, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Wausaukee.vbs" , ProcessId: 7932, ProcessName: wscript.exe
            Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Wausaukee.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Wausaukee.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4056, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Wausaukee.vbs" , ProcessId: 7932, ProcessName: wscript.exe

            Data Obfuscation

            barindex
            Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\AppData\Local\preinhered\Wausaukee.exe, ProcessId: 7788, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Wausaukee.vbs
            No Suricata rule has matched

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: 00000006.00000002.1598705687.00000000027D1000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: AsyncRAT {"Server": "69.174.100.131", "Port": "6606", "Version": "0.5.8", "MutexName": "abkZfsCYRZhk", "Autorun": "false", "Group": "null"}
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeReversingLabs: Detection: 87%
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeVirustotal: Detection: 68%Perma Link
            Source: egpTyFpA8v.exeVirustotal: Detection: 68%Perma Link
            Source: egpTyFpA8v.exeReversingLabs: Detection: 87%
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeJoe Sandbox ML: detected
            Source: egpTyFpA8v.exeJoe Sandbox ML: detected
            Source: egpTyFpA8v.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
            Source: Binary string: wntdll.pdbUGP source: Wausaukee.exe, 00000002.00000003.1377701020.00000000035C0000.00000004.00001000.00020000.00000000.sdmp, Wausaukee.exe, 00000002.00000003.1378166008.0000000003760000.00000004.00001000.00020000.00000000.sdmp, Wausaukee.exe, 00000005.00000003.1476637459.0000000003840000.00000004.00001000.00020000.00000000.sdmp, Wausaukee.exe, 00000005.00000003.1476809472.00000000039E0000.00000004.00001000.00020000.00000000.sdmp
            Source: Binary string: wntdll.pdb source: Wausaukee.exe, 00000002.00000003.1377701020.00000000035C0000.00000004.00001000.00020000.00000000.sdmp, Wausaukee.exe, 00000002.00000003.1378166008.0000000003760000.00000004.00001000.00020000.00000000.sdmp, Wausaukee.exe, 00000005.00000003.1476637459.0000000003840000.00000004.00001000.00020000.00000000.sdmp, Wausaukee.exe, 00000005.00000003.1476809472.00000000039E0000.00000004.00001000.00020000.00000000.sdmp
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeCode function: 0_2_0049445A GetFileAttributesW,FindFirstFileW,FindClose,0_2_0049445A
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeCode function: 0_2_0049C6D1 FindFirstFileW,FindClose,0_2_0049C6D1
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeCode function: 0_2_0049C75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_0049C75C
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeCode function: 0_2_0049EF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0049EF95
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeCode function: 0_2_0049F0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0049F0F2
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeCode function: 0_2_0049F3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0049F3F3
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeCode function: 0_2_004937EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_004937EF
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeCode function: 0_2_00493B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00493B12
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeCode function: 0_2_0049BCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0049BCBC
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeCode function: 2_2_009B445A GetFileAttributesW,FindFirstFileW,FindClose,2_2_009B445A
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeCode function: 2_2_009BC6D1 FindFirstFileW,FindClose,2_2_009BC6D1
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeCode function: 2_2_009BC75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,2_2_009BC75C
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeCode function: 2_2_009BEF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,2_2_009BEF95
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeCode function: 2_2_009BF0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,2_2_009BF0F2
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeCode function: 2_2_009BF3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,2_2_009BF3F3
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeCode function: 2_2_009B37EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,2_2_009B37EF
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeCode function: 2_2_009B3B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,2_2_009B3B12
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeCode function: 2_2_009BBCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,2_2_009BBCBC

            Networking

            barindex
            Source: Yara matchFile source: 5.2.Wausaukee.exe.e60000.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.Wausaukee.exe.1870000.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.RegSvcs.exe.530000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000005.00000002.1485447769.0000000000E60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.1381107360.0000000001870000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: global trafficTCP traffic: 192.168.2.7:49799 -> 69.174.100.131:6606
            Source: Joe Sandbox ViewIP Address: 69.174.100.131 69.174.100.131
            Source: Joe Sandbox ViewASN Name: ASN-QUADRANET-GLOBALUS ASN-QUADRANET-GLOBALUS
            Source: unknownTCP traffic detected without corresponding DNS query: 69.174.100.131
            Source: unknownTCP traffic detected without corresponding DNS query: 69.174.100.131
            Source: unknownTCP traffic detected without corresponding DNS query: 69.174.100.131
            Source: unknownTCP traffic detected without corresponding DNS query: 69.174.100.131
            Source: unknownTCP traffic detected without corresponding DNS query: 69.174.100.131
            Source: unknownTCP traffic detected without corresponding DNS query: 69.174.100.131
            Source: unknownTCP traffic detected without corresponding DNS query: 69.174.100.131
            Source: unknownTCP traffic detected without corresponding DNS query: 69.174.100.131
            Source: unknownTCP traffic detected without corresponding DNS query: 69.174.100.131
            Source: unknownTCP traffic detected without corresponding DNS query: 69.174.100.131
            Source: unknownTCP traffic detected without corresponding DNS query: 69.174.100.131
            Source: unknownTCP traffic detected without corresponding DNS query: 69.174.100.131
            Source: unknownTCP traffic detected without corresponding DNS query: 69.174.100.131
            Source: unknownTCP traffic detected without corresponding DNS query: 69.174.100.131
            Source: unknownTCP traffic detected without corresponding DNS query: 69.174.100.131
            Source: unknownTCP traffic detected without corresponding DNS query: 69.174.100.131
            Source: unknownTCP traffic detected without corresponding DNS query: 69.174.100.131
            Source: unknownTCP traffic detected without corresponding DNS query: 69.174.100.131
            Source: unknownTCP traffic detected without corresponding DNS query: 69.174.100.131
            Source: unknownTCP traffic detected without corresponding DNS query: 69.174.100.131
            Source: unknownTCP traffic detected without corresponding DNS query: 69.174.100.131
            Source: unknownTCP traffic detected without corresponding DNS query: 69.174.100.131
            Source: unknownTCP traffic detected without corresponding DNS query: 69.174.100.131
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeCode function: 0_2_004A22EE InternetReadFile,InternetQueryDataAvailable,InternetReadFile,0_2_004A22EE
            Source: global trafficDNS traffic detected: DNS query: time.windows.com

            Key, Mouse, Clipboard, Microphone and Screen Capturing

            barindex
            Source: Yara matchFile source: 5.2.Wausaukee.exe.e60000.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.Wausaukee.exe.1870000.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.Wausaukee.exe.e60000.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.RegSvcs.exe.530000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.Wausaukee.exe.1870000.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000006.00000002.1597930274.0000000000532000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.1485447769.0000000000E60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.1381107360.0000000001870000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Wausaukee.exe PID: 7788, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: Wausaukee.exe PID: 7984, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 8004, type: MEMORYSTR
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeCode function: 0_2_004A4164 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_004A4164
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeCode function: 0_2_004A4164 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_004A4164
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeCode function: 2_2_009C4164 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,2_2_009C4164
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeCode function: 0_2_004A3F66 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_004A3F66
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeCode function: 0_2_0049001C GetKeyboardState,SetKeyboardState,GetAsyncKeyState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,0_2_0049001C
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeCode function: 0_2_004BCABC DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_004BCABC
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeCode function: 2_2_009DCABC DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,2_2_009DCABC

            System Summary

            barindex
            Source: 5.2.Wausaukee.exe.e60000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
            Source: 5.2.Wausaukee.exe.e60000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detect AsyncRAT based on specific strings Author: Sekoia.io
            Source: 5.2.Wausaukee.exe.e60000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
            Source: 2.2.Wausaukee.exe.1870000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
            Source: 2.2.Wausaukee.exe.1870000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detect AsyncRAT based on specific strings Author: Sekoia.io
            Source: 2.2.Wausaukee.exe.1870000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
            Source: 5.2.Wausaukee.exe.e60000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
            Source: 5.2.Wausaukee.exe.e60000.1.unpack, type: UNPACKEDPEMatched rule: Detect AsyncRAT based on specific strings Author: Sekoia.io
            Source: 5.2.Wausaukee.exe.e60000.1.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
            Source: 6.2.RegSvcs.exe.530000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
            Source: 6.2.RegSvcs.exe.530000.0.unpack, type: UNPACKEDPEMatched rule: Detect AsyncRAT based on specific strings Author: Sekoia.io
            Source: 6.2.RegSvcs.exe.530000.0.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
            Source: 2.2.Wausaukee.exe.1870000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
            Source: 2.2.Wausaukee.exe.1870000.1.unpack, type: UNPACKEDPEMatched rule: Detect AsyncRAT based on specific strings Author: Sekoia.io
            Source: 2.2.Wausaukee.exe.1870000.1.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
            Source: 00000006.00000002.1597930274.0000000000532000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
            Source: 00000005.00000002.1485447769.0000000000E60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
            Source: 00000005.00000002.1485447769.0000000000E60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detect AsyncRAT based on specific strings Author: Sekoia.io
            Source: 00000005.00000002.1485447769.0000000000E60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
            Source: 00000002.00000002.1381107360.0000000001870000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
            Source: 00000002.00000002.1381107360.0000000001870000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detect AsyncRAT based on specific strings Author: Sekoia.io
            Source: 00000002.00000002.1381107360.0000000001870000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
            Source: Process Memory Space: Wausaukee.exe PID: 7788, type: MEMORYSTRMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
            Source: Process Memory Space: RegSvcs.exe PID: 8004, type: MEMORYSTRMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeCode function: This is a third-party compiled AutoIt script.0_2_00433B3A
            Source: egpTyFpA8v.exeString found in binary or memory: This is a third-party compiled AutoIt script.
            Source: egpTyFpA8v.exe, 00000000.00000000.1351470392.00000000004E4000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_aa894530-7
            Source: egpTyFpA8v.exe, 00000000.00000000.1351470392.00000000004E4000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_18edf360-a
            Source: egpTyFpA8v.exe, 00000000.00000003.1358945884.00000000038D3000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_f204f1a2-6
            Source: egpTyFpA8v.exe, 00000000.00000003.1358945884.00000000038D3000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_08cd4199-9
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeCode function: This is a third-party compiled AutoIt script.2_2_00953B3A
            Source: Wausaukee.exeString found in binary or memory: This is a third-party compiled AutoIt script.
            Source: Wausaukee.exe, 00000002.00000002.1380472988.0000000000A04000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_a9cbac8c-9
            Source: Wausaukee.exe, 00000002.00000002.1380472988.0000000000A04000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_8704e3bd-f
            Source: Wausaukee.exe, 00000005.00000002.1482983503.0000000000A04000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_b9218811-7
            Source: Wausaukee.exe, 00000005.00000002.1482983503.0000000000A04000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_dd1835f2-e
            Source: egpTyFpA8v.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_90f1f3e9-8
            Source: egpTyFpA8v.exeString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_c5956f9c-4
            Source: Wausaukee.exe.0.drString found in binary or memory: This is a third-party compiled AutoIt script.memstr_4cc885ca-f
            Source: Wausaukee.exe.0.drString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_651a2da3-9
            Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeCode function: 0_2_0049A1EF: GetFullPathNameW,__swprintf,CreateDirectoryW,CreateFileW,_memset,_wcsncpy,DeviceIoControl,CloseHandle,RemoveDirectoryW,CloseHandle,0_2_0049A1EF
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeCode function: 0_2_00488310 _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00488310
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeCode function: 0_2_004951BD ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_004951BD
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeCode function: 2_2_009B51BD ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,2_2_009B51BD
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeCode function: 0_2_0043E6A00_2_0043E6A0
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeCode function: 0_2_0045D9750_2_0045D975
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeCode function: 0_2_0043FCE00_2_0043FCE0
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeCode function: 0_2_004521C50_2_004521C5
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeCode function: 0_2_004662D20_2_004662D2
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeCode function: 0_2_004B03DA0_2_004B03DA
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeCode function: 0_2_0046242E0_2_0046242E
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeCode function: 0_2_004525FA0_2_004525FA
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeCode function: 0_2_0048E6160_2_0048E616
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeCode function: 0_2_004466E10_2_004466E1
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeCode function: 0_2_0046878F0_2_0046878F
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeCode function: 0_2_004668440_2_00466844
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeCode function: 0_2_004B08570_2_004B0857
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeCode function: 0_2_004488080_2_00448808
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeCode function: 0_2_004988890_2_00498889
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeCode function: 0_2_0045CB210_2_0045CB21
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeCode function: 0_2_00466DB60_2_00466DB6
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeCode function: 0_2_00446F9E0_2_00446F9E
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeCode function: 0_2_004430300_2_00443030
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeCode function: 0_2_0045F1D90_2_0045F1D9
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeCode function: 0_2_004531870_2_00453187
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeCode function: 0_2_004312870_2_00431287
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeCode function: 0_2_004514840_2_00451484
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeCode function: 0_2_004455200_2_00445520
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeCode function: 0_2_004576960_2_00457696
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeCode function: 0_2_004457600_2_00445760
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeCode function: 0_2_004519780_2_00451978
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeCode function: 0_2_00469AB50_2_00469AB5
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeCode function: 0_2_004B7DDB0_2_004B7DDB
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeCode function: 0_2_00451D900_2_00451D90
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeCode function: 0_2_0045BDA60_2_0045BDA6
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeCode function: 0_2_0043DF000_2_0043DF00
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeCode function: 0_2_00443FE00_2_00443FE0
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeCode function: 0_2_00EED2780_2_00EED278
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeCode function: 2_2_0095E6A02_2_0095E6A0
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeCode function: 2_2_0097D9752_2_0097D975
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeCode function: 2_2_0095FCE02_2_0095FCE0
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeCode function: 2_2_009721C52_2_009721C5
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeCode function: 2_2_009862D22_2_009862D2
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeCode function: 2_2_009D03DA2_2_009D03DA
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeCode function: 2_2_0098242E2_2_0098242E
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeCode function: 2_2_009725FA2_2_009725FA
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeCode function: 2_2_009666E12_2_009666E1
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeCode function: 2_2_009AE6162_2_009AE616
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeCode function: 2_2_0098878F2_2_0098878F
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeCode function: 2_2_009B88892_2_009B8889
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeCode function: 2_2_009688082_2_00968808
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeCode function: 2_2_009D08572_2_009D0857
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeCode function: 2_2_009868442_2_00986844
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeCode function: 2_2_0097CB212_2_0097CB21
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeCode function: 2_2_00986DB62_2_00986DB6
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeCode function: 2_2_00966F9E2_2_00966F9E
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeCode function: 2_2_009630302_2_00963030
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeCode function: 2_2_009731872_2_00973187
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeCode function: 2_2_0097F1D92_2_0097F1D9
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeCode function: 2_2_009512872_2_00951287
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeCode function: 2_2_009714842_2_00971484
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeCode function: 2_2_009655202_2_00965520
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeCode function: 2_2_009776962_2_00977696
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeCode function: 2_2_009657602_2_00965760
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeCode function: 2_2_009719782_2_00971978
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeCode function: 2_2_00989AB52_2_00989AB5
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeCode function: 2_2_00971D902_2_00971D90
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeCode function: 2_2_0097BDA62_2_0097BDA6
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeCode function: 2_2_009D7DDB2_2_009D7DDB
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeCode function: 2_2_00963FE02_2_00963FE0
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeCode function: 2_2_0095DF002_2_0095DF00
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeCode function: 2_2_00C7E3582_2_00C7E358
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeCode function: 5_2_00F1E3A85_2_00F1E3A8
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeCode function: String function: 00978900 appears 42 times
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeCode function: String function: 00970AE3 appears 70 times
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeCode function: String function: 00957DE1 appears 36 times
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeCode function: String function: 00437DE1 appears 36 times
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeCode function: String function: 00450AE3 appears 70 times
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeCode function: String function: 00458900 appears 42 times
            Source: egpTyFpA8v.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
            Source: 5.2.Wausaukee.exe.e60000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
            Source: 5.2.Wausaukee.exe.e60000.1.raw.unpack, type: UNPACKEDPEMatched rule: rat_win_asyncrat author = Sekoia.io, description = Detect AsyncRAT based on specific strings, creation_date = 2023-01-25, classification = TLP:CLEAR, version = 1.0, id = d698e4a1-77ff-4cd7-acb3-27fb16168ceb
            Source: 5.2.Wausaukee.exe.e60000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
            Source: 2.2.Wausaukee.exe.1870000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
            Source: 2.2.Wausaukee.exe.1870000.1.raw.unpack, type: UNPACKEDPEMatched rule: rat_win_asyncrat author = Sekoia.io, description = Detect AsyncRAT based on specific strings, creation_date = 2023-01-25, classification = TLP:CLEAR, version = 1.0, id = d698e4a1-77ff-4cd7-acb3-27fb16168ceb
            Source: 2.2.Wausaukee.exe.1870000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
            Source: 5.2.Wausaukee.exe.e60000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
            Source: 5.2.Wausaukee.exe.e60000.1.unpack, type: UNPACKEDPEMatched rule: rat_win_asyncrat author = Sekoia.io, description = Detect AsyncRAT based on specific strings, creation_date = 2023-01-25, classification = TLP:CLEAR, version = 1.0, id = d698e4a1-77ff-4cd7-acb3-27fb16168ceb
            Source: 5.2.Wausaukee.exe.e60000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
            Source: 6.2.RegSvcs.exe.530000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
            Source: 6.2.RegSvcs.exe.530000.0.unpack, type: UNPACKEDPEMatched rule: rat_win_asyncrat author = Sekoia.io, description = Detect AsyncRAT based on specific strings, creation_date = 2023-01-25, classification = TLP:CLEAR, version = 1.0, id = d698e4a1-77ff-4cd7-acb3-27fb16168ceb
            Source: 6.2.RegSvcs.exe.530000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
            Source: 2.2.Wausaukee.exe.1870000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
            Source: 2.2.Wausaukee.exe.1870000.1.unpack, type: UNPACKEDPEMatched rule: rat_win_asyncrat author = Sekoia.io, description = Detect AsyncRAT based on specific strings, creation_date = 2023-01-25, classification = TLP:CLEAR, version = 1.0, id = d698e4a1-77ff-4cd7-acb3-27fb16168ceb
            Source: 2.2.Wausaukee.exe.1870000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
            Source: 00000006.00000002.1597930274.0000000000532000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
            Source: 00000005.00000002.1485447769.0000000000E60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
            Source: 00000005.00000002.1485447769.0000000000E60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: rat_win_asyncrat author = Sekoia.io, description = Detect AsyncRAT based on specific strings, creation_date = 2023-01-25, classification = TLP:CLEAR, version = 1.0, id = d698e4a1-77ff-4cd7-acb3-27fb16168ceb
            Source: 00000005.00000002.1485447769.0000000000E60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
            Source: 00000002.00000002.1381107360.0000000001870000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
            Source: 00000002.00000002.1381107360.0000000001870000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: rat_win_asyncrat author = Sekoia.io, description = Detect AsyncRAT based on specific strings, creation_date = 2023-01-25, classification = TLP:CLEAR, version = 1.0, id = d698e4a1-77ff-4cd7-acb3-27fb16168ceb
            Source: 00000002.00000002.1381107360.0000000001870000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
            Source: Process Memory Space: Wausaukee.exe PID: 7788, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
            Source: Process Memory Space: RegSvcs.exe PID: 8004, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
            Source: classification engineClassification label: mal100.troj.expl.evad.winEXE@10/7@1/1
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeCode function: 0_2_0049A06A GetLastError,FormatMessageW,0_2_0049A06A
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeCode function: 0_2_004881CB AdjustTokenPrivileges,CloseHandle,0_2_004881CB
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeCode function: 0_2_004887E1 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_004887E1
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeCode function: 2_2_009A81CB AdjustTokenPrivileges,CloseHandle,2_2_009A81CB
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeCode function: 2_2_009A87E1 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,2_2_009A87E1
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeCode function: 0_2_0049B333 SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_0049B333
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeCode function: 0_2_004AEE0D CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_004AEE0D
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeCode function: 0_2_0049C397 CoInitialize,CoCreateInstance,CoUninitialize,0_2_0049C397
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeCode function: 0_2_00434E89 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_00434E89
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeFile created: C:\Users\user\AppData\Local\preinheredJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: \Sessions\1\BaseNamedObjects\abkZfsCYRZhk
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeFile created: C:\Users\user~1\AppData\Local\Temp\aut20EF.tmpJump to behavior
            Source: unknownProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Wausaukee.vbs"
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeCommand line argument: 0_2_004347D0
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeCommand line argument: 0_2_004347D0
            Source: egpTyFpA8v.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Windows\System32\wscript.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: egpTyFpA8v.exeVirustotal: Detection: 68%
            Source: egpTyFpA8v.exeReversingLabs: Detection: 87%
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeFile read: C:\Users\user\Desktop\egpTyFpA8v.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\egpTyFpA8v.exe "C:\Users\user\Desktop\egpTyFpA8v.exe"
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeProcess created: C:\Users\user\AppData\Local\preinhered\Wausaukee.exe "C:\Users\user\Desktop\egpTyFpA8v.exe"
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\egpTyFpA8v.exe"
            Source: unknownProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Wausaukee.vbs"
            Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\preinhered\Wausaukee.exe "C:\Users\user\AppData\Local\preinhered\Wausaukee.exe"
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\AppData\Local\preinhered\Wausaukee.exe"
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeProcess created: C:\Users\user\AppData\Local\preinhered\Wausaukee.exe "C:\Users\user\Desktop\egpTyFpA8v.exe"Jump to behavior
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\egpTyFpA8v.exe"Jump to behavior
            Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\preinhered\Wausaukee.exe "C:\Users\user\AppData\Local\preinhered\Wausaukee.exe" Jump to behavior
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\AppData\Local\preinhered\Wausaukee.exe" Jump to behavior
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeSection loaded: wsock32.dllJump to behavior
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeSection loaded: wsock32.dllJump to behavior
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: vbscript.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: mlang.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeSection loaded: wsock32.dllJump to behavior
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B54F3741-5B07-11cf-A4B0-00AA004A55E8}\InprocServer32Jump to behavior
            Source: egpTyFpA8v.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
            Source: egpTyFpA8v.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
            Source: egpTyFpA8v.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
            Source: egpTyFpA8v.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
            Source: egpTyFpA8v.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
            Source: egpTyFpA8v.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
            Source: egpTyFpA8v.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
            Source: Binary string: wntdll.pdbUGP source: Wausaukee.exe, 00000002.00000003.1377701020.00000000035C0000.00000004.00001000.00020000.00000000.sdmp, Wausaukee.exe, 00000002.00000003.1378166008.0000000003760000.00000004.00001000.00020000.00000000.sdmp, Wausaukee.exe, 00000005.00000003.1476637459.0000000003840000.00000004.00001000.00020000.00000000.sdmp, Wausaukee.exe, 00000005.00000003.1476809472.00000000039E0000.00000004.00001000.00020000.00000000.sdmp
            Source: Binary string: wntdll.pdb source: Wausaukee.exe, 00000002.00000003.1377701020.00000000035C0000.00000004.00001000.00020000.00000000.sdmp, Wausaukee.exe, 00000002.00000003.1378166008.0000000003760000.00000004.00001000.00020000.00000000.sdmp, Wausaukee.exe, 00000005.00000003.1476637459.0000000003840000.00000004.00001000.00020000.00000000.sdmp, Wausaukee.exe, 00000005.00000003.1476809472.00000000039E0000.00000004.00001000.00020000.00000000.sdmp
            Source: egpTyFpA8v.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
            Source: egpTyFpA8v.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
            Source: egpTyFpA8v.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
            Source: egpTyFpA8v.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
            Source: egpTyFpA8v.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeCode function: 0_2_00434B37 LoadLibraryA,GetProcAddress,0_2_00434B37
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeCode function: 0_2_0043C4C6 push A30043BAh; retn 0043h0_2_0043C50D
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeCode function: 0_2_00458945 push ecx; ret 0_2_00458958
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeCode function: 2_2_00978945 push ecx; ret 2_2_00978958
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeFile created: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeJump to dropped file

            Boot Survival

            barindex
            Source: Yara matchFile source: 5.2.Wausaukee.exe.e60000.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.Wausaukee.exe.1870000.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.Wausaukee.exe.e60000.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.RegSvcs.exe.530000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.Wausaukee.exe.1870000.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000006.00000002.1597930274.0000000000532000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.1485447769.0000000000E60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.1381107360.0000000001870000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Wausaukee.exe PID: 7788, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: Wausaukee.exe PID: 7984, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 8004, type: MEMORYSTR
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Wausaukee.vbsJump to dropped file
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Wausaukee.vbsJump to behavior
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Wausaukee.vbsJump to behavior
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeCode function: 0_2_004348D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_004348D7
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeCode function: 0_2_004B5376 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_004B5376
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeCode function: 2_2_009548D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,2_2_009548D7
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeCode function: 2_2_009D5376 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,2_2_009D5376
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeCode function: 0_2_00453187 EncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00453187
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: Yara matchFile source: Process Memory Space: Wausaukee.exe PID: 7788, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: Wausaukee.exe PID: 7984, type: MEMORYSTR
            Source: Yara matchFile source: 5.2.Wausaukee.exe.e60000.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.Wausaukee.exe.1870000.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.Wausaukee.exe.e60000.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.RegSvcs.exe.530000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.Wausaukee.exe.1870000.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000006.00000002.1597930274.0000000000532000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.1485447769.0000000000E60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.1381107360.0000000001870000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Wausaukee.exe PID: 7788, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: Wausaukee.exe PID: 7984, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 8004, type: MEMORYSTR
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeAPI/Special instruction interceptor: Address: C7DF7C
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeAPI/Special instruction interceptor: Address: F1DFCC
            Source: egpTyFpA8v.exe, 00000000.00000002.1361268610.0000000000FB8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PROCMON.EXE
            Source: Wausaukee.exe, 00000002.00000003.1360773957.0000000000C04000.00000004.00000020.00020000.00000000.sdmp, Wausaukee.exe, 00000002.00000002.1380809740.0000000000C90000.00000004.00000020.00020000.00000000.sdmp, Wausaukee.exe, 00000005.00000002.1486341502.0000000001011000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PROCMON.EXESK
            Source: Wausaukee.exe, 00000002.00000002.1381107360.0000000001870000.00000004.00001000.00020000.00000000.sdmp, Wausaukee.exe, 00000005.00000002.1485447769.0000000000E60000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.1597930274.0000000000532000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
            Source: egpTyFpA8v.exe, 00000000.00000002.1361305237.0000000000FEF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PROCMON.EXESW
            Source: Wausaukee.exe, 00000002.00000003.1360773957.0000000000C04000.00000004.00000020.00020000.00000000.sdmp, Wausaukee.exe, 00000002.00000002.1380809740.0000000000C90000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PROCMON.EXEOS
            Source: Wausaukee.exe, 00000005.00000002.1486123532.0000000000F30000.00000004.00000020.00020000.00000000.sdmp, Wausaukee.exe, 00000005.00000003.1469535969.0000000000EA4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PROCMON.EXE:*
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodes
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-102144
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeAPI coverage: 4.4 %
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeAPI coverage: 4.6 %
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeCode function: 0_2_0049445A GetFileAttributesW,FindFirstFileW,FindClose,0_2_0049445A
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeCode function: 0_2_0049C6D1 FindFirstFileW,FindClose,0_2_0049C6D1
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeCode function: 0_2_0049C75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_0049C75C
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeCode function: 0_2_0049EF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0049EF95
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeCode function: 0_2_0049F0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0049F0F2
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeCode function: 0_2_0049F3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0049F3F3
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeCode function: 0_2_004937EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_004937EF
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeCode function: 0_2_00493B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00493B12
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeCode function: 0_2_0049BCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0049BCBC
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeCode function: 2_2_009B445A GetFileAttributesW,FindFirstFileW,FindClose,2_2_009B445A
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeCode function: 2_2_009BC6D1 FindFirstFileW,FindClose,2_2_009BC6D1
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeCode function: 2_2_009BC75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,2_2_009BC75C
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeCode function: 2_2_009BEF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,2_2_009BEF95
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeCode function: 2_2_009BF0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,2_2_009BF0F2
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeCode function: 2_2_009BF3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,2_2_009BF3F3
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeCode function: 2_2_009B37EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,2_2_009B37EF
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeCode function: 2_2_009B3B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,2_2_009B3B12
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeCode function: 2_2_009BBCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,2_2_009BBCBC
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeCode function: 0_2_004349A0 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_004349A0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: RegSvcs.exe, 00000006.00000002.1597930274.0000000000532000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: vmware
            Source: RegSvcs.exe, 00000003.00000002.2602945963.00000000009FD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllvZ,
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeAPI call chain: ExitProcess graph end nodegraph_0-100939
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeAPI call chain: ExitProcess graph end nodegraph_0-101161
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeCode function: 0_2_004A3F09 BlockInput,0_2_004A3F09
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeCode function: 0_2_00433B3A GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00433B3A
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeCode function: 0_2_00465A7C EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_00465A7C
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeCode function: 0_2_00434B37 LoadLibraryA,GetProcAddress,0_2_00434B37
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeCode function: 0_2_00EED168 mov eax, dword ptr fs:[00000030h]0_2_00EED168
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeCode function: 0_2_00EED108 mov eax, dword ptr fs:[00000030h]0_2_00EED108
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeCode function: 0_2_00EEBA98 mov eax, dword ptr fs:[00000030h]0_2_00EEBA98
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeCode function: 2_2_00C7E1E8 mov eax, dword ptr fs:[00000030h]2_2_00C7E1E8
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeCode function: 2_2_00C7E248 mov eax, dword ptr fs:[00000030h]2_2_00C7E248
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeCode function: 2_2_00C7CB78 mov eax, dword ptr fs:[00000030h]2_2_00C7CB78
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeCode function: 5_2_00F1CBC8 mov eax, dword ptr fs:[00000030h]5_2_00F1CBC8
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeCode function: 5_2_00F1E238 mov eax, dword ptr fs:[00000030h]5_2_00F1E238
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeCode function: 5_2_00F1E298 mov eax, dword ptr fs:[00000030h]5_2_00F1E298
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeCode function: 0_2_004880A9 GetTokenInformation,GetLastError,GetProcessHeap,HeapAlloc,GetTokenInformation,0_2_004880A9
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeCode function: 0_2_0045A155 SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0045A155
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeCode function: 0_2_0045A124 SetUnhandledExceptionFilter,0_2_0045A124
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeCode function: 2_2_0097A124 SetUnhandledExceptionFilter,2_2_0097A124
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeCode function: 2_2_0097A155 SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_0097A155
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 5A0008Jump to behavior
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 3F6008Jump to behavior
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeCode function: 0_2_004887B1 LogonUserW,0_2_004887B1
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeCode function: 0_2_00433B3A GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00433B3A
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeCode function: 0_2_004348D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_004348D7
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeCode function: 0_2_00494C53 mouse_event,0_2_00494C53
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\egpTyFpA8v.exe"Jump to behavior
            Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\preinhered\Wausaukee.exe "C:\Users\user\AppData\Local\preinhered\Wausaukee.exe" Jump to behavior
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\AppData\Local\preinhered\Wausaukee.exe" Jump to behavior
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeCode function: 0_2_00487CAF GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00487CAF
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeCode function: 0_2_0048874B AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_0048874B
            Source: egpTyFpA8v.exe, Wausaukee.exe.0.drBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
            Source: egpTyFpA8v.exe, Wausaukee.exeBinary or memory string: Shell_TrayWnd
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeCode function: 0_2_0045862B cpuid 0_2_0045862B
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeCode function: 0_2_00464E87 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00464E87
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeCode function: 0_2_00471E06 GetUserNameW,0_2_00471E06
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeCode function: 0_2_00463F3A __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_00463F3A
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeCode function: 0_2_004349A0 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_004349A0
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Lowering of HIPS / PFW / Operating System Security Settings

            barindex
            Source: Yara matchFile source: 5.2.Wausaukee.exe.e60000.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.Wausaukee.exe.1870000.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.Wausaukee.exe.e60000.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.RegSvcs.exe.530000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.Wausaukee.exe.1870000.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000006.00000002.1597930274.0000000000532000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.1485447769.0000000000E60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.1381107360.0000000001870000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Wausaukee.exe PID: 7788, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: Wausaukee.exe PID: 7984, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 8004, type: MEMORYSTR
            Source: egpTyFpA8v.exe, 00000000.00000002.1361268610.0000000000FB8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: procmon.exe
            Source: Wausaukee.exeBinary or memory string: WIN_81
            Source: Wausaukee.exeBinary or memory string: WIN_XP
            Source: Wausaukee.exeBinary or memory string: WIN_XPe
            Source: Wausaukee.exeBinary or memory string: WIN_VISTA
            Source: Wausaukee.exeBinary or memory string: WIN_7
            Source: Wausaukee.exeBinary or memory string: WIN_8
            Source: Wausaukee.exe.0.drBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 0USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeCode function: 0_2_004A6283 socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,0_2_004A6283
            Source: C:\Users\user\Desktop\egpTyFpA8v.exeCode function: 0_2_004A6747 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_004A6747
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeCode function: 2_2_009C6283 socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,2_2_009C6283
            Source: C:\Users\user\AppData\Local\preinhered\Wausaukee.exeCode function: 2_2_009C6747 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,2_2_009C6747
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity Information111
            Scripting
            2
            Valid Accounts
            2
            Native API
            111
            Scripting
            1
            Exploitation for Privilege Escalation
            11
            Disable or Modify Tools
            21
            Input Capture
            2
            System Time Discovery
            Remote Services1
            Archive Collected Data
            1
            Ingress Tool Transfer
            Exfiltration Over Other Network Medium1
            System Shutdown/Reboot
            CredentialsDomainsDefault Accounts2
            Command and Scripting Interpreter
            1
            DLL Side-Loading
            1
            DLL Side-Loading
            1
            Deobfuscate/Decode Files or Information
            LSASS Memory1
            Account Discovery
            Remote Desktop Protocol21
            Input Capture
            1
            Encrypted Channel
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain Accounts1
            Scheduled Task/Job
            2
            Valid Accounts
            2
            Valid Accounts
            12
            Obfuscated Files or Information
            Security Account Manager2
            File and Directory Discovery
            SMB/Windows Admin Shares3
            Clipboard Data
            1
            Non-Standard Port
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCron1
            Scheduled Task/Job
            21
            Access Token Manipulation
            1
            DLL Side-Loading
            NTDS127
            System Information Discovery
            Distributed Component Object ModelInput Capture1
            Non-Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchd2
            Registry Run Keys / Startup Folder
            212
            Process Injection
            1
            Masquerading
            LSA Secrets341
            Security Software Discovery
            SSHKeylogging1
            Application Layer Protocol
            Scheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts1
            Scheduled Task/Job
            2
            Valid Accounts
            Cached Domain Credentials11
            Virtualization/Sandbox Evasion
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup Items2
            Registry Run Keys / Startup Folder
            11
            Virtualization/Sandbox Evasion
            DCSync2
            Process Discovery
            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
            Access Token Manipulation
            Proc Filesystem1
            Application Window Discovery
            Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt212
            Process Injection
            /etc/passwd and /etc/shadow1
            System Owner/User Discovery
            Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1588713 Sample: egpTyFpA8v.exe Startdate: 11/01/2025 Architecture: WINDOWS Score: 100 29 time.windows.com 2->29 33 Found malware configuration 2->33 35 Malicious sample detected (through community Yara rule) 2->35 37 Multi AV Scanner detection for submitted file 2->37 39 8 other signatures 2->39 8 egpTyFpA8v.exe 4 2->8         started        12 wscript.exe 1 2->12         started        signatures3 process4 file5 25 C:\Users\user\AppData\Local\...\Wausaukee.exe, PE32 8->25 dropped 41 Binary is likely a compiled AutoIt script file 8->41 43 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 8->43 14 Wausaukee.exe 2 8->14         started        45 Windows Scripting host queries suspicious COM object (likely to drop second stage) 12->45 18 Wausaukee.exe 1 12->18         started        signatures6 process7 file8 27 C:\Users\user\AppData\...\Wausaukee.vbs, data 14->27 dropped 47 Multi AV Scanner detection for dropped file 14->47 49 Binary is likely a compiled AutoIt script file 14->49 51 Machine Learning detection for dropped file 14->51 59 2 other signatures 14->59 20 RegSvcs.exe 2 14->20         started        53 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 18->53 55 Writes to foreign memory regions 18->55 57 Maps a DLL or memory area into another process 18->57 23 RegSvcs.exe 3 18->23         started        signatures9 process10 dnsIp11 31 69.174.100.131, 49799, 49970, 49972 ASN-QUADRANET-GLOBALUS United States 20->31

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            egpTyFpA8v.exe68%VirustotalBrowse
            egpTyFpA8v.exe88%ReversingLabsWin32.Backdoor.AsyncRAT
            egpTyFpA8v.exe100%Joe Sandbox ML
            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Local\preinhered\Wausaukee.exe100%Joe Sandbox ML
            C:\Users\user\AppData\Local\preinhered\Wausaukee.exe88%ReversingLabsWin32.Backdoor.AsyncRAT
            C:\Users\user\AppData\Local\preinhered\Wausaukee.exe68%VirustotalBrowse
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            NameIPActiveMaliciousAntivirus DetectionReputation
            time.windows.com
            unknown
            unknownfalse
              high
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              69.174.100.131
              unknownUnited States
              8100ASN-QUADRANET-GLOBALUStrue
              Joe Sandbox version:42.0.0 Malachite
              Analysis ID:1588713
              Start date and time:2025-01-11 04:33:42 +01:00
              Joe Sandbox product:CloudBasic
              Overall analysis duration:0h 7m 7s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
              Number of analysed new started processes analysed:11
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample name:egpTyFpA8v.exe
              renamed because original name is a hash value
              Original Sample Name:8f42d1e07595808544eed18a45e8d7220dff40597d4d53d0f63fab47554afbdf.exe
              Detection:MAL
              Classification:mal100.troj.expl.evad.winEXE@10/7@1/1
              EGA Information:
              • Successful, ratio: 60%
              HCA Information:
              • Successful, ratio: 100%
              • Number of executed functions: 54
              • Number of non-executed functions: 279
              Cookbook Comments:
              • Found application associated with file extension: .exe
              • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
              • Excluded IPs from analysis (whitelisted): 20.101.57.9, 13.107.246.45, 52.149.20.212
              • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, twc.trafficmanager.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
              • Execution Graph export aborted for target RegSvcs.exe, PID 7816 because it is empty
              • Execution Graph export aborted for target RegSvcs.exe, PID 8004 because it is empty
              • Not all processes where analyzed, report is missing behavior information
              • Report size exceeded maximum capacity and may have missing disassembly code.
              • Report size getting too big, too many NtOpenKeyEx calls found.
              • Report size getting too big, too many NtProtectVirtualMemory calls found.
              • Report size getting too big, too many NtQueryValueKey calls found.
              TimeTypeDescription
              04:34:48AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Wausaukee.vbs
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              69.174.100.13130% Order payment-BLQuote_'PO#385995790.exeGet hashmaliciousAsyncRATBrowse
                bcUcEm7AqP.exeGet hashmaliciousAsyncRATBrowse
                  BQ_PO#385995.exeGet hashmaliciousRedLine, Snake Keylogger, VIP Keylogger, XWormBrowse
                    BQ_PO#385995.exeGet hashmaliciousRedLine, Snake Keylogger, VIP Keylogger, XWormBrowse
                      Drawing&spec.scr.exeGet hashmaliciousAsyncRATBrowse
                        No context
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        ASN-QUADRANET-GLOBALUSNfi2yQDBda.exeGet hashmaliciousRemcosBrowse
                        • 69.174.98.48
                        rO37Xq39IF.exeGet hashmaliciousRemcosBrowse
                        • 69.174.98.48
                        frosty.sh4.elfGet hashmaliciousMiraiBrowse
                        • 45.199.228.228
                        xLDz0WPZYc.exeGet hashmaliciousGuLoaderBrowse
                        • 66.63.187.30
                        xLDz0WPZYc.exeGet hashmaliciousGuLoaderBrowse
                        • 66.63.187.30
                        vQyKfYxzXB.exeGet hashmaliciousRemcosBrowse
                        • 69.174.98.48
                        https://zfrmz.com/3GiGYUP4BArW2NBgkPU3Get hashmaliciousUnknownBrowse
                        • 45.61.152.125
                        gem1.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                        • 66.63.187.173
                        armv5l.elfGet hashmaliciousUnknownBrowse
                        • 104.237.80.14
                        30% Order payment-BLQuote_'PO#385995790.exeGet hashmaliciousAsyncRATBrowse
                        • 69.174.100.131
                        No context
                        No context
                        Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                        File Type:CSV text
                        Category:dropped
                        Size (bytes):425
                        Entropy (8bit):5.353683843266035
                        Encrypted:false
                        SSDEEP:12:Q3La/KDLI4MWuPTAOKbbDLI4MWuPJKAVKhav:ML9E4KlKDE4KhKiKhk
                        MD5:859802284B12C59DDBB85B0AC64C08F0
                        SHA1:4FDDEFC6DB9645057FEB3322BE98EF10D6A593EE
                        SHA-256:FB234B6DAB715ADABB23E450DADCDBCDDFF78A054BAF19B5CE7A9B4206B7492B
                        SHA-512:8A371F671B962AE8AE0F58421A13E80F645FF0A9888462C1529B77289098A0EA4D6A9E2E07ABD4F96460FCC32AA87B0581CA4D747E77E69C3620BF1368BA9A67
                        Malicious:false
                        Reputation:high, very likely benign file
                        Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..
                        Process:C:\Users\user\Desktop\egpTyFpA8v.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):40368
                        Entropy (8bit):7.8672026068516665
                        Encrypted:false
                        SSDEEP:768:7nPtkXKOKkeq1mDosoxqR42jGWbZ+bdW1V0ASr7U0OOhLBt4lli4L3l+/RCSQ1:7lFrkeq4MBzbbULrY7+ORM7So
                        MD5:360E888BD4500096C2EFCDE86DB752F3
                        SHA1:917261746796F3D2A79427BA1A6F5AD7AF7278CC
                        SHA-256:BB1C0B9570207DC968D0AD64E1F6A4D6F82F80B4E5EBFF4ED11C5B4DD61EA209
                        SHA-512:FE4D887FE1385512B0A60FBFEE9D3B9F17E5644ECF913D9996ECE7588FDF58688AC90DF9C1D8156649D45AB8A79D93D1972287E56ACBF2B59113102768A7C3F3
                        Malicious:false
                        Reputation:low
                        Preview:EA06.....Z4Sj%N.H..hT....B.S....bk1..&s)...4L@..U..B...f..5....D.{..o.....M/..m..[...r.=Z.#..SYebC@..'.Z..E...".8.*.\.I..Jef...N...3._..J......4k.O.Vg...2g..h+ .X.a...p.....ns).X...Lf4`.L..'5......LR(1N<.$..7..2G2.I.41R.....Q.Y.4..f...u|.j.T......-...(.k..F.{.4.k1.P...7..........'z+1..#....IS....h.... ./..J.@oS....,.V' .P.&p`.....p.......l.N4Z.r..P.X.mR.5.4&u.........1.9].U..Bp..-....Wx...\.}......Cc.(..6.hK.v..*.^.K&.z|.........em...:...C.U.u.,.M ..i..d.mR..i..\.J..-..f.2.Lct........i...`..@.......i.x..^.4e..UN.T.G*.....%......b..i.h..+@.....6I...X....).b.H....*...J...Z..8.K.'..j?G...Q..B.k.P..IP....Ti.XD..x...3.%..<G..J|..3.8$. ..s.Fu.*U.e.M..K|.5.s.9.b.9.....*FU\..$..."...[2.=..x.Wh5JD>...\ ...*.7../q.D.oh.N!....`..W#..2s....{....R..I5./N.H).:..i..P.<..f.^.......mH.i.5..f....&.z."o..R.t.$..N.Rh.(..C#..S....n..e.ZU..@...4.......Sj...;.LhT.U..B.Y-T...k1.....{..N.. .sh.Ki.*..ey.L.S.. ........v-.S.U....L..]*=N....79U.....h....L..h..8..@.\...:iE
                        Process:C:\Users\user\AppData\Local\preinhered\Wausaukee.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):40368
                        Entropy (8bit):7.8672026068516665
                        Encrypted:false
                        SSDEEP:768:7nPtkXKOKkeq1mDosoxqR42jGWbZ+bdW1V0ASr7U0OOhLBt4lli4L3l+/RCSQ1:7lFrkeq4MBzbbULrY7+ORM7So
                        MD5:360E888BD4500096C2EFCDE86DB752F3
                        SHA1:917261746796F3D2A79427BA1A6F5AD7AF7278CC
                        SHA-256:BB1C0B9570207DC968D0AD64E1F6A4D6F82F80B4E5EBFF4ED11C5B4DD61EA209
                        SHA-512:FE4D887FE1385512B0A60FBFEE9D3B9F17E5644ECF913D9996ECE7588FDF58688AC90DF9C1D8156649D45AB8A79D93D1972287E56ACBF2B59113102768A7C3F3
                        Malicious:false
                        Reputation:low
                        Preview:EA06.....Z4Sj%N.H..hT....B.S....bk1..&s)...4L@..U..B...f..5....D.{..o.....M/..m..[...r.=Z.#..SYebC@..'.Z..E...".8.*.\.I..Jef...N...3._..J......4k.O.Vg...2g..h+ .X.a...p.....ns).X...Lf4`.L..'5......LR(1N<.$..7..2G2.I.41R.....Q.Y.4..f...u|.j.T......-...(.k..F.{.4.k1.P...7..........'z+1..#....IS....h.... ./..J.@oS....,.V' .P.&p`.....p.......l.N4Z.r..P.X.mR.5.4&u.........1.9].U..Bp..-....Wx...\.}......Cc.(..6.hK.v..*.^.K&.z|.........em...:...C.U.u.,.M ..i..d.mR..i..\.J..-..f.2.Lct........i...`..@.......i.x..^.4e..UN.T.G*.....%......b..i.h..+@.....6I...X....).b.H....*...J...Z..8.K.'..j?G...Q..B.k.P..IP....Ti.XD..x...3.%..<G..J|..3.8$. ..s.Fu.*U.e.M..K|.5.s.9.b.9.....*FU\..$..."...[2.=..x.Wh5JD>...\ ...*.7../q.D.oh.N!....`..W#..2s....{....R..I5./N.H).:..i..P.<..f.^.......mH.i.5..f....&.z."o..R.t.$..N.Rh.(..C#..S....n..e.ZU..@...4.......Sj...;.LhT.U..B.Y-T...k1.....{..N.. .sh.Ki.*..ey.L.S.. ........v-.S.U....L..]*=N....79U.....h....L..h..8..@.\...:iE
                        Process:C:\Users\user\AppData\Local\preinhered\Wausaukee.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):40368
                        Entropy (8bit):7.8672026068516665
                        Encrypted:false
                        SSDEEP:768:7nPtkXKOKkeq1mDosoxqR42jGWbZ+bdW1V0ASr7U0OOhLBt4lli4L3l+/RCSQ1:7lFrkeq4MBzbbULrY7+ORM7So
                        MD5:360E888BD4500096C2EFCDE86DB752F3
                        SHA1:917261746796F3D2A79427BA1A6F5AD7AF7278CC
                        SHA-256:BB1C0B9570207DC968D0AD64E1F6A4D6F82F80B4E5EBFF4ED11C5B4DD61EA209
                        SHA-512:FE4D887FE1385512B0A60FBFEE9D3B9F17E5644ECF913D9996ECE7588FDF58688AC90DF9C1D8156649D45AB8A79D93D1972287E56ACBF2B59113102768A7C3F3
                        Malicious:false
                        Reputation:low
                        Preview:EA06.....Z4Sj%N.H..hT....B.S....bk1..&s)...4L@..U..B...f..5....D.{..o.....M/..m..[...r.=Z.#..SYebC@..'.Z..E...".8.*.\.I..Jef...N...3._..J......4k.O.Vg...2g..h+ .X.a...p.....ns).X...Lf4`.L..'5......LR(1N<.$..7..2G2.I.41R.....Q.Y.4..f...u|.j.T......-...(.k..F.{.4.k1.P...7..........'z+1..#....IS....h.... ./..J.@oS....,.V' .P.&p`.....p.......l.N4Z.r..P.X.mR.5.4&u.........1.9].U..Bp..-....Wx...\.}......Cc.(..6.hK.v..*.^.K&.z|.........em...:...C.U.u.,.M ..i..d.mR..i..\.J..-..f.2.Lct........i...`..@.......i.x..^.4e..UN.T.G*.....%......b..i.h..+@.....6I...X....).b.H....*...J...Z..8.K.'..j?G...Q..B.k.P..IP....Ti.XD..x...3.%..<G..J|..3.8$. ..s.Fu.*U.e.M..K|.5.s.9.b.9.....*FU\..$..."...[2.=..x.Wh5JD>...\ ...*.7../q.D.oh.N!....`..W#..2s....{....R..I5./N.H).:..i..P.<..f.^.......mH.i.5..f....&.z."o..R.t.$..N.Rh.(..C#..S....n..e.ZU..@...4.......Sj...;.LhT.U..B.Y-T...k1.....{..N.. .sh.Ki.*..ey.L.S.. ........v-.S.U....L..]*=N....79U.....h....L..h..8..@.\...:iE
                        Process:C:\Users\user\Desktop\egpTyFpA8v.exe
                        File Type:data
                        Category:modified
                        Size (bytes):46080
                        Entropy (8bit):6.740141727045088
                        Encrypted:false
                        SSDEEP:768:c9h/B5iM40jsdgEkw8KYGNU3DVM1QiPNiwwpD0ZcblAVXp9ESCGAb0Ae7IyqnHE:c9DwoSgPitiTaJPNYpwGAVXIv5zeTcHE
                        MD5:8409FF18F685EFF1B3AE18A11463A348
                        SHA1:D1AF7CD089FBB6E848C33312C39834B5D9AEA885
                        SHA-256:C267167E1BAB18CF8A75063ADBFBF5D8927A97CFB3B549C85B6A9673CF7EDE69
                        SHA-512:E27A4B8917CADC049BA75FF05033FF857E05A646FC899CAB3DF34CEC40D71388651E5D9DA6F2895E09A7777D4CC6DD04EA5D530B05BD0D28188B4E36BFA5BD4D
                        Malicious:false
                        Preview:~h.6DSYH51BJ..TB.N4O2X51.L3226GSYH11BJJATB6N4O2X51QL3226GSYH.1BJD^.L6.=...4}.mgZ[Eg#+'VC#'j"5,X!@oP=.C$".[\....h\^&/dLYH.N4O2X51..32~7DS...TBJJATB6N.O0Y>0YL3.26GYYH11BJD.TB6n4O2.51QLs22.GSYJ11FJJATB6N0O2X51QL3.36GQYH11BJHA..6N$O2H51QL#22&GSYH11RJJATB6N4O2X..QLd226G.YH.6BJJATB6N4O2X51QL3226FSUH11BJJATB6N4O2X51QL3226GSYH11BJJATB6N4O2X51QL3226GSYh11JJJATB6N4O2X=.QL{226GSYH11BJd51:BN4O&.51Ql322.GSYJ11BJJATB6N4O2X.1Q,.@AD$SYH.6BJJ.TB6F4O2.51QL3226GSYH11.JJ.z0S"[,2X91QL3236GQYH1.BJJATB6N4O2X51.L3p26GSYH11BJJATB6N.2X51QL{226ES\H.hBJ.-TB5N4O3X57QL3226GSYH11BJJATB6N4O2X51QL3226GSYH11BJJATB6N4O..+g...../Ewi.IrBw...\T.....h..2.6.SYH/3jRJA^h,0'O2\./S. 222mI'\11F`TC.V6N0e(& 1QH.,0.RSYL.+<\JAPh(L.Y2X1.K2$222mM[.&1BN`[*Z6N0e,Z.)QL7.(H^SYL./@.SATF.TJU2X1.K2(222mM[.*1BN`[*^6N0e,Z.-QL7.(HZSYL./@.WATF.d6g.X5;G.0..HLSYL2^}JJK~lEV4O8./1QH....GS_r.1BJbkTB0t*O2X..QL5.&6GSqo11Dp@ATB.f4O4a31QL'.D6GYs...BJ@2.B6D.o0X5^.L38.X9MYH5.RJJA*\6N0 .X5;E.-222m-'G11Fb]ATH.A4O2p.1QJ.726G{.H17h.8.qBF0$O2\.^QL9..6GWs.B.BJ
                        Process:C:\Users\user\Desktop\egpTyFpA8v.exe
                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                        Category:modified
                        Size (bytes):967680
                        Entropy (8bit):6.850774868418671
                        Encrypted:false
                        SSDEEP:24576:nu6J33O0c+JY5UZ+XC0kGso6FaNXpPkMeCWY:hu0c++OCvkGs9FaNhkZY
                        MD5:BC18B6803A287E63B3668B5817F12419
                        SHA1:BC21190DF092D93629068C705EA8DC630D3DB4A4
                        SHA-256:8F42D1E07595808544EED18A45E8D7220DFF40597D4D53D0F63FAB47554AFBDF
                        SHA-512:2C29ABCD294FD09E39CB604192628C2E4AA71241575AC38644C0FD7E5AC6B77C1F12302003636F166747D7B44649C7A9D31915E1B2C6C5FA09201428187C59E2
                        Malicious:true
                        Antivirus:
                        • Antivirus: Joe Sandbox ML, Detection: 100%
                        • Antivirus: ReversingLabs, Detection: 88%
                        • Antivirus: Virustotal, Detection: 68%, Browse
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......6...r}.r}.r}.4,".p}.....s}../..A}../#..}../".G}.{.@.{}.{.P.W}.r}.R....)."}.....s}../..s}.r}T.s}.....s}.Richr}.................PE..L...o.Ng.........."..................}............@..........................0.......4....@...@.......@.....................L...|....p...;.......................q...+..............................pH..@............................................text............................... ..`.rdata..............................@..@.data...t........R..................@....rsrc....;...p...<..................@..@.reloc...q.......r...R..............@..B........................................................................................................................................................................................................................................................................................
                        Process:C:\Users\user\AppData\Local\preinhered\Wausaukee.exe
                        File Type:data
                        Category:modified
                        Size (bytes):288
                        Entropy (8bit):3.4110438914811274
                        Encrypted:false
                        SSDEEP:6:DMM8lfm3OOQdUfclMMlW8g1UEZ+lX1GOnB7uMlWAlmnriIM8lfQVn:DsO+vNlMkXg1Q1R7uM8mA2n
                        MD5:0A5017AC7579ECF57010602F1C5CC597
                        SHA1:2F38A013D171788806F711120503BF0A1626EF09
                        SHA-256:53C57DE4A96C6F428CBB80774A50FF4F48A72AB512090E45D8BEF700E17237C1
                        SHA-512:3433F857B52F15C0980F8062FA0BF4B116C419AE040B5C75E0468BDCA94D6164F8359342153540906CB16A9DF11D6F963623C680782B8831C4C4139AC58B8417
                        Malicious:true
                        Preview:S.e.t. .W.s.h.S.h.e.l.l. .=. .C.r.e.a.t.e.O.b.j.e.c.t.(.".W.S.c.r.i.p.t...S.h.e.l.l.".)...W.s.h.S.h.e.l.l...R.u.n. .".C.:.\.U.s.e.r.s.\.f.r.o.n.t.d.e.s.k.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.p.r.e.i.n.h.e.r.e.d.\.W.a.u.s.a.u.k.e.e...e.x.e.".,. .1...S.e.t. .W.s.h.S.h.e.l.l. .=. .N.o.t.h.i.n.g...
                        File type:PE32 executable (GUI) Intel 80386, for MS Windows
                        Entropy (8bit):6.850774868418671
                        TrID:
                        • Win32 Executable (generic) a (10002005/4) 99.96%
                        • Generic Win/DOS Executable (2004/3) 0.02%
                        • DOS Executable Generic (2002/1) 0.02%
                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                        File name:egpTyFpA8v.exe
                        File size:967'680 bytes
                        MD5:bc18b6803a287e63b3668b5817f12419
                        SHA1:bc21190df092d93629068c705ea8dc630d3db4a4
                        SHA256:8f42d1e07595808544eed18a45e8d7220dff40597d4d53d0f63fab47554afbdf
                        SHA512:2c29abcd294fd09e39cb604192628c2e4aa71241575ac38644c0fd7e5ac6b77c1f12302003636f166747d7b44649c7a9d31915e1b2c6c5fa09201428187c59e2
                        SSDEEP:24576:nu6J33O0c+JY5UZ+XC0kGso6FaNXpPkMeCWY:hu0c++OCvkGs9FaNhkZY
                        TLSH:1E25AD2273DDC360CB669173BF6AB7016EBF7C614630B85B2F880D7DA950162162D7A3
                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......6...r}..r}..r}..4,".p}......s}.../..A}.../#..}.../".G}..{.@.{}..{.P.W}..r}..R.....)."}......s}.../..s}..r}T.s}......s}..Richr}.
                        Icon Hash:aaf3e3e3938382a0
                        Entrypoint:0x427dcd
                        Entrypoint Section:.text
                        Digitally signed:false
                        Imagebase:0x400000
                        Subsystem:windows gui
                        Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                        DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                        Time Stamp:0x674E986F [Tue Dec 3 05:34:39 2024 UTC]
                        TLS Callbacks:
                        CLR (.Net) Version:
                        OS Version Major:5
                        OS Version Minor:1
                        File Version Major:5
                        File Version Minor:1
                        Subsystem Version Major:5
                        Subsystem Version Minor:1
                        Import Hash:afcdf79be1557326c854b6e20cb900a7
                        Instruction
                        call 00007FEDF4B4172Ah
                        jmp 00007FEDF4B344F4h
                        int3
                        int3
                        int3
                        int3
                        int3
                        int3
                        int3
                        int3
                        int3
                        push edi
                        push esi
                        mov esi, dword ptr [esp+10h]
                        mov ecx, dword ptr [esp+14h]
                        mov edi, dword ptr [esp+0Ch]
                        mov eax, ecx
                        mov edx, ecx
                        add eax, esi
                        cmp edi, esi
                        jbe 00007FEDF4B3467Ah
                        cmp edi, eax
                        jc 00007FEDF4B349DEh
                        bt dword ptr [004C31FCh], 01h
                        jnc 00007FEDF4B34679h
                        rep movsb
                        jmp 00007FEDF4B3498Ch
                        cmp ecx, 00000080h
                        jc 00007FEDF4B34844h
                        mov eax, edi
                        xor eax, esi
                        test eax, 0000000Fh
                        jne 00007FEDF4B34680h
                        bt dword ptr [004BE324h], 01h
                        jc 00007FEDF4B34B50h
                        bt dword ptr [004C31FCh], 00000000h
                        jnc 00007FEDF4B3481Dh
                        test edi, 00000003h
                        jne 00007FEDF4B3482Eh
                        test esi, 00000003h
                        jne 00007FEDF4B3480Dh
                        bt edi, 02h
                        jnc 00007FEDF4B3467Fh
                        mov eax, dword ptr [esi]
                        sub ecx, 04h
                        lea esi, dword ptr [esi+04h]
                        mov dword ptr [edi], eax
                        lea edi, dword ptr [edi+04h]
                        bt edi, 03h
                        jnc 00007FEDF4B34683h
                        movq xmm1, qword ptr [esi]
                        sub ecx, 08h
                        lea esi, dword ptr [esi+08h]
                        movq qword ptr [edi], xmm1
                        lea edi, dword ptr [edi+08h]
                        test esi, 00000007h
                        je 00007FEDF4B346D5h
                        bt esi, 03h
                        jnc 00007FEDF4B34728h
                        Programming Language:
                        • [ASM] VS2013 build 21005
                        • [ C ] VS2013 build 21005
                        • [C++] VS2013 build 21005
                        • [ C ] VS2008 SP1 build 30729
                        • [IMP] VS2008 SP1 build 30729
                        • [ASM] VS2013 UPD4 build 31101
                        • [RES] VS2013 build 21005
                        • [LNK] VS2013 UPD4 build 31101
                        NameVirtual AddressVirtual Size Is in Section
                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IMPORT0xba44c0x17c.rdata
                        IMAGE_DIRECTORY_ENTRY_RESOURCE0xc70000x23bac.rsrc
                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                        IMAGE_DIRECTORY_ENTRY_BASERELOC0xeb0000x711c.reloc
                        IMAGE_DIRECTORY_ENTRY_DEBUG0x92bc00x1c.rdata
                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xa48700x40.rdata
                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IAT0x8f0000x884.rdata
                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                        .text0x10000x8dcc40x8de00d28a820a1d9ff26cda02d12b888ba4b4False0.5728679102422908data6.676118058520316IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        .rdata0x8f0000x2e10e0x2e20079b14b254506b0dbc8cd0ad67fb70ad9False0.33535526761517614OpenPGP Public Key5.76010872795207IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .data0xbe0000x8f740x52009f9d6f746f1a415a63de45f8b7983d33False0.1017530487804878data1.198745897703538IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .rsrc0xc70000x23bac0x23c000208b202d566ac06d244d283dc6ed295False0.8163038133741258data7.584050575804284IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .reloc0xeb0000x711c0x72006fcae3cbbf6bfbabf5ec5bbe7cf612c3False0.7650767543859649data6.779031650454199IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                        NameRVASizeTypeLanguageCountryZLIB Complexity
                        RT_ICON0xc75a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                        RT_ICON0xc76d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                        RT_ICON0xc77f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                        RT_ICON0xc79200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                        RT_ICON0xc7c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                        RT_ICON0xc7d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                        RT_ICON0xc8bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                        RT_ICON0xc94800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                        RT_ICON0xc99e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                        RT_ICON0xcbf900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                        RT_ICON0xcd0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                        RT_MENU0xcd4a00x50dataEnglishGreat Britain0.9
                        RT_STRING0xcd4f00x594dataEnglishGreat Britain0.3333333333333333
                        RT_STRING0xcda840x68adataEnglishGreat Britain0.2747909199522103
                        RT_STRING0xce1100x490dataEnglishGreat Britain0.3715753424657534
                        RT_STRING0xce5a00x5fcdataEnglishGreat Britain0.3087467362924282
                        RT_STRING0xceb9c0x65cdataEnglishGreat Britain0.34336609336609336
                        RT_STRING0xcf1f80x466dataEnglishGreat Britain0.3605683836589698
                        RT_STRING0xcf6600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                        RT_RCDATA0xcf7b80x1ae71data1.0003720744511901
                        RT_GROUP_ICON0xea62c0x76dataEnglishGreat Britain0.6610169491525424
                        RT_GROUP_ICON0xea6a40x14dataEnglishGreat Britain1.25
                        RT_GROUP_ICON0xea6b80x14dataEnglishGreat Britain1.15
                        RT_GROUP_ICON0xea6cc0x14dataEnglishGreat Britain1.25
                        RT_VERSION0xea6e00xdcdataEnglishGreat Britain0.6181818181818182
                        RT_MANIFEST0xea7bc0x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                        DLLImport
                        WSOCK32.dllWSACleanup, socket, inet_ntoa, setsockopt, ntohs, recvfrom, ioctlsocket, htons, WSAStartup, __WSAFDIsSet, select, accept, listen, bind, closesocket, WSAGetLastError, recv, sendto, send, inet_addr, gethostbyname, gethostname, connect
                        VERSION.dllGetFileVersionInfoW, GetFileVersionInfoSizeW, VerQueryValueW
                        WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                        COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                        MPR.dllWNetUseConnectionW, WNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W
                        WININET.dllInternetQueryDataAvailable, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetConnectW
                        PSAPI.DLLGetProcessMemoryInfo
                        IPHLPAPI.DLLIcmpCreateFile, IcmpCloseHandle, IcmpSendEcho
                        USERENV.dllDestroyEnvironmentBlock, UnloadUserProfile, CreateEnvironmentBlock, LoadUserProfileW
                        UxTheme.dllIsThemeActive
                        KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, SetCurrentDirectoryW, GetLongPathNameW, GetShortPathNameW, DeleteFileW, FindNextFileW, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, GetLocalTime, CompareStringW, GetCurrentProcess, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, LoadLibraryW, VirtualAlloc, IsDebuggerPresent, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, GetCurrentThread, CloseHandle, GetFullPathNameW, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetCommandLineW, IsProcessorFeaturePresent, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetStartupInfoW, GetStringTypeW, SetStdHandle, GetFileType, GetConsoleCP, GetConsoleMode, RtlUnwind, ReadConsoleW, GetTimeZoneInformation, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetEnvironmentStringsW, FreeEnvironmentStringsW, WriteConsoleW, FindClose, SetEnvironmentVariableA
                        USER32.dllAdjustWindowRectEx, CopyImage, SetWindowPos, GetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, SetRect, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, MonitorFromRect, keybd_event, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, DispatchMessageW, TranslateMessage, PeekMessageW, UnregisterHotKey, CheckMenuRadioItem, CharLowerBuffW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, SystemParametersInfoW, LoadImageW, GetClassNameW
                        GDI32.dllStrokePath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, GetDeviceCaps, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, LineTo, AngleArc, MoveToEx, Ellipse, DeleteDC, GetPixel, CreateDCW, GetStockObject, GetTextFaceW, CreateFontW, SetTextColor, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, StrokeAndFillPath
                        COMDLG32.dllGetOpenFileNameW, GetSaveFileNameW
                        ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, RegCreateKeyExW, FreeSid, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, AddAce, SetSecurityDescriptorDacl, GetUserNameW, InitiateSystemShutdownExW
                        SHELL32.dllDragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                        ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoSetProxyBlanket, CoCreateInstanceEx, CoInitializeSecurity
                        OLEAUT32.dllLoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, RegisterTypeLib, CreateStdDispatch, DispCallFunc, VariantChangeType, SysStringLen, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, VariantCopy, VariantClear, OleLoadPicture, QueryPathOfRegTypeLib, RegisterTypeLibForUser, UnRegisterTypeLibForUser, UnRegisterTypeLib, CreateDispTypeInfo, SysAllocString, VariantInit
                        Language of compilation systemCountry where language is spokenMap
                        EnglishGreat Britain
                        TimestampSource PortDest PortSource IPDest IP
                        Jan 11, 2025 04:35:03.035986900 CET497996606192.168.2.769.174.100.131
                        Jan 11, 2025 04:35:03.040844917 CET66064979969.174.100.131192.168.2.7
                        Jan 11, 2025 04:35:03.040920973 CET497996606192.168.2.769.174.100.131
                        Jan 11, 2025 04:35:03.056744099 CET497996606192.168.2.769.174.100.131
                        Jan 11, 2025 04:35:03.061604977 CET66064979969.174.100.131192.168.2.7
                        Jan 11, 2025 04:35:24.397182941 CET66064979969.174.100.131192.168.2.7
                        Jan 11, 2025 04:35:24.397305012 CET497996606192.168.2.769.174.100.131
                        Jan 11, 2025 04:35:29.462718010 CET497996606192.168.2.769.174.100.131
                        Jan 11, 2025 04:35:29.463323116 CET499706606192.168.2.769.174.100.131
                        Jan 11, 2025 04:35:29.467652082 CET66064979969.174.100.131192.168.2.7
                        Jan 11, 2025 04:35:29.468381882 CET66064997069.174.100.131192.168.2.7
                        Jan 11, 2025 04:35:29.468451023 CET499706606192.168.2.769.174.100.131
                        Jan 11, 2025 04:35:29.471846104 CET499706606192.168.2.769.174.100.131
                        Jan 11, 2025 04:35:29.476725101 CET66064997069.174.100.131192.168.2.7
                        Jan 11, 2025 04:35:50.836570024 CET66064997069.174.100.131192.168.2.7
                        Jan 11, 2025 04:35:50.836658955 CET499706606192.168.2.769.174.100.131
                        Jan 11, 2025 04:35:55.852206945 CET499706606192.168.2.769.174.100.131
                        Jan 11, 2025 04:35:55.852624893 CET499726606192.168.2.769.174.100.131
                        Jan 11, 2025 04:35:55.857877970 CET66064997069.174.100.131192.168.2.7
                        Jan 11, 2025 04:35:55.857892990 CET66064997269.174.100.131192.168.2.7
                        Jan 11, 2025 04:35:55.857973099 CET499726606192.168.2.769.174.100.131
                        Jan 11, 2025 04:35:55.858325958 CET499726606192.168.2.769.174.100.131
                        Jan 11, 2025 04:35:55.863084078 CET66064997269.174.100.131192.168.2.7
                        Jan 11, 2025 04:36:17.243068933 CET66064997269.174.100.131192.168.2.7
                        Jan 11, 2025 04:36:17.243153095 CET499726606192.168.2.769.174.100.131
                        Jan 11, 2025 04:36:22.258052111 CET499726606192.168.2.769.174.100.131
                        Jan 11, 2025 04:36:22.258498907 CET499736606192.168.2.769.174.100.131
                        Jan 11, 2025 04:36:22.263756990 CET66064997269.174.100.131192.168.2.7
                        Jan 11, 2025 04:36:22.264193058 CET66064997369.174.100.131192.168.2.7
                        Jan 11, 2025 04:36:22.264352083 CET499736606192.168.2.769.174.100.131
                        Jan 11, 2025 04:36:22.264672041 CET499736606192.168.2.769.174.100.131
                        Jan 11, 2025 04:36:22.269503117 CET66064997369.174.100.131192.168.2.7
                        Jan 11, 2025 04:36:43.616247892 CET66064997369.174.100.131192.168.2.7
                        Jan 11, 2025 04:36:43.616316080 CET499736606192.168.2.769.174.100.131
                        Jan 11, 2025 04:36:48.616964102 CET499736606192.168.2.769.174.100.131
                        Jan 11, 2025 04:36:48.617506981 CET499746606192.168.2.769.174.100.131
                        Jan 11, 2025 04:36:48.621825933 CET66064997369.174.100.131192.168.2.7
                        Jan 11, 2025 04:36:48.622342110 CET66064997469.174.100.131192.168.2.7
                        Jan 11, 2025 04:36:48.622437954 CET499746606192.168.2.769.174.100.131
                        Jan 11, 2025 04:36:48.622800112 CET499746606192.168.2.769.174.100.131
                        Jan 11, 2025 04:36:48.627646923 CET66064997469.174.100.131192.168.2.7
                        TimestampSource PortDest PortSource IPDest IP
                        Jan 11, 2025 04:34:43.723043919 CET5978253192.168.2.71.1.1.1
                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                        Jan 11, 2025 04:34:43.723043919 CET192.168.2.71.1.1.10x7becStandard query (0)time.windows.comA (IP address)IN (0x0001)false
                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                        Jan 11, 2025 04:34:43.729803085 CET1.1.1.1192.168.2.70x7becNo error (0)time.windows.comtwc.trafficmanager.netCNAME (Canonical name)IN (0x0001)false

                        Click to jump to process

                        Click to jump to process

                        Click to dive into process behavior distribution

                        Click to jump to process

                        Target ID:0
                        Start time:22:34:46
                        Start date:10/01/2025
                        Path:C:\Users\user\Desktop\egpTyFpA8v.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Users\user\Desktop\egpTyFpA8v.exe"
                        Imagebase:0x430000
                        File size:967'680 bytes
                        MD5 hash:BC18B6803A287E63B3668B5817F12419
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:low
                        Has exited:true

                        Target ID:2
                        Start time:22:34:47
                        Start date:10/01/2025
                        Path:C:\Users\user\AppData\Local\preinhered\Wausaukee.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Users\user\Desktop\egpTyFpA8v.exe"
                        Imagebase:0x950000
                        File size:967'680 bytes
                        MD5 hash:BC18B6803A287E63B3668B5817F12419
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000002.00000002.1381107360.0000000001870000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: 00000002.00000002.1381107360.0000000001870000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: Windows_Trojan_Asyncrat_11a11ba1, Description: unknown, Source: 00000002.00000002.1381107360.0000000001870000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                        • Rule: rat_win_asyncrat, Description: Detect AsyncRAT based on specific strings, Source: 00000002.00000002.1381107360.0000000001870000.00000004.00001000.00020000.00000000.sdmp, Author: Sekoia.io
                        • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: 00000002.00000002.1381107360.0000000001870000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                        Antivirus matches:
                        • Detection: 100%, Joe Sandbox ML
                        • Detection: 88%, ReversingLabs
                        • Detection: 68%, Virustotal, Browse
                        Reputation:low
                        Has exited:true

                        Target ID:3
                        Start time:22:34:48
                        Start date:10/01/2025
                        Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Users\user\Desktop\egpTyFpA8v.exe"
                        Imagebase:0x350000
                        File size:45'984 bytes
                        MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:false

                        Target ID:4
                        Start time:22:34:57
                        Start date:10/01/2025
                        Path:C:\Windows\System32\wscript.exe
                        Wow64 process (32bit):false
                        Commandline:"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Wausaukee.vbs"
                        Imagebase:0x7ff7f9040000
                        File size:170'496 bytes
                        MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                        Has elevated privileges:false
                        Has administrator privileges:false
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:5
                        Start time:22:34:58
                        Start date:10/01/2025
                        Path:C:\Users\user\AppData\Local\preinhered\Wausaukee.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Users\user\AppData\Local\preinhered\Wausaukee.exe"
                        Imagebase:0x950000
                        File size:967'680 bytes
                        MD5 hash:BC18B6803A287E63B3668B5817F12419
                        Has elevated privileges:false
                        Has administrator privileges:false
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000005.00000002.1485447769.0000000000E60000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: 00000005.00000002.1485447769.0000000000E60000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: Windows_Trojan_Asyncrat_11a11ba1, Description: unknown, Source: 00000005.00000002.1485447769.0000000000E60000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                        • Rule: rat_win_asyncrat, Description: Detect AsyncRAT based on specific strings, Source: 00000005.00000002.1485447769.0000000000E60000.00000004.00001000.00020000.00000000.sdmp, Author: Sekoia.io
                        • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: 00000005.00000002.1485447769.0000000000E60000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                        Reputation:low
                        Has exited:true

                        Target ID:6
                        Start time:22:35:00
                        Start date:10/01/2025
                        Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Users\user\AppData\Local\preinhered\Wausaukee.exe"
                        Imagebase:0x160000
                        File size:45'984 bytes
                        MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                        Has elevated privileges:false
                        Has administrator privileges:false
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000006.00000002.1597930274.0000000000532000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                        • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: 00000006.00000002.1597930274.0000000000532000.00000040.80000000.00040000.00000000.sdmp, Author: ditekSHen
                        Reputation:high
                        Has exited:true

                        Reset < >

                          Execution Graph

                          Execution Coverage:3.4%
                          Dynamic/Decrypted Code Coverage:0.4%
                          Signature Coverage:4.8%
                          Total number of Nodes:2000
                          Total number of Limit Nodes:170
                          execution_graph 100777 433633 100778 43366a 100777->100778 100779 4336e7 100778->100779 100780 433688 100778->100780 100821 4336e5 100778->100821 100782 46d0cc 100779->100782 100783 4336ed 100779->100783 100784 433695 100780->100784 100785 43374b PostQuitMessage 100780->100785 100781 4336ca DefWindowProcW 100786 4336d8 100781->100786 100826 441070 10 API calls Mailbox 100782->100826 100787 4336f2 100783->100787 100788 433715 SetTimer RegisterWindowMessageW 100783->100788 100790 46d154 100784->100790 100791 4336a0 100784->100791 100785->100786 100792 46d06f 100787->100792 100793 4336f9 KillTimer 100787->100793 100788->100786 100795 43373e CreatePopupMenu 100788->100795 100842 492527 71 API calls _memset 100790->100842 100796 433755 100791->100796 100797 4336a8 100791->100797 100800 46d074 100792->100800 100801 46d0a8 MoveWindow 100792->100801 100822 43443a Shell_NotifyIconW _memset 100793->100822 100794 46d0f3 100827 441093 331 API calls Mailbox 100794->100827 100795->100786 100824 4344a0 64 API calls _memset 100796->100824 100804 4336b3 100797->100804 100805 46d139 100797->100805 100808 46d097 SetFocus 100800->100808 100809 46d078 100800->100809 100801->100786 100811 4336be 100804->100811 100812 46d124 100804->100812 100805->100781 100841 487c36 59 API calls Mailbox 100805->100841 100806 46d166 100806->100781 100806->100786 100807 433764 100807->100786 100808->100786 100809->100811 100813 46d081 100809->100813 100810 43370c 100823 433114 DeleteObject DestroyWindow Mailbox 100810->100823 100811->100781 100828 43443a Shell_NotifyIconW _memset 100811->100828 100840 492d36 81 API calls _memset 100812->100840 100825 441070 10 API calls Mailbox 100813->100825 100819 46d118 100829 43434a 100819->100829 100821->100781 100822->100810 100823->100786 100824->100807 100825->100786 100826->100794 100827->100811 100828->100819 100830 434375 _memset 100829->100830 100843 434182 100830->100843 100834 434430 Shell_NotifyIconW 100836 434422 100834->100836 100835 434414 Shell_NotifyIconW 100835->100836 100847 43407c 100836->100847 100837 4343fa 100837->100834 100837->100835 100839 434429 100839->100821 100840->100807 100841->100821 100842->100806 100844 46d423 100843->100844 100845 434196 100843->100845 100844->100845 100846 46d42c DestroyIcon 100844->100846 100845->100837 100869 492f94 62 API calls _W_store_winword 100845->100869 100846->100845 100848 434098 100847->100848 100849 43416f Mailbox 100847->100849 100870 437a16 100848->100870 100849->100839 100852 4340b3 100875 437bcc 100852->100875 100853 46d3c8 LoadStringW 100856 46d3e2 100853->100856 100855 4340c8 100855->100856 100857 4340d9 100855->100857 100858 437b2e 59 API calls 100856->100858 100859 4340e3 100857->100859 100860 434174 100857->100860 100863 46d3ec 100858->100863 100884 437b2e 100859->100884 100893 438047 100860->100893 100866 4340ed _memset _wcscpy 100863->100866 100897 437cab 100863->100897 100865 46d40e 100868 437cab 59 API calls 100865->100868 100867 434155 Shell_NotifyIconW 100866->100867 100867->100849 100868->100866 100869->100837 100904 450db6 100870->100904 100872 437a3b 100914 438029 100872->100914 100876 437c45 100875->100876 100877 437bd8 __NMSG_WRITE 100875->100877 100946 437d2c 100876->100946 100879 437c13 100877->100879 100880 437bee 100877->100880 100881 438029 59 API calls 100879->100881 100945 437f27 59 API calls Mailbox 100880->100945 100883 437bf6 _memmove 100881->100883 100883->100855 100885 437b40 100884->100885 100886 46ec6b 100884->100886 100954 437a51 100885->100954 100960 487bdb 59 API calls _memmove 100886->100960 100889 46ec75 100891 438047 59 API calls 100889->100891 100890 437b4c 100890->100866 100892 46ec7d Mailbox 100891->100892 100894 438052 100893->100894 100895 43805a 100893->100895 100961 437f77 100894->100961 100895->100866 100898 46ed4a 100897->100898 100899 437cbf 100897->100899 100901 438029 59 API calls 100898->100901 100965 437c50 100899->100965 100903 46ed55 __NMSG_WRITE _memmove 100901->100903 100902 437cca 100902->100865 100906 450dbe 100904->100906 100907 450dd8 100906->100907 100909 450ddc std::exception::exception 100906->100909 100917 45571c 100906->100917 100934 4533a1 DecodePointer 100906->100934 100907->100872 100935 45859b RaiseException 100909->100935 100911 450e06 100936 4584d1 58 API calls _free 100911->100936 100913 450e18 100913->100872 100915 450db6 Mailbox 59 API calls 100914->100915 100916 4340a6 100915->100916 100916->100852 100916->100853 100918 455797 100917->100918 100926 455728 100917->100926 100943 4533a1 DecodePointer 100918->100943 100920 45579d 100944 458b28 58 API calls __getptd_noexit 100920->100944 100923 45575b RtlAllocateHeap 100924 45578f 100923->100924 100923->100926 100924->100906 100926->100923 100927 455733 100926->100927 100928 455783 100926->100928 100932 455781 100926->100932 100940 4533a1 DecodePointer 100926->100940 100927->100926 100937 45a16b 58 API calls __NMSG_WRITE 100927->100937 100938 45a1c8 58 API calls 5 library calls 100927->100938 100939 45309f GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 100927->100939 100941 458b28 58 API calls __getptd_noexit 100928->100941 100942 458b28 58 API calls __getptd_noexit 100932->100942 100934->100906 100935->100911 100936->100913 100937->100927 100938->100927 100940->100926 100941->100932 100942->100924 100943->100920 100944->100924 100945->100883 100947 437d43 _memmove 100946->100947 100948 437d3a 100946->100948 100947->100883 100948->100947 100950 437e4f 100948->100950 100951 437e62 100950->100951 100952 437e5f _memmove 100950->100952 100953 450db6 Mailbox 59 API calls 100951->100953 100952->100947 100953->100952 100955 437a5f 100954->100955 100956 437a85 _memmove 100954->100956 100955->100956 100957 450db6 Mailbox 59 API calls 100955->100957 100956->100890 100958 437ad4 100957->100958 100959 450db6 Mailbox 59 API calls 100958->100959 100959->100956 100960->100889 100962 437f9a _memmove 100961->100962 100963 437f87 100961->100963 100962->100895 100963->100962 100964 450db6 Mailbox 59 API calls 100963->100964 100964->100962 100966 437c5f __NMSG_WRITE 100965->100966 100967 437c70 _memmove 100966->100967 100968 438029 59 API calls 100966->100968 100967->100902 100969 46ed07 _memmove 100968->100969 100970 457c56 100971 457c62 __getstream 100970->100971 101007 459e08 GetStartupInfoW 100971->101007 100973 457c67 101009 458b7c GetProcessHeap 100973->101009 100975 457cbf 100976 457cca 100975->100976 101092 457da6 58 API calls 3 library calls 100975->101092 101010 459ae6 100976->101010 100979 457cd0 100980 457cdb __RTC_Initialize 100979->100980 101093 457da6 58 API calls 3 library calls 100979->101093 101031 45d5d2 100980->101031 100983 457cea 100984 457cf6 GetCommandLineW 100983->100984 101094 457da6 58 API calls 3 library calls 100983->101094 101050 464f23 GetEnvironmentStringsW 100984->101050 100987 457cf5 100987->100984 100990 457d10 100991 457d1b 100990->100991 101095 4530b5 58 API calls 3 library calls 100990->101095 101060 464d58 100991->101060 100994 457d21 100995 457d2c 100994->100995 101096 4530b5 58 API calls 3 library calls 100994->101096 101074 4530ef 100995->101074 100998 457d34 100999 457d3f __wwincmdln 100998->100999 101097 4530b5 58 API calls 3 library calls 100998->101097 101080 4347d0 100999->101080 101002 457d53 101003 457d62 101002->101003 101098 453358 58 API calls _doexit 101002->101098 101099 4530e0 58 API calls _doexit 101003->101099 101006 457d67 __getstream 101008 459e1e 101007->101008 101008->100973 101009->100975 101100 453187 36 API calls 2 library calls 101010->101100 101012 459aeb 101101 459d3c InitializeCriticalSectionAndSpinCount __mtinitlocks 101012->101101 101014 459af0 101015 459af4 101014->101015 101103 459d8a TlsAlloc 101014->101103 101102 459b5c 61 API calls 2 library calls 101015->101102 101018 459af9 101018->100979 101019 459b06 101019->101015 101020 459b11 101019->101020 101104 4587d5 101020->101104 101023 459b53 101112 459b5c 61 API calls 2 library calls 101023->101112 101026 459b58 101026->100979 101027 459b32 101027->101023 101028 459b38 101027->101028 101111 459a33 58 API calls 4 library calls 101028->101111 101030 459b40 GetCurrentThreadId 101030->100979 101032 45d5de __getstream 101031->101032 101124 459c0b 101032->101124 101034 45d5e5 101035 4587d5 __calloc_crt 58 API calls 101034->101035 101037 45d5f6 101035->101037 101036 45d661 GetStartupInfoW 101038 45d7a5 101036->101038 101039 45d676 101036->101039 101037->101036 101040 45d601 @_EH4_CallFilterFunc@8 __getstream 101037->101040 101041 45d86d 101038->101041 101044 45d7f2 GetStdHandle 101038->101044 101045 45d805 GetFileType 101038->101045 101132 459e2b InitializeCriticalSectionAndSpinCount 101038->101132 101039->101038 101043 4587d5 __calloc_crt 58 API calls 101039->101043 101046 45d6c4 101039->101046 101040->100983 101133 45d87d LeaveCriticalSection _doexit 101041->101133 101043->101039 101044->101038 101045->101038 101046->101038 101047 45d6f8 GetFileType 101046->101047 101131 459e2b InitializeCriticalSectionAndSpinCount 101046->101131 101047->101046 101051 464f34 101050->101051 101052 457d06 101050->101052 101173 45881d 58 API calls __malloc_crt 101051->101173 101056 464b1b GetModuleFileNameW 101052->101056 101054 464f5a _memmove 101055 464f70 FreeEnvironmentStringsW 101054->101055 101055->101052 101057 464b4f _wparse_cmdline 101056->101057 101059 464b8f _wparse_cmdline 101057->101059 101174 45881d 58 API calls __malloc_crt 101057->101174 101059->100990 101061 464d71 __NMSG_WRITE 101060->101061 101065 464d69 101060->101065 101062 4587d5 __calloc_crt 58 API calls 101061->101062 101070 464d9a __NMSG_WRITE 101062->101070 101063 464df1 101064 452d55 _free 58 API calls 101063->101064 101064->101065 101065->100994 101066 4587d5 __calloc_crt 58 API calls 101066->101070 101067 464e16 101069 452d55 _free 58 API calls 101067->101069 101069->101065 101070->101063 101070->101065 101070->101066 101070->101067 101071 464e2d 101070->101071 101175 464607 58 API calls __output_l 101070->101175 101176 458dc6 IsProcessorFeaturePresent 101071->101176 101073 464e39 101073->100994 101075 4530fb __IsNonwritableInCurrentImage 101074->101075 101199 45a4d1 101075->101199 101077 453119 __initterm_e 101079 453138 _doexit __IsNonwritableInCurrentImage 101077->101079 101202 452d40 101077->101202 101079->100998 101081 4347ea 101080->101081 101091 434889 101080->101091 101082 434824 IsThemeActive 101081->101082 101237 45336c 101082->101237 101086 434850 101249 4348fd SystemParametersInfoW SystemParametersInfoW 101086->101249 101088 43485c 101250 433b3a 101088->101250 101090 434864 SystemParametersInfoW 101090->101091 101091->101002 101092->100976 101093->100980 101094->100987 101098->101003 101099->101006 101100->101012 101101->101014 101102->101018 101103->101019 101106 4587dc 101104->101106 101107 458817 101106->101107 101109 4587fa 101106->101109 101113 4651f6 101106->101113 101107->101023 101110 459de6 TlsSetValue 101107->101110 101109->101106 101109->101107 101121 45a132 Sleep 101109->101121 101110->101027 101111->101030 101112->101026 101114 465201 101113->101114 101119 46521c 101113->101119 101115 46520d 101114->101115 101114->101119 101122 458b28 58 API calls __getptd_noexit 101115->101122 101117 46522c HeapAlloc 101118 465212 101117->101118 101117->101119 101118->101106 101119->101117 101119->101118 101123 4533a1 DecodePointer 101119->101123 101121->101109 101122->101118 101123->101119 101125 459c1c 101124->101125 101126 459c2f EnterCriticalSection 101124->101126 101134 459c93 101125->101134 101126->101034 101128 459c22 101128->101126 101158 4530b5 58 API calls 3 library calls 101128->101158 101131->101046 101132->101038 101133->101040 101135 459c9f __getstream 101134->101135 101136 459cc0 101135->101136 101137 459ca8 101135->101137 101143 459ce1 __getstream 101136->101143 101162 45881d 58 API calls __malloc_crt 101136->101162 101159 45a16b 58 API calls __NMSG_WRITE 101137->101159 101139 459cad 101160 45a1c8 58 API calls 5 library calls 101139->101160 101142 459cd5 101145 459cdc 101142->101145 101146 459ceb 101142->101146 101143->101128 101144 459cb4 101161 45309f GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 101144->101161 101163 458b28 58 API calls __getptd_noexit 101145->101163 101148 459c0b __lock 58 API calls 101146->101148 101150 459cf2 101148->101150 101152 459d17 101150->101152 101153 459cff 101150->101153 101165 452d55 101152->101165 101164 459e2b InitializeCriticalSectionAndSpinCount 101153->101164 101156 459d0b 101171 459d33 LeaveCriticalSection _doexit 101156->101171 101159->101139 101160->101144 101162->101142 101163->101143 101164->101156 101166 452d5e RtlFreeHeap 101165->101166 101167 452d87 _free 101165->101167 101166->101167 101168 452d73 101166->101168 101167->101156 101172 458b28 58 API calls __getptd_noexit 101168->101172 101170 452d79 GetLastError 101170->101167 101171->101143 101172->101170 101173->101054 101174->101059 101175->101070 101177 458dd1 101176->101177 101182 458c59 101177->101182 101181 458dec 101181->101073 101183 458c73 _memset __call_reportfault 101182->101183 101184 458c93 IsDebuggerPresent 101183->101184 101190 45a155 SetUnhandledExceptionFilter UnhandledExceptionFilter 101184->101190 101186 458d57 __call_reportfault 101191 45c5f6 101186->101191 101188 458d7a 101189 45a140 GetCurrentProcess TerminateProcess 101188->101189 101189->101181 101190->101186 101192 45c600 IsProcessorFeaturePresent 101191->101192 101193 45c5fe 101191->101193 101195 46590a 101192->101195 101193->101188 101198 4658b9 5 API calls 2 library calls 101195->101198 101197 4659ed 101197->101188 101198->101197 101200 45a4d4 EncodePointer 101199->101200 101200->101200 101201 45a4ee 101200->101201 101201->101077 101205 452c44 101202->101205 101204 452d4b 101204->101079 101206 452c50 __getstream 101205->101206 101213 453217 101206->101213 101212 452c77 __getstream 101212->101204 101214 459c0b __lock 58 API calls 101213->101214 101215 452c59 101214->101215 101216 452c88 DecodePointer DecodePointer 101215->101216 101217 452cb5 101216->101217 101218 452c65 101216->101218 101217->101218 101230 4587a4 59 API calls __output_l 101217->101230 101227 452c82 101218->101227 101220 452d18 EncodePointer EncodePointer 101220->101218 101221 452cc7 101221->101220 101222 452cec 101221->101222 101231 458864 61 API calls 2 library calls 101221->101231 101222->101218 101225 452d06 EncodePointer 101222->101225 101232 458864 61 API calls 2 library calls 101222->101232 101225->101220 101226 452d00 101226->101218 101226->101225 101233 453220 101227->101233 101230->101221 101231->101222 101232->101226 101236 459d75 LeaveCriticalSection 101233->101236 101235 452c87 101235->101212 101236->101235 101238 459c0b __lock 58 API calls 101237->101238 101239 453377 DecodePointer EncodePointer 101238->101239 101302 459d75 LeaveCriticalSection 101239->101302 101241 434849 101242 4533d4 101241->101242 101243 4533de 101242->101243 101244 4533f8 101242->101244 101243->101244 101303 458b28 58 API calls __getptd_noexit 101243->101303 101244->101086 101246 4533e8 101304 458db6 9 API calls __output_l 101246->101304 101248 4533f3 101248->101086 101249->101088 101251 433b47 __write_nolock 101250->101251 101305 437667 101251->101305 101255 433b7a IsDebuggerPresent 101256 46d272 MessageBoxA 101255->101256 101257 433b88 101255->101257 101260 46d28c 101256->101260 101258 433c61 101257->101258 101257->101260 101261 433ba5 101257->101261 101259 433c68 SetCurrentDirectoryW 101258->101259 101262 433c75 Mailbox 101259->101262 101509 437213 59 API calls Mailbox 101260->101509 101391 437285 101261->101391 101262->101090 101265 46d29c 101270 46d2b2 SetCurrentDirectoryW 101265->101270 101267 433bc3 GetFullPathNameW 101268 437bcc 59 API calls 101267->101268 101269 433bfe 101268->101269 101407 44092d 101269->101407 101270->101262 101273 433c1c 101274 433c26 101273->101274 101510 48874b AllocateAndInitializeSid CheckTokenMembership FreeSid 101273->101510 101423 433a46 GetSysColorBrush LoadCursorW LoadIconW LoadIconW LoadIconW 101274->101423 101277 46d2cf 101277->101274 101280 46d2e0 101277->101280 101511 434706 101280->101511 101281 433c30 101283 433c43 101281->101283 101285 43434a 68 API calls 101281->101285 101431 4409d0 101283->101431 101284 46d2e8 101518 437de1 101284->101518 101285->101283 101288 433c4e 101288->101258 101508 43443a Shell_NotifyIconW _memset 101288->101508 101289 46d2f5 101302->101241 101303->101246 101304->101248 101306 450db6 Mailbox 59 API calls 101305->101306 101307 437688 101306->101307 101308 450db6 Mailbox 59 API calls 101307->101308 101309 433b51 GetCurrentDirectoryW 101308->101309 101310 433766 101309->101310 101311 437667 59 API calls 101310->101311 101312 43377c 101311->101312 101522 433d31 101312->101522 101314 43379a 101315 434706 61 API calls 101314->101315 101316 4337ae 101315->101316 101317 437de1 59 API calls 101316->101317 101318 4337bb 101317->101318 101536 434ddd 101318->101536 101321 46d173 101603 49955b 101321->101603 101322 4337dc Mailbox 101326 438047 59 API calls 101322->101326 101325 46d192 101328 452d55 _free 58 API calls 101325->101328 101329 4337ef 101326->101329 101330 46d19f 101328->101330 101560 43928a 101329->101560 101332 434e4a 84 API calls 101330->101332 101334 46d1a8 101332->101334 101338 433ed0 59 API calls 101334->101338 101335 437de1 59 API calls 101336 433808 101335->101336 101563 4384c0 101336->101563 101340 46d1c3 101338->101340 101339 43381a Mailbox 101341 437de1 59 API calls 101339->101341 101342 433ed0 59 API calls 101340->101342 101343 433840 101341->101343 101344 46d1df 101342->101344 101345 4384c0 69 API calls 101343->101345 101346 434706 61 API calls 101344->101346 101348 43384f Mailbox 101345->101348 101347 46d204 101346->101347 101349 433ed0 59 API calls 101347->101349 101351 437667 59 API calls 101348->101351 101350 46d210 101349->101350 101352 438047 59 API calls 101350->101352 101353 43386d 101351->101353 101354 46d21e 101352->101354 101567 433ed0 101353->101567 101356 433ed0 59 API calls 101354->101356 101360 46d22d 101356->101360 101359 433887 101359->101334 101361 433891 101359->101361 101364 438047 59 API calls 101360->101364 101362 452efd _W_store_winword 60 API calls 101361->101362 101363 43389c 101362->101363 101363->101340 101365 4338a6 101363->101365 101366 46d24f 101364->101366 101367 452efd _W_store_winword 60 API calls 101365->101367 101368 433ed0 59 API calls 101366->101368 101369 4338b1 101367->101369 101370 46d25c 101368->101370 101369->101344 101371 4338bb 101369->101371 101370->101370 101372 452efd _W_store_winword 60 API calls 101371->101372 101373 4338c6 101372->101373 101373->101360 101374 433907 101373->101374 101376 433ed0 59 API calls 101373->101376 101374->101360 101375 433914 101374->101375 101583 4392ce 101375->101583 101378 4338ea 101376->101378 101380 438047 59 API calls 101378->101380 101381 4338f8 101380->101381 101383 433ed0 59 API calls 101381->101383 101383->101374 101386 43928a 59 API calls 101388 43394f 101386->101388 101387 438ee0 60 API calls 101387->101388 101388->101386 101388->101387 101389 433ed0 59 API calls 101388->101389 101390 433995 Mailbox 101388->101390 101389->101388 101390->101255 101392 437292 __write_nolock 101391->101392 101393 46ea22 _memset 101392->101393 101394 4372ab 101392->101394 101397 46ea3e GetOpenFileNameW 101393->101397 102393 434750 101394->102393 101399 46ea8d 101397->101399 101400 437bcc 59 API calls 101399->101400 101402 46eaa2 101400->101402 101402->101402 101404 4372c9 102421 43686a 101404->102421 101408 44093a __write_nolock 101407->101408 102683 436d80 101408->102683 101410 44093f 101411 433c14 101410->101411 102694 44119e 89 API calls 101410->102694 101411->101265 101411->101273 101413 44094c 101413->101411 102695 443ee7 91 API calls Mailbox 101413->102695 101415 440955 101415->101411 101416 440959 GetFullPathNameW 101415->101416 101417 437bcc 59 API calls 101416->101417 101418 440985 101417->101418 101419 437bcc 59 API calls 101418->101419 101420 440992 101419->101420 101421 474cab _wcscat 101420->101421 101422 437bcc 59 API calls 101420->101422 101422->101411 101424 433ab0 LoadImageW RegisterClassExW 101423->101424 101425 46d261 101423->101425 102728 433041 7 API calls 101424->102728 102729 4347a0 LoadImageW EnumResourceNamesW 101425->102729 101428 433b34 101430 4339d5 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 101428->101430 101429 46d26a 101430->101281 101432 474cc3 101431->101432 101444 4409f5 101431->101444 102865 499e4a 89 API calls 4 library calls 101432->102865 101434 440cfa 101434->101288 101437 440ee4 101437->101434 101438 440ef1 101437->101438 102863 441093 331 API calls Mailbox 101438->102863 101439 440a4b PeekMessageW 101506 440a05 Mailbox 101439->101506 101443 440ce4 101443->101434 102862 441070 10 API calls Mailbox 101443->102862 101444->101506 102866 439e5d 60 API calls 101444->102866 102867 486349 331 API calls 101444->102867 101445 474e81 Sleep 101445->101506 101450 474d50 TranslateAcceleratorW 101452 440e43 PeekMessageW 101450->101452 101450->101506 101451 440ea5 TranslateMessage DispatchMessageW 101451->101452 101452->101506 101453 450db6 59 API calls Mailbox 101453->101506 101454 440d13 timeGetTime 101454->101506 101455 47581f WaitForSingleObject 101457 47583c GetExitCodeProcess CloseHandle 101455->101457 101455->101506 101491 440f95 101457->101491 101458 440e5f Sleep 101493 440e70 Mailbox 101458->101493 101459 438047 59 API calls 101459->101506 101460 437667 59 API calls 101460->101493 101461 475af8 Sleep 101461->101493 101464 45049f timeGetTime 101464->101493 101465 440f4e timeGetTime 102864 439e5d 60 API calls 101465->102864 101468 475b8f GetExitCodeProcess 101473 475ba5 WaitForSingleObject 101468->101473 101474 475bbb CloseHandle 101468->101474 101471 4b5f25 110 API calls 101471->101493 101472 43b7dd 109 API calls 101472->101493 101473->101474 101473->101506 101474->101493 101476 475874 101476->101491 101477 439e5d 60 API calls 101477->101506 101478 475c17 Sleep 101478->101506 101479 475078 Sleep 101479->101506 101480 437de1 59 API calls 101480->101493 101486 439ea0 304 API calls 101486->101506 101490 437de1 59 API calls 101490->101506 101491->101288 101493->101460 101493->101464 101493->101468 101493->101471 101493->101472 101493->101476 101493->101478 101493->101479 101493->101480 101493->101491 101493->101506 102892 492408 60 API calls 101493->102892 102893 439e5d 60 API calls 101493->102893 102894 4389b3 69 API calls Mailbox 101493->102894 102895 43b73c 331 API calls 101493->102895 102896 4864da 60 API calls 101493->102896 102897 495244 QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 101493->102897 102898 493c55 66 API calls Mailbox 101493->102898 101495 499e4a 89 API calls 101495->101506 101496 439c90 59 API calls Mailbox 101496->101506 101497 48617e 59 API calls Mailbox 101497->101506 101499 4384c0 69 API calls 101499->101506 101500 4389b3 69 API calls 101500->101506 101501 4755d5 VariantClear 101501->101506 101502 47566b VariantClear 101502->101506 101503 475419 VariantClear 101503->101506 101504 438cd4 59 API calls Mailbox 101504->101506 101505 486e8f 59 API calls 101505->101506 101506->101439 101506->101443 101506->101445 101506->101450 101506->101451 101506->101452 101506->101453 101506->101454 101506->101455 101506->101458 101506->101459 101506->101461 101506->101465 101506->101477 101506->101486 101506->101490 101506->101491 101506->101493 101506->101495 101506->101496 101506->101497 101506->101499 101506->101500 101506->101501 101506->101502 101506->101503 101506->101504 101506->101505 101507 43b73c 304 API calls 101506->101507 102730 43e6a0 101506->102730 102761 43f460 101506->102761 102780 43fce0 101506->102780 102860 43e420 331 API calls 101506->102860 102861 4331ce IsDialogMessageW GetClassLongW 101506->102861 102868 4b6018 59 API calls 101506->102868 102869 499a15 59 API calls Mailbox 101506->102869 102870 48d4f2 59 API calls 101506->102870 102871 439837 101506->102871 102889 4860ef 59 API calls 2 library calls 101506->102889 102890 438401 59 API calls 101506->102890 102891 4382df 59 API calls Mailbox 101506->102891 101507->101506 101508->101258 101509->101265 101510->101277 101512 461940 __write_nolock 101511->101512 101513 434713 GetModuleFileNameW 101512->101513 101514 437de1 59 API calls 101513->101514 101515 434739 101514->101515 101516 434750 60 API calls 101515->101516 101517 434743 Mailbox 101516->101517 101517->101284 101519 437df0 __NMSG_WRITE _memmove 101518->101519 101520 450db6 Mailbox 59 API calls 101519->101520 101521 437e2e 101520->101521 101521->101289 101523 433d3e __write_nolock 101522->101523 101524 437bcc 59 API calls 101523->101524 101528 433ea4 Mailbox 101523->101528 101526 433d70 101524->101526 101534 433da6 Mailbox 101526->101534 101644 4379f2 101526->101644 101527 433e77 101527->101528 101529 437de1 59 API calls 101527->101529 101528->101314 101531 433e98 101529->101531 101530 437de1 59 API calls 101530->101534 101532 433f74 59 API calls 101531->101532 101532->101528 101534->101527 101534->101528 101534->101530 101535 4379f2 59 API calls 101534->101535 101647 433f74 101534->101647 101535->101534 101653 434bb5 101536->101653 101541 46d8e6 101543 434e4a 84 API calls 101541->101543 101542 434e08 LoadLibraryExW 101663 434b6a 101542->101663 101545 46d8ed 101543->101545 101547 434b6a 3 API calls 101545->101547 101549 46d8f5 101547->101549 101689 434f0b 101549->101689 101550 434e2f 101550->101549 101551 434e3b 101550->101551 101552 434e4a 84 API calls 101551->101552 101554 4337d4 101552->101554 101554->101321 101554->101322 101557 46d91c 101697 434ec7 101557->101697 101559 46d929 101561 450db6 Mailbox 59 API calls 101560->101561 101562 4337fb 101561->101562 101562->101335 101564 4384cb 101563->101564 101566 4384f2 101564->101566 102127 4389b3 69 API calls Mailbox 101564->102127 101566->101339 101568 433ef3 101567->101568 101569 433eda 101567->101569 101570 437bcc 59 API calls 101568->101570 101571 438047 59 API calls 101569->101571 101572 433879 101570->101572 101571->101572 101573 452efd 101572->101573 101574 452f7e 101573->101574 101575 452f09 101573->101575 102130 452f90 60 API calls 3 library calls 101574->102130 101582 452f2e 101575->101582 102128 458b28 58 API calls __getptd_noexit 101575->102128 101578 452f8b 101578->101359 101579 452f15 102129 458db6 9 API calls __output_l 101579->102129 101581 452f20 101581->101359 101582->101359 101584 4392d6 101583->101584 101585 450db6 Mailbox 59 API calls 101584->101585 101586 4392e4 101585->101586 101587 433924 101586->101587 102131 4391fc 59 API calls Mailbox 101586->102131 101589 439050 101587->101589 102132 439160 101589->102132 101591 43905f 101592 450db6 Mailbox 59 API calls 101591->101592 101593 433932 101591->101593 101592->101593 101594 438ee0 101593->101594 101595 46f17c 101594->101595 101601 438ef7 101594->101601 101595->101601 102142 438bdb 59 API calls Mailbox 101595->102142 101597 439040 102141 439d3c 60 API calls Mailbox 101597->102141 101598 438ff8 101599 450db6 Mailbox 59 API calls 101598->101599 101602 438fff 101599->101602 101601->101597 101601->101598 101601->101602 101602->101388 101604 434ee5 85 API calls 101603->101604 101605 4995ca 101604->101605 102143 499734 101605->102143 101608 434f0b 74 API calls 101609 4995f7 101608->101609 101610 434f0b 74 API calls 101609->101610 101611 499607 101610->101611 101612 434f0b 74 API calls 101611->101612 101613 499622 101612->101613 101614 434f0b 74 API calls 101613->101614 101615 49963d 101614->101615 101616 434ee5 85 API calls 101615->101616 101617 499654 101616->101617 101618 45571c __malloc_crt 58 API calls 101617->101618 101619 49965b 101618->101619 101620 45571c __malloc_crt 58 API calls 101619->101620 101621 499665 101620->101621 101622 434f0b 74 API calls 101621->101622 101623 499679 101622->101623 101624 499109 GetSystemTimeAsFileTime 101623->101624 101625 49968c 101624->101625 101626 4996a1 101625->101626 101627 4996b6 101625->101627 101628 452d55 _free 58 API calls 101626->101628 101629 49971b 101627->101629 101630 4996bc 101627->101630 101632 4996a7 101628->101632 101631 452d55 _free 58 API calls 101629->101631 102149 498b06 101630->102149 101637 46d186 101631->101637 101635 452d55 _free 58 API calls 101632->101635 101635->101637 101636 452d55 _free 58 API calls 101636->101637 101637->101325 101638 434e4a 101637->101638 101639 434e54 101638->101639 101640 434e5b 101638->101640 101641 4553a6 __fcloseall 83 API calls 101639->101641 101642 434e7b FreeLibrary 101640->101642 101643 434e6a 101640->101643 101641->101640 101642->101643 101643->101325 101645 437e4f 59 API calls 101644->101645 101646 4379fd 101645->101646 101646->101526 101648 433f82 101647->101648 101652 433fa4 _memmove 101647->101652 101650 450db6 Mailbox 59 API calls 101648->101650 101649 450db6 Mailbox 59 API calls 101651 433fb8 101649->101651 101650->101652 101651->101534 101652->101649 101702 434c03 101653->101702 101656 434bdc 101657 434bf5 101656->101657 101658 434bec FreeLibrary 101656->101658 101660 45525b 101657->101660 101658->101657 101659 434c03 2 API calls 101659->101656 101706 455270 101660->101706 101662 434dfc 101662->101541 101662->101542 101864 434c36 101663->101864 101666 434b8f 101668 434ba1 FreeLibrary 101666->101668 101669 434baa 101666->101669 101667 434c36 2 API calls 101667->101666 101668->101669 101670 434c70 101669->101670 101671 450db6 Mailbox 59 API calls 101670->101671 101672 434c85 101671->101672 101868 43522e 101672->101868 101674 434c91 _memmove 101675 434ccc 101674->101675 101677 434dc1 101674->101677 101678 434d89 101674->101678 101676 434ec7 69 API calls 101675->101676 101682 434cd5 101676->101682 101882 49991b 95 API calls 101677->101882 101871 434e89 CreateStreamOnHGlobal 101678->101871 101681 434f0b 74 API calls 101681->101682 101682->101681 101684 434d69 101682->101684 101685 46d8a7 101682->101685 101877 434ee5 101682->101877 101684->101550 101686 434ee5 85 API calls 101685->101686 101687 46d8bb 101686->101687 101688 434f0b 74 API calls 101687->101688 101688->101684 101690 46d9cd 101689->101690 101691 434f1d 101689->101691 101906 4555e2 101691->101906 101694 499109 102104 498f5f 101694->102104 101696 49911f 101696->101557 101698 434ed6 101697->101698 101699 46d990 101697->101699 102109 455c60 101698->102109 101701 434ede 101701->101559 101703 434bd0 101702->101703 101704 434c0c LoadLibraryA 101702->101704 101703->101656 101703->101659 101704->101703 101705 434c1d GetProcAddress 101704->101705 101705->101703 101709 45527c __getstream 101706->101709 101707 45528f 101755 458b28 58 API calls __getptd_noexit 101707->101755 101709->101707 101710 4552c0 101709->101710 101725 4604e8 101710->101725 101711 455294 101756 458db6 9 API calls __output_l 101711->101756 101714 4552c5 101715 4552ce 101714->101715 101716 4552db 101714->101716 101757 458b28 58 API calls __getptd_noexit 101715->101757 101718 455305 101716->101718 101719 4552e5 101716->101719 101740 460607 101718->101740 101758 458b28 58 API calls __getptd_noexit 101719->101758 101720 45529f @_EH4_CallFilterFunc@8 __getstream 101720->101662 101726 4604f4 __getstream 101725->101726 101727 459c0b __lock 58 API calls 101726->101727 101738 460502 101727->101738 101728 460576 101760 4605fe 101728->101760 101729 46057d 101765 45881d 58 API calls __malloc_crt 101729->101765 101732 4605f3 __getstream 101732->101714 101733 460584 101733->101728 101766 459e2b InitializeCriticalSectionAndSpinCount 101733->101766 101736 459c93 __mtinitlocknum 58 API calls 101736->101738 101737 4605aa EnterCriticalSection 101737->101728 101738->101728 101738->101729 101738->101736 101763 456c50 59 API calls __lock 101738->101763 101764 456cba LeaveCriticalSection LeaveCriticalSection _doexit 101738->101764 101749 460627 __wopenfile 101740->101749 101741 460641 101771 458b28 58 API calls __getptd_noexit 101741->101771 101742 4607fc 101742->101741 101746 46085f 101742->101746 101744 460646 101772 458db6 9 API calls __output_l 101744->101772 101768 4685a1 101746->101768 101747 455310 101759 455332 LeaveCriticalSection LeaveCriticalSection _fseek 101747->101759 101749->101741 101749->101742 101773 4537cb 60 API calls 2 library calls 101749->101773 101751 4607f5 101751->101742 101774 4537cb 60 API calls 2 library calls 101751->101774 101753 460814 101753->101742 101775 4537cb 60 API calls 2 library calls 101753->101775 101755->101711 101756->101720 101757->101720 101758->101720 101759->101720 101767 459d75 LeaveCriticalSection 101760->101767 101762 460605 101762->101732 101763->101738 101764->101738 101765->101733 101766->101737 101767->101762 101776 467d85 101768->101776 101770 4685ba 101770->101747 101771->101744 101772->101747 101773->101751 101774->101753 101775->101742 101777 467d91 __getstream 101776->101777 101778 467da7 101777->101778 101781 467ddd 101777->101781 101861 458b28 58 API calls __getptd_noexit 101778->101861 101780 467dac 101862 458db6 9 API calls __output_l 101780->101862 101787 467e4e 101781->101787 101784 467df9 101863 467e22 LeaveCriticalSection __unlock_fhandle 101784->101863 101786 467db6 __getstream 101786->101770 101788 467e6e 101787->101788 101789 4544ea __wsopen_nolock 58 API calls 101788->101789 101792 467e8a 101789->101792 101790 458dc6 __invoke_watson 8 API calls 101791 4685a0 101790->101791 101794 467d85 __wsopen_helper 103 API calls 101791->101794 101793 467ec4 101792->101793 101800 467ee7 101792->101800 101860 467fc1 101792->101860 101795 458af4 __write_nolock 58 API calls 101793->101795 101796 4685ba 101794->101796 101797 467ec9 101795->101797 101796->101784 101798 458b28 __output_l 58 API calls 101797->101798 101799 467ed6 101798->101799 101802 458db6 __output_l 9 API calls 101799->101802 101801 467fa5 101800->101801 101809 467f83 101800->101809 101803 458af4 __write_nolock 58 API calls 101801->101803 101804 467ee0 101802->101804 101805 467faa 101803->101805 101804->101784 101806 458b28 __output_l 58 API calls 101805->101806 101807 467fb7 101806->101807 101808 458db6 __output_l 9 API calls 101807->101808 101808->101860 101810 45d294 __alloc_osfhnd 61 API calls 101809->101810 101811 468051 101810->101811 101812 46807e 101811->101812 101813 46805b 101811->101813 101814 467cfd ___createFile GetModuleHandleW GetProcAddress CreateFileW 101812->101814 101815 458af4 __write_nolock 58 API calls 101813->101815 101823 4680a0 101814->101823 101816 468060 101815->101816 101818 458b28 __output_l 58 API calls 101816->101818 101817 46811e GetFileType 101821 46816b 101817->101821 101822 468129 GetLastError 101817->101822 101820 46806a 101818->101820 101819 4680ec GetLastError 101824 458b07 __dosmaperr 58 API calls 101819->101824 101825 458b28 __output_l 58 API calls 101820->101825 101832 45d52a __set_osfhnd 59 API calls 101821->101832 101826 458b07 __dosmaperr 58 API calls 101822->101826 101823->101817 101823->101819 101828 467cfd ___createFile GetModuleHandleW GetProcAddress CreateFileW 101823->101828 101829 468111 101824->101829 101825->101804 101827 468150 CloseHandle 101826->101827 101827->101829 101830 46815e 101827->101830 101831 4680e1 101828->101831 101834 458b28 __output_l 58 API calls 101829->101834 101833 458b28 __output_l 58 API calls 101830->101833 101831->101817 101831->101819 101836 468189 101832->101836 101835 468163 101833->101835 101834->101860 101835->101829 101837 4618c1 __lseeki64_nolock 60 API calls 101836->101837 101852 468344 101836->101852 101855 46820a 101836->101855 101839 4681f3 101837->101839 101838 468517 CloseHandle 101840 467cfd ___createFile GetModuleHandleW GetProcAddress CreateFileW 101838->101840 101841 458af4 __write_nolock 58 API calls 101839->101841 101839->101855 101843 46853e 101840->101843 101841->101855 101842 460e5b 70 API calls __read_nolock 101842->101855 101844 468546 GetLastError 101843->101844 101845 468572 101843->101845 101846 458b07 __dosmaperr 58 API calls 101844->101846 101845->101860 101847 468552 101846->101847 101850 45d43d __free_osfhnd 59 API calls 101847->101850 101848 460add __close_nolock 61 API calls 101848->101855 101849 46823c 101851 4697a2 __chsize_nolock 82 API calls 101849->101851 101849->101855 101850->101845 101851->101849 101852->101838 101852->101860 101853 45d886 __write 78 API calls 101853->101855 101854 4683c1 101856 460add __close_nolock 61 API calls 101854->101856 101855->101842 101855->101848 101855->101849 101855->101852 101855->101853 101855->101854 101857 4618c1 60 API calls __lseeki64_nolock 101855->101857 101858 4683c8 101856->101858 101857->101855 101859 458b28 __output_l 58 API calls 101858->101859 101859->101860 101860->101790 101861->101780 101862->101786 101863->101786 101865 434b83 101864->101865 101866 434c3f LoadLibraryA 101864->101866 101865->101666 101865->101667 101866->101865 101867 434c50 GetProcAddress 101866->101867 101867->101865 101869 450db6 Mailbox 59 API calls 101868->101869 101870 435240 101869->101870 101870->101674 101872 434ea3 FindResourceExW 101871->101872 101876 434ec0 101871->101876 101873 46d933 LoadResource 101872->101873 101872->101876 101874 46d948 SizeofResource 101873->101874 101873->101876 101875 46d95c LockResource 101874->101875 101874->101876 101875->101876 101876->101675 101878 434ef4 101877->101878 101879 46d9ab 101877->101879 101883 45584d 101878->101883 101881 434f02 101881->101682 101882->101675 101884 455859 __getstream 101883->101884 101885 45586b 101884->101885 101886 455891 101884->101886 101896 458b28 58 API calls __getptd_noexit 101885->101896 101898 456c11 101886->101898 101888 455870 101897 458db6 9 API calls __output_l 101888->101897 101891 455897 101904 4557be 83 API calls 4 library calls 101891->101904 101893 4558a6 101905 4558c8 LeaveCriticalSection LeaveCriticalSection _fseek 101893->101905 101895 45587b __getstream 101895->101881 101896->101888 101897->101895 101899 456c21 101898->101899 101900 456c43 EnterCriticalSection 101898->101900 101899->101900 101901 456c29 101899->101901 101902 456c39 101900->101902 101903 459c0b __lock 58 API calls 101901->101903 101902->101891 101903->101902 101904->101893 101905->101895 101909 4555fd 101906->101909 101908 434f2e 101908->101694 101910 455609 __getstream 101909->101910 101911 455644 __getstream 101910->101911 101912 45564c 101910->101912 101913 45561f _memset 101910->101913 101911->101908 101914 456c11 __lock_file 59 API calls 101912->101914 101936 458b28 58 API calls __getptd_noexit 101913->101936 101916 455652 101914->101916 101922 45541d 101916->101922 101918 455639 101937 458db6 9 API calls __output_l 101918->101937 101926 455438 _memset 101922->101926 101928 455453 101922->101928 101923 455443 102034 458b28 58 API calls __getptd_noexit 101923->102034 101925 455448 102035 458db6 9 API calls __output_l 101925->102035 101926->101923 101926->101928 101933 455493 101926->101933 101938 455686 LeaveCriticalSection LeaveCriticalSection _fseek 101928->101938 101930 4555a4 _memset 102037 458b28 58 API calls __getptd_noexit 101930->102037 101933->101928 101933->101930 101939 4546e6 101933->101939 101946 460e5b 101933->101946 102014 460ba7 101933->102014 102036 460cc8 58 API calls 3 library calls 101933->102036 101936->101918 101937->101911 101938->101911 101940 454705 101939->101940 101941 4546f0 101939->101941 101940->101933 102038 458b28 58 API calls __getptd_noexit 101941->102038 101943 4546f5 102039 458db6 9 API calls __output_l 101943->102039 101945 454700 101945->101933 101947 460e93 101946->101947 101948 460e7c 101946->101948 101950 4615cb 101947->101950 101954 460ecd 101947->101954 102049 458af4 58 API calls __getptd_noexit 101948->102049 102065 458af4 58 API calls __getptd_noexit 101950->102065 101951 460e81 102050 458b28 58 API calls __getptd_noexit 101951->102050 101956 460ed5 101954->101956 101963 460eec 101954->101963 101955 4615d0 102066 458b28 58 API calls __getptd_noexit 101955->102066 102051 458af4 58 API calls __getptd_noexit 101956->102051 101959 460ee1 102067 458db6 9 API calls __output_l 101959->102067 101960 460eda 102052 458b28 58 API calls __getptd_noexit 101960->102052 101962 460f01 102053 458af4 58 API calls __getptd_noexit 101962->102053 101963->101962 101965 460f1b 101963->101965 101967 460f39 101963->101967 101994 460e88 101963->101994 101965->101962 101970 460f26 101965->101970 102054 45881d 58 API calls __malloc_crt 101967->102054 102040 465c6b 101970->102040 101971 460f49 101973 460f51 101971->101973 101974 460f6c 101971->101974 101972 46103a 101976 4610b3 ReadFile 101972->101976 101981 461050 GetConsoleMode 101972->101981 102055 458b28 58 API calls __getptd_noexit 101973->102055 102057 4618c1 60 API calls 3 library calls 101974->102057 101979 4610d5 101976->101979 101980 461593 GetLastError 101976->101980 101978 460f56 102056 458af4 58 API calls __getptd_noexit 101978->102056 101979->101980 101987 4610a5 101979->101987 101983 461093 101980->101983 101984 4615a0 101980->101984 101985 461064 101981->101985 101986 4610b0 101981->101986 101998 461099 101983->101998 102058 458b07 58 API calls 3 library calls 101983->102058 102063 458b28 58 API calls __getptd_noexit 101984->102063 101985->101986 101989 46106a ReadConsoleW 101985->101989 101986->101976 101996 46110a 101987->101996 101997 461377 101987->101997 101987->101998 101989->101987 101991 46108d GetLastError 101989->101991 101990 4615a5 102064 458af4 58 API calls __getptd_noexit 101990->102064 101991->101983 101994->101933 101995 452d55 _free 58 API calls 101995->101994 102000 461176 ReadFile 101996->102000 102004 4611f7 101996->102004 101997->101998 102003 46147d ReadFile 101997->102003 101998->101994 101998->101995 102001 461197 GetLastError 102000->102001 102008 4611a1 102000->102008 102001->102008 102002 4612a4 102060 458b28 58 API calls __getptd_noexit 102002->102060 102007 4614a0 GetLastError 102003->102007 102013 4614ae 102003->102013 102004->101998 102004->102002 102006 4612b4 102004->102006 102010 461264 MultiByteToWideChar 102004->102010 102006->102010 102061 4618c1 60 API calls 3 library calls 102006->102061 102007->102013 102008->101996 102059 4618c1 60 API calls 3 library calls 102008->102059 102010->101991 102010->101998 102013->101997 102062 4618c1 60 API calls 3 library calls 102013->102062 102015 460bb2 102014->102015 102019 460bc7 102014->102019 102101 458b28 58 API calls __getptd_noexit 102015->102101 102017 460bb7 102102 458db6 9 API calls __output_l 102017->102102 102020 460bfc 102019->102020 102026 460bc2 102019->102026 102103 465fe4 58 API calls __malloc_crt 102019->102103 102022 4546e6 __output_l 58 API calls 102020->102022 102023 460c10 102022->102023 102068 460d47 102023->102068 102025 460c17 102025->102026 102027 4546e6 __output_l 58 API calls 102025->102027 102026->101933 102028 460c3a 102027->102028 102028->102026 102029 4546e6 __output_l 58 API calls 102028->102029 102030 460c46 102029->102030 102030->102026 102031 4546e6 __output_l 58 API calls 102030->102031 102032 460c53 102031->102032 102033 4546e6 __output_l 58 API calls 102032->102033 102033->102026 102034->101925 102035->101928 102036->101933 102037->101925 102038->101943 102039->101945 102041 465c76 102040->102041 102042 465c83 102040->102042 102043 458b28 __output_l 58 API calls 102041->102043 102044 465c8f 102042->102044 102045 458b28 __output_l 58 API calls 102042->102045 102047 465c7b 102043->102047 102044->101972 102046 465cb0 102045->102046 102048 458db6 __output_l 9 API calls 102046->102048 102047->101972 102048->102047 102049->101951 102050->101994 102051->101960 102052->101959 102053->101960 102054->101971 102055->101978 102056->101994 102057->101970 102058->101998 102059->102008 102060->101998 102061->102010 102062->102013 102063->101990 102064->101998 102065->101955 102066->101959 102067->101994 102069 460d53 __getstream 102068->102069 102070 460d77 102069->102070 102071 460d60 102069->102071 102072 460e3b 102070->102072 102074 460d8b 102070->102074 102073 458af4 __write_nolock 58 API calls 102071->102073 102075 458af4 __write_nolock 58 API calls 102072->102075 102076 460d65 102073->102076 102077 460db6 102074->102077 102078 460da9 102074->102078 102079 460dae 102075->102079 102080 458b28 __output_l 58 API calls 102076->102080 102082 460dc3 102077->102082 102083 460dd8 102077->102083 102081 458af4 __write_nolock 58 API calls 102078->102081 102086 458b28 __output_l 58 API calls 102079->102086 102087 460d6c __getstream 102080->102087 102081->102079 102084 458af4 __write_nolock 58 API calls 102082->102084 102085 45d206 ___lock_fhandle 59 API calls 102083->102085 102088 460dc8 102084->102088 102089 460dde 102085->102089 102090 460dd0 102086->102090 102087->102025 102091 458b28 __output_l 58 API calls 102088->102091 102092 460e04 102089->102092 102093 460df1 102089->102093 102095 458db6 __output_l 9 API calls 102090->102095 102091->102090 102096 458b28 __output_l 58 API calls 102092->102096 102094 460e5b __read_nolock 70 API calls 102093->102094 102097 460dfd 102094->102097 102095->102087 102098 460e09 102096->102098 102100 460e33 __read LeaveCriticalSection 102097->102100 102099 458af4 __write_nolock 58 API calls 102098->102099 102099->102097 102100->102087 102101->102017 102102->102026 102103->102020 102107 45520a GetSystemTimeAsFileTime 102104->102107 102106 498f6e 102106->101696 102108 455238 __aulldiv 102107->102108 102108->102106 102110 455c6c __getstream 102109->102110 102111 455c93 102110->102111 102112 455c7e 102110->102112 102114 456c11 __lock_file 59 API calls 102111->102114 102123 458b28 58 API calls __getptd_noexit 102112->102123 102115 455c99 102114->102115 102125 4558d0 67 API calls 4 library calls 102115->102125 102116 455c83 102124 458db6 9 API calls __output_l 102116->102124 102119 455ca4 102126 455cc4 LeaveCriticalSection LeaveCriticalSection _fseek 102119->102126 102121 455cb6 102122 455c8e __getstream 102121->102122 102122->101701 102123->102116 102124->102122 102125->102119 102126->102121 102127->101566 102128->101579 102129->101581 102130->101578 102131->101587 102133 439169 Mailbox 102132->102133 102134 46f19f 102133->102134 102139 439173 102133->102139 102135 450db6 Mailbox 59 API calls 102134->102135 102137 46f1ab 102135->102137 102136 43917a 102136->101591 102139->102136 102140 439c90 59 API calls Mailbox 102139->102140 102140->102139 102141->101602 102142->101601 102147 499748 __tzset_nolock _wcscmp 102143->102147 102144 499109 GetSystemTimeAsFileTime 102144->102147 102145 4995dc 102145->101608 102145->101637 102146 434f0b 74 API calls 102146->102147 102147->102144 102147->102145 102147->102146 102148 434ee5 85 API calls 102147->102148 102148->102147 102150 498b11 102149->102150 102151 498b1f 102149->102151 102152 45525b 115 API calls 102150->102152 102153 498b64 102151->102153 102154 45525b 115 API calls 102151->102154 102179 498b28 102151->102179 102152->102151 102180 498d91 102153->102180 102155 498b49 102154->102155 102155->102153 102158 498b52 102155->102158 102157 498ba8 102159 498bcd 102157->102159 102160 498bac 102157->102160 102162 4553a6 __fcloseall 83 API calls 102158->102162 102158->102179 102184 4989a9 102159->102184 102161 498bb9 102160->102161 102164 4553a6 __fcloseall 83 API calls 102160->102164 102166 4553a6 __fcloseall 83 API calls 102161->102166 102161->102179 102162->102179 102164->102161 102166->102179 102167 498bfb 102193 498c2b 102167->102193 102168 498bdb 102170 498be8 102168->102170 102172 4553a6 __fcloseall 83 API calls 102168->102172 102173 4553a6 __fcloseall 83 API calls 102170->102173 102170->102179 102172->102170 102173->102179 102176 498c16 102178 4553a6 __fcloseall 83 API calls 102176->102178 102176->102179 102178->102179 102179->101636 102181 498db6 102180->102181 102183 498d9f __tzset_nolock _memmove 102180->102183 102182 4555e2 __fread_nolock 74 API calls 102181->102182 102182->102183 102183->102157 102185 45571c __malloc_crt 58 API calls 102184->102185 102186 4989b8 102185->102186 102187 45571c __malloc_crt 58 API calls 102186->102187 102188 4989cc 102187->102188 102189 45571c __malloc_crt 58 API calls 102188->102189 102190 4989e0 102189->102190 102191 498d0d 58 API calls 102190->102191 102192 4989f3 102190->102192 102191->102192 102192->102167 102192->102168 102194 498c40 102193->102194 102195 498cf8 102194->102195 102196 498a05 74 API calls 102194->102196 102200 498c02 102194->102200 102226 498aa1 74 API calls 102194->102226 102227 498e12 80 API calls 102194->102227 102222 498f35 102195->102222 102196->102194 102201 498d0d 102200->102201 102202 498d1a 102201->102202 102203 498d20 102201->102203 102204 452d55 _free 58 API calls 102202->102204 102205 452d55 _free 58 API calls 102203->102205 102206 498d31 102203->102206 102204->102203 102205->102206 102207 452d55 _free 58 API calls 102206->102207 102208 498c09 102206->102208 102207->102208 102208->102176 102209 4553a6 102208->102209 102210 4553b2 __getstream 102209->102210 102211 4553c6 102210->102211 102212 4553de 102210->102212 102309 458b28 58 API calls __getptd_noexit 102211->102309 102215 456c11 __lock_file 59 API calls 102212->102215 102218 4553d6 __getstream 102212->102218 102214 4553cb 102310 458db6 9 API calls __output_l 102214->102310 102217 4553f0 102215->102217 102293 45533a 102217->102293 102218->102176 102223 498f53 102222->102223 102224 498f42 102222->102224 102223->102200 102228 454863 102224->102228 102226->102194 102227->102194 102229 45486f __getstream 102228->102229 102230 45489d __getstream 102229->102230 102231 4548a5 102229->102231 102232 45488d 102229->102232 102230->102223 102233 456c11 __lock_file 59 API calls 102231->102233 102253 458b28 58 API calls __getptd_noexit 102232->102253 102235 4548ab 102233->102235 102241 45470a 102235->102241 102236 454892 102254 458db6 9 API calls __output_l 102236->102254 102244 454719 102241->102244 102247 454737 102241->102247 102242 454727 102284 458b28 58 API calls __getptd_noexit 102242->102284 102244->102242 102244->102247 102250 454751 _memmove 102244->102250 102245 45472c 102285 458db6 9 API calls __output_l 102245->102285 102255 4548dd LeaveCriticalSection LeaveCriticalSection _fseek 102247->102255 102250->102247 102251 4546e6 __output_l 58 API calls 102250->102251 102256 45d886 102250->102256 102286 454a3d 102250->102286 102292 45ae1e 78 API calls 6 library calls 102250->102292 102251->102250 102253->102236 102254->102230 102255->102230 102257 45d892 __getstream 102256->102257 102258 45d8b6 102257->102258 102259 45d89f 102257->102259 102260 45d955 102258->102260 102263 45d8ca 102258->102263 102261 458af4 __write_nolock 58 API calls 102259->102261 102264 458af4 __write_nolock 58 API calls 102260->102264 102262 45d8a4 102261->102262 102265 458b28 __output_l 58 API calls 102262->102265 102266 45d8f2 102263->102266 102267 45d8e8 102263->102267 102268 45d8ed 102264->102268 102277 45d8ab __getstream 102265->102277 102270 45d206 ___lock_fhandle 59 API calls 102266->102270 102269 458af4 __write_nolock 58 API calls 102267->102269 102272 458b28 __output_l 58 API calls 102268->102272 102269->102268 102271 45d8f8 102270->102271 102273 45d91e 102271->102273 102274 45d90b 102271->102274 102275 45d961 102272->102275 102276 458b28 __output_l 58 API calls 102273->102276 102278 45d975 __write_nolock 76 API calls 102274->102278 102279 458db6 __output_l 9 API calls 102275->102279 102280 45d923 102276->102280 102277->102250 102281 45d917 102278->102281 102279->102277 102282 458af4 __write_nolock 58 API calls 102280->102282 102283 45d94d __write LeaveCriticalSection 102281->102283 102282->102281 102283->102277 102284->102245 102285->102247 102287 454a74 102286->102287 102288 454a50 102286->102288 102287->102250 102288->102287 102289 4546e6 __output_l 58 API calls 102288->102289 102290 454a6d 102289->102290 102291 45d886 __write 78 API calls 102290->102291 102291->102287 102292->102250 102294 45535d 102293->102294 102295 455349 102293->102295 102297 455359 102294->102297 102299 454a3d __flush 78 API calls 102294->102299 102342 458b28 58 API calls __getptd_noexit 102295->102342 102311 455415 LeaveCriticalSection LeaveCriticalSection _fseek 102297->102311 102298 45534e 102343 458db6 9 API calls __output_l 102298->102343 102301 455369 102299->102301 102312 460b77 102301->102312 102304 4546e6 __output_l 58 API calls 102305 455377 102304->102305 102316 460a02 102305->102316 102307 45537d 102307->102297 102308 452d55 _free 58 API calls 102307->102308 102308->102297 102309->102214 102310->102218 102311->102218 102313 455371 102312->102313 102314 460b84 102312->102314 102313->102304 102314->102313 102315 452d55 _free 58 API calls 102314->102315 102315->102313 102317 460a0e __getstream 102316->102317 102318 460a32 102317->102318 102319 460a1b 102317->102319 102321 460abd 102318->102321 102323 460a42 102318->102323 102368 458af4 58 API calls __getptd_noexit 102319->102368 102373 458af4 58 API calls __getptd_noexit 102321->102373 102322 460a20 102369 458b28 58 API calls __getptd_noexit 102322->102369 102326 460a60 102323->102326 102327 460a6a 102323->102327 102370 458af4 58 API calls __getptd_noexit 102326->102370 102344 45d206 102327->102344 102330 460a70 102334 460a83 102330->102334 102335 460a8e 102330->102335 102331 460a65 102374 458b28 58 API calls __getptd_noexit 102331->102374 102333 460ac9 102375 458db6 9 API calls __output_l 102333->102375 102353 460add 102334->102353 102371 458b28 58 API calls __getptd_noexit 102335->102371 102339 460a89 102372 460ab5 LeaveCriticalSection __unlock_fhandle 102339->102372 102340 460a27 __getstream 102340->102307 102342->102298 102343->102297 102345 45d212 __getstream 102344->102345 102346 45d261 EnterCriticalSection 102345->102346 102348 459c0b __lock 58 API calls 102345->102348 102347 45d287 __getstream 102346->102347 102347->102330 102349 45d237 102348->102349 102352 45d24f 102349->102352 102376 459e2b InitializeCriticalSectionAndSpinCount 102349->102376 102377 45d28b LeaveCriticalSection _doexit 102352->102377 102378 45d4c3 102353->102378 102355 460b41 102391 45d43d 59 API calls 2 library calls 102355->102391 102357 460aeb 102357->102355 102358 460b1f 102357->102358 102361 45d4c3 __lseeki64_nolock 58 API calls 102357->102361 102358->102355 102359 45d4c3 __lseeki64_nolock 58 API calls 102358->102359 102362 460b2b CloseHandle 102359->102362 102360 460b49 102363 460b6b 102360->102363 102392 458b07 58 API calls 3 library calls 102360->102392 102364 460b16 102361->102364 102362->102355 102365 460b37 GetLastError 102362->102365 102363->102339 102367 45d4c3 __lseeki64_nolock 58 API calls 102364->102367 102365->102355 102367->102358 102368->102322 102369->102340 102370->102331 102371->102339 102372->102340 102373->102331 102374->102333 102375->102340 102376->102352 102377->102346 102379 45d4e3 102378->102379 102380 45d4ce 102378->102380 102382 458af4 __write_nolock 58 API calls 102379->102382 102384 45d508 102379->102384 102381 458af4 __write_nolock 58 API calls 102380->102381 102383 45d4d3 102381->102383 102385 45d512 102382->102385 102386 458b28 __output_l 58 API calls 102383->102386 102384->102357 102387 458b28 __output_l 58 API calls 102385->102387 102388 45d4db 102386->102388 102389 45d51a 102387->102389 102388->102357 102390 458db6 __output_l 9 API calls 102389->102390 102390->102388 102391->102360 102392->102363 102455 461940 102393->102455 102396 434799 102461 437d8c 102396->102461 102397 43477c 102399 437bcc 59 API calls 102397->102399 102400 434788 102399->102400 102457 437726 102400->102457 102403 450791 102404 461940 __write_nolock 102403->102404 102405 45079e GetLongPathNameW 102404->102405 102406 437bcc 59 API calls 102405->102406 102407 4372bd 102406->102407 102408 43700b 102407->102408 102409 437667 59 API calls 102408->102409 102410 43701d 102409->102410 102411 434750 60 API calls 102410->102411 102412 437028 102411->102412 102413 437033 102412->102413 102414 46e885 102412->102414 102415 433f74 59 API calls 102413->102415 102419 46e89f 102414->102419 102471 437908 61 API calls 102414->102471 102417 43703f 102415->102417 102465 4334c2 102417->102465 102420 437052 Mailbox 102420->101404 102422 434ddd 136 API calls 102421->102422 102423 43688f 102422->102423 102424 46e031 102423->102424 102426 434ddd 136 API calls 102423->102426 102425 49955b 122 API calls 102424->102425 102427 46e046 102425->102427 102428 4368a3 102426->102428 102429 46e067 102427->102429 102430 46e04a 102427->102430 102428->102424 102431 4368ab 102428->102431 102433 450db6 Mailbox 59 API calls 102429->102433 102432 434e4a 84 API calls 102430->102432 102434 46e052 102431->102434 102435 4368b7 102431->102435 102432->102434 102444 46e0ac Mailbox 102433->102444 102579 4942f8 90 API calls _wprintf 102434->102579 102472 436a8c 102435->102472 102439 46e060 102439->102429 102440 46e260 102441 452d55 _free 58 API calls 102440->102441 102442 46e268 102441->102442 102443 434e4a 84 API calls 102442->102443 102449 46e271 102443->102449 102444->102440 102444->102449 102452 437de1 59 API calls 102444->102452 102565 43750f 102444->102565 102573 43735d 102444->102573 102580 48f73d 59 API calls 2 library calls 102444->102580 102581 48f65e 61 API calls 2 library calls 102444->102581 102582 49737f 59 API calls Mailbox 102444->102582 102448 452d55 _free 58 API calls 102448->102449 102449->102448 102450 434e4a 84 API calls 102449->102450 102583 48f7a1 89 API calls 4 library calls 102449->102583 102450->102449 102452->102444 102456 43475d GetFullPathNameW 102455->102456 102456->102396 102456->102397 102458 437734 102457->102458 102459 437d2c 59 API calls 102458->102459 102460 434794 102459->102460 102460->102403 102462 437da6 102461->102462 102463 437d99 102461->102463 102464 450db6 Mailbox 59 API calls 102462->102464 102463->102400 102464->102463 102466 4334d4 102465->102466 102470 4334f3 _memmove 102465->102470 102469 450db6 Mailbox 59 API calls 102466->102469 102467 450db6 Mailbox 59 API calls 102468 43350a 102467->102468 102468->102420 102469->102470 102470->102467 102471->102414 102473 436ab5 102472->102473 102474 46e41e 102472->102474 102589 4357a6 60 API calls Mailbox 102473->102589 102656 48f7a1 89 API calls 4 library calls 102474->102656 102477 436ad7 102590 4357f6 67 API calls 102477->102590 102478 46e431 102657 48f7a1 89 API calls 4 library calls 102478->102657 102480 436aec 102480->102478 102481 436af4 102480->102481 102483 437667 59 API calls 102481->102483 102485 436b00 102483->102485 102484 46e44d 102486 436b61 102484->102486 102591 450957 60 API calls __write_nolock 102485->102591 102488 46e460 102486->102488 102489 436b6f 102486->102489 102491 435c6f CloseHandle 102488->102491 102492 437667 59 API calls 102489->102492 102490 436b0c 102493 437667 59 API calls 102490->102493 102494 46e46c 102491->102494 102495 436b78 102492->102495 102496 436b18 102493->102496 102497 434ddd 136 API calls 102494->102497 102498 437667 59 API calls 102495->102498 102499 434750 60 API calls 102496->102499 102501 46e488 102497->102501 102502 436b81 102498->102502 102500 436b26 102499->102500 102592 435850 ReadFile SetFilePointerEx 102500->102592 102504 46e4b1 102501->102504 102507 49955b 122 API calls 102501->102507 102594 43459b 102502->102594 102658 48f7a1 89 API calls 4 library calls 102504->102658 102506 436b52 102593 435aee SetFilePointerEx SetFilePointerEx 102506->102593 102511 46e4a4 102507->102511 102508 436b98 102512 437b2e 59 API calls 102508->102512 102514 46e4ac 102511->102514 102515 46e4cd 102511->102515 102516 436ba9 SetCurrentDirectoryW 102512->102516 102513 46e4c8 102543 436d0c Mailbox 102513->102543 102518 434e4a 84 API calls 102514->102518 102517 434e4a 84 API calls 102515->102517 102521 436bbc Mailbox 102516->102521 102519 46e4d2 102517->102519 102518->102504 102520 450db6 Mailbox 59 API calls 102519->102520 102527 46e506 102520->102527 102523 450db6 Mailbox 59 API calls 102521->102523 102525 436bcf 102523->102525 102524 433bbb 102524->101258 102524->101267 102526 43522e 59 API calls 102525->102526 102554 436bda Mailbox __NMSG_WRITE 102526->102554 102528 43750f 59 API calls 102527->102528 102562 46e54f Mailbox 102528->102562 102529 436ce7 102652 435c6f 102529->102652 102532 46e740 102663 4972df 59 API calls Mailbox 102532->102663 102533 436cf3 SetCurrentDirectoryW 102533->102543 102536 46e762 102664 4afbce 59 API calls 2 library calls 102536->102664 102539 46e76f 102540 452d55 _free 58 API calls 102539->102540 102540->102543 102541 46e7d9 102667 48f7a1 89 API calls 4 library calls 102541->102667 102584 4357d4 102543->102584 102545 43750f 59 API calls 102545->102562 102546 46e7f2 102546->102529 102548 46e7d1 102666 48f5f7 59 API calls 4 library calls 102548->102666 102551 437de1 59 API calls 102551->102554 102554->102529 102554->102541 102554->102548 102554->102551 102645 43586d 67 API calls _wcscpy 102554->102645 102646 436f5d GetStringTypeW 102554->102646 102647 436ecc 60 API calls __wcsnicmp 102554->102647 102648 436faa GetStringTypeW __NMSG_WRITE 102554->102648 102649 45363d GetStringTypeW _iswctype 102554->102649 102650 4368dc 165 API calls 3 library calls 102554->102650 102651 437213 59 API calls Mailbox 102554->102651 102555 437de1 59 API calls 102555->102562 102559 46e792 102665 48f7a1 89 API calls 4 library calls 102559->102665 102561 46e7ab 102563 452d55 _free 58 API calls 102561->102563 102562->102532 102562->102545 102562->102555 102562->102559 102659 48f73d 59 API calls 2 library calls 102562->102659 102660 48f65e 61 API calls 2 library calls 102562->102660 102661 49737f 59 API calls Mailbox 102562->102661 102662 437213 59 API calls Mailbox 102562->102662 102564 46e7be 102563->102564 102564->102543 102566 4375af 102565->102566 102570 437522 _memmove 102565->102570 102568 450db6 Mailbox 59 API calls 102566->102568 102567 450db6 Mailbox 59 API calls 102569 437529 102567->102569 102568->102570 102571 450db6 Mailbox 59 API calls 102569->102571 102572 437552 102569->102572 102570->102567 102571->102572 102572->102444 102574 43741e 102573->102574 102575 437370 102573->102575 102574->102444 102576 450db6 Mailbox 59 API calls 102575->102576 102578 4373a2 102575->102578 102576->102578 102577 450db6 59 API calls Mailbox 102577->102578 102578->102574 102578->102577 102579->102439 102580->102444 102581->102444 102582->102444 102583->102449 102585 435c6f CloseHandle 102584->102585 102586 4357dc Mailbox 102585->102586 102587 435c6f CloseHandle 102586->102587 102588 4357eb 102587->102588 102588->102524 102589->102477 102590->102480 102591->102490 102592->102506 102593->102486 102595 437667 59 API calls 102594->102595 102596 4345b1 102595->102596 102597 437667 59 API calls 102596->102597 102598 4345b9 102597->102598 102599 437667 59 API calls 102598->102599 102600 4345c1 102599->102600 102601 437667 59 API calls 102600->102601 102602 4345c9 102601->102602 102603 46d4d2 102602->102603 102604 4345fd 102602->102604 102605 438047 59 API calls 102603->102605 102606 43784b 59 API calls 102604->102606 102607 46d4db 102605->102607 102608 43460b 102606->102608 102609 437d8c 59 API calls 102607->102609 102610 437d2c 59 API calls 102608->102610 102612 434640 102609->102612 102611 434615 102610->102611 102611->102612 102613 43784b 59 API calls 102611->102613 102614 434680 102612->102614 102616 43465f 102612->102616 102627 46d4fb 102612->102627 102617 434636 102613->102617 102668 43784b 102614->102668 102621 4379f2 59 API calls 102616->102621 102620 437d2c 59 API calls 102617->102620 102618 434691 102623 4346a3 102618->102623 102625 438047 59 API calls 102618->102625 102619 46d5cb 102624 437bcc 59 API calls 102619->102624 102620->102612 102622 434669 102621->102622 102622->102614 102628 43784b 59 API calls 102622->102628 102626 4346b3 102623->102626 102629 438047 59 API calls 102623->102629 102640 46d588 102624->102640 102625->102623 102631 4346ba 102626->102631 102632 438047 59 API calls 102626->102632 102627->102619 102630 46d5b4 102627->102630 102639 46d532 102627->102639 102628->102614 102629->102626 102630->102619 102636 46d59f 102630->102636 102633 438047 59 API calls 102631->102633 102642 4346c1 Mailbox 102631->102642 102632->102631 102633->102642 102634 4379f2 59 API calls 102634->102640 102635 46d590 102637 437bcc 59 API calls 102635->102637 102638 437bcc 59 API calls 102636->102638 102637->102640 102638->102640 102639->102635 102643 46d57b 102639->102643 102640->102614 102640->102634 102681 437924 59 API calls 2 library calls 102640->102681 102642->102508 102644 437bcc 59 API calls 102643->102644 102644->102640 102645->102554 102646->102554 102647->102554 102648->102554 102649->102554 102650->102554 102651->102554 102653 435c79 102652->102653 102654 435c88 102652->102654 102653->102533 102654->102653 102655 435c8d CloseHandle 102654->102655 102655->102653 102656->102478 102657->102484 102658->102513 102659->102562 102660->102562 102661->102562 102662->102562 102663->102536 102664->102539 102665->102561 102666->102541 102667->102546 102669 4378b7 102668->102669 102670 43785a 102668->102670 102671 437d2c 59 API calls 102669->102671 102670->102669 102672 437865 102670->102672 102677 437888 _memmove 102671->102677 102673 437880 102672->102673 102674 46eb09 102672->102674 102682 437f27 59 API calls Mailbox 102673->102682 102676 438029 59 API calls 102674->102676 102678 46eb13 102676->102678 102677->102618 102679 450db6 Mailbox 59 API calls 102678->102679 102680 46eb33 102679->102680 102681->102640 102682->102677 102684 436d95 102683->102684 102689 436ea9 102683->102689 102685 450db6 Mailbox 59 API calls 102684->102685 102684->102689 102687 436dbc 102685->102687 102686 450db6 Mailbox 59 API calls 102693 436e31 102686->102693 102687->102686 102689->101410 102691 43735d 59 API calls 102691->102693 102692 43750f 59 API calls 102692->102693 102693->102689 102693->102691 102693->102692 102696 436240 102693->102696 102721 486553 59 API calls Mailbox 102693->102721 102694->101413 102695->101415 102697 437a16 59 API calls 102696->102697 102715 436265 102697->102715 102698 43646a 102699 43750f 59 API calls 102698->102699 102700 436484 Mailbox 102699->102700 102700->102693 102703 437d8c 59 API calls 102703->102715 102704 43750f 59 API calls 102704->102715 102705 46dff6 102726 48f8aa 91 API calls 4 library calls 102705->102726 102709 46e004 102710 43750f 59 API calls 102709->102710 102712 46e01a 102710->102712 102711 436799 _memmove 102727 48f8aa 91 API calls 4 library calls 102711->102727 102712->102700 102713 46df92 102714 438029 59 API calls 102713->102714 102717 46df9d 102714->102717 102715->102698 102715->102703 102715->102704 102715->102705 102715->102711 102715->102713 102718 437e4f 59 API calls 102715->102718 102722 435f6c 60 API calls 102715->102722 102723 435d41 59 API calls Mailbox 102715->102723 102724 435e72 60 API calls 102715->102724 102725 437924 59 API calls 2 library calls 102715->102725 102720 450db6 Mailbox 59 API calls 102717->102720 102719 43643b CharUpperBuffW 102718->102719 102719->102715 102720->102711 102721->102693 102722->102715 102723->102715 102724->102715 102725->102715 102726->102709 102727->102700 102728->101428 102729->101429 102731 43e6d5 102730->102731 102732 473aa9 102731->102732 102735 43e73f 102731->102735 102744 43e799 102731->102744 102899 439ea0 102732->102899 102738 437667 59 API calls 102735->102738 102735->102744 102736 437667 59 API calls 102736->102744 102740 473b04 102738->102740 102739 452d40 __cinit 67 API calls 102739->102744 102741 473b26 102741->101506 102743 4384c0 69 API calls 102746 43e970 Mailbox 102743->102746 102744->102736 102744->102739 102744->102741 102745 43e95a 102744->102745 102744->102746 102745->102746 102924 499e4a 89 API calls 4 library calls 102745->102924 102746->102743 102748 438d40 59 API calls 102746->102748 102749 439ea0 331 API calls 102746->102749 102751 499e4a 89 API calls 102746->102751 102755 437f77 59 API calls 102746->102755 102756 43f195 102746->102756 102760 43ea78 102746->102760 102925 486e8f 59 API calls 102746->102925 102926 4ac5c3 331 API calls 102746->102926 102927 4ab53c 331 API calls Mailbox 102746->102927 102929 439c90 59 API calls Mailbox 102746->102929 102930 4a93c6 331 API calls Mailbox 102746->102930 102748->102746 102749->102746 102751->102746 102755->102746 102760->101506 102762 43f650 102761->102762 102763 43f4ba 102761->102763 102766 437de1 59 API calls 102762->102766 102764 43f4c6 102763->102764 102765 47441e 102763->102765 103029 43f290 331 API calls 2 library calls 102764->103029 103031 4abc6b 331 API calls Mailbox 102765->103031 102773 43f58c Mailbox 102766->102773 102769 43f4fd 102770 47442c 102769->102770 102769->102773 102778 434e4a 84 API calls 102773->102778 102937 49cb7a 102773->102937 103017 4a445a 102773->103017 103026 493c37 102773->103026 103158 438180 102780->103158 102782 43fd3d 102784 47472d 102782->102784 102843 4406f6 102782->102843 103163 43f234 102782->103163 103180 499e4a 89 API calls 4 library calls 102784->103180 102860->101506 102861->101506 102862->101437 102864->101506 102865->101444 102866->101444 102867->101444 102868->101506 102869->101506 102870->101506 102872 439851 102871->102872 102881 43984b 102871->102881 102873 439857 __itow 102872->102873 102874 439899 102872->102874 102875 46f5d3 __i64tow 102872->102875 102879 46f4da 102872->102879 102877 450db6 Mailbox 59 API calls 102873->102877 103200 453698 83 API calls 3 library calls 102874->103200 102875->102875 102880 439871 102877->102880 102882 450db6 Mailbox 59 API calls 102879->102882 102887 46f552 Mailbox _wcscpy 102879->102887 102880->102881 102881->101506 102884 46f51f 102882->102884 103201 453698 83 API calls 3 library calls 102887->103201 102889->101506 102890->101506 102891->101506 102892->101493 102893->101493 102894->101493 102895->101493 102896->101493 102897->101493 102898->101493 102900 439ebf 102899->102900 102915 439eed Mailbox 102899->102915 102902 452d40 67 API calls __cinit 102902->102915 102903 43b475 102905 486e8f 59 API calls 102905->102915 102906 43b47a 102909 437667 59 API calls 102909->102915 102914 43a057 102915->102902 102915->102903 102915->102905 102915->102906 102915->102909 102915->102914 102918 438047 59 API calls 102915->102918 102920 4709d6 102915->102920 102922 43a55a 102915->102922 102918->102915 102924->102746 102925->102746 102926->102746 102927->102746 102929->102746 102930->102746 103029->102769 103031->102770 103159 43818f 103158->103159 103162 4381aa 103158->103162 103160 437e4f 59 API calls 103159->103160 103161 438197 CharUpperBuffW 103160->103161 103161->103162 103162->102782 103200->102873 103201->102875 103202 431066 103207 43f76f 103202->103207 103204 43106c 103205 452d40 __cinit 67 API calls 103204->103205 103206 431076 103205->103206 103208 43f790 103207->103208 103240 44ff03 103208->103240 103212 43f7d7 103213 437667 59 API calls 103212->103213 103214 43f7e1 103213->103214 103215 437667 59 API calls 103214->103215 103216 43f7eb 103215->103216 103217 437667 59 API calls 103216->103217 103218 43f7f5 103217->103218 103219 437667 59 API calls 103218->103219 103220 43f833 103219->103220 103221 437667 59 API calls 103220->103221 103222 43f8fe 103221->103222 103250 445f87 103222->103250 103226 43f930 103227 437667 59 API calls 103226->103227 103228 43f93a 103227->103228 103278 44fd9e 103228->103278 103230 43f981 103231 43f991 GetStdHandle 103230->103231 103232 4745ab 103231->103232 103233 43f9dd 103231->103233 103232->103233 103235 4745b4 103232->103235 103234 43f9e5 OleInitialize 103233->103234 103234->103204 103285 496b38 64 API calls Mailbox 103235->103285 103237 4745bb 103286 497207 CreateThread 103237->103286 103239 4745c7 CloseHandle 103239->103234 103287 44ffdc 103240->103287 103243 44ffdc 59 API calls 103244 44ff45 103243->103244 103245 437667 59 API calls 103244->103245 103246 44ff51 103245->103246 103247 437bcc 59 API calls 103246->103247 103248 43f796 103247->103248 103249 450162 6 API calls 103248->103249 103249->103212 103251 437667 59 API calls 103250->103251 103252 445f97 103251->103252 103253 437667 59 API calls 103252->103253 103254 445f9f 103253->103254 103294 445a9d 103254->103294 103257 445a9d 59 API calls 103258 445faf 103257->103258 103259 437667 59 API calls 103258->103259 103260 445fba 103259->103260 103261 450db6 Mailbox 59 API calls 103260->103261 103262 43f908 103261->103262 103263 4460f9 103262->103263 103264 446107 103263->103264 103265 437667 59 API calls 103264->103265 103266 446112 103265->103266 103267 437667 59 API calls 103266->103267 103268 44611d 103267->103268 103269 437667 59 API calls 103268->103269 103270 446128 103269->103270 103271 437667 59 API calls 103270->103271 103272 446133 103271->103272 103273 445a9d 59 API calls 103272->103273 103274 44613e 103273->103274 103275 450db6 Mailbox 59 API calls 103274->103275 103276 446145 RegisterWindowMessageW 103275->103276 103276->103226 103279 48576f 103278->103279 103280 44fdae 103278->103280 103297 499ae7 60 API calls 103279->103297 103282 450db6 Mailbox 59 API calls 103280->103282 103284 44fdb6 103282->103284 103283 48577a 103284->103230 103285->103237 103286->103239 103298 4971ed 65 API calls 103286->103298 103288 437667 59 API calls 103287->103288 103289 44ffe7 103288->103289 103290 437667 59 API calls 103289->103290 103291 44ffef 103290->103291 103292 437667 59 API calls 103291->103292 103293 44ff3b 103292->103293 103293->103243 103295 437667 59 API calls 103294->103295 103296 445aa5 103295->103296 103296->103257 103297->103283 103299 431016 103304 434974 103299->103304 103302 452d40 __cinit 67 API calls 103303 431025 103302->103303 103305 450db6 Mailbox 59 API calls 103304->103305 103306 43497c 103305->103306 103307 43101b 103306->103307 103311 434936 103306->103311 103307->103302 103312 434951 103311->103312 103313 43493f 103311->103313 103315 4349a0 103312->103315 103314 452d40 __cinit 67 API calls 103313->103314 103314->103312 103316 437667 59 API calls 103315->103316 103317 4349b8 GetVersionExW 103316->103317 103318 437bcc 59 API calls 103317->103318 103319 4349fb 103318->103319 103320 437d2c 59 API calls 103319->103320 103323 434a28 103319->103323 103321 434a1c 103320->103321 103322 437726 59 API calls 103321->103322 103322->103323 103324 46d864 103323->103324 103325 434a93 GetCurrentProcess IsWow64Process 103323->103325 103326 434aac 103325->103326 103327 434ac2 103326->103327 103328 434b2b GetSystemInfo 103326->103328 103339 434b37 103327->103339 103330 434af8 103328->103330 103330->103307 103332 434ad4 103334 434b37 2 API calls 103332->103334 103333 434b1f GetSystemInfo 103335 434ae9 103333->103335 103336 434adc GetNativeSystemInfo 103334->103336 103335->103330 103337 434aef FreeLibrary 103335->103337 103336->103335 103337->103330 103340 434ad0 103339->103340 103341 434b40 LoadLibraryA 103339->103341 103340->103332 103340->103333 103341->103340 103342 434b51 GetProcAddress 103341->103342 103342->103340 103343 431055 103348 432649 103343->103348 103346 452d40 __cinit 67 API calls 103347 431064 103346->103347 103349 437667 59 API calls 103348->103349 103350 4326b7 103349->103350 103355 433582 103350->103355 103353 432754 103354 43105a 103353->103354 103358 433416 59 API calls 2 library calls 103353->103358 103354->103346 103359 4335b0 103355->103359 103358->103353 103360 4335bd 103359->103360 103362 4335a1 103359->103362 103361 4335c4 RegOpenKeyExW 103360->103361 103360->103362 103361->103362 103363 4335de RegQueryValueExW 103361->103363 103362->103353 103364 433614 RegCloseKey 103363->103364 103365 4335ff 103363->103365 103364->103362 103365->103364 103366 eebfd8 103380 ee9bf8 103366->103380 103368 eec0c7 103383 eebec8 103368->103383 103386 eed108 GetPEB 103380->103386 103382 eea283 103382->103368 103384 eebed1 Sleep 103383->103384 103385 eebedf 103384->103385 103387 eed132 103386->103387 103387->103382 103388 47416f 103392 485fe6 103388->103392 103390 47417a 103391 485fe6 85 API calls 103390->103391 103391->103390 103393 485ff3 103392->103393 103402 486020 103392->103402 103394 486022 103393->103394 103396 486027 103393->103396 103400 48601a 103393->103400 103393->103402 103404 439328 84 API calls Mailbox 103394->103404 103397 439837 84 API calls 103396->103397 103398 48602e 103397->103398 103399 437b2e 59 API calls 103398->103399 103399->103402 103403 4395a0 59 API calls _wcsstr 103400->103403 103402->103390 103403->103402 103404->103396 103405 46fdfc 103408 43ab30 Mailbox _memmove 103405->103408 103410 43b525 103408->103410 103419 43a057 103408->103419 103430 437de1 59 API calls 103408->103430 103434 439f37 Mailbox 103408->103434 103438 43b2b6 103408->103438 103440 439ea0 331 API calls 103408->103440 103441 47086a 103408->103441 103443 470878 103408->103443 103445 47085c 103408->103445 103446 43b21c 103408->103446 103448 450db6 59 API calls Mailbox 103408->103448 103451 486e8f 59 API calls 103408->103451 103452 4a445a 331 API calls 103408->103452 103456 4adf23 103408->103456 103459 4adf37 103408->103459 103462 4b2141 103408->103462 103502 439c90 59 API calls Mailbox 103408->103502 103506 4ac193 85 API calls 2 library calls 103408->103506 103507 4ac2e0 96 API calls Mailbox 103408->103507 103508 497956 59 API calls Mailbox 103408->103508 103509 4abc6b 331 API calls Mailbox 103408->103509 103510 48617e 59 API calls Mailbox 103408->103510 103512 499e4a 89 API calls 4 library calls 103410->103512 103413 4709e5 103518 499e4a 89 API calls 4 library calls 103413->103518 103414 470055 103511 499e4a 89 API calls 4 library calls 103414->103511 103417 43b475 103425 438047 59 API calls 103417->103425 103420 43b47a 103420->103413 103420->103414 103421 470064 103422 450db6 59 API calls Mailbox 103422->103434 103425->103419 103427 438047 59 API calls 103427->103434 103428 437667 59 API calls 103428->103434 103429 452d40 67 API calls __cinit 103429->103434 103430->103408 103431 486e8f 59 API calls 103431->103434 103432 4709d6 103517 499e4a 89 API calls 4 library calls 103432->103517 103434->103414 103434->103417 103434->103419 103434->103420 103434->103422 103434->103427 103434->103428 103434->103429 103434->103431 103434->103432 103436 43a55a 103434->103436 103500 43c8c0 331 API calls 2 library calls 103434->103500 103501 43b900 60 API calls Mailbox 103434->103501 103516 499e4a 89 API calls 4 library calls 103436->103516 103505 43f6a3 331 API calls 103438->103505 103440->103408 103514 439c90 59 API calls Mailbox 103441->103514 103515 499e4a 89 API calls 4 library calls 103443->103515 103445->103419 103513 48617e 59 API calls Mailbox 103445->103513 103503 439d3c 60 API calls Mailbox 103446->103503 103448->103408 103449 43b22d 103504 439d3c 60 API calls Mailbox 103449->103504 103451->103408 103452->103408 103519 4acadd 103456->103519 103458 4adf33 103458->103408 103460 4acadd 130 API calls 103459->103460 103461 4adf47 103460->103461 103461->103408 103463 437667 59 API calls 103462->103463 103464 4b2158 103463->103464 103465 439837 84 API calls 103464->103465 103466 4b2167 103465->103466 103467 437a16 59 API calls 103466->103467 103468 4b217a 103467->103468 103469 439837 84 API calls 103468->103469 103470 4b2187 103469->103470 103471 4b21a1 103470->103471 103472 4b2215 103470->103472 103628 439b3c 59 API calls 103471->103628 103474 439837 84 API calls 103472->103474 103476 4b221a 103474->103476 103475 4b21a6 103477 4b2204 103475->103477 103480 4b21bd 103475->103480 103478 4b2228 103476->103478 103479 4b2246 103476->103479 103629 439a98 59 API calls Mailbox 103477->103629 103630 439a98 59 API calls Mailbox 103478->103630 103482 4b225b 103479->103482 103631 439b3c 59 API calls 103479->103631 103484 43784b 59 API calls 103480->103484 103486 4b2270 103482->103486 103632 439b3c 59 API calls 103482->103632 103488 4b21ca 103484->103488 103487 437f77 59 API calls 103486->103487 103490 4b228a 103487->103490 103491 437b2e 59 API calls 103488->103491 103609 48f401 103490->103609 103493 4b21d8 103491->103493 103495 43784b 59 API calls 103493->103495 103494 4b2211 Mailbox 103494->103408 103496 4b21f1 103495->103496 103498 437b2e 59 API calls 103496->103498 103497 4b21ff 103633 439a3c 59 API calls Mailbox 103497->103633 103498->103497 103500->103434 103501->103434 103502->103408 103503->103449 103504->103438 103505->103410 103506->103408 103507->103408 103508->103408 103509->103408 103510->103408 103511->103421 103512->103445 103513->103419 103514->103445 103515->103445 103516->103419 103517->103413 103518->103419 103520 439837 84 API calls 103519->103520 103521 4acb1a 103520->103521 103541 4acb61 Mailbox 103521->103541 103557 4ad7a5 103521->103557 103523 4acdb9 103524 4acf2e 103523->103524 103528 4acdc7 103523->103528 103596 4ad8c8 92 API calls Mailbox 103524->103596 103527 4acf3d 103527->103528 103530 4acf49 103527->103530 103570 4ac96e 103528->103570 103529 439837 84 API calls 103536 4acbb2 Mailbox 103529->103536 103530->103541 103535 4ace00 103585 450c08 103535->103585 103536->103523 103536->103529 103536->103541 103589 4afbce 59 API calls 2 library calls 103536->103589 103590 4acfdf 61 API calls 2 library calls 103536->103590 103539 4ace1a 103591 499e4a 89 API calls 4 library calls 103539->103591 103540 4ace33 103543 4392ce 59 API calls 103540->103543 103541->103458 103545 4ace3f 103543->103545 103544 4ace25 GetCurrentProcess TerminateProcess 103544->103540 103546 439050 59 API calls 103545->103546 103547 4ace55 103546->103547 103556 4ace7c 103547->103556 103592 438d40 59 API calls Mailbox 103547->103592 103549 4acfa4 103549->103541 103553 4acfb8 FreeLibrary 103549->103553 103550 4ace6b 103593 4ad649 107 API calls _free 103550->103593 103553->103541 103556->103549 103594 438d40 59 API calls Mailbox 103556->103594 103595 439d3c 60 API calls Mailbox 103556->103595 103597 4ad649 107 API calls _free 103556->103597 103558 437e4f 59 API calls 103557->103558 103559 4ad7c0 CharLowerBuffW 103558->103559 103598 48f167 103559->103598 103563 437667 59 API calls 103564 4ad7f9 103563->103564 103565 43784b 59 API calls 103564->103565 103566 4ad810 103565->103566 103567 437d2c 59 API calls 103566->103567 103569 4ad81c Mailbox 103567->103569 103568 4ad858 Mailbox 103568->103536 103569->103568 103605 4acfdf 61 API calls 2 library calls 103569->103605 103571 4ac989 103570->103571 103575 4ac9de 103570->103575 103572 450db6 Mailbox 59 API calls 103571->103572 103574 4ac9ab 103572->103574 103573 450db6 Mailbox 59 API calls 103573->103574 103574->103573 103574->103575 103576 4ada50 103575->103576 103577 4adc79 Mailbox 103576->103577 103578 4ada73 _strcat _wcscpy __NMSG_WRITE 103576->103578 103577->103535 103578->103577 103579 439b3c 59 API calls 103578->103579 103580 439b98 59 API calls 103578->103580 103581 439be6 59 API calls 103578->103581 103582 45571c 58 API calls __malloc_crt 103578->103582 103583 439837 84 API calls 103578->103583 103608 495887 61 API calls 2 library calls 103578->103608 103579->103578 103580->103578 103581->103578 103582->103578 103583->103578 103586 450c1d 103585->103586 103587 450cb5 VirtualProtect 103586->103587 103588 450c83 103586->103588 103587->103588 103588->103539 103588->103540 103589->103536 103590->103536 103591->103544 103592->103550 103593->103556 103594->103556 103595->103556 103596->103527 103597->103556 103599 48f192 __NMSG_WRITE 103598->103599 103600 48f1d1 103599->103600 103602 48f1c7 103599->103602 103604 48f278 103599->103604 103600->103563 103600->103569 103602->103600 103606 4378c4 61 API calls 103602->103606 103604->103600 103607 4378c4 61 API calls 103604->103607 103605->103568 103606->103602 103607->103604 103608->103578 103610 437667 59 API calls 103609->103610 103611 48f414 103610->103611 103612 437a16 59 API calls 103611->103612 103613 48f428 103612->103613 103614 48f167 61 API calls 103613->103614 103620 48f44a 103613->103620 103616 48f444 103614->103616 103615 48f167 61 API calls 103615->103620 103618 43784b 59 API calls 103616->103618 103616->103620 103617 48f4c4 103621 43784b 59 API calls 103617->103621 103618->103620 103619 43784b 59 API calls 103619->103620 103620->103615 103620->103617 103620->103619 103625 437b2e 59 API calls 103620->103625 103622 48f4dd 103621->103622 103623 437b2e 59 API calls 103622->103623 103624 48f4e9 103623->103624 103626 437f77 59 API calls 103624->103626 103627 48f4f8 Mailbox 103624->103627 103625->103620 103626->103627 103627->103497 103628->103475 103629->103494 103630->103494 103631->103482 103632->103486 103633->103494 103634 43107d 103639 43708b 103634->103639 103636 43108c 103637 452d40 __cinit 67 API calls 103636->103637 103638 431096 103637->103638 103640 43709b __write_nolock 103639->103640 103641 437667 59 API calls 103640->103641 103642 437151 103641->103642 103643 434706 61 API calls 103642->103643 103644 43715a 103643->103644 103670 45050b 103644->103670 103647 437cab 59 API calls 103648 437173 103647->103648 103649 433f74 59 API calls 103648->103649 103650 437182 103649->103650 103651 437667 59 API calls 103650->103651 103652 43718b 103651->103652 103653 437d8c 59 API calls 103652->103653 103654 437194 RegOpenKeyExW 103653->103654 103655 46e8b1 RegQueryValueExW 103654->103655 103660 4371b6 Mailbox 103654->103660 103656 46e943 RegCloseKey 103655->103656 103657 46e8ce 103655->103657 103656->103660 103668 46e955 _wcscat Mailbox __NMSG_WRITE 103656->103668 103658 450db6 Mailbox 59 API calls 103657->103658 103659 46e8e7 103658->103659 103661 43522e 59 API calls 103659->103661 103660->103636 103662 46e8f2 RegQueryValueExW 103661->103662 103663 46e90f 103662->103663 103665 46e929 103662->103665 103664 437bcc 59 API calls 103663->103664 103664->103665 103665->103656 103666 437de1 59 API calls 103666->103668 103667 433f74 59 API calls 103667->103668 103668->103660 103668->103666 103668->103667 103669 4379f2 59 API calls 103668->103669 103669->103668 103671 461940 __write_nolock 103670->103671 103672 450518 GetFullPathNameW 103671->103672 103673 45053a 103672->103673 103674 437bcc 59 API calls 103673->103674 103675 437165 103674->103675 103675->103647

                          Control-flow Graph

                          APIs
                          • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00433B68
                          • IsDebuggerPresent.KERNEL32 ref: 00433B7A
                          • GetFullPathNameW.KERNEL32(00007FFF,?,?,P@,004F52E0,?,?), ref: 00433BEB
                            • Part of subcall function 00437BCC: _memmove.LIBCMT ref: 00437C06
                            • Part of subcall function 0044092D: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,00433C14,P@,?,?,?), ref: 0044096E
                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00433C6F
                          • MessageBoxA.USER32(00000000,This is a third-party compiled AutoIt script.,004E7770,00000010), ref: 0046D281
                          • SetCurrentDirectoryW.KERNEL32(?,P@,?,?,?), ref: 0046D2B9
                          • GetForegroundWindow.USER32(runas,?,?,?,00000001,?,004E4260,P@,?,?,?), ref: 0046D33F
                          • ShellExecuteW.SHELL32(00000000,?,?), ref: 0046D346
                            • Part of subcall function 00433A46: GetSysColorBrush.USER32(0000000F), ref: 00433A50
                            • Part of subcall function 00433A46: LoadCursorW.USER32(00000000,00007F00), ref: 00433A5F
                            • Part of subcall function 00433A46: LoadIconW.USER32(00000063), ref: 00433A76
                            • Part of subcall function 00433A46: LoadIconW.USER32(000000A4), ref: 00433A88
                            • Part of subcall function 00433A46: LoadIconW.USER32(000000A2), ref: 00433A9A
                            • Part of subcall function 00433A46: LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00433AC0
                            • Part of subcall function 00433A46: RegisterClassExW.USER32(?), ref: 00433B16
                            • Part of subcall function 004339D5: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00433A03
                            • Part of subcall function 004339D5: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00433A24
                            • Part of subcall function 004339D5: ShowWindow.USER32(00000000,?,?), ref: 00433A38
                            • Part of subcall function 004339D5: ShowWindow.USER32(00000000,?,?), ref: 00433A41
                            • Part of subcall function 0043434A: _memset.LIBCMT ref: 00434370
                            • Part of subcall function 0043434A: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00434415
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: LoadWindow$Icon$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__memmove_memset
                          • String ID: P@$This is a third-party compiled AutoIt script.$runas$%L
                          • API String ID: 529118366-2090550214
                          • Opcode ID: dccdfbc5d9e5e567a615d2ec14087e3ec0ffbc0bd5dca889c181f58e0542cdce
                          • Instruction ID: 5d57f81c1e0482f716e4892394bc2ceac60426254a4214a4856b9edb30477701
                          • Opcode Fuzzy Hash: dccdfbc5d9e5e567a615d2ec14087e3ec0ffbc0bd5dca889c181f58e0542cdce
                          • Instruction Fuzzy Hash: 88511671E04108AADB10EFB5DC05AFE7B74AF08715F0061BBF651A22A1DA785605CB2D

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 983 4349a0-434a00 call 437667 GetVersionExW call 437bcc 988 434a06 983->988 989 434b0b-434b0d 983->989 990 434a09-434a0e 988->990 991 46d767-46d773 989->991 993 434b12-434b13 990->993 994 434a14 990->994 992 46d774-46d778 991->992 995 46d77a 992->995 996 46d77b-46d787 992->996 997 434a15-434a4c call 437d2c call 437726 993->997 994->997 995->996 996->992 998 46d789-46d78e 996->998 1006 434a52-434a53 997->1006 1007 46d864-46d867 997->1007 998->990 1000 46d794-46d79b 998->1000 1000->991 1002 46d79d 1000->1002 1005 46d7a2-46d7a5 1002->1005 1008 434a93-434aaa GetCurrentProcess IsWow64Process 1005->1008 1009 46d7ab-46d7c9 1005->1009 1006->1005 1010 434a59-434a64 1006->1010 1011 46d880-46d884 1007->1011 1012 46d869 1007->1012 1019 434aaf-434ac0 1008->1019 1020 434aac 1008->1020 1009->1008 1013 46d7cf-46d7d5 1009->1013 1014 434a6a-434a6c 1010->1014 1015 46d7ea-46d7f0 1010->1015 1017 46d886-46d88f 1011->1017 1018 46d86f-46d878 1011->1018 1016 46d86c 1012->1016 1023 46d7d7-46d7da 1013->1023 1024 46d7df-46d7e5 1013->1024 1025 434a72-434a75 1014->1025 1026 46d805-46d811 1014->1026 1027 46d7f2-46d7f5 1015->1027 1028 46d7fa-46d800 1015->1028 1016->1018 1017->1016 1029 46d891-46d894 1017->1029 1018->1011 1021 434ac2-434ad2 call 434b37 1019->1021 1022 434b2b-434b35 GetSystemInfo 1019->1022 1020->1019 1040 434ad4-434ae1 call 434b37 1021->1040 1041 434b1f-434b29 GetSystemInfo 1021->1041 1035 434af8-434b08 1022->1035 1023->1008 1024->1008 1033 46d831-46d834 1025->1033 1034 434a7b-434a8a 1025->1034 1030 46d813-46d816 1026->1030 1031 46d81b-46d821 1026->1031 1027->1008 1028->1008 1029->1018 1030->1008 1031->1008 1033->1008 1037 46d83a-46d84f 1033->1037 1038 46d826-46d82c 1034->1038 1039 434a90 1034->1039 1042 46d851-46d854 1037->1042 1043 46d859-46d85f 1037->1043 1038->1008 1039->1008 1048 434ae3-434ae7 GetNativeSystemInfo 1040->1048 1049 434b18-434b1d 1040->1049 1045 434ae9-434aed 1041->1045 1042->1008 1043->1008 1045->1035 1047 434aef-434af2 FreeLibrary 1045->1047 1047->1035 1048->1045 1049->1048
                          APIs
                          • GetVersionExW.KERNEL32(?), ref: 004349CD
                            • Part of subcall function 00437BCC: _memmove.LIBCMT ref: 00437C06
                          • GetCurrentProcess.KERNEL32(?,004BFAEC,00000000,00000000,?), ref: 00434A9A
                          • IsWow64Process.KERNEL32(00000000), ref: 00434AA1
                          • GetNativeSystemInfo.KERNELBASE(00000000), ref: 00434AE7
                          • FreeLibrary.KERNEL32(00000000), ref: 00434AF2
                          • GetSystemInfo.KERNEL32(00000000), ref: 00434B23
                          • GetSystemInfo.KERNEL32(00000000), ref: 00434B2F
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: InfoSystem$Process$CurrentFreeLibraryNativeVersionWow64_memmove
                          • String ID:
                          • API String ID: 1986165174-0
                          • Opcode ID: 5c9a4357339921b4f17e902603f7ccf7e627c574920bb4151bd5ef683f0001e2
                          • Instruction ID: 44c7c845859ebce400d2f4e4cdedf7bd5d9c1ab85570b55a0a8f6daf16cab874
                          • Opcode Fuzzy Hash: 5c9a4357339921b4f17e902603f7ccf7e627c574920bb4151bd5ef683f0001e2
                          • Instruction Fuzzy Hash: 8B91A2319897C4DAC731DBA884501ABFFE5AF6D300F44596FD0CA93B41D228B948C76E

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1080 434e89-434ea1 CreateStreamOnHGlobal 1081 434ea3-434eba FindResourceExW 1080->1081 1082 434ec1-434ec6 1080->1082 1083 434ec0 1081->1083 1084 46d933-46d942 LoadResource 1081->1084 1083->1082 1084->1083 1085 46d948-46d956 SizeofResource 1084->1085 1085->1083 1086 46d95c-46d967 LockResource 1085->1086 1086->1083 1087 46d96d-46d98b 1086->1087 1087->1083
                          APIs
                          • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?,?,?,?,?,00434D8E,?,?,00000000,00000000), ref: 00434E99
                          • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,00434D8E,?,?,00000000,00000000), ref: 00434EB0
                          • LoadResource.KERNEL32(?,00000000,?,?,00434D8E,?,?,00000000,00000000,?,?,?,?,?,?,00434E2F), ref: 0046D937
                          • SizeofResource.KERNEL32(?,00000000,?,?,00434D8E,?,?,00000000,00000000,?,?,?,?,?,?,00434E2F), ref: 0046D94C
                          • LockResource.KERNEL32(00434D8E,?,?,00434D8E,?,?,00000000,00000000,?,?,?,?,?,?,00434E2F,00000000), ref: 0046D95F
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                          • String ID: SCRIPT
                          • API String ID: 3051347437-3967369404
                          • Opcode ID: 595d754d8783406d79fdcf7a50e3cf413845b8c6b575e8937f3d0be937ecb9b9
                          • Instruction ID: e5beebecaab1b45ec31f6b02a7f61cdfdc66dedf0f784a1ec72759cb478a5677
                          • Opcode Fuzzy Hash: 595d754d8783406d79fdcf7a50e3cf413845b8c6b575e8937f3d0be937ecb9b9
                          • Instruction Fuzzy Hash: 7C115E75240700BFD7258B65EC49F677BBAFBC9B12F204279F409D6250DB61EC048665
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: BuffCharUpper
                          • String ID: pbO$%L
                          • API String ID: 3964851224-529566928
                          • Opcode ID: 972f198a3cbabd4edcb83ca59df65d29d34c62518878e477accfe6ed9fc4df4d
                          • Instruction ID: eddd68665aca6b03fe9dc150d960ae3151f5c9fa24aca202cec267b285923c74
                          • Opcode Fuzzy Hash: 972f198a3cbabd4edcb83ca59df65d29d34c62518878e477accfe6ed9fc4df4d
                          • Instruction Fuzzy Hash: 00929D746083418FD720DF24C480B6BB7E1BF89304F15896EE98A8B352D779EC55CB9A
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID:
                          • String ID: (!$DdO$DdO$Variable must be of type 'Object'.
                          • API String ID: 0-1082842394
                          • Opcode ID: 25f30395301c233a9084d8d3e8b9a0416f87ce6ceadbd601eac37848eb945549
                          • Instruction ID: ecd94180f3dd0fa48069be316de8db93c9861611fc32c459ec4af120ce1e95e6
                          • Opcode Fuzzy Hash: 25f30395301c233a9084d8d3e8b9a0416f87ce6ceadbd601eac37848eb945549
                          • Instruction Fuzzy Hash: 21A2AF74A01205CFCB24DF5AC480AAEB7B1FF58314F25906BE905AB391D739ED42CB99
                          APIs
                          • IsThemeActive.UXTHEME ref: 00434834
                            • Part of subcall function 0045336C: __lock.LIBCMT ref: 00453372
                            • Part of subcall function 0045336C: DecodePointer.KERNEL32(00000001,?,00434849,00487C74), ref: 0045337E
                            • Part of subcall function 0045336C: EncodePointer.KERNEL32(?,?,00434849,00487C74), ref: 00453389
                            • Part of subcall function 004348FD: SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 00434915
                            • Part of subcall function 004348FD: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 0043492A
                            • Part of subcall function 00433B3A: GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00433B68
                            • Part of subcall function 00433B3A: IsDebuggerPresent.KERNEL32 ref: 00433B7A
                            • Part of subcall function 00433B3A: GetFullPathNameW.KERNEL32(00007FFF,?,?,P@,004F52E0,?,?), ref: 00433BEB
                            • Part of subcall function 00433B3A: SetCurrentDirectoryW.KERNEL32(?), ref: 00433C6F
                          • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00434874
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: InfoParametersSystem$CurrentDirectoryPointer$ActiveDebuggerDecodeEncodeFullNamePathPresentTheme__lock
                          • String ID:
                          • API String ID: 1438897964-2740779761
                          • Opcode ID: 605ccfdec59096966fe8a744696a4b7ae21dacb6b9aa299429c5335e923184e5
                          • Instruction ID: d60b2d46e873bca2ef5a40cc3c69db13869557659332541a4e7907aed551f901
                          • Opcode Fuzzy Hash: 605ccfdec59096966fe8a744696a4b7ae21dacb6b9aa299429c5335e923184e5
                          • Instruction Fuzzy Hash: 8B11AC718083019BC700EF69EC0591AFFE8EB89754F114A2FF444832B1DBB49918CF9A
                          APIs
                          • GetFileAttributesW.KERNELBASE(?,0046E398), ref: 0049446A
                          • FindFirstFileW.KERNELBASE(?,?), ref: 0049447B
                          • FindClose.KERNEL32(00000000), ref: 0049448B
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: FileFind$AttributesCloseFirst
                          • String ID:
                          • API String ID: 48322524-0
                          • Opcode ID: 6191dbfa0692489dc8655b93bac99d5aa7e6cb6b4eb00174c0bf0de80a71e23e
                          • Instruction ID: 4495b08c62dc998e64bab6951bd6f27a4c62454f7ff470b5dbf300275a26c849
                          • Opcode Fuzzy Hash: 6191dbfa0692489dc8655b93bac99d5aa7e6cb6b4eb00174c0bf0de80a71e23e
                          • Instruction Fuzzy Hash: 4AE0D832410500674614AB78EC0D8EA7B9C9E45335F100776FC39C11D0E7785905959E
                          APIs
                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00440A5B
                          • timeGetTime.WINMM ref: 00440D16
                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00440E53
                          • Sleep.KERNEL32(0000000A), ref: 00440E61
                          • LockWindowUpdate.USER32(00000000,?,?), ref: 00440EFA
                          • DestroyWindow.USER32 ref: 00440F06
                          • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00440F20
                          • Sleep.KERNEL32(0000000A,?,?), ref: 00474E83
                          • TranslateMessage.USER32(?), ref: 00475C60
                          • DispatchMessageW.USER32(?), ref: 00475C6E
                          • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00475C82
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: Message$PeekSleepWindow$DestroyDispatchLockTimeTranslateUpdatetime
                          • String ID: @COM_EVENTOBJ$@GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE$@TRAY_ID$pbO$pbO$pbO$pbO
                          • API String ID: 4212290369-442891389
                          • Opcode ID: 0ec0d6f2a0bfe7b1055ca361cc30de8ee6f821d45c5f04245d5cac84c3a41730
                          • Instruction ID: b46cb7ef234b6ad573a81df93f563271d8dbb332f0387a95d7ad7de89852f9ed
                          • Opcode Fuzzy Hash: 0ec0d6f2a0bfe7b1055ca361cc30de8ee6f821d45c5f04245d5cac84c3a41730
                          • Instruction Fuzzy Hash: E2B2A370608741DFD724DF24C885BAAB7E4BF84304F14892FE54D9B2A1C7B9E855CB8A

                          Control-flow Graph

                          APIs
                            • Part of subcall function 00498F5F: __time64.LIBCMT ref: 00498F69
                            • Part of subcall function 00434EE5: _fseek.LIBCMT ref: 00434EFD
                          • __wsplitpath.LIBCMT ref: 00499234
                            • Part of subcall function 004540FB: __wsplitpath_helper.LIBCMT ref: 0045413B
                          • _wcscpy.LIBCMT ref: 00499247
                          • _wcscat.LIBCMT ref: 0049925A
                          • __wsplitpath.LIBCMT ref: 0049927F
                          • _wcscat.LIBCMT ref: 00499295
                          • _wcscat.LIBCMT ref: 004992A8
                            • Part of subcall function 00498FA5: _memmove.LIBCMT ref: 00498FDE
                            • Part of subcall function 00498FA5: _memmove.LIBCMT ref: 00498FED
                          • _wcscmp.LIBCMT ref: 004991EF
                            • Part of subcall function 00499734: _wcscmp.LIBCMT ref: 00499824
                            • Part of subcall function 00499734: _wcscmp.LIBCMT ref: 00499837
                          • DeleteFileW.KERNEL32(?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 00499452
                          • _wcsncpy.LIBCMT ref: 004994C5
                          • DeleteFileW.KERNEL32(?,?), ref: 004994FB
                          • CopyFileW.KERNEL32(?,?,00000000,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00499511
                          • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00499522
                          • DeleteFileW.KERNELBASE(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00499534
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: File$Delete$_wcscat_wcscmp$__wsplitpath_memmove$Copy__time64__wsplitpath_helper_fseek_wcscpy_wcsncpy
                          • String ID:
                          • API String ID: 1500180987-0
                          • Opcode ID: 0cae97fe31b6b839396d8498f11c46e5d892fb0ddb46f5c89bba4e25b8bf2d43
                          • Instruction ID: 5b1ad0255ef311961927bb43edc1ac0126f407b63f101533955e2eb12c04584a
                          • Opcode Fuzzy Hash: 0cae97fe31b6b839396d8498f11c46e5d892fb0ddb46f5c89bba4e25b8bf2d43
                          • Instruction Fuzzy Hash: 5EC14FB1D00219ABDF11DF95CC85ADEBBB8EF49314F0040ABF609E6141DB349E448F69

                          Control-flow Graph

                          APIs
                          • GetSysColorBrush.USER32(0000000F), ref: 00433074
                          • RegisterClassExW.USER32(00000030), ref: 0043309E
                          • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 004330AF
                          • InitCommonControlsEx.COMCTL32(?), ref: 004330CC
                          • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 004330DC
                          • LoadIconW.USER32(000000A9), ref: 004330F2
                          • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00433101
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                          • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                          • API String ID: 2914291525-1005189915
                          • Opcode ID: 807c4d888c9f6e1e84f07b5e0a7873e895a4a998b382bbf671b8326816f60460
                          • Instruction ID: 0d33cec71e7d395dc7959dbbce282e4fe3d693ab43bf20869e17996868c8262a
                          • Opcode Fuzzy Hash: 807c4d888c9f6e1e84f07b5e0a7873e895a4a998b382bbf671b8326816f60460
                          • Instruction Fuzzy Hash: F0315871805348AFDB10DFA4EC84AEABFF4FB09310F1442AEE584E62A1D7B50565CF99

                          Control-flow Graph

                          APIs
                          • GetSysColorBrush.USER32(0000000F), ref: 00433074
                          • RegisterClassExW.USER32(00000030), ref: 0043309E
                          • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 004330AF
                          • InitCommonControlsEx.COMCTL32(?), ref: 004330CC
                          • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 004330DC
                          • LoadIconW.USER32(000000A9), ref: 004330F2
                          • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00433101
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                          • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                          • API String ID: 2914291525-1005189915
                          • Opcode ID: 86b9bc8b144f8a9b3923a93e29c2db4410a18c2b66e17fa730d282c3f823bd9b
                          • Instruction ID: 1732837aa14026671a25cf4894b9707b70cc6691c6fc46b2a0aac02e6b762c7a
                          • Opcode Fuzzy Hash: 86b9bc8b144f8a9b3923a93e29c2db4410a18c2b66e17fa730d282c3f823bd9b
                          • Instruction Fuzzy Hash: 5821F9B1910618AFDB00EF94EC48BDDBBF4FB08710F10427AF614A62A0D7B54564CFA9

                          Control-flow Graph

                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: FileLibraryLoadModuleName__wcsicmp_l_memmove
                          • String ID: /AutoIt3ExecuteLine$/AutoIt3ExecuteScript$/AutoIt3OutputDebug$/ErrorStdOut$>>>AUTOIT NO CMDEXECUTE<<<$CMDLINE$CMDLINERAW$P@$RO
                          • API String ID: 1825951767-2495368042
                          • Opcode ID: 599479a33ca9c903d392e4c732ca86db5d5b12831ff7dce3494ce5467e094e3a
                          • Instruction ID: 7dd5fe227b8beb4ee2597658067fcee7e5ed6e6896fa75398501987325c71428
                          • Opcode Fuzzy Hash: 599479a33ca9c903d392e4c732ca86db5d5b12831ff7dce3494ce5467e094e3a
                          • Instruction Fuzzy Hash: F5A16B71D0021DAACB04EFA5DC92AEEB778BF19305F00152FF415A7191EF786A08CB69

                          Control-flow Graph

                          APIs
                            • Part of subcall function 00434706: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,P@,?,004337AE,?), ref: 00434724
                            • Part of subcall function 0045050B: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,00437165), ref: 0045052D
                          • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 004371A8
                          • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 0046E8C8
                          • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 0046E909
                          • RegCloseKey.ADVAPI32(?), ref: 0046E947
                          • _wcscat.LIBCMT ref: 0046E9A0
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: NameQueryValue$CloseFileFullModuleOpenPath_wcscat
                          • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                          • API String ID: 2673923337-2727554177
                          • Opcode ID: e589d8ca21422a09ab27b10ad913cbf7f8aee66c5a29f6727e057bd56d2d7a57
                          • Instruction ID: 9d61f5cc8490c0f0252218b90ece18ce06f629e4d2c2607ba00ce7deb0856a77
                          • Opcode Fuzzy Hash: e589d8ca21422a09ab27b10ad913cbf7f8aee66c5a29f6727e057bd56d2d7a57
                          • Instruction Fuzzy Hash: AC716EB15083019EC310EF2AEC419ABBBE8FF58314F42453FF485872A1EB759948CB5A

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 878 433633-433681 880 433683-433686 878->880 881 4336e1-4336e3 878->881 883 4336e7 880->883 884 433688-43368f 880->884 881->880 882 4336e5 881->882 885 4336ca-4336d2 DefWindowProcW 882->885 886 46d0cc-46d0fa call 441070 call 441093 883->886 887 4336ed-4336f0 883->887 888 433695-43369a 884->888 889 43374b-433753 PostQuitMessage 884->889 890 4336d8-4336de 885->890 921 46d0ff-46d106 886->921 891 4336f2-4336f3 887->891 892 433715-43373c SetTimer RegisterWindowMessageW 887->892 894 46d154-46d168 call 492527 888->894 895 4336a0-4336a2 888->895 896 433711-433713 889->896 897 46d06f-46d072 891->897 898 4336f9-43370c KillTimer call 43443a call 433114 891->898 892->896 900 43373e-433749 CreatePopupMenu 892->900 894->896 912 46d16e 894->912 901 433755-433764 call 4344a0 895->901 902 4336a8-4336ad 895->902 896->890 905 46d074-46d076 897->905 906 46d0a8-46d0c7 MoveWindow 897->906 898->896 900->896 901->896 909 4336b3-4336b8 902->909 910 46d139-46d140 902->910 914 46d097-46d0a3 SetFocus 905->914 915 46d078-46d07b 905->915 906->896 919 46d124-46d134 call 492d36 909->919 920 4336be-4336c4 909->920 910->885 917 46d146-46d14f call 487c36 910->917 912->885 914->896 915->920 922 46d081-46d092 call 441070 915->922 917->885 919->896 920->885 920->921 921->885 926 46d10c-46d11f call 43443a call 43434a 921->926 922->896 926->885
                          APIs
                          • DefWindowProcW.USER32(?,?,?,?), ref: 004336D2
                          • KillTimer.USER32(?,00000001), ref: 004336FC
                          • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 0043371F
                          • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 0043372A
                          • CreatePopupMenu.USER32 ref: 0043373E
                          • PostQuitMessage.USER32(00000000), ref: 0043374D
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                          • String ID: TaskbarCreated$%L
                          • API String ID: 129472671-928395405
                          • Opcode ID: 03b2d50b9c0327c5d05fee9e5f5b21530a941353bfb529305d0745d74df9d05d
                          • Instruction ID: 6222010d553096697b79701babbc3ac5d0e23902ac4890275c8ce34cc246111b
                          • Opcode Fuzzy Hash: 03b2d50b9c0327c5d05fee9e5f5b21530a941353bfb529305d0745d74df9d05d
                          • Instruction Fuzzy Hash: E6411BB1A00505BFDB246F78DC0AB7A3B54E708342F10523BF601963A1DB6C9E65976E

                          Control-flow Graph

                          APIs
                          • GetSysColorBrush.USER32(0000000F), ref: 00433A50
                          • LoadCursorW.USER32(00000000,00007F00), ref: 00433A5F
                          • LoadIconW.USER32(00000063), ref: 00433A76
                          • LoadIconW.USER32(000000A4), ref: 00433A88
                          • LoadIconW.USER32(000000A2), ref: 00433A9A
                          • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00433AC0
                          • RegisterClassExW.USER32(?), ref: 00433B16
                            • Part of subcall function 00433041: GetSysColorBrush.USER32(0000000F), ref: 00433074
                            • Part of subcall function 00433041: RegisterClassExW.USER32(00000030), ref: 0043309E
                            • Part of subcall function 00433041: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 004330AF
                            • Part of subcall function 00433041: InitCommonControlsEx.COMCTL32(?), ref: 004330CC
                            • Part of subcall function 00433041: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 004330DC
                            • Part of subcall function 00433041: LoadIconW.USER32(000000A9), ref: 004330F2
                            • Part of subcall function 00433041: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00433101
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                          • String ID: #$0$AutoIt v3
                          • API String ID: 423443420-4155596026
                          • Opcode ID: ebc0d9cf38fd9959ade260f377e600ef81beda1e0fbe46c91e57aa527d15d8f6
                          • Instruction ID: 7e6b806a180d9ec01bef45fcd37491090d89392b3924435fcb9c426f75ced8cf
                          • Opcode Fuzzy Hash: ebc0d9cf38fd9959ade260f377e600ef81beda1e0fbe46c91e57aa527d15d8f6
                          • Instruction Fuzzy Hash: B3214B74D00704AFEB10DFA4EC09BAD7FB0FB08725F1142BAE604A62A1D7B55664CF98

                          Control-flow Graph

                          APIs
                            • Part of subcall function 00450162: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00450193
                            • Part of subcall function 00450162: MapVirtualKeyW.USER32(00000010,00000000), ref: 0045019B
                            • Part of subcall function 00450162: MapVirtualKeyW.USER32(000000A0,00000000), ref: 004501A6
                            • Part of subcall function 00450162: MapVirtualKeyW.USER32(000000A1,00000000), ref: 004501B1
                            • Part of subcall function 00450162: MapVirtualKeyW.USER32(00000011,00000000), ref: 004501B9
                            • Part of subcall function 00450162: MapVirtualKeyW.USER32(00000012,00000000), ref: 004501C1
                            • Part of subcall function 004460F9: RegisterWindowMessageW.USER32(WM_GETCONTROLNAME,?,0043F930), ref: 00446154
                          • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 0043F9CD
                          • OleInitialize.OLE32(00000000), ref: 0043FA4A
                          • CloseHandle.KERNEL32(00000000), ref: 004745C8
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                          • String ID: $<WO$\TO$%L$SO$
                          • API String ID: 1986988660-1004310443
                          • Opcode ID: 8b226273d88f2e68c6709d06bc4bf425ea532b7612d50aa5b2155952f3c4f22b
                          • Instruction ID: 7fe029b97eeea0af872e1f784dd930d818ed35070a2e202a9a5b93ed50041eb6
                          • Opcode Fuzzy Hash: 8b226273d88f2e68c6709d06bc4bf425ea532b7612d50aa5b2155952f3c4f22b
                          • Instruction Fuzzy Hash: 6C81ABB0901E409FD384EF2AA9457397BE5EB8830AB51813F9719CB272E77844A4CF1D

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1050 eea518-eea56a call eea418 CreateFileW 1053 eea56c-eea56e 1050->1053 1054 eea573-eea580 1050->1054 1055 eea6cc-eea6d0 1053->1055 1057 eea582-eea58e 1054->1057 1058 eea593-eea5aa VirtualAlloc 1054->1058 1057->1055 1059 eea5ac-eea5ae 1058->1059 1060 eea5b3-eea5d9 CreateFileW 1058->1060 1059->1055 1062 eea5fd-eea617 ReadFile 1060->1062 1063 eea5db-eea5f8 1060->1063 1064 eea63b-eea63f 1062->1064 1065 eea619-eea636 1062->1065 1063->1055 1066 eea660-eea677 WriteFile 1064->1066 1067 eea641-eea65e 1064->1067 1065->1055 1069 eea679-eea6a0 1066->1069 1070 eea6a2-eea6c7 CloseHandle VirtualFree 1066->1070 1067->1055 1069->1055 1070->1055
                          APIs
                          • CreateFileW.KERNELBASE(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00EEA55D
                          Memory Dump Source
                          • Source File: 00000000.00000002.1361149548.0000000000EE9000.00000040.00000020.00020000.00000000.sdmp, Offset: 00EE9000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_ee9000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: CreateFile
                          • String ID:
                          • API String ID: 823142352-0
                          • Opcode ID: eb584f4a57c68eb24893e8662cdde2a6850f072ba7aa360e4ef334368506de38
                          • Instruction ID: 31bdb78bd7b7ea462c50f912727bd7c343202daea386633e13774dcda2b067a2
                          • Opcode Fuzzy Hash: eb584f4a57c68eb24893e8662cdde2a6850f072ba7aa360e4ef334368506de38
                          • Instruction Fuzzy Hash: 90513A75A50249FBEF20DFA4CC49FDE7B78AF48700F148518F60AFB180DA74AA449B64

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1090 4339d5-433a45 CreateWindowExW * 2 ShowWindow * 2
                          APIs
                          • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00433A03
                          • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00433A24
                          • ShowWindow.USER32(00000000,?,?), ref: 00433A38
                          • ShowWindow.USER32(00000000,?,?), ref: 00433A41
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: Window$CreateShow
                          • String ID: AutoIt v3$edit
                          • API String ID: 1584632944-3779509399
                          • Opcode ID: 33b270fbb94111eb4d132423673b37cad156b1ff3bbfb15398d58c67e3840c7e
                          • Instruction ID: 71d4d4ca74fa2381b3ad87fce2d46482f59a67401a953560a5379dd2f10d2e71
                          • Opcode Fuzzy Hash: 33b270fbb94111eb4d132423673b37cad156b1ff3bbfb15398d58c67e3840c7e
                          • Instruction Fuzzy Hash: 19F03A705002907EEA305B2B6C0CE7B2E7DD7C6F50B1242BABA04E2170C6650820CEB9

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1443 49955b-4995de call 434ee5 call 499734 1448 4995e8-499656 call 434f0b * 4 call 434ee5 call 45571c 1443->1448 1449 4995e0 1443->1449 1463 49965b-49969f call 45571c call 434f0b call 499109 call 498953 1448->1463 1450 4995e2-4995e3 1449->1450 1452 49972b-499731 1450->1452 1472 4996a1-4996b1 call 452d55 * 2 1463->1472 1473 4996b6-4996ba 1463->1473 1472->1450 1475 49971b-499721 call 452d55 1473->1475 1476 4996bc-499719 call 498b06 call 452d55 1473->1476 1484 499723-499729 1475->1484 1476->1484 1484->1452
                          APIs
                            • Part of subcall function 00434EE5: _fseek.LIBCMT ref: 00434EFD
                            • Part of subcall function 00499734: _wcscmp.LIBCMT ref: 00499824
                            • Part of subcall function 00499734: _wcscmp.LIBCMT ref: 00499837
                          • _free.LIBCMT ref: 004996A2
                          • _free.LIBCMT ref: 004996A9
                          • _free.LIBCMT ref: 00499714
                            • Part of subcall function 00452D55: RtlFreeHeap.NTDLL(00000000,00000000,?,00459A24), ref: 00452D69
                            • Part of subcall function 00452D55: GetLastError.KERNEL32(00000000,?,00459A24), ref: 00452D7B
                          • _free.LIBCMT ref: 0049971C
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: _free$_wcscmp$ErrorFreeHeapLast_fseek
                          • String ID: P@
                          • API String ID: 1552873950-286689840
                          • Opcode ID: 50af52b8f22919c11c7515362fb071ee60fc7e1c9e9e4129b0e36dbf2dd802cb
                          • Instruction ID: 44e0b27076a87e2e41ab8428d5fc19437e4c12069863d37d29a993e30942b44b
                          • Opcode Fuzzy Hash: 50af52b8f22919c11c7515362fb071ee60fc7e1c9e9e4129b0e36dbf2dd802cb
                          • Instruction Fuzzy Hash: C4514EB1904219AFDF249FA5DC81AAEBB79EF48304F1404AFF609A3241DB755E84CF58

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1487 43407c-434092 1488 434098-4340ad call 437a16 1487->1488 1489 43416f-434173 1487->1489 1492 4340b3-4340d3 call 437bcc 1488->1492 1493 46d3c8-46d3d7 LoadStringW 1488->1493 1496 46d3e2-46d3fa call 437b2e call 436fe3 1492->1496 1497 4340d9-4340dd 1492->1497 1493->1496 1506 4340ed-43416a call 452de0 call 43454e call 452dbc Shell_NotifyIconW call 435904 1496->1506 1509 46d400-46d41e call 437cab call 436fe3 call 437cab 1496->1509 1499 4340e3-4340e8 call 437b2e 1497->1499 1500 434174-43417d call 438047 1497->1500 1499->1506 1500->1506 1506->1489 1509->1506
                          APIs
                          • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 0046D3D7
                            • Part of subcall function 00437BCC: _memmove.LIBCMT ref: 00437C06
                          • _memset.LIBCMT ref: 004340FC
                          • _wcscpy.LIBCMT ref: 00434150
                          • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00434160
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: IconLoadNotifyShell_String_memmove_memset_wcscpy
                          • String ID: Line:
                          • API String ID: 3942752672-1585850449
                          • Opcode ID: 6d59ee2d36c021d9925bd3668daf1a0fe69d5e2e3579de8d1aaceaa22d0db240
                          • Instruction ID: ab07bed2cfd580a7d32a9db5ee3c45df15f6233e176b5cdabeab106ec9a0fae0
                          • Opcode Fuzzy Hash: 6d59ee2d36c021d9925bd3668daf1a0fe69d5e2e3579de8d1aaceaa22d0db240
                          • Instruction Fuzzy Hash: 6C31D271108705ABD730EB61DC45BEB77E8AF48308F10562FF68592191DB78A658CB8F
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: _memset$__filbuf__getptd_noexit__read_nolock_memcpy_s
                          • String ID:
                          • API String ID: 1559183368-0
                          • Opcode ID: dfdd2df0ab245b9716d30a375d324e0946404ce6e082d96a71c3349c3dbc91e5
                          • Instruction ID: b18c6f00eb23dd8b5e2ed11aaa4ea8e60ec089dad47d86c1e1e2dc410515d365
                          • Opcode Fuzzy Hash: dfdd2df0ab245b9716d30a375d324e0946404ce6e082d96a71c3349c3dbc91e5
                          • Instruction Fuzzy Hash: 8C511A30A00B09EBCB148E65D85067F77B2AF41326F14872FFC25963C6E7789D588B49
                          APIs
                            • Part of subcall function 00434DDD: LoadLibraryExW.KERNEL32(?,00000000,00000002,?,P@,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00434E0F
                          • _free.LIBCMT ref: 0046E263
                          • _free.LIBCMT ref: 0046E2AA
                            • Part of subcall function 00436A8C: SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00436BAD
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: _free$CurrentDirectoryLibraryLoad
                          • String ID: >>>AUTOIT SCRIPT<<<$Bad directive syntax error
                          • API String ID: 2861923089-1757145024
                          • Opcode ID: 794d866666d97e3c7de7962cf00249e28922e150e0b8b6c15c707e92d8992a21
                          • Instruction ID: 5d5c3430a25124b6d38ac48cf0dad262a8c56bbce00fc336ed8dccf5dca2bf26
                          • Opcode Fuzzy Hash: 794d866666d97e3c7de7962cf00249e28922e150e0b8b6c15c707e92d8992a21
                          • Instruction Fuzzy Hash: A091AF75900219AFCF04EFA6CC519EEB7B4FF09314F10446FE815AB2A1EB78A905CB59
                          APIs
                            • Part of subcall function 00EEBEC8: Sleep.KERNELBASE(000001F4), ref: 00EEBED9
                          • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 00EEC133
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1361149548.0000000000EE9000.00000040.00000020.00020000.00000000.sdmp, Offset: 00EE9000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_ee9000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: CreateFileSleep
                          • String ID: 3226GSYH11BJJATB6N4O2X51QL
                          • API String ID: 2694422964-1864654900
                          • Opcode ID: da7967e11387c66b0845243cc540c1cfc59b0a9242c248622b7300990286e747
                          • Instruction ID: 76f2dbdcc1690ca6f4aafcd755d6712afa09e2c24c6f6f76a91db3a96df507d6
                          • Opcode Fuzzy Hash: da7967e11387c66b0845243cc540c1cfc59b0a9242c248622b7300990286e747
                          • Instruction Fuzzy Hash: F961A330D0428CDAEF11DBB4C844BEEBBB5AF19304F144199E6487B2C1D7B91B49CB66
                          APIs
                          • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,00000003,00000000,80000001,80000001,?,004335A1,SwapMouseButtons,00000004,?), ref: 004335D4
                          • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,004335A1,SwapMouseButtons,00000004,?,?,?,?,00432754), ref: 004335F5
                          • RegCloseKey.KERNELBASE(00000000,?,?,004335A1,SwapMouseButtons,00000004,?,?,?,?,00432754), ref: 00433617
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: CloseOpenQueryValue
                          • String ID: Control Panel\Mouse
                          • API String ID: 3677997916-824357125
                          • Opcode ID: fe7ed9d5fedd7fb18a4f5b581c9497dc27d2b6ad2464c12a2f9d331eb9c64d98
                          • Instruction ID: 2f0305700a78fca4fdce5e354ad81702b186f7a538fd0fc0f1fd1f82a8bc34fe
                          • Opcode Fuzzy Hash: fe7ed9d5fedd7fb18a4f5b581c9497dc27d2b6ad2464c12a2f9d331eb9c64d98
                          • Instruction Fuzzy Hash: AC114871910208BFDB20DF64DC419AFB7BCEF08741F00556AF809D7210D2759F549768
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                          • String ID:
                          • API String ID: 2782032738-0
                          • Opcode ID: 998aeda2236a74d80706e5f9a46343bd1135ee917ddd04e378ba6ed458c3dace
                          • Instruction ID: 7caebcbcc51e0287248e3495dd48301f6accc046c27c5b4d33d4a4611a4a5171
                          • Opcode Fuzzy Hash: 998aeda2236a74d80706e5f9a46343bd1135ee917ddd04e378ba6ed458c3dace
                          • Instruction Fuzzy Hash: 24410834A00745ABCB189E69C8809AF77A5AFC535AB10817FEC158F742E738DDC98B48
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: _memmove
                          • String ID: AU3!P/L$EA06
                          • API String ID: 4104443479-584251071
                          • Opcode ID: cf3ad109832178d58d370f6ffb4407bd84747eb00efef499707997fc37a57ba5
                          • Instruction ID: 91ed7b442460471391c6bb2f906b01720a36bbb08f61a38ba218a11bb806efe5
                          • Opcode Fuzzy Hash: cf3ad109832178d58d370f6ffb4407bd84747eb00efef499707997fc37a57ba5
                          • Instruction Fuzzy Hash: 89419D21A0015857DF219B5488527FF7FA1DBCD304F68607BEC829B382D62C7D4587AA
                          APIs
                          • _memset.LIBCMT ref: 0046EA39
                          • GetOpenFileNameW.COMDLG32(?), ref: 0046EA83
                            • Part of subcall function 00434750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00434743,?,?,004337AE,?), ref: 00434770
                            • Part of subcall function 00450791: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 004507B0
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: Name$Path$FileFullLongOpen_memset
                          • String ID: X
                          • API String ID: 3777226403-3081909835
                          • Opcode ID: 4a8490fbf8dc981a7a918020385ac2d8fa1d8b3208ba2b161884b17cb9e03a7e
                          • Instruction ID: 6f558b76faf609c988482383c7c155e129a6e3036c3f8c086db08d8a00bf6de9
                          • Opcode Fuzzy Hash: 4a8490fbf8dc981a7a918020385ac2d8fa1d8b3208ba2b161884b17cb9e03a7e
                          • Instruction Fuzzy Hash: B021D470A102489BCF519FD5C845AEE7BF8AF48319F00805BE548A7241DBB859498F9A
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: __fread_nolock_memmove
                          • String ID: EA06
                          • API String ID: 1988441806-3962188686
                          • Opcode ID: a968434574c89ca64c48d48d42f60f435c67d1b792b819e8e86530c025bf8705
                          • Instruction ID: f32507c8bc577867d8a58cbae16b266a4f8018f4fdfc1ea4ce80eb614d974c3e
                          • Opcode Fuzzy Hash: a968434574c89ca64c48d48d42f60f435c67d1b792b819e8e86530c025bf8705
                          • Instruction Fuzzy Hash: F101F9718042587EDF18CAA9C816EFE7BF8DB11301F00459FF556D2181E878E6088764
                          APIs
                          • CreateProcessW.KERNELBASE(?,00000000), ref: 00EEAC3D
                          • ExitProcess.KERNEL32(00000000), ref: 00EEAC5C
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1361149548.0000000000EE9000.00000040.00000020.00020000.00000000.sdmp, Offset: 00EE9000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_ee9000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: Process$CreateExit
                          • String ID: D
                          • API String ID: 126409537-2746444292
                          • Opcode ID: eaefe38700dea64172a30051a10e55a487822181055063bbb51e2642d874e9cd
                          • Instruction ID: 14e35113ca3af61d3a2d640ad5a7286fc61503257e223e698e666e142ae970e1
                          • Opcode Fuzzy Hash: eaefe38700dea64172a30051a10e55a487822181055063bbb51e2642d874e9cd
                          • Instruction Fuzzy Hash: F4F0FFB154024CABDB60EFE1CC49FEE77BCBF08701F548518FB1AAA184DA7496088B61
                          APIs
                          • GetTempPathW.KERNEL32(00000104,?), ref: 004998F8
                          • GetTempFileNameW.KERNELBASE(?,aut,00000000,?), ref: 0049990F
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: Temp$FileNamePath
                          • String ID: aut
                          • API String ID: 3285503233-3010740371
                          • Opcode ID: 2b859bbd0b3f5c4bd256690eb99ff3e7e11587256f029cd5d0d442cbe24fcf2a
                          • Instruction ID: ec6e99b086d741b21d9ee23e0ca7d9749064f7eb92b969d41c9f7319d3b38917
                          • Opcode Fuzzy Hash: 2b859bbd0b3f5c4bd256690eb99ff3e7e11587256f029cd5d0d442cbe24fcf2a
                          • Instruction Fuzzy Hash: ECD05E7954030DABDB50ABA4DC0EF9A773CEB04701F0003F1BF58D11A1EAB2A5988B99
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 71de25266735fe11e0006c9e5fae3cfe4e1a0ba4f05ab67204da25a756fe2162
                          • Instruction ID: 195b549ecfd269cbaf140ccc764ba54ab948519c1739a332d3875a6821c54f01
                          • Opcode Fuzzy Hash: 71de25266735fe11e0006c9e5fae3cfe4e1a0ba4f05ab67204da25a756fe2162
                          • Instruction Fuzzy Hash: 68F149706083009FCB54DF29C480A6ABBE5FF99318F14892EF8999B351D778E945CF86
                          APIs
                          • _memset.LIBCMT ref: 00434370
                          • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00434415
                          • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00434432
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: IconNotifyShell_$_memset
                          • String ID:
                          • API String ID: 1505330794-0
                          • Opcode ID: be3817b1a88e53030942f10b6abc37e5bd335cbaa799560b76b3688f2b2eecab
                          • Instruction ID: a4613e3a953525aea8af52eac9c39e0ec186b2bc084807d53af92e9cba843034
                          • Opcode Fuzzy Hash: be3817b1a88e53030942f10b6abc37e5bd335cbaa799560b76b3688f2b2eecab
                          • Instruction Fuzzy Hash: 353141706047019FD721DF24D88469BBBF8FB98319F000A3FE69A83251D7756958CB5A
                          APIs
                          • __FF_MSGBANNER.LIBCMT ref: 00455733
                            • Part of subcall function 0045A16B: __NMSG_WRITE.LIBCMT ref: 0045A192
                            • Part of subcall function 0045A16B: __NMSG_WRITE.LIBCMT ref: 0045A19C
                          • __NMSG_WRITE.LIBCMT ref: 0045573A
                            • Part of subcall function 0045A1C8: GetModuleFileNameW.KERNEL32(00000000,004F33BA,00000104,?,00000001,00000000), ref: 0045A25A
                            • Part of subcall function 0045A1C8: ___crtMessageBoxW.LIBCMT ref: 0045A308
                            • Part of subcall function 0045309F: ___crtCorExitProcess.LIBCMT ref: 004530A5
                            • Part of subcall function 0045309F: ExitProcess.KERNEL32 ref: 004530AE
                            • Part of subcall function 00458B28: __getptd_noexit.LIBCMT ref: 00458B28
                          • RtlAllocateHeap.NTDLL(00E40000,00000000,00000001,00000000,?,?,?,00450DD3,?), ref: 0045575F
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: ExitProcess___crt$AllocateFileHeapMessageModuleName__getptd_noexit
                          • String ID:
                          • API String ID: 1372826849-0
                          • Opcode ID: f285f299ad252bd8abfc32fd1f54045442fb0e0e06a09544359bed5e1fcd88d3
                          • Instruction ID: 0bd25d7cdd4837b1b05041d50cbc1f63c89f52b06989f3a5e8fad221388169ac
                          • Opcode Fuzzy Hash: f285f299ad252bd8abfc32fd1f54045442fb0e0e06a09544359bed5e1fcd88d3
                          • Instruction Fuzzy Hash: F101D275200B01DBD6102B3AEC62A3E67588B46767F10053FFC05AB283DE7C9C09866D
                          APIs
                          • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000,?,?,00499548,?,?,?,?,?,00000004), ref: 004998BB
                          • SetFileTime.KERNELBASE(00000000,?,00000000,?,?,00499548,?,?,?,?,?,00000004,00000001,?,?,00000004), ref: 004998D1
                          • CloseHandle.KERNEL32(00000000,?,00499548,?,?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 004998D8
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: File$CloseCreateHandleTime
                          • String ID:
                          • API String ID: 3397143404-0
                          • Opcode ID: 254bf3d4eccd5ad05499ecee798a4c0d1295b4f4750ccecd318b2a804fad8232
                          • Instruction ID: 9eec6b3a1ccf91404cdbc101eb716cfcbf16142178a1bc34d477a915a39ff545
                          • Opcode Fuzzy Hash: 254bf3d4eccd5ad05499ecee798a4c0d1295b4f4750ccecd318b2a804fad8232
                          • Instruction Fuzzy Hash: A2E08632140214B7DB212B58EC09FCA7F59AB06760F144230FB18790E087B12915979C
                          APIs
                          • _free.LIBCMT ref: 00498D1B
                            • Part of subcall function 00452D55: RtlFreeHeap.NTDLL(00000000,00000000,?,00459A24), ref: 00452D69
                            • Part of subcall function 00452D55: GetLastError.KERNEL32(00000000,?,00459A24), ref: 00452D7B
                          • _free.LIBCMT ref: 00498D2C
                          • _free.LIBCMT ref: 00498D3E
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: _free$ErrorFreeHeapLast
                          • String ID:
                          • API String ID: 776569668-0
                          • Opcode ID: c56cf7ee783aa8295308e84720220828ccc4d403300e1e82c1220f1652f177a4
                          • Instruction ID: d8166d4f83b155685f68d3f918d0c108e9bceff05358b8380a4f9cb88d2fe0c0
                          • Opcode Fuzzy Hash: c56cf7ee783aa8295308e84720220828ccc4d403300e1e82c1220f1652f177a4
                          • Instruction Fuzzy Hash: 9FE012A170160246DF24A57DAA40A9317EC4F5A397B140A2FB80DD72C7CEACF84A812C
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID:
                          • String ID: CALL
                          • API String ID: 0-4196123274
                          • Opcode ID: cace3d22e3dcdea47d6b3e44f7e1757e2bb4dc7b34960557138480cae794bf2b
                          • Instruction ID: 88dc3436ffa515fa134f6d83cfe1594e820bca70c033f4234710fb0a20fd55c1
                          • Opcode Fuzzy Hash: cace3d22e3dcdea47d6b3e44f7e1757e2bb4dc7b34960557138480cae794bf2b
                          • Instruction Fuzzy Hash: 8B226A70508201DFDB24DF14C490B6AB7E1FF48304F15996EE98A8B362D739EC55CB8A
                          APIs
                            • Part of subcall function 00434BB5: FreeLibrary.KERNEL32(00000000,?), ref: 00434BEF
                            • Part of subcall function 0045525B: __wfsopen.LIBCMT ref: 00455266
                          • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,P@,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00434E0F
                            • Part of subcall function 00434B6A: FreeLibrary.KERNEL32(00000000), ref: 00434BA4
                            • Part of subcall function 00434C70: _memmove.LIBCMT ref: 00434CBA
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: Library$Free$Load__wfsopen_memmove
                          • String ID: P@
                          • API String ID: 1396898556-286689840
                          • Opcode ID: ee97270d916703584553fac3a6a102a129159e569530dd39ac66472f2868b615
                          • Instruction ID: 98485b204286a82f0b34afb347739cc86cf1013d0ff022642f5ab36dea098e6c
                          • Opcode Fuzzy Hash: ee97270d916703584553fac3a6a102a129159e569530dd39ac66472f2868b615
                          • Instruction Fuzzy Hash: 6811C831A00205ABCF14BF71CC17FED77A4AF88714F10842FF54197281DA79A9059759
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: _memmove
                          • String ID:
                          • API String ID: 4104443479-0
                          • Opcode ID: 8a1fad2dc96cfc5bda97f6ddc727d0ae725561dd87fd932f273e0287656629b4
                          • Instruction ID: e3287db7387147b693b8a58bbe0f8d3770e91dbf1ce5502f406ba9878cefc8dc
                          • Opcode Fuzzy Hash: 8a1fad2dc96cfc5bda97f6ddc727d0ae725561dd87fd932f273e0287656629b4
                          • Instruction Fuzzy Hash: 2D31E7B1600506AFC714DF68C8D1D69F3A4FF4C314B14822EE959CB391EB34E910CB94
                          APIs
                            • Part of subcall function 0045571C: __FF_MSGBANNER.LIBCMT ref: 00455733
                            • Part of subcall function 0045571C: __NMSG_WRITE.LIBCMT ref: 0045573A
                            • Part of subcall function 0045571C: RtlAllocateHeap.NTDLL(00E40000,00000000,00000001,00000000,?,?,?,00450DD3,?), ref: 0045575F
                          • std::exception::exception.LIBCMT ref: 00450DEC
                          • __CxxThrowException@8.LIBCMT ref: 00450E01
                            • Part of subcall function 0045859B: RaiseException.KERNEL32(?,?,?,004E9E78,00000000,?,?,?,?,00450E06,?,004E9E78,?,00000001), ref: 004585F0
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: AllocateExceptionException@8HeapRaiseThrowstd::exception::exception
                          • String ID:
                          • API String ID: 3902256705-0
                          • Opcode ID: e1abb1964d36001fa56360f14491e306f0482c7a7d77d1aaad9c13bde32b79df
                          • Instruction ID: ecfaf8c87e4706eea3322483ef65268c8d2dd150ec87d6c23880ddce41bfc6c0
                          • Opcode Fuzzy Hash: e1abb1964d36001fa56360f14491e306f0482c7a7d77d1aaad9c13bde32b79df
                          • Instruction Fuzzy Hash: 24F0863950021E76DB10BA95DD01ADF77A89F11357F10442FFD04A6283EFB99A4885DD
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: __lock_file_memset
                          • String ID:
                          • API String ID: 26237723-0
                          • Opcode ID: b7c867f92045d9ab3634c74b6652df05259916e2aaf53a388613dd10a60efc0f
                          • Instruction ID: af3ff549afc3b054d91ac91ae80f1ae99f93f830c991aff3c6f03effac137e8b
                          • Opcode Fuzzy Hash: b7c867f92045d9ab3634c74b6652df05259916e2aaf53a388613dd10a60efc0f
                          • Instruction Fuzzy Hash: F901D871800644EBCF12AF668C024AF7B61AF51327F50411FBC1827253DB398519DF59
                          APIs
                            • Part of subcall function 00458B28: __getptd_noexit.LIBCMT ref: 00458B28
                          • __lock_file.LIBCMT ref: 004553EB
                            • Part of subcall function 00456C11: __lock.LIBCMT ref: 00456C34
                          • __fclose_nolock.LIBCMT ref: 004553F6
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                          • String ID:
                          • API String ID: 2800547568-0
                          • Opcode ID: 96a5f8743d05d62217137f8e566e8cea0dca781456fa4b80b9bef22cd91f9c91
                          • Instruction ID: 5aa9989d60ae868be7a6d45093aadfc6ac1388cd91a830fc0d0f221cf488979d
                          • Opcode Fuzzy Hash: 96a5f8743d05d62217137f8e566e8cea0dca781456fa4b80b9bef22cd91f9c91
                          • Instruction Fuzzy Hash: 0AF068718006049AD7116F6658057BD76A06F4137BF21411FAC54A71C3CFBC55499A5A
                          APIs
                            • Part of subcall function 00EEA4D8: GetFileAttributesW.KERNELBASE(?), ref: 00EEA4E3
                          • CreateDirectoryW.KERNELBASE(?,00000000), ref: 00EEADCD
                          Memory Dump Source
                          • Source File: 00000000.00000002.1361149548.0000000000EE9000.00000040.00000020.00020000.00000000.sdmp, Offset: 00EE9000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_ee9000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: AttributesCreateDirectoryFile
                          • String ID:
                          • API String ID: 3401506121-0
                          • Opcode ID: cc027ea7805b725660c00381bae0f4c464f72387a46caf1fbed9bd71efd739f8
                          • Instruction ID: 35fb0747f57d4271ab40a3a9352c1f4c01aa2ef29a55b5ee6a7a3ffea8bc05bb
                          • Opcode Fuzzy Hash: cc027ea7805b725660c00381bae0f4c464f72387a46caf1fbed9bd71efd739f8
                          • Instruction Fuzzy Hash: BC516F31A1024C96EF24DFA0D844BEF737AEF58700F04556DE60DE7290EB759A84C766
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: ProtectVirtual
                          • String ID:
                          • API String ID: 544645111-0
                          • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                          • Instruction ID: 7c7e074f336a42937a3dce3798dbc48e0badafa73efdac3245a950124125098c
                          • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                          • Instruction Fuzzy Hash: C431E878A001059BC71EDF08C48496AF7A5FB4A302B688796E80ACF356D735EDC5DBC5
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: ClearVariant
                          • String ID:
                          • API String ID: 1473721057-0
                          • Opcode ID: 80403751bf3b16d130fa98fee565d852dc013c79ef609e8eb4bfe8f7e1b4d47b
                          • Instruction ID: 44bab56dc2ab8cde32489e4452faf6fae7bf82cfed3cad65b5601ae687a505e6
                          • Opcode Fuzzy Hash: 80403751bf3b16d130fa98fee565d852dc013c79ef609e8eb4bfe8f7e1b4d47b
                          • Instruction Fuzzy Hash: D64116746043419FDB14DF14C444B1ABBE1BF49318F1998ADE9998B362C339EC49CF9A
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: ClearVariant
                          • String ID:
                          • API String ID: 1473721057-0
                          • Opcode ID: 306c2ac41415c4d732e7e6e309be3f578cc410945c9c8b5e6cfba7a45f458898
                          • Instruction ID: 439085dc1f81f91865e89fa979136bfc39d9dea6fb8828d7de2aa91255d95a6c
                          • Opcode Fuzzy Hash: 306c2ac41415c4d732e7e6e309be3f578cc410945c9c8b5e6cfba7a45f458898
                          • Instruction Fuzzy Hash: AF2122B4508301DFCB14DF24C444A1ABBE1BF88315F05896EE88A97722D739E819CB9B
                          APIs
                          • __lock_file.LIBCMT ref: 004548A6
                            • Part of subcall function 00458B28: __getptd_noexit.LIBCMT ref: 00458B28
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: __getptd_noexit__lock_file
                          • String ID:
                          • API String ID: 2597487223-0
                          • Opcode ID: b9695d503ee7f994f795ffc7e080404e98721d5803fd581efff59a5272cc581d
                          • Instruction ID: 024d3bde10a8b930e4f3cc99fa0fa9a73826851c0073298ee905ef2063242ec2
                          • Opcode Fuzzy Hash: b9695d503ee7f994f795ffc7e080404e98721d5803fd581efff59a5272cc581d
                          • Instruction Fuzzy Hash: 6DF0D171800604ABDB11BFA288063AE36A0AF4032FF11440EBC14AA193CB7C8999DF49
                          APIs
                          • FreeLibrary.KERNEL32(?,?,P@,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00434E7E
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: FreeLibrary
                          • String ID:
                          • API String ID: 3664257935-0
                          • Opcode ID: 2dd93781c175439e7f79cc2af7e1652528eb96ade003da7a7019c752bfbae299
                          • Instruction ID: 5861b3b357ca51e8153b86b3d2f40e1ba728384ce97880f3152040741e909bf5
                          • Opcode Fuzzy Hash: 2dd93781c175439e7f79cc2af7e1652528eb96ade003da7a7019c752bfbae299
                          • Instruction Fuzzy Hash: 71F03071501711CFDB349F64D495853BBE1BF983297109A7FE5DA82610C739A844DF48
                          APIs
                          • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 004507B0
                            • Part of subcall function 00437BCC: _memmove.LIBCMT ref: 00437C06
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: LongNamePath_memmove
                          • String ID:
                          • API String ID: 2514874351-0
                          • Opcode ID: d05d2489b6ffe775fd90b2930d0f751ae442d4cc97b326ec77c5e4199fd6f31f
                          • Instruction ID: fc88bcc2f343ae0f4136759ccf33e2f12a023531e6e99fe3a81a7dbb457308fc
                          • Opcode Fuzzy Hash: d05d2489b6ffe775fd90b2930d0f751ae442d4cc97b326ec77c5e4199fd6f31f
                          • Instruction Fuzzy Hash: 33E0867690422857C72096699C05FEAB7EDDB887A4F0441B6FC0CD7214D965AC848695
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: __fread_nolock
                          • String ID:
                          • API String ID: 2638373210-0
                          • Opcode ID: 36e66934677415102e9643fee0822ecf6e22e0db5db5ed1a6e3653ba213ae753
                          • Instruction ID: 9d5468fba95894c9fe8c72ae71bab96c00bb209c8a5d318eee5a29343e75b5a6
                          • Opcode Fuzzy Hash: 36e66934677415102e9643fee0822ecf6e22e0db5db5ed1a6e3653ba213ae753
                          • Instruction Fuzzy Hash: 2AE092B0104B045FDB388A28D810BA377E1AB06305F00085EF6AAC3342EB667845C75D
                          APIs
                          • GetFileAttributesW.KERNELBASE(?), ref: 00EEA4E3
                          Memory Dump Source
                          • Source File: 00000000.00000002.1361149548.0000000000EE9000.00000040.00000020.00020000.00000000.sdmp, Offset: 00EE9000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_ee9000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: AttributesFile
                          • String ID:
                          • API String ID: 3188754299-0
                          • Opcode ID: 195c23eedc4a89e51baf60bc3cc3d10d01908f8b29aed20e491e172ce03d4d2a
                          • Instruction ID: c02aea8adc0f00a7464bdd544fa6fba1d7230929cae3ad8837682d781f83ad58
                          • Opcode Fuzzy Hash: 195c23eedc4a89e51baf60bc3cc3d10d01908f8b29aed20e491e172ce03d4d2a
                          • Instruction Fuzzy Hash: F5E08C7090524CEBCB10CBA98948AED73A8AB05320F145A68E916E32C0D534AE44E652
                          APIs
                          • GetFileAttributesW.KERNELBASE(?), ref: 00EEA4B3
                          Memory Dump Source
                          • Source File: 00000000.00000002.1361149548.0000000000EE9000.00000040.00000020.00020000.00000000.sdmp, Offset: 00EE9000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_ee9000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: AttributesFile
                          • String ID:
                          • API String ID: 3188754299-0
                          • Opcode ID: 63700976fb5b8646ca9f82f7877e0f33cef2a649cb81b4b88ad66ba6039b9afc
                          • Instruction ID: 6db3d34dae771b77f7a486504016c053f64876b31f7524e0728c4e6da1a66daf
                          • Opcode Fuzzy Hash: 63700976fb5b8646ca9f82f7877e0f33cef2a649cb81b4b88ad66ba6039b9afc
                          • Instruction Fuzzy Hash: B1D05E3090520CABDB10CAA599089D973A89705320F104768ED29932C0D571A9009761
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: __wfsopen
                          • String ID:
                          • API String ID: 197181222-0
                          • Opcode ID: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                          • Instruction ID: 5b0f97acc59a2e1cfeb8636f9b37e92f260b146d966c67c387968ab59869202a
                          • Opcode Fuzzy Hash: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                          • Instruction Fuzzy Hash: 94B0927644020C77CE012A82EC02A593B199B41768F408061FF0C18162A677A6689A8A
                          APIs
                          • Sleep.KERNELBASE(000001F4), ref: 00EEBED9
                          Memory Dump Source
                          • Source File: 00000000.00000002.1361149548.0000000000EE9000.00000040.00000020.00020000.00000000.sdmp, Offset: 00EE9000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_ee9000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: Sleep
                          • String ID:
                          • API String ID: 3472027048-0
                          • Opcode ID: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                          • Instruction ID: c6aded937648befb4cc6db669f5d13de93cda29a9b9bbf0c1a7b623d5bd86fc9
                          • Opcode Fuzzy Hash: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                          • Instruction Fuzzy Hash: 7BE0BF7494020EEFDB10DFA5D5496DE7BB4EF04301F1005A1FD05E7690DB309E548A62
                          APIs
                          • Sleep.KERNELBASE(000001F4), ref: 00EEBED9
                          Memory Dump Source
                          • Source File: 00000000.00000002.1361149548.0000000000EE9000.00000040.00000020.00020000.00000000.sdmp, Offset: 00EE9000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_ee9000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: Sleep
                          • String ID:
                          • API String ID: 3472027048-0
                          • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                          • Instruction ID: 780a4b036f2df0027d3beb2b99997bef859d6cb5f55a7da51c6cf2fbacf1802f
                          • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                          • Instruction Fuzzy Hash: FEE0E67494020EDFDB00DFB5D5496DE7BB4EF04301F100161FD01E2290DB309D508A62
                          APIs
                            • Part of subcall function 00432612: GetWindowLongW.USER32(?,000000EB), ref: 00432623
                          • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 004BCB37
                          • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 004BCB95
                          • GetWindowLongW.USER32(?,000000F0), ref: 004BCBD6
                          • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 004BCC00
                          • SendMessageW.USER32 ref: 004BCC29
                          • _wcsncpy.LIBCMT ref: 004BCC95
                          • GetKeyState.USER32(00000011), ref: 004BCCB6
                          • GetKeyState.USER32(00000009), ref: 004BCCC3
                          • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 004BCCD9
                          • GetKeyState.USER32(00000010), ref: 004BCCE3
                          • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 004BCD0C
                          • SendMessageW.USER32 ref: 004BCD33
                          • SendMessageW.USER32(?,00001030,?,004BB348), ref: 004BCE37
                          • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 004BCE4D
                          • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 004BCE60
                          • SetCapture.USER32(?), ref: 004BCE69
                          • ClientToScreen.USER32(?,?), ref: 004BCECE
                          • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 004BCEDB
                          • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 004BCEF5
                          • ReleaseCapture.USER32 ref: 004BCF00
                          • GetCursorPos.USER32(?), ref: 004BCF3A
                          • ScreenToClient.USER32(?,?), ref: 004BCF47
                          • SendMessageW.USER32(?,00001012,00000000,?), ref: 004BCFA3
                          • SendMessageW.USER32 ref: 004BCFD1
                          • SendMessageW.USER32(?,00001111,00000000,?), ref: 004BD00E
                          • SendMessageW.USER32 ref: 004BD03D
                          • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 004BD05E
                          • SendMessageW.USER32(?,0000110B,00000009,?), ref: 004BD06D
                          • GetCursorPos.USER32(?), ref: 004BD08D
                          • ScreenToClient.USER32(?,?), ref: 004BD09A
                          • GetParent.USER32(?), ref: 004BD0BA
                          • SendMessageW.USER32(?,00001012,00000000,?), ref: 004BD123
                          • SendMessageW.USER32 ref: 004BD154
                          • ClientToScreen.USER32(?,?), ref: 004BD1B2
                          • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 004BD1E2
                          • SendMessageW.USER32(?,00001111,00000000,?), ref: 004BD20C
                          • SendMessageW.USER32 ref: 004BD22F
                          • ClientToScreen.USER32(?,?), ref: 004BD281
                          • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 004BD2B5
                            • Part of subcall function 004325DB: GetWindowLongW.USER32(?,000000EB), ref: 004325EC
                          • GetWindowLongW.USER32(?,000000F0), ref: 004BD351
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease_wcsncpy
                          • String ID: @GUI_DRAGID$F$pbO
                          • API String ID: 3977979337-3825772488
                          • Opcode ID: c55fe5d49ce17c041ded3c31b610377931e21fbfcd58c5b5d0739d8f6d2d5c1d
                          • Instruction ID: da00c101abf043f5c2e046148e0e216c354b2f2c7855d5e79985c903352dfd4f
                          • Opcode Fuzzy Hash: c55fe5d49ce17c041ded3c31b610377931e21fbfcd58c5b5d0739d8f6d2d5c1d
                          • Instruction Fuzzy Hash: 2242C034508640AFDB24DF28D8C4AAABFE5FF48310F14062EF6558B2B1C735E855DB6A
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: _memmove$_memset
                          • String ID: ]N$3cD$DEFINE$P\N$Q\E$[:<:]]$[:>:]]$\b(?<=\w)$\b(?=\w)$_D
                          • API String ID: 1357608183-451301767
                          • Opcode ID: d53df95eecd5dc4d84c85546f1de09a013819b5b66be6a7f83fa02a21fd92729
                          • Instruction ID: 0fd2dfe8a7d96896929e2d148bb67472aeb693eb3d259d1a8d8c72c36c3767ae
                          • Opcode Fuzzy Hash: d53df95eecd5dc4d84c85546f1de09a013819b5b66be6a7f83fa02a21fd92729
                          • Instruction Fuzzy Hash: 5B93B471E00215DBDB24DF58C881BAEB7B1FF48710F24856BE945AB391E7789D82CB48
                          APIs
                          • GetForegroundWindow.USER32(00000000,?), ref: 004348DF
                          • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0046D665
                          • IsIconic.USER32(?), ref: 0046D66E
                          • ShowWindow.USER32(?,00000009), ref: 0046D67B
                          • SetForegroundWindow.USER32(?), ref: 0046D685
                          • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0046D69B
                          • GetCurrentThreadId.KERNEL32 ref: 0046D6A2
                          • GetWindowThreadProcessId.USER32(?,00000000), ref: 0046D6AE
                          • AttachThreadInput.USER32(?,00000000,00000001), ref: 0046D6BF
                          • AttachThreadInput.USER32(?,00000000,00000001), ref: 0046D6C7
                          • AttachThreadInput.USER32(00000000,?,00000001), ref: 0046D6CF
                          • SetForegroundWindow.USER32(?), ref: 0046D6D2
                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 0046D6E7
                          • keybd_event.USER32(00000012,00000000), ref: 0046D6F2
                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 0046D6FC
                          • keybd_event.USER32(00000012,00000000), ref: 0046D701
                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 0046D70A
                          • keybd_event.USER32(00000012,00000000), ref: 0046D70F
                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 0046D719
                          • keybd_event.USER32(00000012,00000000), ref: 0046D71E
                          • SetForegroundWindow.USER32(?), ref: 0046D721
                          • AttachThreadInput.USER32(?,?,00000000), ref: 0046D748
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                          • String ID: Shell_TrayWnd
                          • API String ID: 4125248594-2988720461
                          • Opcode ID: b2054204fe0c43783bb53502750eec85b9c5e7030c88b0394cf9e90aeea6e103
                          • Instruction ID: 3c3cdd204e17c654ccfdc0d646e0de93bad34e0c3e5f5e7c651125686986c36d
                          • Opcode Fuzzy Hash: b2054204fe0c43783bb53502750eec85b9c5e7030c88b0394cf9e90aeea6e103
                          • Instruction Fuzzy Hash: 86318671E403187BEB201F659C49FBF3F6CEB44B51F104136FA08EA1D1DA745D01AAAA
                          APIs
                            • Part of subcall function 004887E1: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0048882B
                            • Part of subcall function 004887E1: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00488858
                            • Part of subcall function 004887E1: GetLastError.KERNEL32 ref: 00488865
                          • _memset.LIBCMT ref: 00488353
                          • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?,?,?,?,00000001,?,?), ref: 004883A5
                          • CloseHandle.KERNEL32(?), ref: 004883B6
                          • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 004883CD
                          • GetProcessWindowStation.USER32 ref: 004883E6
                          • SetProcessWindowStation.USER32(00000000), ref: 004883F0
                          • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 0048840A
                            • Part of subcall function 004881CB: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00488309), ref: 004881E0
                            • Part of subcall function 004881CB: CloseHandle.KERNEL32(?,?,00488309), ref: 004881F2
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLookupPrivilegeValue_memset
                          • String ID: $default$winsta0
                          • API String ID: 2063423040-1027155976
                          • Opcode ID: 27d1ff380190252940a3ab37a09bd6c3f955d4abbae5023588813535f2f29bb1
                          • Instruction ID: d667821ef7a34ae685710729c38aed9cd40bfc1ddd7713faa3c2310b7b3558b9
                          • Opcode Fuzzy Hash: 27d1ff380190252940a3ab37a09bd6c3f955d4abbae5023588813535f2f29bb1
                          • Instruction Fuzzy Hash: 7E816AB1900209BFDF11AFA5CC45AEE7BB9FF04304F54456EF814A2261DB399E19DB28
                          APIs
                          • FindFirstFileW.KERNEL32(?,?), ref: 0049C78D
                          • FindClose.KERNEL32(00000000), ref: 0049C7E1
                          • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 0049C806
                          • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 0049C81D
                          • FileTimeToSystemTime.KERNEL32(?,?), ref: 0049C844
                          • __swprintf.LIBCMT ref: 0049C890
                          • __swprintf.LIBCMT ref: 0049C8D3
                            • Part of subcall function 00437DE1: _memmove.LIBCMT ref: 00437E22
                          • __swprintf.LIBCMT ref: 0049C927
                            • Part of subcall function 00453698: __woutput_l.LIBCMT ref: 004536F1
                          • __swprintf.LIBCMT ref: 0049C975
                            • Part of subcall function 00453698: __flsbuf.LIBCMT ref: 00453713
                            • Part of subcall function 00453698: __flsbuf.LIBCMT ref: 0045372B
                          • __swprintf.LIBCMT ref: 0049C9C4
                          • __swprintf.LIBCMT ref: 0049CA13
                          • __swprintf.LIBCMT ref: 0049CA62
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem__woutput_l_memmove
                          • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                          • API String ID: 3953360268-2428617273
                          • Opcode ID: 8e008a979c3e6bf15dde95e2eeeaf0ebb25cfc282e68172a53be6ddce007e079
                          • Instruction ID: 865e95455f15134758b43d2f331b387749ddb661521e3477afe2cb99ca9798ae
                          • Opcode Fuzzy Hash: 8e008a979c3e6bf15dde95e2eeeaf0ebb25cfc282e68172a53be6ddce007e079
                          • Instruction Fuzzy Hash: 59A140B1408344ABD714EF95C885DAFB7ECFF88709F40192EF585C6151EA78DA08CB66
                          APIs
                          • FindFirstFileW.KERNEL32(?,?,771A8FB0,?,00000000), ref: 0049EFB6
                          • _wcscmp.LIBCMT ref: 0049EFCB
                          • _wcscmp.LIBCMT ref: 0049EFE2
                          • GetFileAttributesW.KERNEL32(?), ref: 0049EFF4
                          • SetFileAttributesW.KERNEL32(?,?), ref: 0049F00E
                          • FindNextFileW.KERNEL32(00000000,?), ref: 0049F026
                          • FindClose.KERNEL32(00000000), ref: 0049F031
                          • FindFirstFileW.KERNEL32(*.*,?), ref: 0049F04D
                          • _wcscmp.LIBCMT ref: 0049F074
                          • _wcscmp.LIBCMT ref: 0049F08B
                          • SetCurrentDirectoryW.KERNEL32(?), ref: 0049F09D
                          • SetCurrentDirectoryW.KERNEL32(004E8920), ref: 0049F0BB
                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 0049F0C5
                          • FindClose.KERNEL32(00000000), ref: 0049F0D2
                          • FindClose.KERNEL32(00000000), ref: 0049F0E4
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: Find$File$_wcscmp$Close$AttributesCurrentDirectoryFirstNext
                          • String ID: *.*
                          • API String ID: 1803514871-438819550
                          • Opcode ID: 66e7f0b8d03d9ceecbf75e4169a862901d6d7e1fdf9c709e4204e98b26e4afe0
                          • Instruction ID: 000033135e91a07f656ebc176bb70a4b16c55612824b9d587c55e47dd7f40b42
                          • Opcode Fuzzy Hash: 66e7f0b8d03d9ceecbf75e4169a862901d6d7e1fdf9c709e4204e98b26e4afe0
                          • Instruction Fuzzy Hash: 2B31B6325012187BDF14DFB5DC49AEE7BAC9F44361F1401B7E808D2191DB79DA48CA6D
                          APIs
                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 004B0953
                          • RegCreateKeyExW.ADVAPI32(?,?,00000000,004BF910,00000000,?,00000000,?,?), ref: 004B09C1
                          • RegCloseKey.ADVAPI32(00000000,00000001,00000000,00000000,00000000), ref: 004B0A09
                          • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000002,?), ref: 004B0A92
                          • RegCloseKey.ADVAPI32(?), ref: 004B0DB2
                          • RegCloseKey.ADVAPI32(00000000), ref: 004B0DBF
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: Close$ConnectCreateRegistryValue
                          • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                          • API String ID: 536824911-966354055
                          • Opcode ID: 1c0a7a93d7c2d1d2048015db9931f8a4ea2e14f2f57ac357adc707dcac9ef02c
                          • Instruction ID: 294098fa75da494182498f75a475a935017da30b0f8e8817888c274ec14a38da
                          • Opcode Fuzzy Hash: 1c0a7a93d7c2d1d2048015db9931f8a4ea2e14f2f57ac357adc707dcac9ef02c
                          • Instruction Fuzzy Hash: 19023A756006019FCB14EF19C881E6AB7E5FF89314F04855EF8899B3A2CB78ED05CB99
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID:
                          • String ID: 0DM$0EM$0FM$3cD$ANY)$ANYCRLF)$BSR_ANYCRLF)$BSR_UNICODE)$CR)$CRLF)$LF)$LIMIT_MATCH=$LIMIT_RECURSION=$NO_AUTO_POSSESS)$NO_START_OPT)$UCP)$UTF)$UTF16)$pGM$_D
                          • API String ID: 0-1571114681
                          • Opcode ID: b3a137d33b79b2f9c52dfd541658b17ee0742e395a9b83b5f44c38fb91b66979
                          • Instruction ID: e5edff143c0eb95a7776ef4250570b911324b8d83c14ad8edf35259aa86a0faf
                          • Opcode Fuzzy Hash: b3a137d33b79b2f9c52dfd541658b17ee0742e395a9b83b5f44c38fb91b66979
                          • Instruction Fuzzy Hash: 1E726E71E002199BEB14DF59C8807AEB7B5FF45310F15856BE805EB390EB389D82CB99
                          APIs
                          • FindFirstFileW.KERNEL32(?,?,771A8FB0,?,00000000), ref: 0049F113
                          • _wcscmp.LIBCMT ref: 0049F128
                          • _wcscmp.LIBCMT ref: 0049F13F
                            • Part of subcall function 00494385: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 004943A0
                          • FindNextFileW.KERNEL32(00000000,?), ref: 0049F16E
                          • FindClose.KERNEL32(00000000), ref: 0049F179
                          • FindFirstFileW.KERNEL32(*.*,?), ref: 0049F195
                          • _wcscmp.LIBCMT ref: 0049F1BC
                          • _wcscmp.LIBCMT ref: 0049F1D3
                          • SetCurrentDirectoryW.KERNEL32(?), ref: 0049F1E5
                          • SetCurrentDirectoryW.KERNEL32(004E8920), ref: 0049F203
                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 0049F20D
                          • FindClose.KERNEL32(00000000), ref: 0049F21A
                          • FindClose.KERNEL32(00000000), ref: 0049F22C
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: Find$File$_wcscmp$Close$CurrentDirectoryFirstNext$Create
                          • String ID: *.*
                          • API String ID: 1824444939-438819550
                          • Opcode ID: d9249ecfc69c45f0c05a9f2a60316c27c00115dc9fd2b0bc45c0acc215c84476
                          • Instruction ID: ba9c007c816659bfc46bcd19759bc65eee93c6139fb43a74b270a1515cd245ef
                          • Opcode Fuzzy Hash: d9249ecfc69c45f0c05a9f2a60316c27c00115dc9fd2b0bc45c0acc215c84476
                          • Instruction Fuzzy Hash: 5C31B3365002196ACF149FA4EC49FEF7BAC9F45365F1402B7E804E2191DB39DE49CA6C
                          APIs
                          • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 0049A20F
                          • __swprintf.LIBCMT ref: 0049A231
                          • CreateDirectoryW.KERNEL32(?,00000000), ref: 0049A26E
                          • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 0049A293
                          • _memset.LIBCMT ref: 0049A2B2
                          • _wcsncpy.LIBCMT ref: 0049A2EE
                          • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 0049A323
                          • CloseHandle.KERNEL32(00000000), ref: 0049A32E
                          • RemoveDirectoryW.KERNEL32(?), ref: 0049A337
                          • CloseHandle.KERNEL32(00000000), ref: 0049A341
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove__swprintf_memset_wcsncpy
                          • String ID: :$\$\??\%s
                          • API String ID: 2733774712-3457252023
                          • Opcode ID: 6016f68e01b5cee441d9c412756b2cbdbe2587a46b5c2551fa48f23c9d954178
                          • Instruction ID: 5549b965648e90950d339df0cdb5aba3fd9795ceca1536459429353174174be9
                          • Opcode Fuzzy Hash: 6016f68e01b5cee441d9c412756b2cbdbe2587a46b5c2551fa48f23c9d954178
                          • Instruction Fuzzy Hash: CA31D371500109ABDF209FA0DC49FEB37BCEF88705F1041B7F908D2160EB7496588B69
                          APIs
                            • Part of subcall function 00488202: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 0048821E
                            • Part of subcall function 00488202: GetLastError.KERNEL32(?,00487CE2,?,?,?), ref: 00488228
                            • Part of subcall function 00488202: GetProcessHeap.KERNEL32(00000008,?,?,00487CE2,?,?,?), ref: 00488237
                            • Part of subcall function 00488202: HeapAlloc.KERNEL32(00000000,?,00487CE2,?,?,?), ref: 0048823E
                            • Part of subcall function 00488202: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00488255
                            • Part of subcall function 0048829F: GetProcessHeap.KERNEL32(00000008,00487CF8,00000000,00000000,?,00487CF8,?), ref: 004882AB
                            • Part of subcall function 0048829F: HeapAlloc.KERNEL32(00000000,?,00487CF8,?), ref: 004882B2
                            • Part of subcall function 0048829F: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00487CF8,?), ref: 004882C3
                          • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00487D13
                          • _memset.LIBCMT ref: 00487D28
                          • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00487D47
                          • GetLengthSid.ADVAPI32(?), ref: 00487D58
                          • GetAce.ADVAPI32(?,00000000,?), ref: 00487D95
                          • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00487DB1
                          • GetLengthSid.ADVAPI32(?), ref: 00487DCE
                          • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 00487DDD
                          • HeapAlloc.KERNEL32(00000000), ref: 00487DE4
                          • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00487E05
                          • CopySid.ADVAPI32(00000000), ref: 00487E0C
                          • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00487E3D
                          • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00487E63
                          • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00487E77
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                          • String ID:
                          • API String ID: 3996160137-0
                          • Opcode ID: 0502a81dffc18e98c0adeabee1379fad7a9809ef054bee0983258d92ec854b99
                          • Instruction ID: 56a82255ce6d1d872a70e94513c66d0a001791bc23a54d251012886be3e30311
                          • Opcode Fuzzy Hash: 0502a81dffc18e98c0adeabee1379fad7a9809ef054bee0983258d92ec854b99
                          • Instruction Fuzzy Hash: F3616D71904109AFCF00EFA5DC54AEEBB79FF08304F14866AE819A6291DB39DE05DB64
                          APIs
                          • GetKeyboardState.USER32(?), ref: 00490097
                          • SetKeyboardState.USER32(?), ref: 00490102
                          • GetAsyncKeyState.USER32(000000A0), ref: 00490122
                          • GetKeyState.USER32(000000A0), ref: 00490139
                          • GetAsyncKeyState.USER32(000000A1), ref: 00490168
                          • GetKeyState.USER32(000000A1), ref: 00490179
                          • GetAsyncKeyState.USER32(00000011), ref: 004901A5
                          • GetKeyState.USER32(00000011), ref: 004901B3
                          • GetAsyncKeyState.USER32(00000012), ref: 004901DC
                          • GetKeyState.USER32(00000012), ref: 004901EA
                          • GetAsyncKeyState.USER32(0000005B), ref: 00490213
                          • GetKeyState.USER32(0000005B), ref: 00490221
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: State$Async$Keyboard
                          • String ID:
                          • API String ID: 541375521-0
                          • Opcode ID: cde87b604a4dd2e5e85d404541b9ddf5617a88b2f0e77a08a388dbcf99159fb4
                          • Instruction ID: f5e10f8d964fcf16dc805f551ea1e9fedecf348f7e314918ffce1e5ea29b8883
                          • Opcode Fuzzy Hash: cde87b604a4dd2e5e85d404541b9ddf5617a88b2f0e77a08a388dbcf99159fb4
                          • Instruction Fuzzy Hash: E451DB209047882DFF35DBA098557ABBFB49F01380F0845BF99C5562C3DA6C9B8CC769
                          APIs
                            • Part of subcall function 004B0E1A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,004AFDAD,?,?), ref: 004B0E31
                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 004B04AC
                            • Part of subcall function 00439837: __itow.LIBCMT ref: 00439862
                            • Part of subcall function 00439837: __swprintf.LIBCMT ref: 004398AC
                          • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 004B054B
                          • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 004B05E3
                          • RegCloseKey.ADVAPI32(000000FE,000000FE,00000000,?,00000000), ref: 004B0822
                          • RegCloseKey.ADVAPI32(00000000), ref: 004B082F
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: CloseQueryValue$BuffCharConnectRegistryUpper__itow__swprintf
                          • String ID:
                          • API String ID: 1240663315-0
                          • Opcode ID: fd82a2a4dd128251bf9307c8e2fece3bf1b3f40ea8b9ade32e17b54d2dc90d53
                          • Instruction ID: e9ed6caee20d3461d73c1e2029923fcbe79807e1c9cf5e88925a033de703b3e6
                          • Opcode Fuzzy Hash: fd82a2a4dd128251bf9307c8e2fece3bf1b3f40ea8b9ade32e17b54d2dc90d53
                          • Instruction Fuzzy Hash: 03E15071604200AFCB14EF69C891D6BBBE4FF89314F04856EF84AD7261DA34ED05CB95
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                          • String ID:
                          • API String ID: 1737998785-0
                          • Opcode ID: e9abb02fe7443fe329f85096add3914f233c7ba36f4e2cd6aad2428a89efe679
                          • Instruction ID: e1cff0963d6d4053f2deed1d8f113d55fb679fe32f9a1af3060dee3ac7e4137e
                          • Opcode Fuzzy Hash: e9abb02fe7443fe329f85096add3914f233c7ba36f4e2cd6aad2428a89efe679
                          • Instruction Fuzzy Hash: 4B21B1352002109FDB04AF24EC09B6E7BA8EF95351F00816BF949DB2A1DBB8AC05CB5D
                          APIs
                            • Part of subcall function 00434750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00434743,?,?,004337AE,?), ref: 00434770
                            • Part of subcall function 00494A31: GetFileAttributesW.KERNEL32(?,0049370B), ref: 00494A32
                          • FindFirstFileW.KERNEL32(?,?), ref: 004938A3
                          • DeleteFileW.KERNEL32(?,?,00000000,?,?,?,?), ref: 0049394B
                          • MoveFileW.KERNEL32(?,?), ref: 0049395E
                          • DeleteFileW.KERNEL32(?,?,?,?,?), ref: 0049397B
                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 0049399D
                          • FindClose.KERNEL32(00000000,?,?,?,?), ref: 004939B9
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: File$Find$Delete$AttributesCloseFirstFullMoveNameNextPath
                          • String ID: \*.*
                          • API String ID: 4002782344-1173974218
                          • Opcode ID: d647dd287c046929ae3c25e935f2d9355ff1a4938a8c48ab99658eea5ec9c262
                          • Instruction ID: 121ae9363c0d416af3ad57c2f6113fe48baf4d147289b70f0a05eebffe9199ea
                          • Opcode Fuzzy Hash: d647dd287c046929ae3c25e935f2d9355ff1a4938a8c48ab99658eea5ec9c262
                          • Instruction Fuzzy Hash: C951B2B180014C9ACF15EFA1C9929FEBB78AF15315F6001BEE44677191EB396F09CB68
                          APIs
                            • Part of subcall function 00437DE1: _memmove.LIBCMT ref: 00437E22
                          • FindFirstFileW.KERNEL32(?,?,*.*,?,?,00000000,00000000), ref: 0049F440
                          • Sleep.KERNEL32(0000000A), ref: 0049F470
                          • _wcscmp.LIBCMT ref: 0049F484
                          • _wcscmp.LIBCMT ref: 0049F49F
                          • FindNextFileW.KERNEL32(?,?), ref: 0049F53D
                          • FindClose.KERNEL32(00000000), ref: 0049F553
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: Find$File_wcscmp$CloseFirstNextSleep_memmove
                          • String ID: *.*
                          • API String ID: 713712311-438819550
                          • Opcode ID: 22583bdf8c58cafa443640074d61deeb6e8413646a2a7aa3cf40e2858c58e463
                          • Instruction ID: c95a9b0225f00efbc07427010ac1d89e9f94a24d1ad8da4bdc78c68bd636d153
                          • Opcode Fuzzy Hash: 22583bdf8c58cafa443640074d61deeb6e8413646a2a7aa3cf40e2858c58e463
                          • Instruction Fuzzy Hash: 6641607190021AABCF14DF64CC45AEEBBB4FF04324F14457BE819A3291DB389A49CF58
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: __itow__swprintf
                          • String ID: 3cD$_D
                          • API String ID: 674341424-3978952248
                          • Opcode ID: cb10e9855861f0f108824b9e73d0a8ab9e1d82ff28692b718caf43d0480cbd60
                          • Instruction ID: bdf3aa83ff47b9f9662bf26db534db95e67b2b8f9b204d68e5997f657127be1d
                          • Opcode Fuzzy Hash: cb10e9855861f0f108824b9e73d0a8ab9e1d82ff28692b718caf43d0480cbd60
                          • Instruction Fuzzy Hash: 38229C716083009FD724DF14C881BAFB7E5AF88714F10891EF89A97291DB79ED05CB9A
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: _memmove
                          • String ID:
                          • API String ID: 4104443479-0
                          • Opcode ID: 351df61a553d89f4b0d8bab7a3b9f3e965639cf992d92c9ffeefe91b82eff81f
                          • Instruction ID: 0136ee98f4a995e8d0af7060850e90faefbab4dbcf511b793edbcfdfd68d274c
                          • Opcode Fuzzy Hash: 351df61a553d89f4b0d8bab7a3b9f3e965639cf992d92c9ffeefe91b82eff81f
                          • Instruction Fuzzy Hash: 8B12AC70A00609DFDF04EFA5D981AAEB3F5FF48304F10452AE846E7291EB39AD15CB59
                          APIs
                            • Part of subcall function 00434750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00434743,?,?,004337AE,?), ref: 00434770
                            • Part of subcall function 00494A31: GetFileAttributesW.KERNEL32(?,0049370B), ref: 00494A32
                          • FindFirstFileW.KERNEL32(?,?), ref: 00493B89
                          • DeleteFileW.KERNEL32(?,?,?,?), ref: 00493BD9
                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 00493BEA
                          • FindClose.KERNEL32(00000000), ref: 00493C01
                          • FindClose.KERNEL32(00000000), ref: 00493C0A
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                          • String ID: \*.*
                          • API String ID: 2649000838-1173974218
                          • Opcode ID: 72e85ba918383ba07dcb9e6a872228571ef0bec60a7213626963ac1f7f6fd37e
                          • Instruction ID: d8dc1e4f01d113869d3e96425cc8a40c080520d1729869760264a11d51463df0
                          • Opcode Fuzzy Hash: 72e85ba918383ba07dcb9e6a872228571ef0bec60a7213626963ac1f7f6fd37e
                          • Instruction Fuzzy Hash: 5F31A6710083849BC700EF64C8918AFBBE8AE96319F441E2EF4D593191EB29DA0DC75B
                          APIs
                            • Part of subcall function 004887E1: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0048882B
                            • Part of subcall function 004887E1: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00488858
                            • Part of subcall function 004887E1: GetLastError.KERNEL32 ref: 00488865
                          • ExitWindowsEx.USER32(?,00000000), ref: 004951F9
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                          • String ID: $@$SeShutdownPrivilege
                          • API String ID: 2234035333-194228
                          • Opcode ID: 1389ac64059d9f966f38854e6b9750652b5e3e2ed8a67d4c3d24748c45942284
                          • Instruction ID: fb276f45c7437fb82601d653e092b5351883d3a9bf588808ccbaadafda7ad656
                          • Opcode Fuzzy Hash: 1389ac64059d9f966f38854e6b9750652b5e3e2ed8a67d4c3d24748c45942284
                          • Instruction Fuzzy Hash: 720147317916012BEF2D2378AC8AFBB7A589B05741F3009BBF807E21D2D9691C018B9D
                          APIs
                          • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 004A62DC
                          • WSAGetLastError.WSOCK32(00000000), ref: 004A62EB
                          • bind.WSOCK32(00000000,?,00000010), ref: 004A6307
                          • listen.WSOCK32(00000000,00000005), ref: 004A6316
                          • WSAGetLastError.WSOCK32(00000000), ref: 004A6330
                          • closesocket.WSOCK32(00000000,00000000), ref: 004A6344
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: ErrorLast$bindclosesocketlistensocket
                          • String ID:
                          • API String ID: 1279440585-0
                          • Opcode ID: 95fe9e0f279773fe742e64cdd0403bff4b4be84b68a13ff7377113734321398b
                          • Instruction ID: 22c7b883ae8742e6fd7b62595de6454f249df19f1eef59f3813cd826ac779985
                          • Opcode Fuzzy Hash: 95fe9e0f279773fe742e64cdd0403bff4b4be84b68a13ff7377113734321398b
                          • Instruction Fuzzy Hash: BC21D2316002009FCB10EF64CC89B6EB7A9EF59324F15426AEC1AA7391CB74AC05CB59
                          APIs
                            • Part of subcall function 00450DB6: std::exception::exception.LIBCMT ref: 00450DEC
                            • Part of subcall function 00450DB6: __CxxThrowException@8.LIBCMT ref: 00450E01
                          • _memmove.LIBCMT ref: 00480258
                          • _memmove.LIBCMT ref: 0048036D
                          • _memmove.LIBCMT ref: 00480414
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: _memmove$Exception@8Throwstd::exception::exception
                          • String ID:
                          • API String ID: 1300846289-0
                          • Opcode ID: 4a3af8360bbf977dc885d52467a22fdaac40b817d8f78181060f3909674e6c39
                          • Instruction ID: 45f29d74af2ff3999dd4e101510ba26ab4fbd4f8a7b95cf934d5c4fb9e6f92b5
                          • Opcode Fuzzy Hash: 4a3af8360bbf977dc885d52467a22fdaac40b817d8f78181060f3909674e6c39
                          • Instruction Fuzzy Hash: CC02F3B0A00209DBDF04DF65D9816AEBBB5EF44304F10846EE809DB352EB39DD14CB59
                          APIs
                            • Part of subcall function 00432612: GetWindowLongW.USER32(?,000000EB), ref: 00432623
                          • DefDlgProcW.USER32(?,?,?,?,?), ref: 004319FA
                          • GetSysColor.USER32(0000000F), ref: 00431A4E
                          • SetBkColor.GDI32(?,00000000), ref: 00431A61
                            • Part of subcall function 00431290: DefDlgProcW.USER32(?,00000020,?), ref: 004312D8
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: ColorProc$LongWindow
                          • String ID:
                          • API String ID: 3744519093-0
                          • Opcode ID: 7c99ac3797a09dc911c8438948c31ecba3c23df8c82202df9e6a60ed9cf56039
                          • Instruction ID: 4d3c14569f4ee6dd12b5db41083a41e3e1535c7f62f98e04615189e27c99275a
                          • Opcode Fuzzy Hash: 7c99ac3797a09dc911c8438948c31ecba3c23df8c82202df9e6a60ed9cf56039
                          • Instruction Fuzzy Hash: 0FA138B1106544BAE628BB294C84EBF359CDF49386F14121FF502D62B2DB2C9D42D2BF
                          APIs
                            • Part of subcall function 004A7D8B: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 004A7DB6
                          • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 004A679E
                          • WSAGetLastError.WSOCK32(00000000), ref: 004A67C7
                          • bind.WSOCK32(00000000,?,00000010), ref: 004A6800
                          • WSAGetLastError.WSOCK32(00000000), ref: 004A680D
                          • closesocket.WSOCK32(00000000,00000000), ref: 004A6821
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: ErrorLast$bindclosesocketinet_addrsocket
                          • String ID:
                          • API String ID: 99427753-0
                          • Opcode ID: 78218cc9bb8ddd1da377c9693c06cd9a1aed396ae00b4a52984ae60e86ac50eb
                          • Instruction ID: 3eea943c551ce81199ced32f1d7c18ef665f4fcd0d463b1c4c324d58abd19862
                          • Opcode Fuzzy Hash: 78218cc9bb8ddd1da377c9693c06cd9a1aed396ae00b4a52984ae60e86ac50eb
                          • Instruction Fuzzy Hash: EF41E9757002006FDB50BF259C86F3E77A8DF59718F04856EF919AB3C2CA789D008B99
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: Window$EnabledForegroundIconicVisibleZoomed
                          • String ID:
                          • API String ID: 292994002-0
                          • Opcode ID: 5da4ff96d34a32415e7824ed71b4978bf7a552f9bfd541a97d6a4b92574d6dab
                          • Instruction ID: 897116ba3bd85d51b5b1eeab5d136dbae17226b8cad7d179d996eb52ee87043f
                          • Opcode Fuzzy Hash: 5da4ff96d34a32415e7824ed71b4978bf7a552f9bfd541a97d6a4b92574d6dab
                          • Instruction Fuzzy Hash: 241193317005116BD7216F269C44B9FBBD8EF447A1B55543AEC49D3341CBB89C028ABC
                          APIs
                          • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 004880C0
                          • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 004880CA
                          • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 004880D9
                          • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 004880E0
                          • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 004880F6
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: HeapInformationToken$AllocErrorLastProcess
                          • String ID:
                          • API String ID: 44706859-0
                          • Opcode ID: 1bdfed05c46f7c5d0e35ac6c0b728090418c1d69978cd3710dcda7b0c950d654
                          • Instruction ID: 79b10365de94e5e8e3486bf7d69b55f0d12b009a78aa809d51c1af920b8986cb
                          • Opcode Fuzzy Hash: 1bdfed05c46f7c5d0e35ac6c0b728090418c1d69978cd3710dcda7b0c950d654
                          • Instruction Fuzzy Hash: EBF0C270200215BFEB102FA9EC8CE6B3BACEF49754B40053AF909D2260CF609C05DB64
                          APIs
                          • CoInitialize.OLE32(00000000), ref: 0049C432
                          • CoCreateInstance.OLE32(004C2D6C,00000000,00000001,004C2BDC,?), ref: 0049C44A
                            • Part of subcall function 00437DE1: _memmove.LIBCMT ref: 00437E22
                          • CoUninitialize.OLE32 ref: 0049C6B7
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: CreateInitializeInstanceUninitialize_memmove
                          • String ID: .lnk
                          • API String ID: 2683427295-24824748
                          • Opcode ID: 45906759ee55bd5b4e56c6fa622e5a2e768e082983745796de67b80fccacf2f4
                          • Instruction ID: 818feba47952e1ccbcf2b1bf7275d2464afe948409f7fa354146054ea12b4a5f
                          • Opcode Fuzzy Hash: 45906759ee55bd5b4e56c6fa622e5a2e768e082983745796de67b80fccacf2f4
                          • Instruction Fuzzy Hash: 47A13CB1108205AFD700EF55C881EAFB7E8EF89358F00492EF15597192DBB5EE09CB56
                          APIs
                          • LoadLibraryA.KERNEL32(kernel32.dll,?,00434AD0), ref: 00434B45
                          • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00434B57
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: AddressLibraryLoadProc
                          • String ID: GetNativeSystemInfo$kernel32.dll
                          • API String ID: 2574300362-192647395
                          • Opcode ID: 3b4dccef4a982dd2c3de7519b0afb3be757c25e23bccc5c076cbefe684688332
                          • Instruction ID: 8a32a04e7db704ab49d8b0ec5992bddd280d08e45470e6f83909cc0daf9cda9d
                          • Opcode Fuzzy Hash: 3b4dccef4a982dd2c3de7519b0afb3be757c25e23bccc5c076cbefe684688332
                          • Instruction Fuzzy Hash: 36D0EC34A10712CFD7209B39DC28B86B6D4AF45351B21893A9499D6650D778F884C66C
                          APIs
                          • CreateToolhelp32Snapshot.KERNEL32 ref: 004AEE3D
                          • Process32FirstW.KERNEL32(00000000,?), ref: 004AEE4B
                            • Part of subcall function 00437DE1: _memmove.LIBCMT ref: 00437E22
                          • Process32NextW.KERNEL32(00000000,?), ref: 004AEF0B
                          • CloseHandle.KERNEL32(00000000,?,?,?), ref: 004AEF1A
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32_memmove
                          • String ID:
                          • API String ID: 2576544623-0
                          • Opcode ID: b413e34651b1c8394fb5600a8659ee1695dc55d794d80c6120c6efd9d8dec532
                          • Instruction ID: 41ccc6553a74aaf92ba2f11ad0535ff8a201547e20b3b4fed157f39afa418838
                          • Opcode Fuzzy Hash: b413e34651b1c8394fb5600a8659ee1695dc55d794d80c6120c6efd9d8dec532
                          • Instruction Fuzzy Hash: A751A1B1504300AFD320EF25DC81E6BB7E8EF99714F10492EF595972A1EB74AD08CB96
                          APIs
                          • lstrlenW.KERNEL32(?,?,?,00000000), ref: 0048E628
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: lstrlen
                          • String ID: ($|
                          • API String ID: 1659193697-1631851259
                          • Opcode ID: 31c32615d0123bb0c7e2c36f4f2ced55e8dd7f2f1ce382a6280a7d864f0b0d4a
                          • Instruction ID: 22b2dd8cf51e92b49bf98f3fba5adee8ae8b73a113321c8517d182a1b669106c
                          • Opcode Fuzzy Hash: 31c32615d0123bb0c7e2c36f4f2ced55e8dd7f2f1ce382a6280a7d864f0b0d4a
                          • Instruction Fuzzy Hash: 92323475A007059FDB28DF1AC48196AB7F0FF48320B15C86EE89ADB3A1E774E941CB44
                          APIs
                          • InternetQueryDataAvailable.WININET(00000001,?,00000000,00000000,00000000,?,?,?,?,?,?,?,?,004A180A,00000000), ref: 004A23E1
                          • InternetReadFile.WININET(00000001,00000000,00000001,00000001), ref: 004A2418
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: Internet$AvailableDataFileQueryRead
                          • String ID:
                          • API String ID: 599397726-0
                          • Opcode ID: d78afe4572322f3acd911b1cee69d646ebf219242cd37472d8bab35a81c4e23e
                          • Instruction ID: 0cdcbf05e7ce2c072d3d8187994bf3b1292e9d111cf5978293426fcf2b320c73
                          • Opcode Fuzzy Hash: d78afe4572322f3acd911b1cee69d646ebf219242cd37472d8bab35a81c4e23e
                          • Instruction Fuzzy Hash: 4B413771504209BFEF10DEA9CE81EBB77BCEB52314F10406FFA00A6241DABC9E41A758
                          APIs
                          • SetErrorMode.KERNEL32(00000001), ref: 0049B343
                          • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 0049B39D
                          • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 0049B3EA
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: ErrorMode$DiskFreeSpace
                          • String ID:
                          • API String ID: 1682464887-0
                          • Opcode ID: 27df176a4230bccca11de6534a895865efc3f2dc413fd48a8d7ab1721c083f91
                          • Instruction ID: cd2d5f1d38bdddb2ebe230febfbcea1e8a4d0b5683c1f016cc3888ad1ab12c32
                          • Opcode Fuzzy Hash: 27df176a4230bccca11de6534a895865efc3f2dc413fd48a8d7ab1721c083f91
                          • Instruction Fuzzy Hash: 18215E35A00108EFCB00EFA5D885AEDBBB8FF49314F1481AAE905AB351CB359D19CB55
                          APIs
                            • Part of subcall function 00450DB6: std::exception::exception.LIBCMT ref: 00450DEC
                            • Part of subcall function 00450DB6: __CxxThrowException@8.LIBCMT ref: 00450E01
                          • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0048882B
                          • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00488858
                          • GetLastError.KERNEL32 ref: 00488865
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: AdjustErrorException@8LastLookupPrivilegePrivilegesThrowTokenValuestd::exception::exception
                          • String ID:
                          • API String ID: 1922334811-0
                          • Opcode ID: 591e55f36c58ff1ca9e89c490ea7aa250a08587bd57758adf6f185c81fc63d6f
                          • Instruction ID: 44fd6b5978381c4223981471ae481d606672576ee99ce7c730e5d2371ed90c61
                          • Opcode Fuzzy Hash: 591e55f36c58ff1ca9e89c490ea7aa250a08587bd57758adf6f185c81fc63d6f
                          • Instruction Fuzzy Hash: B911BFB2404205AFE718EFA4DC85D2BB7F8EB04311B60852EF85593212EB34BC048B64
                          APIs
                          • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 00488774
                          • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 0048878B
                          • FreeSid.ADVAPI32(?), ref: 0048879B
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: AllocateCheckFreeInitializeMembershipToken
                          • String ID:
                          • API String ID: 3429775523-0
                          • Opcode ID: 386ceebf5b5a27f8f372b48027186c2ba5ab66a2918bc483bd29f37b3549962c
                          • Instruction ID: e367b31ae513eb1ebf8fbe74008512d53d981ee92f636ef93e22fb0967879789
                          • Opcode Fuzzy Hash: 386ceebf5b5a27f8f372b48027186c2ba5ab66a2918bc483bd29f37b3549962c
                          • Instruction Fuzzy Hash: 90F04F7595130CBFDF00DFF4DC89AAEB7BCEF08201F504579A505E2191D6756A488B54
                          APIs
                          • __time64.LIBCMT ref: 0049889B
                            • Part of subcall function 0045520A: GetSystemTimeAsFileTime.KERNEL32(00000000,?,?,?,00498F6E,00000000,?,?,?,?,0049911F,00000000,?), ref: 00455213
                            • Part of subcall function 0045520A: __aulldiv.LIBCMT ref: 00455233
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: Time$FileSystem__aulldiv__time64
                          • String ID: 0eO
                          • API String ID: 2893107130-633601889
                          • Opcode ID: 87a85016b41be3342b1ea848f0d837c71bf747edc38200afd93f0f845cf9d770
                          • Instruction ID: 322450015eccb100fb1152b0f8b4275a8a9636f91a9386166dc1aea2a12f82a7
                          • Opcode Fuzzy Hash: 87a85016b41be3342b1ea848f0d837c71bf747edc38200afd93f0f845cf9d770
                          • Instruction Fuzzy Hash: 7521B4326355108BC729CF29D841A62B7E1EFA5311B698E7DD1F5CB2D0CB34B905CB58
                          APIs
                          • FindFirstFileW.KERNEL32(?,?), ref: 0049C6FB
                          • FindClose.KERNEL32(00000000), ref: 0049C72B
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: Find$CloseFileFirst
                          • String ID:
                          • API String ID: 2295610775-0
                          • Opcode ID: 4e51ee8064c0f90d3612b502c40801a4b426e762f04c7ae9d056d0d996c1f545
                          • Instruction ID: 052eea4fec4336a2f994dad91ef24d4591c447ea34191900e320a19b3586a6a2
                          • Opcode Fuzzy Hash: 4e51ee8064c0f90d3612b502c40801a4b426e762f04c7ae9d056d0d996c1f545
                          • Instruction Fuzzy Hash: B01182716102009FDB14EF29D88592AF7E4EF85324F00856EF8A987290DB74AC05CF85
                          APIs
                          • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,00000016,?,004A9468,?,004BFB84,?), ref: 0049A097
                          • FormatMessageW.KERNEL32(00001000,00000000,000000FF,00000000,?,00000FFF,00000000,00000016,?,004A9468,?,004BFB84,?), ref: 0049A0A9
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: ErrorFormatLastMessage
                          • String ID:
                          • API String ID: 3479602957-0
                          • Opcode ID: 38ac3e07880e6ab55a1db55ad630cc7dd8657f35acc07b4e4a0a100d79fc0d61
                          • Instruction ID: 013f2d71780aecbc309f99a3b5abb5da711d41590e65d135f7e38b9e7669746a
                          • Opcode Fuzzy Hash: 38ac3e07880e6ab55a1db55ad630cc7dd8657f35acc07b4e4a0a100d79fc0d61
                          • Instruction Fuzzy Hash: 00F0823510522DABDB219FA4CC48FEA77ACBF08361F00426AF909D7291D6349954CBE6
                          APIs
                          • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00488309), ref: 004881E0
                          • CloseHandle.KERNEL32(?,?,00488309), ref: 004881F2
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: AdjustCloseHandlePrivilegesToken
                          • String ID:
                          • API String ID: 81990902-0
                          • Opcode ID: fa54c81f25ac2958b9f1753a54a7f7c2e98ffcc22a2b4aacb68839f928dbd55e
                          • Instruction ID: c39ba2021f9f491ffd5f223a72ff11f164aaf03953ac32fadb0d8706cd46c1de
                          • Opcode Fuzzy Hash: fa54c81f25ac2958b9f1753a54a7f7c2e98ffcc22a2b4aacb68839f928dbd55e
                          • Instruction Fuzzy Hash: A1E08C32010611AFE7212B21EC09D7B7BEAEF04315724893EF8AA80431CB22AC94DB18
                          APIs
                          • SetUnhandledExceptionFilter.KERNEL32(00000000,?,00458D57,?,?,?,00000001), ref: 0045A15A
                          • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 0045A163
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: ExceptionFilterUnhandled
                          • String ID:
                          • API String ID: 3192549508-0
                          • Opcode ID: 3e9d539b575c0c63c9de12c45c5682115cb5ec51b70c8cbcfea6a0a816f17b34
                          • Instruction ID: a075d9e47cbb1835aac0b86d1db2a18de91b7f17087bed901930b20f7181ddee
                          • Opcode Fuzzy Hash: 3e9d539b575c0c63c9de12c45c5682115cb5ec51b70c8cbcfea6a0a816f17b34
                          • Instruction Fuzzy Hash: F8B09231054208ABCA002B91EC09B883FA8EB54AA2F409130FA0E84C60CB6254548A99
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 1a067cf7fe18c78231ac75fe64c90add8491e9684d62f466b3a83a1279aeaeaf
                          • Instruction ID: 2a75325ba9bd5515e2c22bc6bed21b5331c8d2a43d786c067f5b3d5b0a40a215
                          • Opcode Fuzzy Hash: 1a067cf7fe18c78231ac75fe64c90add8491e9684d62f466b3a83a1279aeaeaf
                          • Instruction Fuzzy Hash: EB324661D29F014ED7639634D832336A248AFB73C9F14D737FC19B5AA6EB28D8874109
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: fb839485504853003e39333346b6d179682e3f12be758fa0e3c188e027fd3139
                          • Instruction ID: 4ec43e41a5ed58355e6c5631dc69b7af3b9f9edafac0459d835274f60a3dc232
                          • Opcode Fuzzy Hash: fb839485504853003e39333346b6d179682e3f12be758fa0e3c188e027fd3139
                          • Instruction Fuzzy Hash: FDB12030E2AF454DD36396398935336BA4CAFBB2C9F51D72BFC2670D22EB2185934145
                          APIs
                          • mouse_event.USER32(00000004,00000000,00000000,00000000,00000000), ref: 00494C76
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: mouse_event
                          • String ID:
                          • API String ID: 2434400541-0
                          • Opcode ID: 199f9fc8e044cc8a9bb3ef738b75ef0820a12614c89c48681c31e997b1fd66c5
                          • Instruction ID: 3edbb597b197f9bc0689ca2e3291a3d5e6c1cd43ab9d48e4bb8910a0055e2f98
                          • Opcode Fuzzy Hash: 199f9fc8e044cc8a9bb3ef738b75ef0820a12614c89c48681c31e997b1fd66c5
                          • Instruction Fuzzy Hash: 75D05EA012220A3DECA80720CD5FFBB1909E3C0795F86C17B7241952C1E8DC6803A03D
                          APIs
                          • LogonUserW.ADVAPI32(?,00000001,?,?,00000000,00488389), ref: 004887D1
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: LogonUser
                          • String ID:
                          • API String ID: 1244722697-0
                          • Opcode ID: 8824dc4b7df1e353a1dcbbb959f6b633c2cfd80876bfaeaf3fa433245804c441
                          • Instruction ID: 1d00d46061c686e3f10d267c637dd3566d94da0f4c3f757cb04711a123e74e3a
                          • Opcode Fuzzy Hash: 8824dc4b7df1e353a1dcbbb959f6b633c2cfd80876bfaeaf3fa433245804c441
                          • Instruction Fuzzy Hash: 08D05E3226050EABEF019EA4DC02EAE3B69EB04B01F408121FE15C50A1C775E835AB60
                          APIs
                          • SetUnhandledExceptionFilter.KERNEL32(?), ref: 0045A12A
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: ExceptionFilterUnhandled
                          • String ID:
                          • API String ID: 3192549508-0
                          • Opcode ID: 833e008c856389094ed8f7b625b265ee6fbd632d459089db0fbe85a7aad122aa
                          • Instruction ID: 07c3cf51378e8e2cb391969c7cf96deda484a3edf4a1a4d3a50dbbef239d57a8
                          • Opcode Fuzzy Hash: 833e008c856389094ed8f7b625b265ee6fbd632d459089db0fbe85a7aad122aa
                          • Instruction Fuzzy Hash: EDA0113000020CAB8A002B82EC08888BFACEA002A0B008030F80E808228B32A8208A88
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 413dd36d905b2f0ed312ba02c1d044cec4ec28d8e6b712eb562a6ee50bbd68a2
                          • Instruction ID: 16e6ecc3f3a490f6546d3eb96cec47fdd0950cb5658ed1af10714e3e8864bd24
                          • Opcode Fuzzy Hash: 413dd36d905b2f0ed312ba02c1d044cec4ec28d8e6b712eb562a6ee50bbd68a2
                          • Instruction Fuzzy Hash: 87224730904546CBEF389A64C49477E77A1FB41304F28886FD9429B692DFBC9D92CB4E
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                          • Instruction ID: a657e96a5fd69ee023ba3b57fe23091c84aa4d742d73d5aece2d39dcdc14b80a
                          • Opcode Fuzzy Hash: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                          • Instruction Fuzzy Hash: 2EC194322050930ADB2D4639853413FBAA15EA37B371A075FDCB3CB2D6EE18D92DD624
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                          • Instruction ID: 5298415ba48e282cbcbfdb2a03570802c99161a43fed6e2753e21ff239c1f2ed
                          • Opcode Fuzzy Hash: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                          • Instruction Fuzzy Hash: DAC1C6322050930ADF2D4639853413FBAA15EA37B271A075FDCB2DB2D6EE18D92DD624
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                          • Instruction ID: 1c905a688ab3d13a7d57946aa2942c1e622466bf09cdbddc61faca874ff65930
                          • Opcode Fuzzy Hash: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                          • Instruction Fuzzy Hash: 9AC1753220519309DF2D4639847423FBAA15EA27B331A075FDCB3CB2E6EE18D96DD614
                          APIs
                          • DeleteObject.GDI32(00000000), ref: 004A785B
                          • DeleteObject.GDI32(00000000), ref: 004A786D
                          • DestroyWindow.USER32 ref: 004A787B
                          • GetDesktopWindow.USER32 ref: 004A7895
                          • GetWindowRect.USER32(00000000), ref: 004A789C
                          • SetRect.USER32(?,00000000,00000000,000001F4,00000190), ref: 004A79DD
                          • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000002), ref: 004A79ED
                          • CreateWindowExW.USER32(00000002,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 004A7A35
                          • GetClientRect.USER32(00000000,?), ref: 004A7A41
                          • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 004A7A7B
                          • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 004A7A9D
                          • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 004A7AB0
                          • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 004A7ABB
                          • GlobalLock.KERNEL32(00000000), ref: 004A7AC4
                          • ReadFile.KERNEL32(00000000,00000000,00000000,00000190,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 004A7AD3
                          • GlobalUnlock.KERNEL32(00000000), ref: 004A7ADC
                          • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 004A7AE3
                          • GlobalFree.KERNEL32(00000000), ref: 004A7AEE
                          • CreateStreamOnHGlobal.OLE32(00000000,00000001,88C00000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 004A7B00
                          • OleLoadPicture.OLEAUT32(88C00000,00000000,00000000,004C2CAC,00000000), ref: 004A7B16
                          • GlobalFree.KERNEL32(00000000), ref: 004A7B26
                          • CopyImage.USER32(000001F4,00000000,00000000,00000000,00002000), ref: 004A7B4C
                          • SendMessageW.USER32(?,00000172,00000000,000001F4), ref: 004A7B6B
                          • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 004A7B8D
                          • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 004A7D7A
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                          • String ID: $AutoIt v3$DISPLAY$static
                          • API String ID: 2211948467-2373415609
                          • Opcode ID: d0ef7831147f409728552efc82b7c8db152d594602f7e342455dfe7a3720dc30
                          • Instruction ID: 9d174577acfaf846f0efef7d241e86aaf4933d77a7443e79a57ad5e0aacdee0b
                          • Opcode Fuzzy Hash: d0ef7831147f409728552efc82b7c8db152d594602f7e342455dfe7a3720dc30
                          • Instruction Fuzzy Hash: 68027071900105EFDB14DFA8DC89EAE7BB9FF49314F10426AF905AB2A1C774AD05CB68
                          APIs
                          • CharUpperBuffW.USER32(?,?,004BF910), ref: 004B3627
                          • IsWindowVisible.USER32(?), ref: 004B364B
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: BuffCharUpperVisibleWindow
                          • String ID: ADDSTRING$CHECK$CURRENTTAB$DELSTRING$EDITPASTE$FINDSTRING$GETCURRENTCOL$GETCURRENTLINE$GETCURRENTSELECTION$GETLINE$GETLINECOUNT$GETSELECTED$HIDEDROPDOWN$ISCHECKED$ISENABLED$ISVISIBLE$SELECTSTRING$SENDCOMMANDID$SETCURRENTSELECTION$SHOWDROPDOWN$TABLEFT$TABRIGHT$UNCHECK
                          • API String ID: 4105515805-45149045
                          • Opcode ID: 37b6da3ef58ba0dec24ea2a0c796960bfde3353040a3548432e562c00bc78da5
                          • Instruction ID: 0b268240c946aad4d7549058dc85b8d51b002f049c8d1aea90deeab0cead7edd
                          • Opcode Fuzzy Hash: 37b6da3ef58ba0dec24ea2a0c796960bfde3353040a3548432e562c00bc78da5
                          • Instruction Fuzzy Hash: 43D171742043019BCB14EF12C451AAE77A1AF95349F14885FF8855B3E3DB39EE0ACB5A
                          APIs
                          • SetTextColor.GDI32(?,00000000), ref: 004BA630
                          • GetSysColorBrush.USER32(0000000F), ref: 004BA661
                          • GetSysColor.USER32(0000000F), ref: 004BA66D
                          • SetBkColor.GDI32(?,000000FF), ref: 004BA687
                          • SelectObject.GDI32(?,00000000), ref: 004BA696
                          • InflateRect.USER32(?,000000FF,000000FF), ref: 004BA6C1
                          • GetSysColor.USER32(00000010), ref: 004BA6C9
                          • CreateSolidBrush.GDI32(00000000), ref: 004BA6D0
                          • FrameRect.USER32(?,?,00000000), ref: 004BA6DF
                          • DeleteObject.GDI32(00000000), ref: 004BA6E6
                          • InflateRect.USER32(?,000000FE,000000FE), ref: 004BA731
                          • FillRect.USER32(?,?,00000000), ref: 004BA763
                          • GetWindowLongW.USER32(?,000000F0), ref: 004BA78E
                            • Part of subcall function 004BA8CA: GetSysColor.USER32(00000012), ref: 004BA903
                            • Part of subcall function 004BA8CA: SetTextColor.GDI32(?,?), ref: 004BA907
                            • Part of subcall function 004BA8CA: GetSysColorBrush.USER32(0000000F), ref: 004BA91D
                            • Part of subcall function 004BA8CA: GetSysColor.USER32(0000000F), ref: 004BA928
                            • Part of subcall function 004BA8CA: GetSysColor.USER32(00000011), ref: 004BA945
                            • Part of subcall function 004BA8CA: CreatePen.GDI32(00000000,00000001,00743C00), ref: 004BA953
                            • Part of subcall function 004BA8CA: SelectObject.GDI32(?,00000000), ref: 004BA964
                            • Part of subcall function 004BA8CA: SetBkColor.GDI32(?,00000000), ref: 004BA96D
                            • Part of subcall function 004BA8CA: SelectObject.GDI32(?,?), ref: 004BA97A
                            • Part of subcall function 004BA8CA: InflateRect.USER32(?,000000FF,000000FF), ref: 004BA999
                            • Part of subcall function 004BA8CA: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 004BA9B0
                            • Part of subcall function 004BA8CA: GetWindowLongW.USER32(00000000,000000F0), ref: 004BA9C5
                            • Part of subcall function 004BA8CA: SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 004BA9ED
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameMessageRoundSendSolid
                          • String ID:
                          • API String ID: 3521893082-0
                          • Opcode ID: 7abb7b5a04b7716125a7bea1f06a5b4c1f1ec81e32e7b6c771f0a164e292fe9e
                          • Instruction ID: 4330a7a9623b758152961859e2349c64fe57bd1d5b97182c5581baf5a54f6ec1
                          • Opcode Fuzzy Hash: 7abb7b5a04b7716125a7bea1f06a5b4c1f1ec81e32e7b6c771f0a164e292fe9e
                          • Instruction Fuzzy Hash: 18917071408301FFCB109F68DC08A9B7BA9FF48321F104B3AF966961A1D775D949CB6A
                          APIs
                          • DestroyWindow.USER32(?,?,?), ref: 00432CA2
                          • DeleteObject.GDI32(00000000), ref: 00432CE8
                          • DeleteObject.GDI32(00000000), ref: 00432CF3
                          • DestroyIcon.USER32(00000000,?,?,?), ref: 00432CFE
                          • DestroyWindow.USER32(00000000,?,?,?), ref: 00432D09
                          • SendMessageW.USER32(?,00001308,?,00000000), ref: 0046C43B
                          • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 0046C474
                          • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 0046C89D
                            • Part of subcall function 00431B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00432036,?,00000000,?,?,?,?,004316CB,00000000,?), ref: 00431B9A
                          • SendMessageW.USER32(?,00001053), ref: 0046C8DA
                          • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 0046C8F1
                          • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 0046C907
                          • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 0046C912
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: Destroy$ImageList_MessageSendWindow$DeleteObject$IconInvalidateMoveRectRemove
                          • String ID: 0
                          • API String ID: 464785882-4108050209
                          • Opcode ID: e75a72c004d0b16f19b3e4deb0c2d1aad53c23399a871a803bec9e251a4eab1b
                          • Instruction ID: 90a9843a44511c2f406ae094692b5f9139fe7a925ef081163cdf4326d289b729
                          • Opcode Fuzzy Hash: e75a72c004d0b16f19b3e4deb0c2d1aad53c23399a871a803bec9e251a4eab1b
                          • Instruction Fuzzy Hash: 74128F30100211EFDB20DF24C984BBAB7A1BF08315F54557BE899CB262D779EC46CB9A
                          APIs
                          • DestroyWindow.USER32(00000000), ref: 004A74DE
                          • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 004A759D
                          • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 004A75DB
                          • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000006), ref: 004A75ED
                          • CreateWindowExW.USER32(00000006,AutoIt v3,?,88C00000,?,?,?,?,00000000,00000000,00000000), ref: 004A7633
                          • GetClientRect.USER32(00000000,?), ref: 004A763F
                          • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000), ref: 004A7683
                          • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 004A7692
                          • GetStockObject.GDI32(00000011), ref: 004A76A2
                          • SelectObject.GDI32(00000000,00000000), ref: 004A76A6
                          • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?), ref: 004A76B6
                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004A76BF
                          • DeleteDC.GDI32(00000000), ref: 004A76C8
                          • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 004A76F4
                          • SendMessageW.USER32(00000030,00000000,00000001), ref: 004A770B
                          • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,00000000,00000000,00000000), ref: 004A7746
                          • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 004A775A
                          • SendMessageW.USER32(00000404,00000001,00000000), ref: 004A776B
                          • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,00000000,00000000,00000000), ref: 004A779B
                          • GetStockObject.GDI32(00000011), ref: 004A77A6
                          • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 004A77B1
                          • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?,?,?,?), ref: 004A77BB
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                          • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                          • API String ID: 2910397461-517079104
                          • Opcode ID: abbb5aa052789cf38cba546dd165cff6e28e9b1a7aeaf1a914b50994832d095c
                          • Instruction ID: a9b32efbb8d84d1adf237f4a4397c730cc2acf76f9f61c4fff17d1d67b21ad56
                          • Opcode Fuzzy Hash: abbb5aa052789cf38cba546dd165cff6e28e9b1a7aeaf1a914b50994832d095c
                          • Instruction Fuzzy Hash: 76A17371A00605BFEB14DBA8DC4AFAF7B69EB09714F114265FA14A72E0C674AD10CF68
                          APIs
                          • SetErrorMode.KERNEL32(00000001), ref: 0049AD1E
                          • GetDriveTypeW.KERNEL32(?,004BFAC0,?,\\.\,004BF910), ref: 0049ADFB
                          • SetErrorMode.KERNEL32(00000000,004BFAC0,?,\\.\,004BF910), ref: 0049AF59
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: ErrorMode$DriveType
                          • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                          • API String ID: 2907320926-4222207086
                          • Opcode ID: 2a612b507905c0d604a238fd284f892f130157e80018aebee418c59a64baba5f
                          • Instruction ID: 2d4c8738eabbb27ead5b1bb68ed8b33ec2be632e8a59cbcf6c04d11ee773b161
                          • Opcode Fuzzy Hash: 2a612b507905c0d604a238fd284f892f130157e80018aebee418c59a64baba5f
                          • Instruction Fuzzy Hash: 2151B4B06441059B8F10DB11C942DBE7BA1EB48709B30417FF80AA7694DA7DAD22DB8F
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: __wcsnicmp
                          • String ID: #OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                          • API String ID: 1038674560-86951937
                          • Opcode ID: 122a88f8a6f96f21aaae48215cd7d99f25a4247e869de03fca5b911895c4cd32
                          • Instruction ID: 271ea1fbd57a96a91c6bd982e6ea5f843a8e7eb4efd9c11468fa0507a5e1a075
                          • Opcode Fuzzy Hash: 122a88f8a6f96f21aaae48215cd7d99f25a4247e869de03fca5b911895c4cd32
                          • Instruction Fuzzy Hash: 84810CB46002067ACF10AF62DC43FAF37A8AF09745F14902BFD056B292EB6DD945C66D
                          APIs
                          • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000103,?,?,?), ref: 004B9AD2
                          • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 004B9B8B
                          • SendMessageW.USER32(?,00001102,00000002,?), ref: 004B9BA7
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: MessageSend$Window
                          • String ID: 0
                          • API String ID: 2326795674-4108050209
                          • Opcode ID: ba20d1aa00bf13c266d35604fc3d3ef9ccf220ffb065fd011d32879bd180d7fc
                          • Instruction ID: a55902f07b5eb8a11621bb23b8f8a8d61baaebbcef74c89d174f2ecae72b8bbc
                          • Opcode Fuzzy Hash: ba20d1aa00bf13c266d35604fc3d3ef9ccf220ffb065fd011d32879bd180d7fc
                          • Instruction Fuzzy Hash: 2202AD30104201ABD725CF24C849BEBBBE5FF49314F04862EFA99963A1C778DD55CB6A
                          APIs
                          • GetSysColor.USER32(00000012), ref: 004BA903
                          • SetTextColor.GDI32(?,?), ref: 004BA907
                          • GetSysColorBrush.USER32(0000000F), ref: 004BA91D
                          • GetSysColor.USER32(0000000F), ref: 004BA928
                          • CreateSolidBrush.GDI32(?), ref: 004BA92D
                          • GetSysColor.USER32(00000011), ref: 004BA945
                          • CreatePen.GDI32(00000000,00000001,00743C00), ref: 004BA953
                          • SelectObject.GDI32(?,00000000), ref: 004BA964
                          • SetBkColor.GDI32(?,00000000), ref: 004BA96D
                          • SelectObject.GDI32(?,?), ref: 004BA97A
                          • InflateRect.USER32(?,000000FF,000000FF), ref: 004BA999
                          • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 004BA9B0
                          • GetWindowLongW.USER32(00000000,000000F0), ref: 004BA9C5
                          • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 004BA9ED
                          • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 004BAA14
                          • InflateRect.USER32(?,000000FD,000000FD), ref: 004BAA32
                          • DrawFocusRect.USER32(?,?), ref: 004BAA3D
                          • GetSysColor.USER32(00000011), ref: 004BAA4B
                          • SetTextColor.GDI32(?,00000000), ref: 004BAA53
                          • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 004BAA67
                          • SelectObject.GDI32(?,004BA5FA), ref: 004BAA7E
                          • DeleteObject.GDI32(?), ref: 004BAA89
                          • SelectObject.GDI32(?,?), ref: 004BAA8F
                          • DeleteObject.GDI32(?), ref: 004BAA94
                          • SetTextColor.GDI32(?,?), ref: 004BAA9A
                          • SetBkColor.GDI32(?,?), ref: 004BAAA4
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                          • String ID:
                          • API String ID: 1996641542-0
                          • Opcode ID: 16761ad7a0f20b827dd8f738f3b03078ff92bfb445c586b7aa3655471fcf271c
                          • Instruction ID: d43c3baa796381f7886760aa9eda615cf9d3b29bf43846211d731146408bb412
                          • Opcode Fuzzy Hash: 16761ad7a0f20b827dd8f738f3b03078ff92bfb445c586b7aa3655471fcf271c
                          • Instruction Fuzzy Hash: 83513B71900208FFDF109FA8DC48EEE7BB9EB08320F114626F915AB2A1D7759954DFA4
                          APIs
                          • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 004B8AC1
                          • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 004B8AD2
                          • CharNextW.USER32(0000014E), ref: 004B8B01
                          • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 004B8B42
                          • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 004B8B58
                          • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 004B8B69
                          • SendMessageW.USER32(?,000000C2,00000001,0000014E), ref: 004B8B86
                          • SetWindowTextW.USER32(?,0000014E), ref: 004B8BD8
                          • SendMessageW.USER32(?,000000B1,000F4240,000F423F), ref: 004B8BEE
                          • SendMessageW.USER32(?,00001002,00000000,?), ref: 004B8C1F
                          • _memset.LIBCMT ref: 004B8C44
                          • SendMessageW.USER32(00000000,00001060,00000001,00000004), ref: 004B8C8D
                          • _memset.LIBCMT ref: 004B8CEC
                          • SendMessageW.USER32(?,00001053,000000FF,?), ref: 004B8D16
                          • SendMessageW.USER32(?,00001074,?,00000001), ref: 004B8D6E
                          • SendMessageW.USER32(?,0000133D,?,?), ref: 004B8E1B
                          • InvalidateRect.USER32(?,00000000,00000001), ref: 004B8E3D
                          • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 004B8E87
                          • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 004B8EB4
                          • DrawMenuBar.USER32(?), ref: 004B8EC3
                          • SetWindowTextW.USER32(?,0000014E), ref: 004B8EEB
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: MessageSend$Menu$InfoItemTextWindow_memset$CharDrawInvalidateNextRect
                          • String ID: 0
                          • API String ID: 1073566785-4108050209
                          • Opcode ID: 5da6fab308d23ffb1096eb7b6c37fb782aba5dc3ef0fb3bae4b0454bf510b8d5
                          • Instruction ID: 23d7fdc5e285c6afd07a961b29afc5a6fd05d39e59d57e9652904b062814a4bf
                          • Opcode Fuzzy Hash: 5da6fab308d23ffb1096eb7b6c37fb782aba5dc3ef0fb3bae4b0454bf510b8d5
                          • Instruction Fuzzy Hash: A6E19270900208ABDF209F65CC84EEF7B7DEF09710F10815BFA15AA291DB789985DF69
                          APIs
                          • GetCursorPos.USER32(?), ref: 004B49CA
                          • GetDesktopWindow.USER32 ref: 004B49DF
                          • GetWindowRect.USER32(00000000), ref: 004B49E6
                          • GetWindowLongW.USER32(?,000000F0), ref: 004B4A48
                          • DestroyWindow.USER32(?), ref: 004B4A74
                          • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 004B4A9D
                          • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 004B4ABB
                          • SendMessageW.USER32(?,00000439,00000000,00000030), ref: 004B4AE1
                          • SendMessageW.USER32(?,00000421,?,?), ref: 004B4AF6
                          • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 004B4B09
                          • IsWindowVisible.USER32(?), ref: 004B4B29
                          • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 004B4B44
                          • SendMessageW.USER32(?,00000411,00000001,00000030), ref: 004B4B58
                          • GetWindowRect.USER32(?,?), ref: 004B4B70
                          • MonitorFromPoint.USER32(?,?,00000002), ref: 004B4B96
                          • GetMonitorInfoW.USER32(00000000,?), ref: 004B4BB0
                          • CopyRect.USER32(?,?), ref: 004B4BC7
                          • SendMessageW.USER32(?,00000412,00000000), ref: 004B4C32
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                          • String ID: ($0$tooltips_class32
                          • API String ID: 698492251-4156429822
                          • Opcode ID: 303280a4eb93fc09dbaa22a0c33e1c23ad95869dc3d9c0dc457ad9f3200cb728
                          • Instruction ID: f9360dae1ad0de899de88b421a9a3c9e5d919ddb6dce7d9d00b9f58ba266f128
                          • Opcode Fuzzy Hash: 303280a4eb93fc09dbaa22a0c33e1c23ad95869dc3d9c0dc457ad9f3200cb728
                          • Instruction Fuzzy Hash: 03B17E71604340AFDB04DF65C884B9BBBE4BF88714F008A1EF9999B292D775EC05CB69
                          APIs
                          • GetFileVersionInfoSizeW.VERSION(?,?), ref: 004944AC
                          • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 004944D2
                          • _wcscpy.LIBCMT ref: 00494500
                          • _wcscmp.LIBCMT ref: 0049450B
                          • _wcscat.LIBCMT ref: 00494521
                          • _wcsstr.LIBCMT ref: 0049452C
                          • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 00494548
                          • _wcscat.LIBCMT ref: 00494591
                          • _wcscat.LIBCMT ref: 00494598
                          • _wcsncpy.LIBCMT ref: 004945C3
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: _wcscat$FileInfoVersion$QuerySizeValue_wcscmp_wcscpy_wcsncpy_wcsstr
                          • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                          • API String ID: 699586101-1459072770
                          • Opcode ID: 643ab4b75bf11da73397c69c30b3eaea8810e31a86f092cd954ed973d0ac93a1
                          • Instruction ID: 47dcc92a03768fed43477dabcb6cf82c3255cb2820327f8a8ec02472e7d01941
                          • Opcode Fuzzy Hash: 643ab4b75bf11da73397c69c30b3eaea8810e31a86f092cd954ed973d0ac93a1
                          • Instruction Fuzzy Hash: 3641F8715002007BDB10AA75CC07EBF7B6CDF86715F10006FFD08A6183EA7C9A0A86AD
                          APIs
                          • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 004328BC
                          • GetSystemMetrics.USER32(00000007), ref: 004328C4
                          • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 004328EF
                          • GetSystemMetrics.USER32(00000008), ref: 004328F7
                          • GetSystemMetrics.USER32(00000004), ref: 0043291C
                          • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 00432939
                          • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 00432949
                          • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 0043297C
                          • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00432990
                          • GetClientRect.USER32(00000000,000000FF), ref: 004329AE
                          • GetStockObject.GDI32(00000011), ref: 004329CA
                          • SendMessageW.USER32(00000000,00000030,00000000), ref: 004329D5
                            • Part of subcall function 00432344: GetCursorPos.USER32(?), ref: 00432357
                            • Part of subcall function 00432344: ScreenToClient.USER32(004F57B0,?), ref: 00432374
                            • Part of subcall function 00432344: GetAsyncKeyState.USER32(00000001), ref: 00432399
                            • Part of subcall function 00432344: GetAsyncKeyState.USER32(00000002), ref: 004323A7
                          • SetTimer.USER32(00000000,00000000,00000028,00431256), ref: 004329FC
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                          • String ID: AutoIt v3 GUI
                          • API String ID: 1458621304-248962490
                          • Opcode ID: ba1863de7012d3f676423803fa6413344796acf7870f3e7c162353cbe3011c74
                          • Instruction ID: 139a87d1f6620010c9d41582e0cfa1340ecca3fbf89163c7321fc33a5ada33fe
                          • Opcode Fuzzy Hash: ba1863de7012d3f676423803fa6413344796acf7870f3e7c162353cbe3011c74
                          • Instruction Fuzzy Hash: 66B15271600209EFDB14EFA8DD45BEE7BB4FB08315F10422AFA1597290DB78A851CF59
                          APIs
                          • GetClassNameW.USER32(?,?,00000100), ref: 0048A47A
                          • __swprintf.LIBCMT ref: 0048A51B
                          • _wcscmp.LIBCMT ref: 0048A52E
                          • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 0048A583
                          • _wcscmp.LIBCMT ref: 0048A5BF
                          • GetClassNameW.USER32(?,?,00000400), ref: 0048A5F6
                          • GetDlgCtrlID.USER32(?), ref: 0048A648
                          • GetWindowRect.USER32(?,?), ref: 0048A67E
                          • GetParent.USER32(?), ref: 0048A69C
                          • ScreenToClient.USER32(00000000), ref: 0048A6A3
                          • GetClassNameW.USER32(?,?,00000100), ref: 0048A71D
                          • _wcscmp.LIBCMT ref: 0048A731
                          • GetWindowTextW.USER32(?,?,00000400), ref: 0048A757
                          • _wcscmp.LIBCMT ref: 0048A76B
                            • Part of subcall function 0045362C: _iswctype.LIBCMT ref: 00453634
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: _wcscmp$ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_iswctype
                          • String ID: %s%u
                          • API String ID: 3744389584-679674701
                          • Opcode ID: 40454b99208e98746a6839c4c4fe215f3be82169db178303dd3e9a3f207b9e2b
                          • Instruction ID: a64362e5e4a5330be5c07ca594f51a39d195a4847090429a361c3b9d9b6f32c5
                          • Opcode Fuzzy Hash: 40454b99208e98746a6839c4c4fe215f3be82169db178303dd3e9a3f207b9e2b
                          • Instruction Fuzzy Hash: 7EA1D431204206AFE714EF64C884BAFB7E8FF44345F00492BF999D2150D778E965CB9A
                          APIs
                          • GetClassNameW.USER32(00000008,?,00000400), ref: 0048AF18
                          • _wcscmp.LIBCMT ref: 0048AF29
                          • GetWindowTextW.USER32(00000001,?,00000400), ref: 0048AF51
                          • CharUpperBuffW.USER32(?,00000000), ref: 0048AF6E
                          • _wcscmp.LIBCMT ref: 0048AF8C
                          • _wcsstr.LIBCMT ref: 0048AF9D
                          • GetClassNameW.USER32(00000018,?,00000400), ref: 0048AFD5
                          • _wcscmp.LIBCMT ref: 0048AFE5
                          • GetWindowTextW.USER32(00000002,?,00000400), ref: 0048B00C
                          • GetClassNameW.USER32(00000018,?,00000400), ref: 0048B055
                          • _wcscmp.LIBCMT ref: 0048B065
                          • GetClassNameW.USER32(00000010,?,00000400), ref: 0048B08D
                          • GetWindowRect.USER32(00000004,?), ref: 0048B0F6
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: ClassName_wcscmp$Window$Text$BuffCharRectUpper_wcsstr
                          • String ID: @$ThumbnailClass
                          • API String ID: 1788623398-1539354611
                          • Opcode ID: c590f5ff23737a5459203e41aea92f1bd88a7162374850cd9de9ce6a106fee1a
                          • Instruction ID: 479b7c4ae9b000dd46d838348d72eaf7357b356d35a8f8533c4cc8a1a3f2d95c
                          • Opcode Fuzzy Hash: c590f5ff23737a5459203e41aea92f1bd88a7162374850cd9de9ce6a106fee1a
                          • Instruction Fuzzy Hash: 0A81B0710082059FDB01EF15C885BAF7BD8EF44358F04896BFE858A196DB38DD49CBA9
                          APIs
                            • Part of subcall function 00432612: GetWindowLongW.USER32(?,000000EB), ref: 00432623
                          • DragQueryPoint.SHELL32(?,?), ref: 004BC627
                            • Part of subcall function 004BAB37: ClientToScreen.USER32(?,?), ref: 004BAB60
                            • Part of subcall function 004BAB37: GetWindowRect.USER32(?,?), ref: 004BABD6
                            • Part of subcall function 004BAB37: PtInRect.USER32(?,?,004BC014), ref: 004BABE6
                          • SendMessageW.USER32(?,000000B0,?,?), ref: 004BC690
                          • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 004BC69B
                          • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 004BC6BE
                          • _wcscat.LIBCMT ref: 004BC6EE
                          • SendMessageW.USER32(?,000000C2,00000001,?), ref: 004BC705
                          • SendMessageW.USER32(?,000000B0,?,?), ref: 004BC71E
                          • SendMessageW.USER32(?,000000B1,?,?), ref: 004BC735
                          • SendMessageW.USER32(?,000000B1,?,?), ref: 004BC757
                          • DragFinish.SHELL32(?), ref: 004BC75E
                          • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 004BC851
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen_wcscat
                          • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID$pbO
                          • API String ID: 169749273-2135428632
                          • Opcode ID: bc4461f4fc9e48f33f3ad92979c0453bab4e0f687a04ad8c65b905e1e940e4fe
                          • Instruction ID: 75ad52eee72d67467a2ddb14166423d9963d83c8d367cf83c084f43e28bf6b41
                          • Opcode Fuzzy Hash: bc4461f4fc9e48f33f3ad92979c0453bab4e0f687a04ad8c65b905e1e940e4fe
                          • Instruction Fuzzy Hash: A4617E71108301AFC701EF65CC85EAFBBE8EF88314F400A2FF595921A1DB749909CB6A
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: __wcsnicmp
                          • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:
                          • API String ID: 1038674560-1810252412
                          • Opcode ID: 8f45d2128f6a06d3eb9297e16753e489da88307d5bf4f1143f9e9dc64ed751a8
                          • Instruction ID: f17064d7e02f5123ab1ecb655e95b1f53bf92a18fc00a1f051b45dea51263369
                          • Opcode Fuzzy Hash: 8f45d2128f6a06d3eb9297e16753e489da88307d5bf4f1143f9e9dc64ed751a8
                          • Instruction Fuzzy Hash: 8B31E670948209A6EA10FA52DE03FAE77A4AF1472AF30082FF441710D2EF9D6F14C65E
                          APIs
                          • LoadCursorW.USER32(00000000,00007F8A), ref: 004A5013
                          • LoadCursorW.USER32(00000000,00007F00), ref: 004A501E
                          • LoadCursorW.USER32(00000000,00007F03), ref: 004A5029
                          • LoadCursorW.USER32(00000000,00007F8B), ref: 004A5034
                          • LoadCursorW.USER32(00000000,00007F01), ref: 004A503F
                          • LoadCursorW.USER32(00000000,00007F81), ref: 004A504A
                          • LoadCursorW.USER32(00000000,00007F88), ref: 004A5055
                          • LoadCursorW.USER32(00000000,00007F80), ref: 004A5060
                          • LoadCursorW.USER32(00000000,00007F86), ref: 004A506B
                          • LoadCursorW.USER32(00000000,00007F83), ref: 004A5076
                          • LoadCursorW.USER32(00000000,00007F85), ref: 004A5081
                          • LoadCursorW.USER32(00000000,00007F82), ref: 004A508C
                          • LoadCursorW.USER32(00000000,00007F84), ref: 004A5097
                          • LoadCursorW.USER32(00000000,00007F04), ref: 004A50A2
                          • LoadCursorW.USER32(00000000,00007F02), ref: 004A50AD
                          • LoadCursorW.USER32(00000000,00007F89), ref: 004A50B8
                          • GetCursorInfo.USER32(?), ref: 004A50C8
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: Cursor$Load$Info
                          • String ID:
                          • API String ID: 2577412497-0
                          • Opcode ID: 2d82b1997b0c2db934e186bf00edad8b971beac6602514bb574a5577a27afed6
                          • Instruction ID: 8ea8995f252440c5e35d25459b5201f1fadf388d95211cb73d74f5f6de2a797b
                          • Opcode Fuzzy Hash: 2d82b1997b0c2db934e186bf00edad8b971beac6602514bb574a5577a27afed6
                          • Instruction Fuzzy Hash: 243112B1D083196ADF109FB68C8996FBFE8FF14750F50453BA50CE7281DA78A5048F95
                          APIs
                          • _memset.LIBCMT ref: 004BA259
                          • DestroyWindow.USER32(?,?), ref: 004BA2D3
                            • Part of subcall function 00437BCC: _memmove.LIBCMT ref: 00437C06
                          • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 004BA34D
                          • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 004BA36F
                          • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 004BA382
                          • DestroyWindow.USER32(00000000), ref: 004BA3A4
                          • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00430000,00000000), ref: 004BA3DB
                          • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 004BA3F4
                          • GetDesktopWindow.USER32 ref: 004BA40D
                          • GetWindowRect.USER32(00000000), ref: 004BA414
                          • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 004BA42C
                          • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 004BA444
                            • Part of subcall function 004325DB: GetWindowLongW.USER32(?,000000EB), ref: 004325EC
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_memmove_memset
                          • String ID: 0$tooltips_class32
                          • API String ID: 1297703922-3619404913
                          • Opcode ID: ea35ab72e6555ddd0b43c576d3da3e1d36d8c093fb0f0acb845192cac5a86570
                          • Instruction ID: 2536100a1a3c640947b8f019ab7b3f885c2d4982e736a70032ad0b8d992ef3fa
                          • Opcode Fuzzy Hash: ea35ab72e6555ddd0b43c576d3da3e1d36d8c093fb0f0acb845192cac5a86570
                          • Instruction Fuzzy Hash: 88719E70140205AFD721DF18CC49FA77BE5FB88304F04452EF985872A0DBB8E926CB6A
                          APIs
                          • CharUpperBuffW.USER32(?,?), ref: 004B4424
                          • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 004B446F
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: BuffCharMessageSendUpper
                          • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                          • API String ID: 3974292440-4258414348
                          • Opcode ID: 64f0386dfac72ab97d9a8020b9cc515bbcac2b9ccdb10bbe47d13cc124235f33
                          • Instruction ID: 6bce17250ec8167e3d9bddfbfe18bfc5a6dd2d8690d2a1905a18f8f222205f9d
                          • Opcode Fuzzy Hash: 64f0386dfac72ab97d9a8020b9cc515bbcac2b9ccdb10bbe47d13cc124235f33
                          • Instruction Fuzzy Hash: 529192742007019FCB14EF15C451A6EB7E1AF95358F04886EF8965B3A3CB78ED0ACB59
                          APIs
                          • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 004BB8B4
                          • LoadLibraryExW.KERNEL32(?,00000000,00000032,00000000,?,?,?,?,?,004B91C2), ref: 004BB910
                          • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 004BB949
                          • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 004BB98C
                          • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 004BB9C3
                          • FreeLibrary.KERNEL32(?), ref: 004BB9CF
                          • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 004BB9DF
                          • DestroyIcon.USER32(?,?,?,?,?,004B91C2), ref: 004BB9EE
                          • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 004BBA0B
                          • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 004BBA17
                            • Part of subcall function 00452EFD: __wcsicmp_l.LIBCMT ref: 00452F86
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: Load$Image$IconLibraryMessageSend$DestroyExtractFree__wcsicmp_l
                          • String ID: .dll$.exe$.icl
                          • API String ID: 1212759294-1154884017
                          • Opcode ID: 5a0d89538a11230e3efa3c52dd2215e2f0b6e82df200b9e456a8eac01380de2f
                          • Instruction ID: 6b580ecac9b7349c9cb7e81bd87f801347b13b52f723dee0168cdfa98251b704
                          • Opcode Fuzzy Hash: 5a0d89538a11230e3efa3c52dd2215e2f0b6e82df200b9e456a8eac01380de2f
                          • Instruction Fuzzy Hash: 3361CEB1900205BAEB14DF65CC41BFE77A8FB08711F10461BF915D61C1DBB8A984DBA8
                          APIs
                          • GetLocalTime.KERNEL32(?), ref: 0049DCDC
                          • SystemTimeToFileTime.KERNEL32(?,?), ref: 0049DCEC
                          • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 0049DCF8
                          • __wsplitpath.LIBCMT ref: 0049DD56
                          • _wcscat.LIBCMT ref: 0049DD6E
                          • _wcscat.LIBCMT ref: 0049DD80
                          • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 0049DD95
                          • SetCurrentDirectoryW.KERNEL32(?), ref: 0049DDA9
                          • SetCurrentDirectoryW.KERNEL32(?), ref: 0049DDDB
                          • SetCurrentDirectoryW.KERNEL32(?), ref: 0049DDFC
                          • _wcscpy.LIBCMT ref: 0049DE08
                          • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 0049DE47
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: CurrentDirectoryTime$File$Local_wcscat$System__wsplitpath_wcscpy
                          • String ID: *.*
                          • API String ID: 3566783562-438819550
                          • Opcode ID: de097244591e4d98f73f76270a53f12414223f00b53c8d2cad539a006dfae625
                          • Instruction ID: f0763abd8df5748c415b3a4ff348d3ec72e6b1739459b8ddb78ac8a82087aade
                          • Opcode Fuzzy Hash: de097244591e4d98f73f76270a53f12414223f00b53c8d2cad539a006dfae625
                          • Instruction Fuzzy Hash: CE616C725042059FCB10EF61C8849AFB7E8FF89314F04492EF989C7251DB79E949CB9A
                          APIs
                          • LoadStringW.USER32(00000066,?,00000FFF,00000016), ref: 00499C7F
                            • Part of subcall function 00437DE1: _memmove.LIBCMT ref: 00437E22
                          • LoadStringW.USER32(00000072,?,00000FFF,?), ref: 00499CA0
                          • __swprintf.LIBCMT ref: 00499CF9
                          • __swprintf.LIBCMT ref: 00499D12
                          • _wprintf.LIBCMT ref: 00499DB9
                          • _wprintf.LIBCMT ref: 00499DD7
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: LoadString__swprintf_wprintf$_memmove
                          • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Incorrect parameters to object property !$Line %d (File "%s"):$^ ERROR
                          • API String ID: 311963372-3080491070
                          • Opcode ID: 593eff45f46a73993ef8d003e968f6807d1b0139a5ce7a360432da52b941a28a
                          • Instruction ID: 38cab5eab740123b1d881cedff25dcd0ea52b9e1a311b45fe4439489bad17547
                          • Opcode Fuzzy Hash: 593eff45f46a73993ef8d003e968f6807d1b0139a5ce7a360432da52b941a28a
                          • Instruction Fuzzy Hash: A651A471900509AACF15EBE5CD46EEEBB78AF08305F20016FF505721A2EB392F59CB59
                          APIs
                            • Part of subcall function 00439837: __itow.LIBCMT ref: 00439862
                            • Part of subcall function 00439837: __swprintf.LIBCMT ref: 004398AC
                          • CharLowerBuffW.USER32(?,?), ref: 0049A3CB
                          • GetDriveTypeW.KERNEL32 ref: 0049A418
                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0049A460
                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0049A497
                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0049A4C5
                            • Part of subcall function 00437BCC: _memmove.LIBCMT ref: 00437C06
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: SendString$BuffCharDriveLowerType__itow__swprintf_memmove
                          • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                          • API String ID: 2698844021-4113822522
                          • Opcode ID: 556f92ee365df9055bb0f57eededa0b82d64897cf20c5afd51811aeb6f5b0e31
                          • Instruction ID: 2b8b275afd4dbf873d5921b2b5e04b2bd7ea0d7fd9a35abb55173920f5fd41dd
                          • Opcode Fuzzy Hash: 556f92ee365df9055bb0f57eededa0b82d64897cf20c5afd51811aeb6f5b0e31
                          • Instruction Fuzzy Hash: 3E518FB11143059FCB10EF12C88196BB7F4EF98718F10886EF89957251DB79ED09CB8A
                          APIs
                          • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000001,00000000,00000000,?,0046E029,00000001,0000138C,00000001,00000000,00000001,?,00000000,00000000), ref: 0048F8DF
                          • LoadStringW.USER32(00000000,?,0046E029,00000001), ref: 0048F8E8
                            • Part of subcall function 00437DE1: _memmove.LIBCMT ref: 00437E22
                          • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,?,0046E029,00000001,0000138C,00000001,00000000,00000001,?,00000000,00000000,00000001), ref: 0048F90A
                          • LoadStringW.USER32(00000000,?,0046E029,00000001), ref: 0048F90D
                          • __swprintf.LIBCMT ref: 0048F95D
                          • __swprintf.LIBCMT ref: 0048F96E
                          • _wprintf.LIBCMT ref: 0048FA17
                          • MessageBoxW.USER32(00000000,?,?,00011010), ref: 0048FA2E
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: HandleLoadModuleString__swprintf$Message_memmove_wprintf
                          • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                          • API String ID: 984253442-2268648507
                          • Opcode ID: 426184fd088f8de2ef193321b3b9959b43226ac7dc23c5779cf17c3c2e07d56b
                          • Instruction ID: 97ebd9df96d3ab0846bf371318d388fdc60a708638fb2906c119b8f4c71b2723
                          • Opcode Fuzzy Hash: 426184fd088f8de2ef193321b3b9959b43226ac7dc23c5779cf17c3c2e07d56b
                          • Instruction Fuzzy Hash: 614164B2800109AACF15FFE1DD46EEEB778AF18315F10146AF50572092EB396F09CB69
                          APIs
                          • CreateFileW.KERNEL32(00000000,80000000,00000000,00000000,00000003,00000000,00000000,00000000,?,?,?,?,?,004B9207,?,?), ref: 004BBA56
                          • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,004B9207,?,?,00000000,?), ref: 004BBA6D
                          • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,004B9207,?,?,00000000,?), ref: 004BBA78
                          • CloseHandle.KERNEL32(00000000,?,?,?,?,004B9207,?,?,00000000,?), ref: 004BBA85
                          • GlobalLock.KERNEL32(00000000), ref: 004BBA8E
                          • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,?,?,?,004B9207,?,?,00000000,?), ref: 004BBA9D
                          • GlobalUnlock.KERNEL32(00000000), ref: 004BBAA6
                          • CloseHandle.KERNEL32(00000000,?,?,?,?,004B9207,?,?,00000000,?), ref: 004BBAAD
                          • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,004B9207,?,?,00000000,?), ref: 004BBABE
                          • OleLoadPicture.OLEAUT32(?,00000000,00000000,004C2CAC,?), ref: 004BBAD7
                          • GlobalFree.KERNEL32(00000000), ref: 004BBAE7
                          • GetObjectW.GDI32(00000000,00000018,?), ref: 004BBB0B
                          • CopyImage.USER32(00000000,00000000,?,?,00002000), ref: 004BBB36
                          • DeleteObject.GDI32(00000000), ref: 004BBB5E
                          • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 004BBB74
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                          • String ID:
                          • API String ID: 3840717409-0
                          • Opcode ID: c04e8c051f16174370c94e140919dcd64c42ec636424765b2285e6dd31d3edcf
                          • Instruction ID: 9f0fdafda148e7cce57fdd39a08c18a46a67a4f6558fd4795515287a9bdc703b
                          • Opcode Fuzzy Hash: c04e8c051f16174370c94e140919dcd64c42ec636424765b2285e6dd31d3edcf
                          • Instruction Fuzzy Hash: 60415775600208FFDB119F69DC88EABBBB8FB89711F104169F90AD7260C774AE05CB64
                          APIs
                          • __wsplitpath.LIBCMT ref: 0049DA10
                          • _wcscat.LIBCMT ref: 0049DA28
                          • _wcscat.LIBCMT ref: 0049DA3A
                          • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 0049DA4F
                          • SetCurrentDirectoryW.KERNEL32(?), ref: 0049DA63
                          • GetFileAttributesW.KERNEL32(?), ref: 0049DA7B
                          • SetFileAttributesW.KERNEL32(?,00000000), ref: 0049DA95
                          • SetCurrentDirectoryW.KERNEL32(?), ref: 0049DAA7
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: CurrentDirectory$AttributesFile_wcscat$__wsplitpath
                          • String ID: *.*
                          • API String ID: 34673085-438819550
                          • Opcode ID: 3840be858e9b721e71c8f95fb15e2032d682e63d3e6dfd021b8c1ccc694b39a3
                          • Instruction ID: 4b67461f1d7fac1195f09accd9e0c49c277a3fd710b0d332433846a9f6104a9b
                          • Opcode Fuzzy Hash: 3840be858e9b721e71c8f95fb15e2032d682e63d3e6dfd021b8c1ccc694b39a3
                          • Instruction Fuzzy Hash: 888180B19042419FCF24EF65C844A6BBBE4AF89314F14483FF889DB251E638ED45CB5A
                          APIs
                            • Part of subcall function 00432612: GetWindowLongW.USER32(?,000000EB), ref: 00432623
                          • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 004BC1FC
                          • GetFocus.USER32 ref: 004BC20C
                          • GetDlgCtrlID.USER32(00000000), ref: 004BC217
                          • _memset.LIBCMT ref: 004BC342
                          • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 004BC36D
                          • GetMenuItemCount.USER32(?), ref: 004BC38D
                          • GetMenuItemID.USER32(?,00000000), ref: 004BC3A0
                          • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 004BC3D4
                          • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 004BC41C
                          • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 004BC454
                          • DefDlgProcW.USER32(?,00000111,?,?,?,?,?,?,?), ref: 004BC489
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow_memset
                          • String ID: 0
                          • API String ID: 1296962147-4108050209
                          • Opcode ID: a3cdb477ec2cbe306bb708f1c7248225256571e3c741957dde62423ac98be18f
                          • Instruction ID: 44b227534b984fe46bd71ad8088ef5e669019ad1380c54da2e5c736fb4e79d23
                          • Opcode Fuzzy Hash: a3cdb477ec2cbe306bb708f1c7248225256571e3c741957dde62423ac98be18f
                          • Instruction Fuzzy Hash: 44816C70608301AFD714DF14C8D4AABBBE4EB88714F00492FFA9597291D778D905CBAA
                          APIs
                          • GetDC.USER32(00000000), ref: 004A738F
                          • CreateCompatibleBitmap.GDI32(00000000,00000007,?), ref: 004A739B
                          • CreateCompatibleDC.GDI32(?), ref: 004A73A7
                          • SelectObject.GDI32(00000000,?), ref: 004A73B4
                          • StretchBlt.GDI32(00000006,00000000,00000000,00000007,?,?,?,?,00000007,?,00CC0020), ref: 004A7408
                          • GetDIBits.GDI32(00000006,?,00000000,00000000,00000000,00000028,00000000), ref: 004A7444
                          • GetDIBits.GDI32(00000006,?,00000000,?,00000000,00000028,00000000), ref: 004A7468
                          • SelectObject.GDI32(00000006,?), ref: 004A7470
                          • DeleteObject.GDI32(?), ref: 004A7479
                          • DeleteDC.GDI32(00000006), ref: 004A7480
                          • ReleaseDC.USER32(00000000,?), ref: 004A748B
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                          • String ID: (
                          • API String ID: 2598888154-3887548279
                          • Opcode ID: 5bd13904e84963489be425dfd660c2dc13fb2c151e7ded0e9db6e5946cdbc5b8
                          • Instruction ID: 9564fca4adc6d706f3a4d0af48cda8b7be437c398fb12a3ae8afcea99d9aab50
                          • Opcode Fuzzy Hash: 5bd13904e84963489be425dfd660c2dc13fb2c151e7ded0e9db6e5946cdbc5b8
                          • Instruction Fuzzy Hash: A5515875904209EFCB24CFA8CC84EAFBBB9EF49310F14852EF95997221C735A845CB54
                          APIs
                            • Part of subcall function 00450957: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,00436B0C,?,00008000), ref: 00450973
                            • Part of subcall function 00434750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00434743,?,?,004337AE,?), ref: 00434770
                          • SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00436BAD
                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00436CFA
                            • Part of subcall function 0043586D: _wcscpy.LIBCMT ref: 004358A5
                            • Part of subcall function 0045363D: _iswctype.LIBCMT ref: 00453645
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: CurrentDirectory$FullNamePath_iswctype_wcscpy
                          • String ID: #include depth exceeded. Make sure there are no recursive includes$>>>AUTOIT SCRIPT<<<$AU3!$Bad directive syntax error$EA06$Error opening the file$Unterminated string
                          • API String ID: 537147316-1018226102
                          • Opcode ID: fca0bbf7b00fcdd0c0b21f148dd9170504978468ac145ccc767b93035e1bfddd
                          • Instruction ID: 3e2d1a7d025324bd6ba8941fd8a84b760951e72e4ab90c6e1ffcb07a29f3e56c
                          • Opcode Fuzzy Hash: fca0bbf7b00fcdd0c0b21f148dd9170504978468ac145ccc767b93035e1bfddd
                          • Instruction Fuzzy Hash: 3D02AF741083419FC724EF26C8819AFBBE5AF98318F10491FF485972A1DB38D949CB5B
                          APIs
                          • _memset.LIBCMT ref: 00492D50
                          • GetMenuItemInfoW.USER32(00000000,00000007,00000000,00000030), ref: 00492DDD
                          • GetMenuItemCount.USER32(004F5890), ref: 00492E66
                          • DeleteMenu.USER32(004F5890,00000005,00000000,000000F5,?,?), ref: 00492EF6
                          • DeleteMenu.USER32(004F5890,00000004,00000000), ref: 00492EFE
                          • DeleteMenu.USER32(004F5890,00000006,00000000), ref: 00492F06
                          • DeleteMenu.USER32(004F5890,00000003,00000000), ref: 00492F0E
                          • GetMenuItemCount.USER32(004F5890), ref: 00492F16
                          • SetMenuItemInfoW.USER32(004F5890,00000004,00000000,00000030), ref: 00492F4C
                          • GetCursorPos.USER32(?), ref: 00492F56
                          • SetForegroundWindow.USER32(00000000), ref: 00492F5F
                          • TrackPopupMenuEx.USER32(004F5890,00000000,?,00000000,00000000,00000000), ref: 00492F72
                          • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 00492F7E
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: Menu$DeleteItem$CountInfo$CursorForegroundMessagePopupPostTrackWindow_memset
                          • String ID:
                          • API String ID: 3993528054-0
                          • Opcode ID: def8f307c36392f70dbaae0a8e6c729584f1499c8b5c7309b1fc26b85c0b5e30
                          • Instruction ID: 723434facf599a0d59b87035b3182a11987e658f6349be3816acea515734af49
                          • Opcode Fuzzy Hash: def8f307c36392f70dbaae0a8e6c729584f1499c8b5c7309b1fc26b85c0b5e30
                          • Instruction Fuzzy Hash: 0E71D270640205BBEF219F55DD85FAABF64FB04324F100237F619A62E1C7F96824DB99
                          APIs
                          • VariantInit.OLEAUT32(?), ref: 004A88D7
                          • CoInitialize.OLE32(00000000), ref: 004A8904
                          • CoUninitialize.OLE32 ref: 004A890E
                          • GetRunningObjectTable.OLE32(00000000,?), ref: 004A8A0E
                          • SetErrorMode.KERNEL32(00000001,00000029), ref: 004A8B3B
                          • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,004C2C0C), ref: 004A8B6F
                          • CoGetObject.OLE32(?,00000000,004C2C0C,?), ref: 004A8B92
                          • SetErrorMode.KERNEL32(00000000), ref: 004A8BA5
                          • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 004A8C25
                          • VariantClear.OLEAUT32(?), ref: 004A8C35
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize
                          • String ID: ,,L
                          • API String ID: 2395222682-2286747779
                          • Opcode ID: 33fd3316faaa3e1e026b07633174f26bd70b5b57b9cefad690e8560809898d64
                          • Instruction ID: 8ddb8eb93558f2b1eb38f1fb0cc6c0126b17f7be908824cd0f1f82e32da4afcc
                          • Opcode Fuzzy Hash: 33fd3316faaa3e1e026b07633174f26bd70b5b57b9cefad690e8560809898d64
                          • Instruction Fuzzy Hash: 31C159B1604305AFD700EF69C88492BB7E9FF89348F00492EF8899B251DB75ED06CB56
                          APIs
                            • Part of subcall function 00437BCC: _memmove.LIBCMT ref: 00437C06
                          • _memset.LIBCMT ref: 0048786B
                          • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 004878A0
                          • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 004878BC
                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 004878D8
                          • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 00487902
                          • CLSIDFromString.OLE32(?,?,?,SOFTWARE\Classes\), ref: 0048792A
                          • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00487935
                          • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 0048793A
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_memmove_memset
                          • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                          • API String ID: 1411258926-22481851
                          • Opcode ID: 936e9f980f97b6eb3157bde3515116a7ba79be5e9b0ce221c4f74ee5bc9f72d8
                          • Instruction ID: f85230890a134429dada4fd1f803fe06b5a475c2f3d057ee0abcfb2bddb49935
                          • Opcode Fuzzy Hash: 936e9f980f97b6eb3157bde3515116a7ba79be5e9b0ce221c4f74ee5bc9f72d8
                          • Instruction Fuzzy Hash: BD411CB2C14229ABDF21EFA5DC95DEEB778BF08314F00552AF805A3261DB389D04CB94
                          APIs
                          • CharUpperBuffW.USER32(?,?,?,?,?,?,?,004AFDAD,?,?), ref: 004B0E31
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: BuffCharUpper
                          • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                          • API String ID: 3964851224-909552448
                          • Opcode ID: 6a60fbb1e7d73f22319137d5a5561f2ef5df4a04efe7c18cc5cd5da80cb3733a
                          • Instruction ID: b0c8838b39500910429bac7da14d8ce978a8c4a296f69f762a7d58b980cee562
                          • Opcode Fuzzy Hash: 6a60fbb1e7d73f22319137d5a5561f2ef5df4a04efe7c18cc5cd5da80cb3733a
                          • Instruction Fuzzy Hash: 5C41387520424A8BCF20EF12D855AFF3760AF2530AF14445AFC551B292DB7C9D1ACBA8
                          APIs
                          • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,0046E2A0,00000010,?,Bad directive syntax error,004BF910,00000000,?,?,?,>>>AUTOIT SCRIPT<<<), ref: 0048F7C2
                          • LoadStringW.USER32(00000000,?,0046E2A0,00000010), ref: 0048F7C9
                            • Part of subcall function 00437DE1: _memmove.LIBCMT ref: 00437E22
                          • _wprintf.LIBCMT ref: 0048F7FC
                          • __swprintf.LIBCMT ref: 0048F81E
                          • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 0048F88D
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: HandleLoadMessageModuleString__swprintf_memmove_wprintf
                          • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                          • API String ID: 1506413516-4153970271
                          • Opcode ID: 35c52806403f3bef034c2b6f0d1d95cf7efc62e330108b8406974834e800e7b2
                          • Instruction ID: a6df5ee64d5daf32af2fe6e6629bc9dc25dc20675bad8bb3b85ac66f79511aa0
                          • Opcode Fuzzy Hash: 35c52806403f3bef034c2b6f0d1d95cf7efc62e330108b8406974834e800e7b2
                          • Instruction Fuzzy Hash: CA216172910219EBCF12EF91CC4AEEE7739BF18315F04086FB509660A2DA399618DB59
                          APIs
                            • Part of subcall function 00437BCC: _memmove.LIBCMT ref: 00437C06
                            • Part of subcall function 00437924: _memmove.LIBCMT ref: 004379AD
                          • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 00495330
                          • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 00495346
                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00495357
                          • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 00495369
                          • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 0049537A
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: SendString$_memmove
                          • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                          • API String ID: 2279737902-1007645807
                          • Opcode ID: 7c6dfc13fb0ee9333cd4b9e87a2ec3c014619453dd71bad3be3007eb865fab00
                          • Instruction ID: 22cbe2b56277fbd40800c485d26c42913dcaad1d88cefed8a2fe673d43c43e7a
                          • Opcode Fuzzy Hash: 7c6dfc13fb0ee9333cd4b9e87a2ec3c014619453dd71bad3be3007eb865fab00
                          • Instruction Fuzzy Hash: 6C11936095015979DB30B673CC4AEFF7B7CEBD5B44F20042FB805920D1DEA80D44C668
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: _wcscpy$CleanupStartup_memmove_strcatgethostbynamegethostnameinet_ntoa
                          • String ID: 0.0.0.0
                          • API String ID: 208665112-3771769585
                          • Opcode ID: 2b29d1e44a0772427a95b650ad67cebf567675d76436b1b760cc1be3a436bbb0
                          • Instruction ID: 63f9e1216dddc9093f5ba13a4df3f9a0fd642798378b76ed77554181cc885c8b
                          • Opcode Fuzzy Hash: 2b29d1e44a0772427a95b650ad67cebf567675d76436b1b760cc1be3a436bbb0
                          • Instruction Fuzzy Hash: 5D1108315001086BCF10AB71DC46EDA7BBCDB86716F1002FBF84996152EF788A8A8A58
                          APIs
                          • timeGetTime.WINMM ref: 00494F7A
                            • Part of subcall function 0045049F: timeGetTime.WINMM(?,75A4B400,00440E7B), ref: 004504A3
                          • Sleep.KERNEL32(0000000A), ref: 00494FA6
                          • EnumThreadWindows.USER32(?,Function_00064F28,00000000), ref: 00494FCA
                          • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 00494FEC
                          • SetActiveWindow.USER32 ref: 0049500B
                          • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00495019
                          • SendMessageW.USER32(00000010,00000000,00000000), ref: 00495038
                          • Sleep.KERNEL32(000000FA), ref: 00495043
                          • IsWindow.USER32 ref: 0049504F
                          • EndDialog.USER32(00000000), ref: 00495060
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                          • String ID: BUTTON
                          • API String ID: 1194449130-3405671355
                          • Opcode ID: 01fe271423366aa7219fee6b9116fa53b20dfe68c26053080f85e615f6f1d0dc
                          • Instruction ID: 747e1e6ebf0c57fd439715426f5a93b8a552347d75339226df7a7ca21dd1ac15
                          • Opcode Fuzzy Hash: 01fe271423366aa7219fee6b9116fa53b20dfe68c26053080f85e615f6f1d0dc
                          • Instruction Fuzzy Hash: 4221CF70205601BFEB215F20FC89E363F69EB45349B15223AF509922B5CB258D25CB6E
                          APIs
                            • Part of subcall function 00439837: __itow.LIBCMT ref: 00439862
                            • Part of subcall function 00439837: __swprintf.LIBCMT ref: 004398AC
                          • CoInitialize.OLE32(00000000), ref: 0049D5EA
                          • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 0049D67D
                          • SHGetDesktopFolder.SHELL32(?), ref: 0049D691
                          • CoCreateInstance.OLE32(004C2D7C,00000000,00000001,004E8C1C,?), ref: 0049D6DD
                          • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 0049D74C
                          • CoTaskMemFree.OLE32(?,?), ref: 0049D7A4
                          • _memset.LIBCMT ref: 0049D7E1
                          • SHBrowseForFolderW.SHELL32(?), ref: 0049D81D
                          • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 0049D840
                          • CoTaskMemFree.OLE32(00000000), ref: 0049D847
                          • CoTaskMemFree.OLE32(00000000,00000001,00000000), ref: 0049D87E
                          • CoUninitialize.OLE32(00000001,00000000), ref: 0049D880
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize__itow__swprintf_memset
                          • String ID:
                          • API String ID: 1246142700-0
                          • Opcode ID: a374e97532b16924ce46ca064431deff9d389296348ea41f7133857c726dd745
                          • Instruction ID: c50fce7bf9d91325d01810b9ae43b9651b7c82db9270897ed81526a731190bdb
                          • Opcode Fuzzy Hash: a374e97532b16924ce46ca064431deff9d389296348ea41f7133857c726dd745
                          • Instruction Fuzzy Hash: 73B11C75A00109AFDB04DFA5C884DAEBBB9FF48304F1485AAF909EB261DB34ED45CB54
                          APIs
                          • GetDlgItem.USER32(?,00000001), ref: 0048C283
                          • GetWindowRect.USER32(00000000,?), ref: 0048C295
                          • MoveWindow.USER32(00000001,0000000A,?,00000001,?,00000000), ref: 0048C2F3
                          • GetDlgItem.USER32(?,00000002), ref: 0048C2FE
                          • GetWindowRect.USER32(00000000,?), ref: 0048C310
                          • MoveWindow.USER32(00000001,?,00000000,00000001,?,00000000), ref: 0048C364
                          • GetDlgItem.USER32(?,000003E9), ref: 0048C372
                          • GetWindowRect.USER32(00000000,?), ref: 0048C383
                          • MoveWindow.USER32(00000000,0000000A,00000000,?,?,00000000), ref: 0048C3C6
                          • GetDlgItem.USER32(?,000003EA), ref: 0048C3D4
                          • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 0048C3F1
                          • InvalidateRect.USER32(?,00000000,00000001), ref: 0048C3FE
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: Window$ItemMoveRect$Invalidate
                          • String ID:
                          • API String ID: 3096461208-0
                          • Opcode ID: d4c11964ac083952f85d36bb5124cf1026eb255012f6bf1011ae19488484b701
                          • Instruction ID: 732b67c96382c078a5d8c15b649db4122c3a4124afa6f6d102c309c124cc9ddb
                          • Opcode Fuzzy Hash: d4c11964ac083952f85d36bb5124cf1026eb255012f6bf1011ae19488484b701
                          • Instruction Fuzzy Hash: ED518071B00205AFDB08DFB8DD89AAEBBB6EB88310F14863DF909D7290D7709D058B14
                          APIs
                            • Part of subcall function 00431B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00432036,?,00000000,?,?,?,?,004316CB,00000000,?), ref: 00431B9A
                          • DestroyWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,?), ref: 004320D3
                          • KillTimer.USER32(-00000001,?,?,?,?,004316CB,00000000,?,?,00431AE2,?,?), ref: 0043216E
                          • DestroyAcceleratorTable.USER32(00000000), ref: 0046BCA6
                          • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,004316CB,00000000,?,?,00431AE2,?,?), ref: 0046BCD7
                          • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,004316CB,00000000,?,?,00431AE2,?,?), ref: 0046BCEE
                          • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,004316CB,00000000,?,?,00431AE2,?,?), ref: 0046BD0A
                          • DeleteObject.GDI32(00000000), ref: 0046BD1C
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                          • String ID:
                          • API String ID: 641708696-0
                          • Opcode ID: f6ec999343867c35bd6b91e5a7b56598614890a67f76569c0f483601ded439db
                          • Instruction ID: 2587c9c70917d8800456710b829310d28c9f2d1f3d081665827f4c103da75067
                          • Opcode Fuzzy Hash: f6ec999343867c35bd6b91e5a7b56598614890a67f76569c0f483601ded439db
                          • Instruction Fuzzy Hash: B8617F30100A10DFCB29AF15DE48B2A77F1FB44315F50953EE6428A670D7B8A8A5DB99
                          APIs
                            • Part of subcall function 004325DB: GetWindowLongW.USER32(?,000000EB), ref: 004325EC
                          • GetSysColor.USER32(0000000F), ref: 004321D3
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: ColorLongWindow
                          • String ID:
                          • API String ID: 259745315-0
                          • Opcode ID: 205f7d6e263c52f9b304e55d9acb75771ec56a8f4f8766a35445986154812256
                          • Instruction ID: c11efd2f2817f6c8e4ee9b50b5b1722f7bc3a5747d3fcc9f93d4093488074c78
                          • Opcode Fuzzy Hash: 205f7d6e263c52f9b304e55d9acb75771ec56a8f4f8766a35445986154812256
                          • Instruction Fuzzy Hash: 5A41B331000640EBDB255F28DD88BBA3B65EB0A331F1453B6FE658A2E2D7758C42DB59
                          APIs
                          • CharLowerBuffW.USER32(?,?,004BF910), ref: 0049A90B
                          • GetDriveTypeW.KERNEL32(00000061,004E89A0,00000061), ref: 0049A9D5
                          • _wcscpy.LIBCMT ref: 0049A9FF
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: BuffCharDriveLowerType_wcscpy
                          • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                          • API String ID: 2820617543-1000479233
                          • Opcode ID: ed5525bb613458fb95a7e4080db6e9364ac51fa2087a6dab42ee9b80200b12ab
                          • Instruction ID: 3fce7ad971d85a49d1b33a2ad1ecfb0a63079a63df5b7caebdb89859b2a7e5d2
                          • Opcode Fuzzy Hash: ed5525bb613458fb95a7e4080db6e9364ac51fa2087a6dab42ee9b80200b12ab
                          • Instruction Fuzzy Hash: DE51B0711083009BCB14EF15C892A6FBBA5FF94308F10482FF885572A2DB799D19CA9B
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: __i64tow__itow__swprintf
                          • String ID: %.15g$0x%p$False$True
                          • API String ID: 421087845-2263619337
                          • Opcode ID: cdc6a61f11917f701d389cb7045ed11b5e3bd30a28fdf8b8b3ce142b936df537
                          • Instruction ID: 106f7434d101ab25cdda73a18b722dd05ea441c5f996f2bc4741faabbedb7c64
                          • Opcode Fuzzy Hash: cdc6a61f11917f701d389cb7045ed11b5e3bd30a28fdf8b8b3ce142b936df537
                          • Instruction Fuzzy Hash: FF410B71510205AFEB24EF35D841E7673E8FF49304F20446FE98AD7242FA799D068B19
                          APIs
                          • _memset.LIBCMT ref: 004B716A
                          • CreateMenu.USER32 ref: 004B7185
                          • SetMenu.USER32(?,00000000), ref: 004B7194
                          • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 004B7221
                          • IsMenu.USER32(?), ref: 004B7237
                          • CreatePopupMenu.USER32 ref: 004B7241
                          • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 004B726E
                          • DrawMenuBar.USER32 ref: 004B7276
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: Menu$CreateItem$DrawInfoInsertPopup_memset
                          • String ID: 0$F
                          • API String ID: 176399719-3044882817
                          • Opcode ID: aaa36d52bb05538d5b64c08f72229d3e6af93333293e10aade05f70b6effb3d5
                          • Instruction ID: 8e7815a0e7cebc11e547610150b2d2a93e0f740356776be17ed3a0ce42c75b70
                          • Opcode Fuzzy Hash: aaa36d52bb05538d5b64c08f72229d3e6af93333293e10aade05f70b6effb3d5
                          • Instruction Fuzzy Hash: 0A418A74A01205EFDB24DF64D984EDA7BB5FF48340F14016AF906A7361D735A924CFA8
                          APIs
                          • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 004B755E
                          • CreateCompatibleDC.GDI32(00000000), ref: 004B7565
                          • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 004B7578
                          • SelectObject.GDI32(00000000,00000000), ref: 004B7580
                          • GetPixel.GDI32(00000000,00000000,00000000), ref: 004B758B
                          • DeleteDC.GDI32(00000000), ref: 004B7594
                          • GetWindowLongW.USER32(?,000000EC), ref: 004B759E
                          • SetLayeredWindowAttributes.USER32(?,00000000,00000000,00000001), ref: 004B75B2
                          • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?,?), ref: 004B75BE
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                          • String ID: static
                          • API String ID: 2559357485-2160076837
                          • Opcode ID: 323e0a9092abe90a23d352ba05eb2956fabfcd715aff51e3e0f7cbfd78545d9f
                          • Instruction ID: 7195d54fa75e63269f1ac0a26109b20171f8a86d105de0f6c6198a8f0d25bcd5
                          • Opcode Fuzzy Hash: 323e0a9092abe90a23d352ba05eb2956fabfcd715aff51e3e0f7cbfd78545d9f
                          • Instruction Fuzzy Hash: 4A316E71104214BBDF219F74DC08FDB3B69EF49364F110326FA19961A0C735D825DBA8
                          APIs
                          • _memset.LIBCMT ref: 00456E3E
                            • Part of subcall function 00458B28: __getptd_noexit.LIBCMT ref: 00458B28
                          • __gmtime64_s.LIBCMT ref: 00456ED7
                          • __gmtime64_s.LIBCMT ref: 00456F0D
                          • __gmtime64_s.LIBCMT ref: 00456F2A
                          • __allrem.LIBCMT ref: 00456F80
                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00456F9C
                          • __allrem.LIBCMT ref: 00456FB3
                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00456FD1
                          • __allrem.LIBCMT ref: 00456FE8
                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00457006
                          • __invoke_watson.LIBCMT ref: 00457077
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@__gmtime64_s$__getptd_noexit__invoke_watson_memset
                          • String ID:
                          • API String ID: 384356119-0
                          • Opcode ID: 1572197e9c4cf49d3ac3c19b6e82465e4eefa01e3d88f7bbd38cf7a66862b9c5
                          • Instruction ID: a14f19b930f9ac8ef8cebff22dd058a6f423dd34b721c0d4882b950413bb61d3
                          • Opcode Fuzzy Hash: 1572197e9c4cf49d3ac3c19b6e82465e4eefa01e3d88f7bbd38cf7a66862b9c5
                          • Instruction Fuzzy Hash: 4F71F672A00716ABD714AE69DC42B5BB3E8AF05729F10423FF914D72C2F778D9088799
                          APIs
                          • _memset.LIBCMT ref: 00492542
                          • GetMenuItemInfoW.USER32(004F5890,000000FF,00000000,00000030), ref: 004925A3
                          • SetMenuItemInfoW.USER32(004F5890,00000004,00000000,00000030), ref: 004925D9
                          • Sleep.KERNEL32(000001F4), ref: 004925EB
                          • GetMenuItemCount.USER32(?), ref: 0049262F
                          • GetMenuItemID.USER32(?,00000000), ref: 0049264B
                          • GetMenuItemID.USER32(?,-00000001), ref: 00492675
                          • GetMenuItemID.USER32(?,?), ref: 004926BA
                          • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00492700
                          • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00492714
                          • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00492735
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: ItemMenu$Info$CheckCountRadioSleep_memset
                          • String ID:
                          • API String ID: 4176008265-0
                          • Opcode ID: 3b87fc2916457d71b56fea74a0d5a9ac9bd288ee9a3b13301cc912bbbe8c554f
                          • Instruction ID: dbc49e5549135cd2dc4ab98f07eb7c6c0a4fe0bd8ffefd94e20d7a5b2c0f3f7d
                          • Opcode Fuzzy Hash: 3b87fc2916457d71b56fea74a0d5a9ac9bd288ee9a3b13301cc912bbbe8c554f
                          • Instruction Fuzzy Hash: EA618D70900249BFDF21CFA4DE88DAF7FA9EB01344F14017AE841A3251D7B9AD15DB29
                          APIs
                          • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 004B6FA5
                          • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 004B6FA8
                          • GetWindowLongW.USER32(?,000000F0), ref: 004B6FCC
                          • _memset.LIBCMT ref: 004B6FDD
                          • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004B6FEF
                          • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 004B7067
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: MessageSend$LongWindow_memset
                          • String ID:
                          • API String ID: 830647256-0
                          • Opcode ID: 99459b94f0e7f231bfee6111ff60b554e45c5d4db159e4667b85d8079d40af0e
                          • Instruction ID: cf32cd220a9cbfeb1e1bbe0a9ec4565ae1f1eeab2eb4cc3feaaca34f654058dd
                          • Opcode Fuzzy Hash: 99459b94f0e7f231bfee6111ff60b554e45c5d4db159e4667b85d8079d40af0e
                          • Instruction Fuzzy Hash: EA618C71900208AFDB10DFA8CC81EEE77F8EB48704F10016AFA14AB3A1C775AD55CB68
                          APIs
                          • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 00486BBF
                          • SafeArrayAllocData.OLEAUT32(?), ref: 00486C18
                          • VariantInit.OLEAUT32(?), ref: 00486C2A
                          • SafeArrayAccessData.OLEAUT32(?,?), ref: 00486C4A
                          • VariantCopy.OLEAUT32(?,?), ref: 00486C9D
                          • SafeArrayUnaccessData.OLEAUT32(?), ref: 00486CB1
                          • VariantClear.OLEAUT32(?), ref: 00486CC6
                          • SafeArrayDestroyData.OLEAUT32(?), ref: 00486CD3
                          • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00486CDC
                          • VariantClear.OLEAUT32(?), ref: 00486CEE
                          • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00486CF9
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                          • String ID:
                          • API String ID: 2706829360-0
                          • Opcode ID: 56b25182e94226c207c8f672129e532f51597e911a254db144212d617acb63ba
                          • Instruction ID: 89c0c8668f5235e942db031c44b88ff926aa63ec91ee2484d1d3a54a9f8c05a8
                          • Opcode Fuzzy Hash: 56b25182e94226c207c8f672129e532f51597e911a254db144212d617acb63ba
                          • Instruction Fuzzy Hash: 38418171A002199FCF00EFA9DC44DAEBBB9EF18304F01857AE955E7261CB74A949CF94
                          APIs
                            • Part of subcall function 00439837: __itow.LIBCMT ref: 00439862
                            • Part of subcall function 00439837: __swprintf.LIBCMT ref: 004398AC
                          • CoInitialize.OLE32 ref: 004A8403
                          • CoUninitialize.OLE32 ref: 004A840E
                          • CoCreateInstance.OLE32(?,00000000,00000017,004C2BEC,?), ref: 004A846E
                          • IIDFromString.OLE32(?,?), ref: 004A84E1
                          • VariantInit.OLEAUT32(?), ref: 004A857B
                          • VariantClear.OLEAUT32(?), ref: 004A85DC
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize__itow__swprintf
                          • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                          • API String ID: 834269672-1287834457
                          • Opcode ID: 38cf6368a69d6c0dc35d5d712b2707096ae5433c1192098cb8b640f8e9333425
                          • Instruction ID: 4e1a14bc059534469697640cb27a371e14510077ae59516e284d1cac5ea876f2
                          • Opcode Fuzzy Hash: 38cf6368a69d6c0dc35d5d712b2707096ae5433c1192098cb8b640f8e9333425
                          • Instruction Fuzzy Hash: C061BD70608312AFC710DF15C848B5BBBE4EF5A754F10091EF9859B291DB78ED48CB9A
                          APIs
                          • WSAStartup.WSOCK32(00000101,?), ref: 004A5793
                          • inet_addr.WSOCK32(?,?,?), ref: 004A57D8
                          • gethostbyname.WSOCK32(?), ref: 004A57E4
                          • IcmpCreateFile.IPHLPAPI ref: 004A57F2
                          • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 004A5862
                          • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 004A5878
                          • IcmpCloseHandle.IPHLPAPI(00000000), ref: 004A58ED
                          • WSACleanup.WSOCK32 ref: 004A58F3
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                          • String ID: Ping
                          • API String ID: 1028309954-2246546115
                          • Opcode ID: 95dfb5c67b6eda7509212e534723f8ba617c83277021071092ede6c0ded868df
                          • Instruction ID: ef55c1f3d3c1ed4add505aba7e95ab319407d137a1e756dd967045335c95c7ca
                          • Opcode Fuzzy Hash: 95dfb5c67b6eda7509212e534723f8ba617c83277021071092ede6c0ded868df
                          • Instruction Fuzzy Hash: 1C51BE316006009FDB10AF25DD85B2AB7E4EF59314F04496EF95ADB2A1DB78EC04CB4A
                          APIs
                          • SetErrorMode.KERNEL32(00000001), ref: 0049B4D0
                          • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 0049B546
                          • GetLastError.KERNEL32 ref: 0049B550
                          • SetErrorMode.KERNEL32(00000000,READY), ref: 0049B5BD
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: Error$Mode$DiskFreeLastSpace
                          • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                          • API String ID: 4194297153-14809454
                          • Opcode ID: 966de2861277ab767cf3871a5ba5ff82d5fdbb7d9cf3e8b33d7365eef717f41a
                          • Instruction ID: 441496e829d23f7d4858f60fdda6ec3b7af44fbf606fcad667fd84f9629a35f9
                          • Opcode Fuzzy Hash: 966de2861277ab767cf3871a5ba5ff82d5fdbb7d9cf3e8b33d7365eef717f41a
                          • Instruction Fuzzy Hash: B531A475A00209EFCF00EB69D945AAE7BB4EF48329F11417BF50597291DB789E02CB89
                          APIs
                            • Part of subcall function 00437DE1: _memmove.LIBCMT ref: 00437E22
                            • Part of subcall function 0048AA99: GetClassNameW.USER32(?,?,000000FF), ref: 0048AABC
                          • SendMessageW.USER32(?,0000018C,000000FF,00000002), ref: 00489014
                          • GetDlgCtrlID.USER32 ref: 0048901F
                          • GetParent.USER32 ref: 0048903B
                          • SendMessageW.USER32(00000000,?,00000111,?), ref: 0048903E
                          • GetDlgCtrlID.USER32(?), ref: 00489047
                          • GetParent.USER32(?), ref: 00489063
                          • SendMessageW.USER32(00000000,?,?,00000111), ref: 00489066
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: MessageSend$CtrlParent$ClassName_memmove
                          • String ID: ComboBox$ListBox
                          • API String ID: 1536045017-1403004172
                          • Opcode ID: b04255cbfea6588cf6d0799448f528c8d631083dfd63c6bf770b433af1082181
                          • Instruction ID: ab5b32e2ed83c71e433c5ddda9c81a79fbc61a1e82d471de9583cc77d5f786a6
                          • Opcode Fuzzy Hash: b04255cbfea6588cf6d0799448f528c8d631083dfd63c6bf770b433af1082181
                          • Instruction Fuzzy Hash: BD21D670A00108BBDF05BBA1CC85EFEBB74EF49310F10062BF961972A1DB795819DB28
                          APIs
                            • Part of subcall function 00437DE1: _memmove.LIBCMT ref: 00437E22
                            • Part of subcall function 0048AA99: GetClassNameW.USER32(?,?,000000FF), ref: 0048AABC
                          • SendMessageW.USER32(?,00000186,00000002,00000000), ref: 004890FD
                          • GetDlgCtrlID.USER32 ref: 00489108
                          • GetParent.USER32 ref: 00489124
                          • SendMessageW.USER32(00000000,?,00000111,?), ref: 00489127
                          • GetDlgCtrlID.USER32(?), ref: 00489130
                          • GetParent.USER32(?), ref: 0048914C
                          • SendMessageW.USER32(00000000,?,?,00000111), ref: 0048914F
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: MessageSend$CtrlParent$ClassName_memmove
                          • String ID: ComboBox$ListBox
                          • API String ID: 1536045017-1403004172
                          • Opcode ID: a59f3515d38f59a70039aad1afd6e1cf908ea9b20e73abf69f2c7bcc0d9ebbb8
                          • Instruction ID: 4827877aeb4097e2f04d8ff510d4ca282f3379f49608db35cfba4bb1d4166000
                          • Opcode Fuzzy Hash: a59f3515d38f59a70039aad1afd6e1cf908ea9b20e73abf69f2c7bcc0d9ebbb8
                          • Instruction Fuzzy Hash: 1A21F574A00108BBDF15BBA5CC89EFEBB74EF48300F54052BB955972A1DB79481ADB28
                          APIs
                          • GetParent.USER32 ref: 0048916F
                          • GetClassNameW.USER32(00000000,?,00000100), ref: 00489184
                          • _wcscmp.LIBCMT ref: 00489196
                          • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00489211
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: ClassMessageNameParentSend_wcscmp
                          • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                          • API String ID: 1704125052-3381328864
                          • Opcode ID: ccd08efe1cbeeb0425dc0c62e0051d541029b762dc9c7bc51727f30f2e304f34
                          • Instruction ID: 0ee97c28f86f63f39701a342d2d5fe4a96fefde76c35ce640c92939f30b76d44
                          • Opcode Fuzzy Hash: ccd08efe1cbeeb0425dc0c62e0051d541029b762dc9c7bc51727f30f2e304f34
                          • Instruction Fuzzy Hash: 0F11C476248707BAFA113625EC0BDBB379CAF15731B240867FD00A4092EEA96C565A5C
                          APIs
                          • SafeArrayGetVartype.OLEAUT32(00000000,?), ref: 00497A6C
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: ArraySafeVartype
                          • String ID:
                          • API String ID: 1725837607-0
                          • Opcode ID: 6b9177930767a8ae8cc7c5956e5e49ffaaf02c4e07ec7ccd2f98bf1ac6a452f4
                          • Instruction ID: c90c40b48ffb004aa04212abd5662e22d3a8ed71bd8ede1e22e075831c5eb0e8
                          • Opcode Fuzzy Hash: 6b9177930767a8ae8cc7c5956e5e49ffaaf02c4e07ec7ccd2f98bf1ac6a452f4
                          • Instruction Fuzzy Hash: 28B18C7191420A9FDF00DFA5C885BBEBBB4FF09325F24443AEA41E7241D738A945CB99
                          APIs
                          • GetCurrentThreadId.KERNEL32 ref: 004911F0
                          • GetForegroundWindow.USER32(00000000,?,?,?,?,?,00490268,?,00000001), ref: 00491204
                          • GetWindowThreadProcessId.USER32(00000000), ref: 0049120B
                          • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00490268,?,00000001), ref: 0049121A
                          • GetWindowThreadProcessId.USER32(?,00000000), ref: 0049122C
                          • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00490268,?,00000001), ref: 00491245
                          • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00490268,?,00000001), ref: 00491257
                          • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,00490268,?,00000001), ref: 0049129C
                          • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,00490268,?,00000001), ref: 004912B1
                          • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,00490268,?,00000001), ref: 004912BC
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                          • String ID:
                          • API String ID: 2156557900-0
                          • Opcode ID: f26f4bb74aff20e17c76938d77deec674e2b65ea5725904edaeafac74ea74a25
                          • Instruction ID: 288735228fb895b79849deea66e5dbc27b68c586cb814d12168486b2b47a87d8
                          • Opcode Fuzzy Hash: f26f4bb74aff20e17c76938d77deec674e2b65ea5725904edaeafac74ea74a25
                          • Instruction Fuzzy Hash: 8F31BD75640205BFEF10AF54ED88FBA3BA9AB55311F114276FE04EA2B0D7789D40CB68
                          APIs
                          • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 0043FAA6
                          • OleUninitialize.OLE32(?,00000000), ref: 0043FB45
                          • UnregisterHotKey.USER32(?), ref: 0043FC9C
                          • DestroyWindow.USER32(?), ref: 004745D6
                          • FreeLibrary.KERNEL32(?), ref: 0047463B
                          • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00474668
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                          • String ID: close all
                          • API String ID: 469580280-3243417748
                          • Opcode ID: 8f2e389714c719354cbde0466c87489461989a47a496be925347cfd7fe0f3941
                          • Instruction ID: c93e8c73a206935f06161e1c9a4929b622329a824bd30310f2c7086d353670ad
                          • Opcode Fuzzy Hash: 8f2e389714c719354cbde0466c87489461989a47a496be925347cfd7fe0f3941
                          • Instruction Fuzzy Hash: 14A18070701112CFDB18EF15C594A7AF364BF49704F1192AEE80AAB261DB38ED1ACF59
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: Variant$ClearInit$_memset
                          • String ID: ,,L$Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                          • API String ID: 2862541840-3251461710
                          • Opcode ID: 6ee0c73383393aeab755e5acadad39ea336efe49992dc851f5eb1ca2740f428e
                          • Instruction ID: 106afd92ef3d149491c11ccb718888e7db28ee803ef80a3478a06f0c0ca9b491
                          • Opcode Fuzzy Hash: 6ee0c73383393aeab755e5acadad39ea336efe49992dc851f5eb1ca2740f428e
                          • Instruction Fuzzy Hash: 8A91A171A00205ABDF24CFA5C848FAFB7B8EF5A714F10855EF915AB280D7789D05CBA4
                          APIs
                          • EnumChildWindows.USER32(?,0048A439), ref: 0048A377
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: ChildEnumWindows
                          • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                          • API String ID: 3555792229-1603158881
                          • Opcode ID: 8ccf5cafc2f840ab9908447d017fa54ed45404d8816d7c47ad5801311b8957c0
                          • Instruction ID: f8cce6f26d0bb519663e957aada4590ad38596c3731b2e06af98dff9f7bd8672
                          • Opcode Fuzzy Hash: 8ccf5cafc2f840ab9908447d017fa54ed45404d8816d7c47ad5801311b8957c0
                          • Instruction Fuzzy Hash: 8591E971500605ABEB18EF61C441BEEFB74BF04314F54891FD849A3242DF7869A9CB99
                          APIs
                          • SetWindowLongW.USER32(?,000000EB), ref: 00432EAE
                            • Part of subcall function 00431DB3: GetClientRect.USER32(?,?), ref: 00431DDC
                            • Part of subcall function 00431DB3: GetWindowRect.USER32(?,?), ref: 00431E1D
                            • Part of subcall function 00431DB3: ScreenToClient.USER32(?,?), ref: 00431E45
                          • GetDC.USER32 ref: 0046CD32
                          • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 0046CD45
                          • SelectObject.GDI32(00000000,00000000), ref: 0046CD53
                          • SelectObject.GDI32(00000000,00000000), ref: 0046CD68
                          • ReleaseDC.USER32(?,00000000), ref: 0046CD70
                          • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 0046CDFB
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                          • String ID: U
                          • API String ID: 4009187628-3372436214
                          • Opcode ID: f6829eb8c28ca72618bea72cdb5cb8397331e3606eb5845ab79b87593d1c0726
                          • Instruction ID: 555ef83e4edde3aa1e754d4e2cb4d8139add9b163542c6583f12ad6c90dc786d
                          • Opcode Fuzzy Hash: f6829eb8c28ca72618bea72cdb5cb8397331e3606eb5845ab79b87593d1c0726
                          • Instruction Fuzzy Hash: 0E71EF31400205DFCF219F64C8C5ABB3BB5FF48324F14427BED995A2A6E7398851DB6A
                          APIs
                          • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 004A1A50
                          • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 004A1A7C
                          • InternetQueryOptionW.WININET(00000000,0000001F,00000000,?), ref: 004A1ABE
                          • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 004A1AD3
                          • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 004A1AE0
                          • HttpQueryInfoW.WININET(00000000,00000005,?,?,00000000), ref: 004A1B10
                          • InternetCloseHandle.WININET(00000000), ref: 004A1B57
                            • Part of subcall function 004A2483: GetLastError.KERNEL32(?,?,004A1817,00000000,00000000,00000001), ref: 004A2498
                            • Part of subcall function 004A2483: SetEvent.KERNEL32(?,?,004A1817,00000000,00000000,00000001), ref: 004A24AD
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: Internet$Http$OptionQueryRequest$CloseConnectErrorEventHandleInfoLastOpenSend
                          • String ID:
                          • API String ID: 2603140658-3916222277
                          • Opcode ID: 92ce41c535786ec1a08d87e8eb28ecb62585c6c4356754594061dba782b75099
                          • Instruction ID: e42324f03541d63cbb0ed2c060d53475139cf23b05308f4137e33f0e0e8be66b
                          • Opcode Fuzzy Hash: 92ce41c535786ec1a08d87e8eb28ecb62585c6c4356754594061dba782b75099
                          • Instruction Fuzzy Hash: D341A4B1501218BFEB118F50CC85FFB77ACEF19354F00816BFA059A251EB789E449BA8
                          APIs
                          • GetModuleFileNameW.KERNEL32(?,?,00000104,?,004BF910), ref: 004A8D28
                          • FreeLibrary.KERNEL32(00000000,00000001,00000000,?,004BF910), ref: 004A8D5C
                          • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 004A8ED6
                          • SysFreeString.OLEAUT32(?), ref: 004A8F00
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: Free$FileLibraryModuleNamePathQueryStringType
                          • String ID:
                          • API String ID: 560350794-0
                          • Opcode ID: 1c2705a7eec5de43eae12b3c4f64fef2b7b4bd3452a65c7a9fe7f4143691fd87
                          • Instruction ID: fbfa2eeb4cb250c0c30d3eb7055538ae77231c6102b3fa0ba83ad12c383b5abf
                          • Opcode Fuzzy Hash: 1c2705a7eec5de43eae12b3c4f64fef2b7b4bd3452a65c7a9fe7f4143691fd87
                          • Instruction Fuzzy Hash: 4FF15A71A00209EFCF04DF94C884EAEB7B9FF5A314F108599F905AB251DB35AE46CB94
                          APIs
                          • _memset.LIBCMT ref: 004AF6B5
                          • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 004AF848
                          • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 004AF86C
                          • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 004AF8AC
                          • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 004AF8CE
                          • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 004AFA4A
                          • GetLastError.KERNEL32(00000000,00000001,00000000), ref: 004AFA7C
                          • CloseHandle.KERNEL32(?), ref: 004AFAAB
                          • CloseHandle.KERNEL32(?), ref: 004AFB22
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: Directory$CloseCurrentHandleSystem$CreateErrorLastProcess_memset
                          • String ID:
                          • API String ID: 4090791747-0
                          • Opcode ID: a8ee5c9779088f5327ef10dfc8b0568bb1123d8ef05f151af40200e508008dbe
                          • Instruction ID: 01d4baad24bbea758a9f71c3ae030d7396091823cca758af5ae69e62a6485848
                          • Opcode Fuzzy Hash: a8ee5c9779088f5327ef10dfc8b0568bb1123d8ef05f151af40200e508008dbe
                          • Instruction Fuzzy Hash: F1E1A2752042009FD714EF65C881B6BBBE0AF89314F14856EF8855B3A2CB78EC49CB5A
                          APIs
                            • Part of subcall function 0049466E: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00493697,?), ref: 0049468B
                            • Part of subcall function 0049466E: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00493697,?), ref: 004946A4
                            • Part of subcall function 00494A31: GetFileAttributesW.KERNEL32(?,0049370B), ref: 00494A32
                          • lstrcmpiW.KERNEL32(?,?), ref: 00494D40
                          • _wcscmp.LIBCMT ref: 00494D5A
                          • MoveFileW.KERNEL32(?,?), ref: 00494D75
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: FileFullNamePath$AttributesMove_wcscmplstrcmpi
                          • String ID:
                          • API String ID: 793581249-0
                          • Opcode ID: 40ec60c5d89172179c62baa0c73c859f6f1a93c6e0397d0343d72f7dcc1fdf7b
                          • Instruction ID: 02f4b0af33c01b52723d1ef9ff725578b879ec4b80fe1c052499206262613e50
                          • Opcode Fuzzy Hash: 40ec60c5d89172179c62baa0c73c859f6f1a93c6e0397d0343d72f7dcc1fdf7b
                          • Instruction Fuzzy Hash: 495150B20083459BCB24DB61D881DDBB7ECAF85355F00092FF589D3152EE78A589C76A
                          APIs
                          • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 004B86FF
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: InvalidateRect
                          • String ID:
                          • API String ID: 634782764-0
                          • Opcode ID: 8a16698c692735742b1c8c9b758ee880beddefec07d1c125135f009e86fb6069
                          • Instruction ID: 93cb306449ab088017a50df16e533b347f8aa1721a09fd89d536a40a10beafca
                          • Opcode Fuzzy Hash: 8a16698c692735742b1c8c9b758ee880beddefec07d1c125135f009e86fb6069
                          • Instruction Fuzzy Hash: 8D518230500244BFDB249F29DC85FEA7B68EB05358F60422FF914D62E1CF79A990DB69
                          APIs
                          • LoadImageW.USER32(00000000,?,00000001,00000010,00000010,00000010), ref: 0046C2F7
                          • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 0046C319
                          • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 0046C331
                          • ExtractIconExW.SHELL32(?,00000000,?,00000000,00000001), ref: 0046C34F
                          • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 0046C370
                          • DestroyIcon.USER32(00000000), ref: 0046C37F
                          • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 0046C39C
                          • DestroyIcon.USER32(?), ref: 0046C3AB
                            • Part of subcall function 004BA4AF: DeleteObject.GDI32(00000000), ref: 004BA4E8
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: Icon$DestroyExtractImageLoadMessageSend$DeleteObject
                          • String ID:
                          • API String ID: 2819616528-0
                          • Opcode ID: f5e096d241a22e8b84854543e9f1abd9eff4e2f384717b6aa85fe3b243109252
                          • Instruction ID: b845682ba52cbe2099b7f6e413486821a9c1f2fbf9ba10ec2f20347672cc22a1
                          • Opcode Fuzzy Hash: f5e096d241a22e8b84854543e9f1abd9eff4e2f384717b6aa85fe3b243109252
                          • Instruction Fuzzy Hash: 48519C70A00205EFDB20DF25CD85FAB7BA5EB18310F10452AF94697390D7B8EC91DB59
                          APIs
                            • Part of subcall function 0048A82C: GetWindowThreadProcessId.USER32(?,00000000), ref: 0048A84C
                            • Part of subcall function 0048A82C: GetCurrentThreadId.KERNEL32 ref: 0048A853
                            • Part of subcall function 0048A82C: AttachThreadInput.USER32(00000000,?,00489683,?,00000001), ref: 0048A85A
                          • MapVirtualKeyW.USER32(00000025,00000000), ref: 0048968E
                          • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 004896AB
                          • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000,?,00000001), ref: 004896AE
                          • MapVirtualKeyW.USER32(00000025,00000000), ref: 004896B7
                          • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 004896D5
                          • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 004896D8
                          • MapVirtualKeyW.USER32(00000025,00000000), ref: 004896E1
                          • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 004896F8
                          • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 004896FB
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                          • String ID:
                          • API String ID: 2014098862-0
                          • Opcode ID: ea579811601a08eb02af81d8b853cb6caa0f1d50f955ab595c168d898536cf9c
                          • Instruction ID: 0ed2981d426ffc75dc19283de442eeac2d3d9667537285bd3921accce6904708
                          • Opcode Fuzzy Hash: ea579811601a08eb02af81d8b853cb6caa0f1d50f955ab595c168d898536cf9c
                          • Instruction Fuzzy Hash: 6511C2B1910618BFF6106B659C49F6A3B1DDB4C754F10092AF648AB0A0C9F25C119BA8
                          APIs
                          • GetProcessHeap.KERNEL32(00000008,0000000C,00000000,00000000,?,0048853C,00000B00,?,?), ref: 0048892A
                          • HeapAlloc.KERNEL32(00000000,?,0048853C,00000B00,?,?), ref: 00488931
                          • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,0048853C,00000B00,?,?), ref: 00488946
                          • GetCurrentProcess.KERNEL32(?,00000000,?,0048853C,00000B00,?,?), ref: 0048894E
                          • DuplicateHandle.KERNEL32(00000000,?,0048853C,00000B00,?,?), ref: 00488951
                          • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,0048853C,00000B00,?,?), ref: 00488961
                          • GetCurrentProcess.KERNEL32(0048853C,00000000,?,0048853C,00000B00,?,?), ref: 00488969
                          • DuplicateHandle.KERNEL32(00000000,?,0048853C,00000B00,?,?), ref: 0048896C
                          • CreateThread.KERNEL32(00000000,00000000,00488992,00000000,00000000,00000000), ref: 00488986
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                          • String ID:
                          • API String ID: 1957940570-0
                          • Opcode ID: 4d66477f17e594320993fccf4dfa755b4584192414850e6bca2a21dc87f95c5f
                          • Instruction ID: f8cf94899d591fe34c34746603da95fcba04ee3c0558e8072e66a841b771b602
                          • Opcode Fuzzy Hash: 4d66477f17e594320993fccf4dfa755b4584192414850e6bca2a21dc87f95c5f
                          • Instruction Fuzzy Hash: 0A01ACB5240304FFE610AFA9DC49F6B7B6CEB89711F404521FA09DB191CA759C048B24
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID:
                          • String ID: NULL Pointer assignment$Not an Object type
                          • API String ID: 0-572801152
                          • Opcode ID: 7356d241f7c03c62f25fa3993955500d39a4040147a1c2129b134ec35d577ded
                          • Instruction ID: cf52fef17ad47969d7683f12426bcdde0a88c1d0e8c473e1b839cb3bc3bf119e
                          • Opcode Fuzzy Hash: 7356d241f7c03c62f25fa3993955500d39a4040147a1c2129b134ec35d577ded
                          • Instruction Fuzzy Hash: 05C1C371A00209ABDF10DF58C884BAFB7F5FB59314F14842EE905AB381E778AD45CB94
                          APIs
                            • Part of subcall function 0048710A: CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00487044,80070057,?,?,?,00487455), ref: 00487127
                            • Part of subcall function 0048710A: ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00487044,80070057,?,?), ref: 00487142
                            • Part of subcall function 0048710A: lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00487044,80070057,?,?), ref: 00487150
                            • Part of subcall function 0048710A: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00487044,80070057,?), ref: 00487160
                          • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,?,?,?), ref: 004A9806
                          • _memset.LIBCMT ref: 004A9813
                          • _memset.LIBCMT ref: 004A9956
                          • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,00000000), ref: 004A9982
                          • CoTaskMemFree.OLE32(?), ref: 004A998D
                          Strings
                          • NULL Pointer assignment, xrefs: 004A99DB
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: FreeFromProgTask_memset$CreateInitializeInstanceSecuritylstrcmpi
                          • String ID: NULL Pointer assignment
                          • API String ID: 1300414916-2785691316
                          • Opcode ID: be2e5b9d3b1d818faae8ab34106d2cc2f1c744999fd7afd2df8918af681e6b5e
                          • Instruction ID: 30b1907e46d5e7f13fb236ecb18ba762f2e03b957c29e9abc2e808a20a4f83c1
                          • Opcode Fuzzy Hash: be2e5b9d3b1d818faae8ab34106d2cc2f1c744999fd7afd2df8918af681e6b5e
                          • Instruction Fuzzy Hash: F4913971D00229EBDB10DFA5DC81EDEBBB9AF09314F20416AF419A7281DB759A44CFA4
                          APIs
                          • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 004B6E24
                          • SendMessageW.USER32(?,00001036,00000000,?), ref: 004B6E38
                          • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 004B6E52
                          • _wcscat.LIBCMT ref: 004B6EAD
                          • SendMessageW.USER32(?,00001057,00000000,?), ref: 004B6EC4
                          • SendMessageW.USER32(?,00001061,?,0000000F), ref: 004B6EF2
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: MessageSend$Window_wcscat
                          • String ID: SysListView32
                          • API String ID: 307300125-78025650
                          • Opcode ID: 593de034e5e4e4d0c7577d49f4f0ee42f059b4ac2b7e3f2f8a8d1d77772b2383
                          • Instruction ID: c20b558fdb58d53c91b410f2265d4d0fe2986c29dbe1d8ee966690228385f9d2
                          • Opcode Fuzzy Hash: 593de034e5e4e4d0c7577d49f4f0ee42f059b4ac2b7e3f2f8a8d1d77772b2383
                          • Instruction Fuzzy Hash: F741A071A00348ABEB219F64CC85BEF77A8EF08354F11052BF944A7291D6799D898B68
                          APIs
                            • Part of subcall function 00493C55: CreateToolhelp32Snapshot.KERNEL32 ref: 00493C7A
                            • Part of subcall function 00493C55: Process32FirstW.KERNEL32(00000000,?), ref: 00493C88
                            • Part of subcall function 00493C55: CloseHandle.KERNEL32(00000000), ref: 00493D52
                          • OpenProcess.KERNEL32(00000001,00000000,?), ref: 004AE9A4
                          • GetLastError.KERNEL32 ref: 004AE9B7
                          • OpenProcess.KERNEL32(00000001,00000000,?), ref: 004AE9E6
                          • TerminateProcess.KERNEL32(00000000,00000000), ref: 004AEA63
                          • GetLastError.KERNEL32(00000000), ref: 004AEA6E
                          • CloseHandle.KERNEL32(00000000), ref: 004AEAA3
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                          • String ID: SeDebugPrivilege
                          • API String ID: 2533919879-2896544425
                          • Opcode ID: a080a2b34b5b5146fdea5d43db540397d76a6a728bc5186afa392bf9ed31de72
                          • Instruction ID: e443a5f15966283faf2c9b532830cd6138d4f4b88ee1f28935e066e11fbd9e05
                          • Opcode Fuzzy Hash: a080a2b34b5b5146fdea5d43db540397d76a6a728bc5186afa392bf9ed31de72
                          • Instruction Fuzzy Hash: 8441BF712002009FDB14EF56CC95F6EB7A5AF55318F04841EF9069B3D2DBB8AC08CB99
                          APIs
                          • LoadIconW.USER32(00000000,00007F03), ref: 00493033
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: IconLoad
                          • String ID: blank$info$question$stop$warning
                          • API String ID: 2457776203-404129466
                          • Opcode ID: 3a8b322f737cb3afb60ba6e45fdf9318c93562487c180e56d6fbe2951403d48c
                          • Instruction ID: 8a243c1926a53c7c122ca4a994ed427b1aad8f75c835ec02e748d2e39b262903
                          • Opcode Fuzzy Hash: 3a8b322f737cb3afb60ba6e45fdf9318c93562487c180e56d6fbe2951403d48c
                          • Instruction Fuzzy Hash: 26112631248386BADF149F56DC43D6B7F9C9F17366B20003FF90466282DEAC5E0456AD
                          APIs
                          • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 00494312
                          • LoadStringW.USER32(00000000), ref: 00494319
                          • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 0049432F
                          • LoadStringW.USER32(00000000), ref: 00494336
                          • _wprintf.LIBCMT ref: 0049435C
                          • MessageBoxW.USER32(00000000,?,?,00011010), ref: 0049437A
                          Strings
                          • %s (%d) : ==> %s: %s %s, xrefs: 00494357
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: HandleLoadModuleString$Message_wprintf
                          • String ID: %s (%d) : ==> %s: %s %s
                          • API String ID: 3648134473-3128320259
                          • Opcode ID: 660666d1962b6898a538ad43d6a31ed7cc153ac45d13c518eb7c16ca01288889
                          • Instruction ID: 67a15d2e6a5bdde70263fd326ebd328e5485eb622182d51331a120e78095a098
                          • Opcode Fuzzy Hash: 660666d1962b6898a538ad43d6a31ed7cc153ac45d13c518eb7c16ca01288889
                          • Instruction Fuzzy Hash: 330162F3900208BFE7519BA4DD89EE7776CDB08301F0005B6BF49E6052EA745E8A4B79
                          APIs
                            • Part of subcall function 00432612: GetWindowLongW.USER32(?,000000EB), ref: 00432623
                          • GetSystemMetrics.USER32(0000000F), ref: 004BD47C
                          • GetSystemMetrics.USER32(0000000F), ref: 004BD49C
                          • MoveWindow.USER32(00000003,?,?,?,?,00000000,?,?,?), ref: 004BD6D7
                          • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 004BD6F5
                          • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 004BD716
                          • ShowWindow.USER32(00000003,00000000), ref: 004BD735
                          • InvalidateRect.USER32(?,00000000,00000001), ref: 004BD75A
                          • DefDlgProcW.USER32(?,00000005,?,?), ref: 004BD77D
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: Window$MessageMetricsSendSystem$InvalidateLongMoveProcRectShow
                          • String ID:
                          • API String ID: 1211466189-0
                          • Opcode ID: f855051c8cd353f3dba41f3c642fef60c18305397038325738341b19dac4791f
                          • Instruction ID: 5588d4f5b93a83764402d48e8ef8ebd2b62d06452ade2963f5aa18aaf1b3ca3a
                          • Opcode Fuzzy Hash: f855051c8cd353f3dba41f3c642fef60c18305397038325738341b19dac4791f
                          • Instruction Fuzzy Hash: 1AB17B71A00615EBDF14CF68C9C57EA7BB1BF04711F0881BAEC489B295EB38A950CB64
                          APIs
                          • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,0046C1C7,00000004,00000000,00000000,00000000), ref: 00432ACF
                          • ShowWindow.USER32(FFFFFFFF,00000000,00000000,00000000,?,0046C1C7,00000004,00000000,00000000,00000000,000000FF), ref: 00432B17
                          • ShowWindow.USER32(FFFFFFFF,00000006,00000000,00000000,?,0046C1C7,00000004,00000000,00000000,00000000), ref: 0046C21A
                          • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,0046C1C7,00000004,00000000,00000000,00000000), ref: 0046C286
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: ShowWindow
                          • String ID:
                          • API String ID: 1268545403-0
                          • Opcode ID: b63afa98081d2f0286dda56be07d43ed2bd2616ca0751b9ddce4a298bbee4d75
                          • Instruction ID: d11757a1c23cc95ec0c2aa106b41c2f589901319d019f394a16d43ab9b454602
                          • Opcode Fuzzy Hash: b63afa98081d2f0286dda56be07d43ed2bd2616ca0751b9ddce4a298bbee4d75
                          • Instruction Fuzzy Hash: 54412E306047809BCB75AB298EDC77B7BD1AB4D300F14986FE48782660C6BCA846D71E
                          APIs
                          • InterlockedExchange.KERNEL32(?,000001F5), ref: 004970DD
                            • Part of subcall function 00450DB6: std::exception::exception.LIBCMT ref: 00450DEC
                            • Part of subcall function 00450DB6: __CxxThrowException@8.LIBCMT ref: 00450E01
                          • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,?,00000000), ref: 00497114
                          • EnterCriticalSection.KERNEL32(?), ref: 00497130
                          • _memmove.LIBCMT ref: 0049717E
                          • _memmove.LIBCMT ref: 0049719B
                          • LeaveCriticalSection.KERNEL32(?), ref: 004971AA
                          • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,00000000,00000000), ref: 004971BF
                          • InterlockedExchange.KERNEL32(?,000001F6), ref: 004971DE
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterException@8LeaveThrowstd::exception::exception
                          • String ID:
                          • API String ID: 256516436-0
                          • Opcode ID: 50dfdb90eb75e744aafd651482b3edd5c7f1d89317daad5b46e77636fee40e54
                          • Instruction ID: 65c8b3a9290f7d1838d85a55be07b031bb70b21fe871e17c47d6651f53706f18
                          • Opcode Fuzzy Hash: 50dfdb90eb75e744aafd651482b3edd5c7f1d89317daad5b46e77636fee40e54
                          • Instruction Fuzzy Hash: E0317235900205EBCF00DFA5DC869AF7B78EF45311F1441BAED04AB256DB349E18CBA8
                          APIs
                          • DeleteObject.GDI32(00000000), ref: 004B61EB
                          • GetDC.USER32(00000000), ref: 004B61F3
                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004B61FE
                          • ReleaseDC.USER32(00000000,00000000), ref: 004B620A
                          • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 004B6246
                          • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 004B6257
                          • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,004B902A,?,?,000000FF,00000000,?,000000FF,?), ref: 004B6291
                          • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 004B62B1
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                          • String ID:
                          • API String ID: 3864802216-0
                          • Opcode ID: d9dc1555e50c4ad8c9f3f05f0f0377ed959ea6174997434e417a989e037c3712
                          • Instruction ID: 935adafaf73dda2a431baff2d52fdc4ce33f0929b3d9ee0f1a41eda9df8c6d7e
                          • Opcode Fuzzy Hash: d9dc1555e50c4ad8c9f3f05f0f0377ed959ea6174997434e417a989e037c3712
                          • Instruction Fuzzy Hash: 74318D72101210BFEF159F54CC8AFEB3BA9EF49765F040166FE089A291C6799C41CB78
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: _memcmp
                          • String ID:
                          • API String ID: 2931989736-0
                          • Opcode ID: 9545e7a404fc456d21202807966a8dd2a117247fa664fd29aef1f07cd72ac115
                          • Instruction ID: f8f239cbf062b6ef2a45589eaa69788bde2960d6c9124f5ffb126a56a0fe17de
                          • Opcode Fuzzy Hash: 9545e7a404fc456d21202807966a8dd2a117247fa664fd29aef1f07cd72ac115
                          • Instruction Fuzzy Hash: 8221B0616012067FA2047A129E42FBF775CDE11348B18482FFD0596B47EBACEE1683ED
                          APIs
                            • Part of subcall function 00439837: __itow.LIBCMT ref: 00439862
                            • Part of subcall function 00439837: __swprintf.LIBCMT ref: 004398AC
                            • Part of subcall function 0044FC86: _wcscpy.LIBCMT ref: 0044FCA9
                          • _wcstok.LIBCMT ref: 0049EC94
                          • _wcscpy.LIBCMT ref: 0049ED23
                          • _memset.LIBCMT ref: 0049ED56
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: _wcscpy$__itow__swprintf_memset_wcstok
                          • String ID: X
                          • API String ID: 774024439-3081909835
                          • Opcode ID: 2cdd60810a74d40bd2ff233dba071b606b6330683a32b1e88e9825dbf0f00f20
                          • Instruction ID: dc5ca6d883b635e57b829d48ffcaaf596575cdff625120971fc02e8b972d8e37
                          • Opcode Fuzzy Hash: 2cdd60810a74d40bd2ff233dba071b606b6330683a32b1e88e9825dbf0f00f20
                          • Instruction Fuzzy Hash: E3C182715083419FDB64EF25C881A5EB7E0FF49314F10492EF899972A2DB78EC45CB4A
                          APIs
                          • __WSAFDIsSet.WSOCK32(00000000,?,00000000,00000000,?,00000064,00000000), ref: 004A6C00
                          • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 004A6C21
                          • WSAGetLastError.WSOCK32(00000000), ref: 004A6C34
                          • htons.WSOCK32(?,?,?,00000000,?), ref: 004A6CEA
                          • inet_ntoa.WSOCK32(?), ref: 004A6CA7
                            • Part of subcall function 0048A7E9: _strlen.LIBCMT ref: 0048A7F3
                            • Part of subcall function 0048A7E9: _memmove.LIBCMT ref: 0048A815
                          • _strlen.LIBCMT ref: 004A6D44
                          • _memmove.LIBCMT ref: 004A6DAD
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: _memmove_strlen$ErrorLasthtonsinet_ntoa
                          • String ID:
                          • API String ID: 3619996494-0
                          • Opcode ID: 1fa402e117b0d3f3e52b71ce301c2f2e9be84e03adafdc30ffd25e2c8d79ed9c
                          • Instruction ID: 97842a73a115c14b3fe46893fcebe13c1894bf375a181ea98407fac56a3d6bab
                          • Opcode Fuzzy Hash: 1fa402e117b0d3f3e52b71ce301c2f2e9be84e03adafdc30ffd25e2c8d79ed9c
                          • Instruction Fuzzy Hash: DF811371204300ABC710EF25CC82F6FB7A8AF99718F14491EF9559B292DB78ED05CB5A
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: b6325a5255b2d047adc2b4ff66abde3e1510205c30aaf3a7ec9d00d6c0c7d954
                          • Instruction ID: 7a99f594a671cff4496a1e31a43c83454be5743964225531473a241505b7e79a
                          • Opcode Fuzzy Hash: b6325a5255b2d047adc2b4ff66abde3e1510205c30aaf3a7ec9d00d6c0c7d954
                          • Instruction Fuzzy Hash: 41716D30900109EFDB049F59CC44EBFBB75FF89314F14C15AF915AA261D738AA51CBA9
                          APIs
                          • IsWindow.USER32(00E54A88), ref: 004BB3EB
                          • IsWindowEnabled.USER32(00E54A88), ref: 004BB3F7
                          • SendMessageW.USER32(?,0000041C,00000000,00000000), ref: 004BB4DB
                          • SendMessageW.USER32(00E54A88,000000B0,?,?), ref: 004BB512
                          • IsDlgButtonChecked.USER32(?,?), ref: 004BB54F
                          • GetWindowLongW.USER32(00E54A88,000000EC), ref: 004BB571
                          • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 004BB589
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                          • String ID:
                          • API String ID: 4072528602-0
                          • Opcode ID: 8cf7ac7cf88a09bdb9915f658c892601558fa41f364ce0b7ac055592ad4927d8
                          • Instruction ID: d8a453c8a3edde3e178325bea40cf7334087b29106a434697276d08ea4b6a096
                          • Opcode Fuzzy Hash: 8cf7ac7cf88a09bdb9915f658c892601558fa41f364ce0b7ac055592ad4927d8
                          • Instruction Fuzzy Hash: D771AF34600604EFDB219F65CC90FFA7BB9FF09300F14416AEA4597362C7B9A851DBA8
                          APIs
                          • _memset.LIBCMT ref: 004AF448
                          • _memset.LIBCMT ref: 004AF511
                          • ShellExecuteExW.SHELL32(?), ref: 004AF556
                            • Part of subcall function 00439837: __itow.LIBCMT ref: 00439862
                            • Part of subcall function 00439837: __swprintf.LIBCMT ref: 004398AC
                            • Part of subcall function 0044FC86: _wcscpy.LIBCMT ref: 0044FCA9
                          • GetProcessId.KERNEL32(00000000), ref: 004AF5CD
                          • CloseHandle.KERNEL32(00000000), ref: 004AF5FC
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: _memset$CloseExecuteHandleProcessShell__itow__swprintf_wcscpy
                          • String ID: @
                          • API String ID: 3522835683-2766056989
                          • Opcode ID: eeecedb76894d4471def0431ccce51c0ff22cfa475474827aee95ea16bd4484e
                          • Instruction ID: 5012287a687a60197a9508148710a85b7bd9b8a14ae6b442ac1b96e38dcbf90c
                          • Opcode Fuzzy Hash: eeecedb76894d4471def0431ccce51c0ff22cfa475474827aee95ea16bd4484e
                          • Instruction Fuzzy Hash: 49619D75A006199FCB14EF99C8819AEBBB4FF59314F14806EE815AB351CB38AD45CF88
                          APIs
                          • GetParent.USER32(?), ref: 00490F8C
                          • GetKeyboardState.USER32(?), ref: 00490FA1
                          • SetKeyboardState.USER32(?), ref: 00491002
                          • PostMessageW.USER32(?,00000101,00000010,?), ref: 00491030
                          • PostMessageW.USER32(?,00000101,00000011,?), ref: 0049104F
                          • PostMessageW.USER32(?,00000101,00000012,?), ref: 00491095
                          • PostMessageW.USER32(?,00000101,0000005B,?), ref: 004910B8
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: MessagePost$KeyboardState$Parent
                          • String ID:
                          • API String ID: 87235514-0
                          • Opcode ID: d9f4b88b9589d88af0590ca14ca51289f9592f89e52bdd9523a787278dae87bc
                          • Instruction ID: a75f5f9ad4dcca62971fe9efd3a38b6e143fec8d191a211e140075d2e9c5d1ce
                          • Opcode Fuzzy Hash: d9f4b88b9589d88af0590ca14ca51289f9592f89e52bdd9523a787278dae87bc
                          • Instruction Fuzzy Hash: 215113605047D23EFF3246348C05BBBBEA96B06304F0885AAE1D8459E3C2DDECC9D759
                          APIs
                          • GetParent.USER32(00000000), ref: 00490DA5
                          • GetKeyboardState.USER32(?), ref: 00490DBA
                          • SetKeyboardState.USER32(?), ref: 00490E1B
                          • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 00490E47
                          • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 00490E64
                          • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 00490EA8
                          • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 00490EC9
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: MessagePost$KeyboardState$Parent
                          • String ID:
                          • API String ID: 87235514-0
                          • Opcode ID: 0195fdbb046c254981c742bc9c4da1fdbc4a02f4d8cb3564679b56c7f09e765b
                          • Instruction ID: 4a5ee3e947949bd3757bbdd3209144b7457c258604bdd4c56654a5780edc9580
                          • Opcode Fuzzy Hash: 0195fdbb046c254981c742bc9c4da1fdbc4a02f4d8cb3564679b56c7f09e765b
                          • Instruction Fuzzy Hash: F85116A05447D53DFF3287348C45B7B7FA95B06300F0889AEF1D8569C2C399AC88D758
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: _wcsncpy$LocalTime
                          • String ID:
                          • API String ID: 2945705084-0
                          • Opcode ID: 5fc0b3aaf1b51797906deaf62732c300c8f59141064af65726842188690111c7
                          • Instruction ID: 4fb9d42a043a3f30d3e26782b2eb7186272a3354bfdbf9b3e36d4a24838c9ea4
                          • Opcode Fuzzy Hash: 5fc0b3aaf1b51797906deaf62732c300c8f59141064af65726842188690111c7
                          • Instruction Fuzzy Hash: AD41A766C1011476CB11EBB588469CFB7B8AF45315F60896BE908E3222F738E749C79E
                          APIs
                          • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 0048D5D4
                          • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 0048D60A
                          • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 0048D61B
                          • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 0048D69D
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: ErrorMode$AddressCreateInstanceProc
                          • String ID: ,,L$DllGetClassObject
                          • API String ID: 753597075-1523921096
                          • Opcode ID: 2874f49d8a31c27fa751d8fb05b92799712410cad7e6c20a8ff481bb29441fc2
                          • Instruction ID: 349aae52de480aa460380dd5ac828e1f768982ef7e7cb7ee11d629a544b569c0
                          • Opcode Fuzzy Hash: 2874f49d8a31c27fa751d8fb05b92799712410cad7e6c20a8ff481bb29441fc2
                          • Instruction Fuzzy Hash: 6441A4B1901208EFDB05EF54C884B9E7BA9EF44314F1185AEEC09AF245E7B4DD44CBA8
                          APIs
                            • Part of subcall function 0049466E: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00493697,?), ref: 0049468B
                            • Part of subcall function 0049466E: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00493697,?), ref: 004946A4
                          • lstrcmpiW.KERNEL32(?,?), ref: 004936B7
                          • _wcscmp.LIBCMT ref: 004936D3
                          • MoveFileW.KERNEL32(?,?), ref: 004936EB
                          • _wcscat.LIBCMT ref: 00493733
                          • SHFileOperationW.SHELL32(?), ref: 0049379F
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: FileFullNamePath$MoveOperation_wcscat_wcscmplstrcmpi
                          • String ID: \*.*
                          • API String ID: 1377345388-1173974218
                          • Opcode ID: e2733c519779d9b65c96e0fedb00e9f6905b8e651c1af57af1e4d438c6f40fd2
                          • Instruction ID: 162e92b7f90164ee15853b1d964996f1752bc3e01d24eb23056e8e57bd9ab906
                          • Opcode Fuzzy Hash: e2733c519779d9b65c96e0fedb00e9f6905b8e651c1af57af1e4d438c6f40fd2
                          • Instruction Fuzzy Hash: 544162B1508344AECB61EF65C4419DFBBE8AF89385F00097FF499C3251EA38D689C75A
                          APIs
                          • _memset.LIBCMT ref: 004B72AA
                          • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 004B7351
                          • IsMenu.USER32(?), ref: 004B7369
                          • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 004B73B1
                          • DrawMenuBar.USER32 ref: 004B73C4
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: Menu$Item$DrawInfoInsert_memset
                          • String ID: 0
                          • API String ID: 3866635326-4108050209
                          • Opcode ID: ee36f042df1874f920b0bbb297afc327899e50cf4300c362a36cb73739dc0f45
                          • Instruction ID: a9a4f53620497e76308fa1f7498c97d3e85104f82c28078ee9c245bce8d4ce8b
                          • Opcode Fuzzy Hash: ee36f042df1874f920b0bbb297afc327899e50cf4300c362a36cb73739dc0f45
                          • Instruction Fuzzy Hash: D0412675A04208EFDB20DF60D884AEABBF8FB48350F14952AFD05A7351D734AD64EB64
                          APIs
                          • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?), ref: 004B0FD4
                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 004B0FFE
                          • FreeLibrary.KERNEL32(00000000), ref: 004B10B5
                            • Part of subcall function 004B0FA5: RegCloseKey.ADVAPI32(?), ref: 004B101B
                            • Part of subcall function 004B0FA5: FreeLibrary.KERNEL32(?), ref: 004B106D
                            • Part of subcall function 004B0FA5: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 004B1090
                          • RegDeleteKeyW.ADVAPI32(?,?), ref: 004B1058
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: EnumFreeLibrary$CloseDeleteOpen
                          • String ID:
                          • API String ID: 395352322-0
                          • Opcode ID: 61c0abed08a93a8e6da0530a11321b67c3b893387271a684fe0f9d9921bb0bec
                          • Instruction ID: d4ecd12b5eb40bd1c66571d9cd27e4bd7114c3fca4b8a16b9ac38a0f82d530b3
                          • Opcode Fuzzy Hash: 61c0abed08a93a8e6da0530a11321b67c3b893387271a684fe0f9d9921bb0bec
                          • Instruction Fuzzy Hash: 2A312F71900109BFDB15AF94DC99EFFB7BCEF08300F40027AF505A2251D6745E899AB4
                          APIs
                          • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 004B62EC
                          • GetWindowLongW.USER32(00E54A88,000000F0), ref: 004B631F
                          • GetWindowLongW.USER32(00E54A88,000000F0), ref: 004B6354
                          • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 004B6386
                          • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 004B63B0
                          • GetWindowLongW.USER32(00000000,000000F0), ref: 004B63C1
                          • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 004B63DB
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: LongWindow$MessageSend
                          • String ID:
                          • API String ID: 2178440468-0
                          • Opcode ID: 0b0474097472c1cd17a8540c9be5e062173b0066a9e4de0bd3213eb651dee428
                          • Instruction ID: f4a4fc16ae4343ea887edb61cd75ff9491ae658b4dfc8c66c0d02394d14d32e8
                          • Opcode Fuzzy Hash: 0b0474097472c1cd17a8540c9be5e062173b0066a9e4de0bd3213eb651dee428
                          • Instruction Fuzzy Hash: 943137306041409FDB20DF18DC84FA537E1FB4A754F1A11BAFA058F2B1CB79A854CB69
                          APIs
                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 0048DB2E
                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 0048DB54
                          • SysAllocString.OLEAUT32(00000000), ref: 0048DB57
                          • SysAllocString.OLEAUT32(?), ref: 0048DB75
                          • SysFreeString.OLEAUT32(?), ref: 0048DB7E
                          • StringFromGUID2.OLE32(?,?,00000028), ref: 0048DBA3
                          • SysAllocString.OLEAUT32(?), ref: 0048DBB1
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                          • String ID:
                          • API String ID: 3761583154-0
                          • Opcode ID: b75431585c78ddd540e35e5c2e53db6eb3a85f8039710bd8260d10acc60ca5ed
                          • Instruction ID: 2187f6e717a7d66bbf3f6a0a9e2f5f7257932a774b8b25a39eb3472c40d66da1
                          • Opcode Fuzzy Hash: b75431585c78ddd540e35e5c2e53db6eb3a85f8039710bd8260d10acc60ca5ed
                          • Instruction Fuzzy Hash: 91218336A01219AFDF10EFA9DC84CBF77ACEF09360B018536F918DB291D674AD458768
                          APIs
                            • Part of subcall function 004A7D8B: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 004A7DB6
                          • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 004A61C6
                          • WSAGetLastError.WSOCK32(00000000), ref: 004A61D5
                          • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 004A620E
                          • connect.WSOCK32(00000000,?,00000010), ref: 004A6217
                          • WSAGetLastError.WSOCK32 ref: 004A6221
                          • closesocket.WSOCK32(00000000), ref: 004A624A
                          • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 004A6263
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: ErrorLastioctlsocket$closesocketconnectinet_addrsocket
                          • String ID:
                          • API String ID: 910771015-0
                          • Opcode ID: 9dd0fe60330ecde91c020a93366e7f3bdb002be972a7610e8613161cf5a2bfa0
                          • Instruction ID: 8fa5419178266e0d5b24b8523b1937883fa3c5572b70ce1f1540798a2d5bc72e
                          • Opcode Fuzzy Hash: 9dd0fe60330ecde91c020a93366e7f3bdb002be972a7610e8613161cf5a2bfa0
                          • Instruction Fuzzy Hash: E931D531600108AFDF10AF64CC85FBE7BADEF55714F05416AFD0997291DB78AC088B69
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: __wcsnicmp
                          • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                          • API String ID: 1038674560-2734436370
                          • Opcode ID: 1e6f82a6ac4288fe0cfc230485afbf7f20771c804f6f2f85255e5fc6fec5e27b
                          • Instruction ID: 242dfe45fa957fa74ba49fd0407f8c63b2298afabebb5cc2bcdeeab72c12fb07
                          • Opcode Fuzzy Hash: 1e6f82a6ac4288fe0cfc230485afbf7f20771c804f6f2f85255e5fc6fec5e27b
                          • Instruction Fuzzy Hash: 22216A7220451166E220BA35AC02FAF7398EF59744F50483FFC4296152FB9C9D4AD3AD
                          APIs
                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 0048DC09
                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 0048DC2F
                          • SysAllocString.OLEAUT32(00000000), ref: 0048DC32
                          • SysAllocString.OLEAUT32 ref: 0048DC53
                          • SysFreeString.OLEAUT32 ref: 0048DC5C
                          • StringFromGUID2.OLE32(?,?,00000028), ref: 0048DC76
                          • SysAllocString.OLEAUT32(?), ref: 0048DC84
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                          • String ID:
                          • API String ID: 3761583154-0
                          • Opcode ID: de54d417083f2741e95e9c519210cfefdf8a85d58860979682421b7d44bc82ad
                          • Instruction ID: 0bc83bf6e5ffc0cba7bb0bffc23b1522e91ffc161a6c7958de31b8d47501958e
                          • Opcode Fuzzy Hash: de54d417083f2741e95e9c519210cfefdf8a85d58860979682421b7d44bc82ad
                          • Instruction Fuzzy Hash: C3215635A05204AFAB10FFA8DC89DAF77ECEB09360B108536F914CB2A1D674EC45D768
                          APIs
                            • Part of subcall function 00431D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00431D73
                            • Part of subcall function 00431D35: GetStockObject.GDI32(00000011), ref: 00431D87
                            • Part of subcall function 00431D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00431D91
                          • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 004B7632
                          • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 004B763F
                          • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 004B764A
                          • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 004B7659
                          • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 004B7665
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: MessageSend$CreateObjectStockWindow
                          • String ID: Msctls_Progress32
                          • API String ID: 1025951953-3636473452
                          • Opcode ID: 7abca5646e21d3d0bdb54e74ac3324f859f89ebb22138531cb11af15f6914884
                          • Instruction ID: b3c9ed4db48d3dd1c6d2e27c67db438fde2f00afaa2f169563c5e8bcbf0f846d
                          • Opcode Fuzzy Hash: 7abca5646e21d3d0bdb54e74ac3324f859f89ebb22138531cb11af15f6914884
                          • Instruction Fuzzy Hash: 8811E6B1110119BFEF118F65CC85EE77F5DEF083A8F014115BB04A20A0CA76AC21DBA8
                          APIs
                          • __init_pointers.LIBCMT ref: 00459AE6
                            • Part of subcall function 00453187: EncodePointer.KERNEL32(00000000), ref: 0045318A
                            • Part of subcall function 00453187: __initp_misc_winsig.LIBCMT ref: 004531A5
                            • Part of subcall function 00453187: GetModuleHandleW.KERNEL32(kernel32.dll), ref: 00459EA0
                            • Part of subcall function 00453187: GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00459EB4
                            • Part of subcall function 00453187: GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00459EC7
                            • Part of subcall function 00453187: GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00459EDA
                            • Part of subcall function 00453187: GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00459EED
                            • Part of subcall function 00453187: GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 00459F00
                            • Part of subcall function 00453187: GetProcAddress.KERNEL32(00000000,CreateEventExW), ref: 00459F13
                            • Part of subcall function 00453187: GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 00459F26
                            • Part of subcall function 00453187: GetProcAddress.KERNEL32(00000000,SetThreadStackGuarantee), ref: 00459F39
                            • Part of subcall function 00453187: GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 00459F4C
                            • Part of subcall function 00453187: GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 00459F5F
                            • Part of subcall function 00453187: GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 00459F72
                            • Part of subcall function 00453187: GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 00459F85
                            • Part of subcall function 00453187: GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 00459F98
                            • Part of subcall function 00453187: GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 00459FAB
                            • Part of subcall function 00453187: GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 00459FBE
                          • __mtinitlocks.LIBCMT ref: 00459AEB
                          • __mtterm.LIBCMT ref: 00459AF4
                            • Part of subcall function 00459B5C: DeleteCriticalSection.KERNEL32(00000000,00000000,?,?,00459AF9,00457CD0,004EA0B8,00000014), ref: 00459C56
                            • Part of subcall function 00459B5C: _free.LIBCMT ref: 00459C5D
                            • Part of subcall function 00459B5C: DeleteCriticalSection.KERNEL32(02O,?,?,00459AF9,00457CD0,004EA0B8,00000014), ref: 00459C7F
                          • __calloc_crt.LIBCMT ref: 00459B19
                          • __initptd.LIBCMT ref: 00459B3B
                          • GetCurrentThreadId.KERNEL32 ref: 00459B42
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: AddressProc$CriticalDeleteSection$CurrentEncodeHandleModulePointerThread__calloc_crt__init_pointers__initp_misc_winsig__initptd__mtinitlocks__mtterm_free
                          • String ID:
                          • API String ID: 3567560977-0
                          • Opcode ID: 46dbff05e0bcdf8e580b5fcd30c8b4e07bad482868155a39d0428612696fdd47
                          • Instruction ID: 2ae62426222ec65429b25f5d532d94faf8bb2169e9bb1a34f65c9db9f5bb1b28
                          • Opcode Fuzzy Hash: 46dbff05e0bcdf8e580b5fcd30c8b4e07bad482868155a39d0428612696fdd47
                          • Instruction Fuzzy Hash: CCF06232519751DAE6647A7A7C0364B2694EB0273BB200A2FFC54D51D3FE289C49416C
                          APIs
                          • _memset.LIBCMT ref: 004BB644
                          • _memset.LIBCMT ref: 004BB653
                          • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,004F6F20,004F6F64), ref: 004BB682
                          • CloseHandle.KERNEL32 ref: 004BB694
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: _memset$CloseCreateHandleProcess
                          • String ID: oO$doO
                          • API String ID: 3277943733-358147081
                          • Opcode ID: caa6b3b7ba6cf95354d21574fa8557027304edfd260bc5d0822475e7a40fe185
                          • Instruction ID: 895301e791b60ac6666730454d65729b4e9b20d7c4ee91ab41d7549f14aa65e3
                          • Opcode Fuzzy Hash: caa6b3b7ba6cf95354d21574fa8557027304edfd260bc5d0822475e7a40fe185
                          • Instruction Fuzzy Hash: 6DF0FEB25403047BE2106765BC06FBB7A9CEB09795F054036BE08E5192D7BA5C24C7BD
                          APIs
                          • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,00453F85), ref: 00454085
                          • GetProcAddress.KERNEL32(00000000), ref: 0045408C
                          • EncodePointer.KERNEL32(00000000), ref: 00454097
                          • DecodePointer.KERNEL32(00453F85), ref: 004540B2
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                          • String ID: RoUninitialize$combase.dll
                          • API String ID: 3489934621-2819208100
                          • Opcode ID: 921470834120af926f4f7cbe216860375019214c46f213a24dcfec1a95eabfb3
                          • Instruction ID: 300108b336663d03eca51e1c98ce954b715ecd23b8c77600d3d3accb955de76a
                          • Opcode Fuzzy Hash: 921470834120af926f4f7cbe216860375019214c46f213a24dcfec1a95eabfb3
                          • Instruction Fuzzy Hash: E0E01A70540200ABDA509F61EE08B153AA4B710743F200139F505D51A0CFBA5698CA0C
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: _memmove$__itow__swprintf
                          • String ID:
                          • API String ID: 3253778849-0
                          • Opcode ID: 448254e0949c07d16a0f673e8df4957746ed55f0cae072f6d9ea880876eb2e4a
                          • Instruction ID: 111daa243ca0d0f5473fc5fea8a330716a6465144956d8a81d34878b5c90ba2f
                          • Opcode Fuzzy Hash: 448254e0949c07d16a0f673e8df4957746ed55f0cae072f6d9ea880876eb2e4a
                          • Instruction Fuzzy Hash: 0E619E3050024A9BCF16EF65CC82EFE3BA5AF49308F05452EFC555B292DB789C06CB58
                          APIs
                            • Part of subcall function 00437DE1: _memmove.LIBCMT ref: 00437E22
                            • Part of subcall function 004B0E1A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,004AFDAD,?,?), ref: 004B0E31
                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 004B02BD
                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 004B02FD
                          • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 004B0320
                          • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 004B0349
                          • RegCloseKey.ADVAPI32(?,?,00000000), ref: 004B038C
                          • RegCloseKey.ADVAPI32(00000000), ref: 004B0399
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: Close$BuffCharConnectEnumOpenRegistryUpperValue_memmove
                          • String ID:
                          • API String ID: 4046560759-0
                          • Opcode ID: 04e12b14a9d886a8e2e600ee3e13107049da4a6b544d85895498cde15ac74991
                          • Instruction ID: db81573fb31feb67f07116270f183e11e77e1861341c732e77d299452fa090bb
                          • Opcode Fuzzy Hash: 04e12b14a9d886a8e2e600ee3e13107049da4a6b544d85895498cde15ac74991
                          • Instruction Fuzzy Hash: 4E514E71108204AFD714EF65C885EAFBBE5FF88314F04491EF855872A2DB39D909CB56
                          APIs
                          • GetMenu.USER32(?), ref: 004B57FB
                          • GetMenuItemCount.USER32(00000000), ref: 004B5832
                          • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 004B585A
                          • GetMenuItemID.USER32(?,?), ref: 004B58C9
                          • GetSubMenu.USER32(?,?), ref: 004B58D7
                          • PostMessageW.USER32(?,00000111,?,00000000), ref: 004B5928
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: Menu$Item$CountMessagePostString
                          • String ID:
                          • API String ID: 650687236-0
                          • Opcode ID: b2298ba9966a92cff94d6c7263ac9486e1c5e921d2264b274183002b698bc1e7
                          • Instruction ID: 671b33b8e6195a396f5e1669aecaca47a1247113efad201ff336146c764adf39
                          • Opcode Fuzzy Hash: b2298ba9966a92cff94d6c7263ac9486e1c5e921d2264b274183002b698bc1e7
                          • Instruction Fuzzy Hash: 5B517E35E00615EFCF15EF65C845AEEBBB4EF48314F10446AE905BB351CB78AE418BA8
                          APIs
                          • VariantInit.OLEAUT32(?), ref: 0048EF06
                          • VariantClear.OLEAUT32(00000013), ref: 0048EF78
                          • VariantClear.OLEAUT32(00000000), ref: 0048EFD3
                          • _memmove.LIBCMT ref: 0048EFFD
                          • VariantClear.OLEAUT32(?), ref: 0048F04A
                          • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 0048F078
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: Variant$Clear$ChangeInitType_memmove
                          • String ID:
                          • API String ID: 1101466143-0
                          • Opcode ID: 05f4e366557a9f9b24a93ab77b684039115a079cc914a439c9ae10c89ccbdcf0
                          • Instruction ID: e95e931b27b41293def412a92d9a6d6bb4af60250d770f19d15f6c9613f102ef
                          • Opcode Fuzzy Hash: 05f4e366557a9f9b24a93ab77b684039115a079cc914a439c9ae10c89ccbdcf0
                          • Instruction Fuzzy Hash: 84516AB5A00209EFCB14DF58C880AAAB7B8FF4D314B15856AED59DB301E334E915CFA4
                          APIs
                          • _memset.LIBCMT ref: 00492258
                          • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 004922A3
                          • IsMenu.USER32(00000000), ref: 004922C3
                          • CreatePopupMenu.USER32 ref: 004922F7
                          • GetMenuItemCount.USER32(000000FF), ref: 00492355
                          • InsertMenuItemW.USER32(00000000,?,00000001,00000030), ref: 00492386
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: Menu$Item$CountCreateInfoInsertPopup_memset
                          • String ID:
                          • API String ID: 3311875123-0
                          • Opcode ID: 26b0cf545d795cd13ab820f5a09f0df121587530da6eb80dd04b3d68a162bff2
                          • Instruction ID: ee41d9ad57ac48b1e9df1c5bb13c2861669730fadf18551cfb004bc432e802f1
                          • Opcode Fuzzy Hash: 26b0cf545d795cd13ab820f5a09f0df121587530da6eb80dd04b3d68a162bff2
                          • Instruction Fuzzy Hash: 8E51AE30600209FBDF31CF68DA88BAEBFF5AF45318F10427AE815A7291D3B89905CB55
                          APIs
                            • Part of subcall function 00432612: GetWindowLongW.USER32(?,000000EB), ref: 00432623
                          • BeginPaint.USER32(?,?,?,?,?,?), ref: 0043179A
                          • GetWindowRect.USER32(?,?), ref: 004317FE
                          • ScreenToClient.USER32(?,?), ref: 0043181B
                          • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 0043182C
                          • EndPaint.USER32(?,?), ref: 00431876
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: PaintWindow$BeginClientLongRectScreenViewport
                          • String ID:
                          • API String ID: 1827037458-0
                          • Opcode ID: 6d1e3d1f42b9bb7db9fc320a8b5e610491435315b8af1d67fffe173b3efbae59
                          • Instruction ID: d76a123bc0ff705356395e19a82b790cf03d34efff92c8cb0dae4b24016db21c
                          • Opcode Fuzzy Hash: 6d1e3d1f42b9bb7db9fc320a8b5e610491435315b8af1d67fffe173b3efbae59
                          • Instruction Fuzzy Hash: FB419F31504700AFD710EF25CC84FBA7BE8EB49764F04462AFAA4872B1D7349C56DB6A
                          APIs
                          • ShowWindow.USER32(004F57B0,00000000,00E54A88,?,?,004F57B0,?,004BB5A8,?,?), ref: 004BB712
                          • EnableWindow.USER32(00000000,00000000), ref: 004BB736
                          • ShowWindow.USER32(004F57B0,00000000,00E54A88,?,?,004F57B0,?,004BB5A8,?,?), ref: 004BB796
                          • ShowWindow.USER32(00000000,00000004,?,004BB5A8,?,?), ref: 004BB7A8
                          • EnableWindow.USER32(00000000,00000001), ref: 004BB7CC
                          • SendMessageW.USER32(?,0000130C,?,00000000), ref: 004BB7EF
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: Window$Show$Enable$MessageSend
                          • String ID:
                          • API String ID: 642888154-0
                          • Opcode ID: 72598b521a4069b705420464f7d4a44dc08f800f84b16d58a90b58e5738ae059
                          • Instruction ID: cb04806912d3d1b2bdc53491c2562db8b199a207f84a7f934c40bfbf38c4d2a7
                          • Opcode Fuzzy Hash: 72598b521a4069b705420464f7d4a44dc08f800f84b16d58a90b58e5738ae059
                          • Instruction Fuzzy Hash: 04419534600240AFDB21CF24C899BD57BE0FF45310F1841BAF9488F7A2CBB5A856CBA4
                          APIs
                          • GetForegroundWindow.USER32(?,?,?,?,?,?,004A4E41,?,?,00000000,00000001), ref: 004A70AC
                            • Part of subcall function 004A39A0: GetWindowRect.USER32(?,?), ref: 004A39B3
                          • GetDesktopWindow.USER32 ref: 004A70D6
                          • GetWindowRect.USER32(00000000), ref: 004A70DD
                          • mouse_event.USER32(00008001,?,?,00000001,00000001), ref: 004A710F
                            • Part of subcall function 00495244: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 004952BC
                          • GetCursorPos.USER32(?), ref: 004A713B
                          • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 004A7199
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: Window$Rectmouse_event$CursorDesktopForegroundSleep
                          • String ID:
                          • API String ID: 4137160315-0
                          • Opcode ID: f494605da67b4f177d9c3a6bdf6cec008a6ac47eb2f79a0045fabd36b50af478
                          • Instruction ID: dcf879b53f4d9db5118dba940de2dd81f45a140805f80f97e2d81cdb4866359e
                          • Opcode Fuzzy Hash: f494605da67b4f177d9c3a6bdf6cec008a6ac47eb2f79a0045fabd36b50af478
                          • Instruction Fuzzy Hash: AC31B472505305ABD720DF14CC49B9BBBE9FF99314F00062AF58997291C674EA09CBDA
                          APIs
                            • Part of subcall function 004880A9: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 004880C0
                            • Part of subcall function 004880A9: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 004880CA
                            • Part of subcall function 004880A9: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 004880D9
                            • Part of subcall function 004880A9: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 004880E0
                            • Part of subcall function 004880A9: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 004880F6
                          • GetLengthSid.ADVAPI32(?,00000000,0048842F), ref: 004888CA
                          • GetProcessHeap.KERNEL32(00000008,00000000), ref: 004888D6
                          • HeapAlloc.KERNEL32(00000000), ref: 004888DD
                          • CopySid.ADVAPI32(00000000,00000000,?), ref: 004888F6
                          • GetProcessHeap.KERNEL32(00000000,00000000,0048842F), ref: 0048890A
                          • HeapFree.KERNEL32(00000000), ref: 00488911
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                          • String ID:
                          • API String ID: 3008561057-0
                          • Opcode ID: 2093636edac730c67e3989b551c4833e91737cb5570e49b326d7d10b8be98bdf
                          • Instruction ID: b7870aed429b18e3c97659f3921e8038ae1b33fdd520a07bdf85e57711ccab41
                          • Opcode Fuzzy Hash: 2093636edac730c67e3989b551c4833e91737cb5570e49b326d7d10b8be98bdf
                          • Instruction Fuzzy Hash: F711D2B1501605FFDB10AF98CC09BBF7768EB41311F50492EE84993210CB3A9D04CB64
                          APIs
                          • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 004885E2
                          • OpenProcessToken.ADVAPI32(00000000), ref: 004885E9
                          • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 004885F8
                          • CloseHandle.KERNEL32(00000004), ref: 00488603
                          • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00488632
                          • DestroyEnvironmentBlock.USERENV(00000000), ref: 00488646
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                          • String ID:
                          • API String ID: 1413079979-0
                          • Opcode ID: 90e3a2b41b51f82eb96158803deddb0af4ef7cec1aaa30e168f042bd0673d572
                          • Instruction ID: f6be3b756895c3f96136d05b6df6842c27106fc2bf18bcba8b573503138a0cf3
                          • Opcode Fuzzy Hash: 90e3a2b41b51f82eb96158803deddb0af4ef7cec1aaa30e168f042bd0673d572
                          • Instruction Fuzzy Hash: 0B115972500209BBDF019FA8DD49BDF7BA9EF08304F044169FE04A2161C7769D65EB64
                          APIs
                          • GetDC.USER32(00000000), ref: 0048B7B5
                          • GetDeviceCaps.GDI32(00000000,00000058), ref: 0048B7C6
                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0048B7CD
                          • ReleaseDC.USER32(00000000,00000000), ref: 0048B7D5
                          • MulDiv.KERNEL32(000009EC,?,00000000), ref: 0048B7EC
                          • MulDiv.KERNEL32(000009EC,?,?), ref: 0048B7FE
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: CapsDevice$Release
                          • String ID:
                          • API String ID: 1035833867-0
                          • Opcode ID: 9a8675147205cd7b5728f465b28f665ad1fda0e4053c88ba7487b6da5c4069a9
                          • Instruction ID: 3ea944893fc5a3da7d3e21af04600d63655f48df9726506d2a84d55564eb19a4
                          • Opcode Fuzzy Hash: 9a8675147205cd7b5728f465b28f665ad1fda0e4053c88ba7487b6da5c4069a9
                          • Instruction Fuzzy Hash: A2017175E00309BFEF10ABE69C45A5EBFA8EB48311F004176FE08A7291D6309C04CF94
                          APIs
                          • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00450193
                          • MapVirtualKeyW.USER32(00000010,00000000), ref: 0045019B
                          • MapVirtualKeyW.USER32(000000A0,00000000), ref: 004501A6
                          • MapVirtualKeyW.USER32(000000A1,00000000), ref: 004501B1
                          • MapVirtualKeyW.USER32(00000011,00000000), ref: 004501B9
                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 004501C1
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: Virtual
                          • String ID:
                          • API String ID: 4278518827-0
                          • Opcode ID: 1c1389f5f9a5b0afba21de7289f9ecc9f8de28485629925c7305b4d2851af865
                          • Instruction ID: eea781d471832368adc9d55e24dfcdc49d9a20de8dd37078c437cf24f327e788
                          • Opcode Fuzzy Hash: 1c1389f5f9a5b0afba21de7289f9ecc9f8de28485629925c7305b4d2851af865
                          • Instruction Fuzzy Hash: 2F016CB09017597DE3008F5A8C85B52FFA8FF19354F00411BA15C47941C7F5A868CBE5
                          APIs
                          • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 004953F9
                          • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 0049540F
                          • GetWindowThreadProcessId.USER32(?,?), ref: 0049541E
                          • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 0049542D
                          • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00495437
                          • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 0049543E
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                          • String ID:
                          • API String ID: 839392675-0
                          • Opcode ID: 09d62cd989ef1e7aef71939168b65707a8015b3a8773043c7687bbfc33925b7e
                          • Instruction ID: 4fcdf6be3c74799959579fe900c98a64c6e645956b9088b314ee1952719380ea
                          • Opcode Fuzzy Hash: 09d62cd989ef1e7aef71939168b65707a8015b3a8773043c7687bbfc33925b7e
                          • Instruction Fuzzy Hash: 09F01D32641558BBE7215BA69C0DEEB7B7CEBCAB11F000279FA08D10519AA51A0687B9
                          APIs
                          • InterlockedExchange.KERNEL32(?,?), ref: 00497243
                          • EnterCriticalSection.KERNEL32(?,?,00440EE4,?,?), ref: 00497254
                          • TerminateThread.KERNEL32(00000000,000001F6,?,00440EE4,?,?), ref: 00497261
                          • WaitForSingleObject.KERNEL32(00000000,000003E8,?,00440EE4,?,?), ref: 0049726E
                            • Part of subcall function 00496C35: CloseHandle.KERNEL32(00000000,?,0049727B,?,00440EE4,?,?), ref: 00496C3F
                          • InterlockedExchange.KERNEL32(?,000001F6), ref: 00497281
                          • LeaveCriticalSection.KERNEL32(?,?,00440EE4,?,?), ref: 00497288
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                          • String ID:
                          • API String ID: 3495660284-0
                          • Opcode ID: 9ff539d8e1522470b581f9d755e579b58bd1f14244f093c6b0f9c5f17020fdcd
                          • Instruction ID: b3ff6f2962ed6495aff27199c9574fa92e6bfc2536a4f7faf5cb2ae373d6ca30
                          • Opcode Fuzzy Hash: 9ff539d8e1522470b581f9d755e579b58bd1f14244f093c6b0f9c5f17020fdcd
                          • Instruction Fuzzy Hash: 09F05E36540612EBDB161B64ED4CADB7B29EF45702B1006B2F507950A0CB7A5C05CB58
                          APIs
                          • WaitForSingleObject.KERNEL32(?,000000FF), ref: 0048899D
                          • UnloadUserProfile.USERENV(?,?), ref: 004889A9
                          • CloseHandle.KERNEL32(?), ref: 004889B2
                          • CloseHandle.KERNEL32(?), ref: 004889BA
                          • GetProcessHeap.KERNEL32(00000000,?), ref: 004889C3
                          • HeapFree.KERNEL32(00000000), ref: 004889CA
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                          • String ID:
                          • API String ID: 146765662-0
                          • Opcode ID: 812a234739518f6ab167ce24ea6f197e1148ac0a583ca9bacb5e4406cd255783
                          • Instruction ID: cf1c454f80ad9c11f746e58b73202d35af95f9cdd7e1cb226c02a7340fe63b4b
                          • Opcode Fuzzy Hash: 812a234739518f6ab167ce24ea6f197e1148ac0a583ca9bacb5e4406cd255783
                          • Instruction Fuzzy Hash: 9DE0C276004401FBDA011FE5EC0C90ABBA9FB89322B148730F21981070CB32A828DB58
                          APIs
                          • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,004C2C7C,?), ref: 004876EA
                          • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,004C2C7C,?), ref: 00487702
                          • CLSIDFromProgID.OLE32(?,?,00000000,004BFB80,000000FF,?,00000000,00000800,00000000,?,004C2C7C,?), ref: 00487727
                          • _memcmp.LIBCMT ref: 00487748
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: FromProg$FreeTask_memcmp
                          • String ID: ,,L
                          • API String ID: 314563124-2286747779
                          • Opcode ID: 089deda58d4d1e1e4cf8c398a329a87cfe8cd84680ce6e4f4f5e0a1f033e4560
                          • Instruction ID: 07271a76de31aa03033335f5927c3553df63c75a1a09cda362ff46b5e01428f6
                          • Opcode Fuzzy Hash: 089deda58d4d1e1e4cf8c398a329a87cfe8cd84680ce6e4f4f5e0a1f033e4560
                          • Instruction Fuzzy Hash: E2814C71A00109EFCB00DFA8C994EEEB7B9FF89315F204559F505AB250DB75AE06CB64
                          APIs
                          • VariantInit.OLEAUT32(?), ref: 004A8613
                          • CharUpperBuffW.USER32(?,?), ref: 004A8722
                          • VariantClear.OLEAUT32(?), ref: 004A889A
                            • Part of subcall function 00497562: VariantInit.OLEAUT32(00000000), ref: 004975A2
                            • Part of subcall function 00497562: VariantCopy.OLEAUT32(00000000,?), ref: 004975AB
                            • Part of subcall function 00497562: VariantClear.OLEAUT32(00000000), ref: 004975B7
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: Variant$ClearInit$BuffCharCopyUpper
                          • String ID: AUTOIT.ERROR$Incorrect Parameter format
                          • API String ID: 4237274167-1221869570
                          • Opcode ID: 5024eb12674345b9fb504591349bf8290733c6462321e1e38230358a64f9add4
                          • Instruction ID: 5012a50a711c94112b01d46ef9ddd1fb23ff9c35be60de1a0ef252e2c4b1f56d
                          • Opcode Fuzzy Hash: 5024eb12674345b9fb504591349bf8290733c6462321e1e38230358a64f9add4
                          • Instruction Fuzzy Hash: E8917D746043019FCB10EF25C48595BBBE4EF9A718F14492EF88A8B361DB39ED05CB56
                          APIs
                            • Part of subcall function 0044FC86: _wcscpy.LIBCMT ref: 0044FCA9
                          • _memset.LIBCMT ref: 00492B87
                          • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00492BB6
                          • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00492C69
                          • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 00492C97
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: ItemMenu$Info$Default_memset_wcscpy
                          • String ID: 0
                          • API String ID: 4152858687-4108050209
                          • Opcode ID: d0ff9ca1fa1c7e589cc83b4ccb40813297cdb0b339f14cc97dcaa465f5d67dec
                          • Instruction ID: e97f22ad12ceca9444f0708233e55c12eed16d9557aea7680a9cfcfedcce4815
                          • Opcode Fuzzy Hash: d0ff9ca1fa1c7e589cc83b4ccb40813297cdb0b339f14cc97dcaa465f5d67dec
                          • Instruction Fuzzy Hash: 2851CF71508301ABDB24DE28DA45A6FBBE4AF49314F140A3FF895D3291DBA8DC04C75A
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: _memmove$_free
                          • String ID: 3cD$_D
                          • API String ID: 2620147621-3978952248
                          • Opcode ID: 38479935ef0cadf98f0b71a0a4b95706aa831347ea30191ccc013cf349b5f579
                          • Instruction ID: 44648c3fd66566955b7360c43d0d55246b43508309d19801bbbbb75dd75163aa
                          • Opcode Fuzzy Hash: 38479935ef0cadf98f0b71a0a4b95706aa831347ea30191ccc013cf349b5f579
                          • Instruction Fuzzy Hash: CF518B716043418FEB25CF28C840BABBBF1BF85715F08882EE98987351DB39E905CB46
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: _memset$_memmove
                          • String ID: 3cD$ERCP
                          • API String ID: 2532777613-125502418
                          • Opcode ID: d40b2a8e53cf3c6ade2d1d77dd64fecbc772663c7f4379d6d650221474c0d2fe
                          • Instruction ID: 6f8bcde29cef68ecf4d0aa0d9042c88e88379e736faca872e6b20a3d5d75084a
                          • Opcode Fuzzy Hash: d40b2a8e53cf3c6ade2d1d77dd64fecbc772663c7f4379d6d650221474c0d2fe
                          • Instruction Fuzzy Hash: 04519171900705DBEB24DF55C941BABB7E4BF05305F20896FE84ACB281E778AA45CB49
                          APIs
                          • _memset.LIBCMT ref: 004927C0
                          • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 004927DC
                          • DeleteMenu.USER32(?,00000007,00000000), ref: 00492822
                          • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,004F5890,00000000), ref: 0049286B
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: Menu$Delete$InfoItem_memset
                          • String ID: 0
                          • API String ID: 1173514356-4108050209
                          • Opcode ID: 80114f351545fe8a704645891bc162c4211c3dc2cc5009dd3b64f587a613ec52
                          • Instruction ID: 01fdf02e388fa77dde16f8afbd4d2b9804049fb124e960108d4c2b1a23fab469
                          • Opcode Fuzzy Hash: 80114f351545fe8a704645891bc162c4211c3dc2cc5009dd3b64f587a613ec52
                          • Instruction Fuzzy Hash: 7D41A170204301AFDB20EF25C944F1BBBE4AF85314F044A3EF96597391D7B8A905CB6A
                          APIs
                          • CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 004AD7C5
                            • Part of subcall function 0043784B: _memmove.LIBCMT ref: 00437899
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: BuffCharLower_memmove
                          • String ID: cdecl$none$stdcall$winapi
                          • API String ID: 3425801089-567219261
                          • Opcode ID: e364e49c01f62f0c0c4bd926dc64376140f5ed8904fb49a70acd8b8f9fccf41c
                          • Instruction ID: 0d80f2cfec8683ee69c47bb89b25ac92fb8fedaec973c558a8aac2c704ea6a84
                          • Opcode Fuzzy Hash: e364e49c01f62f0c0c4bd926dc64376140f5ed8904fb49a70acd8b8f9fccf41c
                          • Instruction Fuzzy Hash: 44319C70904205ABCF10EF59CC519AEB3A5FF25324F108A2FE876976D1DB39AD05CB88
                          APIs
                            • Part of subcall function 00437DE1: _memmove.LIBCMT ref: 00437E22
                            • Part of subcall function 0048AA99: GetClassNameW.USER32(?,?,000000FF), ref: 0048AABC
                          • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00488F14
                          • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00488F27
                          • SendMessageW.USER32(?,00000189,?,00000000), ref: 00488F57
                            • Part of subcall function 00437BCC: _memmove.LIBCMT ref: 00437C06
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: MessageSend$_memmove$ClassName
                          • String ID: ComboBox$ListBox
                          • API String ID: 365058703-1403004172
                          • Opcode ID: 6ed11ad8a5e90c4e090876dc339b76cbae2837c047d198ec1aaa6fc52ae6b3ae
                          • Instruction ID: 47e3114adf5811cb32fb202004234b244224dcc7077b915bcbd3e4b95e60541c
                          • Opcode Fuzzy Hash: 6ed11ad8a5e90c4e090876dc339b76cbae2837c047d198ec1aaa6fc52ae6b3ae
                          • Instruction Fuzzy Hash: 0D21F571A00108BBDB14BBA18C45DFFB769DF05324F54492FF925A72E1DB3D180A9718
                          APIs
                          • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 004A184C
                          • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 004A1872
                          • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 004A18A2
                          • InternetCloseHandle.WININET(00000000), ref: 004A18E9
                            • Part of subcall function 004A2483: GetLastError.KERNEL32(?,?,004A1817,00000000,00000000,00000001), ref: 004A2498
                            • Part of subcall function 004A2483: SetEvent.KERNEL32(?,?,004A1817,00000000,00000000,00000001), ref: 004A24AD
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                          • String ID:
                          • API String ID: 3113390036-3916222277
                          • Opcode ID: d3d0066d328c56f793d533431c698c9215fd976ec39a09b328f6bfbd44e804d5
                          • Instruction ID: c634f435d72239a16352a0f347decf4f3136bb65124c70eb57dfed4f6ad5d61c
                          • Opcode Fuzzy Hash: d3d0066d328c56f793d533431c698c9215fd976ec39a09b328f6bfbd44e804d5
                          • Instruction Fuzzy Hash: C821B0B1500308BFEB11AF65CC85EBB77EDEB5A748F10412FF80596250EA6C8D0597A9
                          APIs
                            • Part of subcall function 00431D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00431D73
                            • Part of subcall function 00431D35: GetStockObject.GDI32(00000011), ref: 00431D87
                            • Part of subcall function 00431D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00431D91
                          • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 004B6461
                          • LoadLibraryW.KERNEL32(?), ref: 004B6468
                          • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 004B647D
                          • DestroyWindow.USER32(?), ref: 004B6485
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: MessageSend$Window$CreateDestroyLibraryLoadObjectStock
                          • String ID: SysAnimate32
                          • API String ID: 4146253029-1011021900
                          • Opcode ID: a521bb101b4ec74a018dd755f094dd066bdc75777d3538f45309c5f46166d11b
                          • Instruction ID: 1d57da3fb96959cbcb1a8fd3ad3756badc35df23b968db322180204fa327f985
                          • Opcode Fuzzy Hash: a521bb101b4ec74a018dd755f094dd066bdc75777d3538f45309c5f46166d11b
                          • Instruction Fuzzy Hash: 80218E71100605BFEF108F64DC40EFB77A9EB59328F12462AFA1492290D77DDC519778
                          APIs
                          • GetStdHandle.KERNEL32(0000000C), ref: 00496DBC
                          • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00496DEF
                          • GetStdHandle.KERNEL32(0000000C), ref: 00496E01
                          • CreateFileW.KERNEL32(nul,40000000,00000002,0000000C,00000003,00000080,00000000), ref: 00496E3B
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: CreateHandle$FilePipe
                          • String ID: nul
                          • API String ID: 4209266947-2873401336
                          • Opcode ID: 99aeeb637150f4b1465c64a9be9c05f7a34a340b5fe12e8b270088efed70712b
                          • Instruction ID: 7f3f7da2e7f6bc767c640a524b70d37489df9273f3f1e94aa14c1a768524d900
                          • Opcode Fuzzy Hash: 99aeeb637150f4b1465c64a9be9c05f7a34a340b5fe12e8b270088efed70712b
                          • Instruction Fuzzy Hash: 56218C7460020AABDF209F29DC04A9A7FA8EF44720F214B3AFCA0D73D0DB759955CB58
                          APIs
                          • GetStdHandle.KERNEL32(000000F6), ref: 00496E89
                          • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00496EBB
                          • GetStdHandle.KERNEL32(000000F6), ref: 00496ECC
                          • CreateFileW.KERNEL32(nul,80000000,00000001,0000000C,00000003,00000080,00000000), ref: 00496F06
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: CreateHandle$FilePipe
                          • String ID: nul
                          • API String ID: 4209266947-2873401336
                          • Opcode ID: 682a466c2b3d5b12d3f7165aa0fef70d1b9d2f603ce815ade2a4f0832fab97c4
                          • Instruction ID: f86c81b4f66469c7d11070121aab3787c2ac66c466e92ca1ccf95872ef2439d7
                          • Opcode Fuzzy Hash: 682a466c2b3d5b12d3f7165aa0fef70d1b9d2f603ce815ade2a4f0832fab97c4
                          • Instruction Fuzzy Hash: 90219079500305ABDF209F69DC04A9B7BA8EF45724F210B3AF8A0D73D0D774A8518B59
                          APIs
                          • SetErrorMode.KERNEL32(00000001), ref: 0049AC54
                          • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 0049ACA8
                          • __swprintf.LIBCMT ref: 0049ACC1
                          • SetErrorMode.KERNEL32(00000000,00000001,00000000,004BF910), ref: 0049ACFF
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: ErrorMode$InformationVolume__swprintf
                          • String ID: %lu
                          • API String ID: 3164766367-685833217
                          • Opcode ID: 32313a419c3528fbfd0c99ccd6304dec6354f464f9d49fa6895853e2cfc38de7
                          • Instruction ID: d3dac4c3fa80b13c47912213b8c96f35cea2868ef054f22dc93a4b1af532dc8a
                          • Opcode Fuzzy Hash: 32313a419c3528fbfd0c99ccd6304dec6354f464f9d49fa6895853e2cfc38de7
                          • Instruction Fuzzy Hash: 4521A470600109AFCB10EF59CD45EAE7BB8EF49318B00447EF809EB251DA75EE05CB65
                          APIs
                          • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,0048FCED,?,00490D40,?,00008000), ref: 0049115F
                          • Sleep.KERNEL32(00000000,?,?,?,?,?,?,0048FCED,?,00490D40,?,00008000), ref: 00491184
                          • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,0048FCED,?,00490D40,?,00008000), ref: 0049118E
                          • Sleep.KERNEL32(?,?,?,?,?,?,?,0048FCED,?,00490D40,?,00008000), ref: 004911C1
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: CounterPerformanceQuerySleep
                          • String ID: @I
                          • API String ID: 2875609808-896914347
                          • Opcode ID: 533c9849eaad2fc183a7a2b1d88e695b247915029a77acd1e0f1842994d18589
                          • Instruction ID: affee40a5d7ecd4052049719faedbd6a62e2dbb764091929e6f5f7bdc139d94d
                          • Opcode Fuzzy Hash: 533c9849eaad2fc183a7a2b1d88e695b247915029a77acd1e0f1842994d18589
                          • Instruction Fuzzy Hash: 78115A31C0051EE7CF009FA9D88AAEEBF78FF09711F004566EA45B2250CB349954CB99
                          APIs
                          • CharUpperBuffW.USER32(?,?), ref: 00491B19
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: BuffCharUpper
                          • String ID: APPEND$EXISTS$KEYS$REMOVE
                          • API String ID: 3964851224-769500911
                          • Opcode ID: 2ba08271f9e359f9b2b68cd91abd4a378a45cbe0f207c2b72b9d5964110c3e38
                          • Instruction ID: e61f98d31fae9714ed9c338df4e5a2300e656c9e54dbd1d1e3d4551d6d6e3fa1
                          • Opcode Fuzzy Hash: 2ba08271f9e359f9b2b68cd91abd4a378a45cbe0f207c2b72b9d5964110c3e38
                          • Instruction Fuzzy Hash: 18118E359002499FCF00EF55D8518FEB7B5FF25309B10846AD819672A2EB366D0ACB48
                          APIs
                          • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 004AEC07
                          • GetProcessIoCounters.KERNEL32(00000000,?), ref: 004AEC37
                          • GetProcessMemoryInfo.PSAPI(00000000,?,00000028), ref: 004AED6A
                          • CloseHandle.KERNEL32(?), ref: 004AEDEB
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: Process$CloseCountersHandleInfoMemoryOpen
                          • String ID:
                          • API String ID: 2364364464-0
                          • Opcode ID: efcbf0502f2b6895941cde168376644724b18b63886ee4e6a9e59386e27a5269
                          • Instruction ID: a4c656ba251f4604fd26d37ec8af6a13ddf456307c85db96d9b25ae0ee8432f3
                          • Opcode Fuzzy Hash: efcbf0502f2b6895941cde168376644724b18b63886ee4e6a9e59386e27a5269
                          • Instruction Fuzzy Hash: 0781A1716003009FD724EF29C886F2AB7E5AF99714F14881EF9599B3D2DAB4EC04CB59
                          APIs
                            • Part of subcall function 00437DE1: _memmove.LIBCMT ref: 00437E22
                            • Part of subcall function 004B0E1A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,004AFDAD,?,?), ref: 004B0E31
                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 004B00FD
                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 004B013C
                          • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 004B0183
                          • RegCloseKey.ADVAPI32(?,?), ref: 004B01AF
                          • RegCloseKey.ADVAPI32(00000000), ref: 004B01BC
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: Close$BuffCharConnectEnumOpenRegistryUpper_memmove
                          • String ID:
                          • API String ID: 3440857362-0
                          • Opcode ID: 33ff531982bc89e616aaa54ffa3676b73d156aa878de9b3c0f541709729989c0
                          • Instruction ID: 5e578814daa62eee309834d4cd50126ec173471724600a99ef0d85101819e7b5
                          • Opcode Fuzzy Hash: 33ff531982bc89e616aaa54ffa3676b73d156aa878de9b3c0f541709729989c0
                          • Instruction Fuzzy Hash: 39516D71208204AFD714EF58CC81EABB7E9FF88318F40492EF595872A1DB35E905CB66
                          APIs
                            • Part of subcall function 00439837: __itow.LIBCMT ref: 00439862
                            • Part of subcall function 00439837: __swprintf.LIBCMT ref: 004398AC
                          • LoadLibraryW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 004AD927
                          • GetProcAddress.KERNEL32(00000000,?), ref: 004AD9AA
                          • GetProcAddress.KERNEL32(00000000,00000000), ref: 004AD9C6
                          • GetProcAddress.KERNEL32(00000000,?), ref: 004ADA07
                          • FreeLibrary.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,?,?), ref: 004ADA21
                            • Part of subcall function 00435A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00497896,?,?,00000000), ref: 00435A2C
                            • Part of subcall function 00435A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00497896,?,?,00000000,?,?), ref: 00435A50
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad__itow__swprintf
                          • String ID:
                          • API String ID: 327935632-0
                          • Opcode ID: 00f556488e576b2324f4fac41c84967437c19167e95f972f3ac2a56907396eb8
                          • Instruction ID: 3c3356efa7cbc2811293e4b7ff662cf22703a315952e3640fb1249463ee04b4c
                          • Opcode Fuzzy Hash: 00f556488e576b2324f4fac41c84967437c19167e95f972f3ac2a56907396eb8
                          • Instruction Fuzzy Hash: DB512975A00205DFCB00EFA9C4849AEB7B4FF19314F04816AE85AAB312D738ED46CF55
                          APIs
                          • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 0049E61F
                          • GetPrivateProfileSectionW.KERNEL32(?,00000001,00000003,?), ref: 0049E648
                          • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 0049E687
                            • Part of subcall function 00439837: __itow.LIBCMT ref: 00439862
                            • Part of subcall function 00439837: __swprintf.LIBCMT ref: 004398AC
                          • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 0049E6AC
                          • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 0049E6B4
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: PrivateProfile$SectionWrite$String$__itow__swprintf
                          • String ID:
                          • API String ID: 1389676194-0
                          • Opcode ID: d890f677beb422091183d31fb38772f6ef039849954467b6240394c2f7d1f662
                          • Instruction ID: ab694512dc93015156489160799cec1eb37182a0ff96fb25fc721653c1d2ee81
                          • Opcode Fuzzy Hash: d890f677beb422091183d31fb38772f6ef039849954467b6240394c2f7d1f662
                          • Instruction Fuzzy Hash: E8510A39A00105DFCB05EF65C9819AEBBF5EF49314F1480AAE809AB362CB35ED15DF54
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 51c919d021ecd504a73058d0dca54cdb1eb4a2b3d6450d009f8d8f20a6dcea4d
                          • Instruction ID: 636e4c5aa972f5d438a6c1233cc2438f745126c90c9ed9c87e57a53b2af703f4
                          • Opcode Fuzzy Hash: 51c919d021ecd504a73058d0dca54cdb1eb4a2b3d6450d009f8d8f20a6dcea4d
                          • Instruction Fuzzy Hash: D241B335904114ABD760DF28CC48FEABBA4EB09310F144266E915A73E1C7389D65DA7A
                          APIs
                          • GetCursorPos.USER32(?), ref: 00432357
                          • ScreenToClient.USER32(004F57B0,?), ref: 00432374
                          • GetAsyncKeyState.USER32(00000001), ref: 00432399
                          • GetAsyncKeyState.USER32(00000002), ref: 004323A7
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: AsyncState$ClientCursorScreen
                          • String ID:
                          • API String ID: 4210589936-0
                          • Opcode ID: 41785b240e6601ae1905b20ac74bbba3f8292ccb75e9e5a7988f482834c64deb
                          • Instruction ID: 7036231bce9eaeb2300a3b4c2350970a07d1e8bd268525f1ff6fafc568d54a1e
                          • Opcode Fuzzy Hash: 41785b240e6601ae1905b20ac74bbba3f8292ccb75e9e5a7988f482834c64deb
                          • Instruction Fuzzy Hash: 54418335604115FBCF199F69CC44AEABB74FB09364F20431BF828D22A0D7789D94DBA6
                          APIs
                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 004863E7
                          • TranslateAcceleratorW.USER32(?,?,?), ref: 00486433
                          • TranslateMessage.USER32(?), ref: 0048645C
                          • DispatchMessageW.USER32(?), ref: 00486466
                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00486475
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: Message$PeekTranslate$AcceleratorDispatch
                          • String ID:
                          • API String ID: 2108273632-0
                          • Opcode ID: 191270fb0f4669ae825d20717867bcc8e93864b814db3abb251a2c70cd575988
                          • Instruction ID: 3bb6802debbd126dc1f36d43bd20c5b0fd041aec41539aeb0a6b8000066287a6
                          • Opcode Fuzzy Hash: 191270fb0f4669ae825d20717867bcc8e93864b814db3abb251a2c70cd575988
                          • Instruction Fuzzy Hash: EB31E931900606AFDBA4EFB4CC44FBF7BACAB00700F120A77E915C2260E7299459DB5D
                          APIs
                          • GetWindowRect.USER32(?,?), ref: 00488A30
                          • PostMessageW.USER32(?,00000201,00000001), ref: 00488ADA
                          • Sleep.KERNEL32(00000000,?,00000201,00000001,?,?,?), ref: 00488AE2
                          • PostMessageW.USER32(?,00000202,00000000), ref: 00488AF0
                          • Sleep.KERNEL32(00000000,?,00000202,00000000,?,?,00000201,00000001,?,?,?), ref: 00488AF8
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: MessagePostSleep$RectWindow
                          • String ID:
                          • API String ID: 3382505437-0
                          • Opcode ID: a663ea8c3f046860806e6f6cd6975b638e8a534f8b930f629c36d94ef7447beb
                          • Instruction ID: 8e164b1faf137524f05c76d21caaa54d26d68ecd26f86458f36ace3b4e5875b1
                          • Opcode Fuzzy Hash: a663ea8c3f046860806e6f6cd6975b638e8a534f8b930f629c36d94ef7447beb
                          • Instruction Fuzzy Hash: 4831E071900219EBDF18DFA8DD4CA9E3BB5EB04315F10862AF928E62D0C7B49D14CB94
                          APIs
                          • IsWindowVisible.USER32(?), ref: 0048B204
                          • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 0048B221
                          • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 0048B259
                          • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 0048B27F
                          • _wcsstr.LIBCMT ref: 0048B289
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: MessageSend$BuffCharUpperVisibleWindow_wcsstr
                          • String ID:
                          • API String ID: 3902887630-0
                          • Opcode ID: 1e3843ae25657ab5e2a095ef7965aa8a899965ddc4aec5955e5b19e5c8adb11b
                          • Instruction ID: a3321e107a4f19de3af6d4272d22984969399ac28715ac9339c2955e8b7d4985
                          • Opcode Fuzzy Hash: 1e3843ae25657ab5e2a095ef7965aa8a899965ddc4aec5955e5b19e5c8adb11b
                          • Instruction Fuzzy Hash: B321D3722042006FEB25AB799C09E7F7B98DB49750F10417FFC08DA262EB699C4197A8
                          APIs
                            • Part of subcall function 00432612: GetWindowLongW.USER32(?,000000EB), ref: 00432623
                          • GetWindowLongW.USER32(?,000000F0), ref: 004BB192
                          • SetWindowLongW.USER32(00000000,000000F0,00000001), ref: 004BB1B7
                          • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 004BB1CF
                          • GetSystemMetrics.USER32(00000004), ref: 004BB1F8
                          • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000047,?,?,?,?,?,?,?,004A0E90,00000000), ref: 004BB216
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: Window$Long$MetricsSystem
                          • String ID:
                          • API String ID: 2294984445-0
                          • Opcode ID: a737a7414ddeede255a3afa4d15df666d819d5d4dba2e5cfaacdb748297a1377
                          • Instruction ID: 59ebe9c46189c30684df7a25b2796984920dbe7118a3c3bc4b30f4967b6859d9
                          • Opcode Fuzzy Hash: a737a7414ddeede255a3afa4d15df666d819d5d4dba2e5cfaacdb748297a1377
                          • Instruction Fuzzy Hash: 8A21A271910611AFCB149F38CC08AAA3BA4EB05361F10473AFD36D72E0D7749821DBA8
                          APIs
                          • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00489320
                            • Part of subcall function 00437BCC: _memmove.LIBCMT ref: 00437C06
                          • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00489352
                          • __itow.LIBCMT ref: 0048936A
                          • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00489392
                          • __itow.LIBCMT ref: 004893A3
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: MessageSend$__itow$_memmove
                          • String ID:
                          • API String ID: 2983881199-0
                          • Opcode ID: 8001ebe095e0d4ed85b44f4bc795fa9bf02678cef6e1590dc9b1f360bff64fa8
                          • Instruction ID: 407daabc41d2823b3c8e6f435ababe96183c85ee8e8ece07b63e50f6438626b4
                          • Opcode Fuzzy Hash: 8001ebe095e0d4ed85b44f4bc795fa9bf02678cef6e1590dc9b1f360bff64fa8
                          • Instruction Fuzzy Hash: 16210731700208BBDB20AE658C85EFE7BACEB4D714F08502BFD44E72C1D6B88D559799
                          APIs
                          • IsWindow.USER32(00000000), ref: 004A5A6E
                          • GetForegroundWindow.USER32 ref: 004A5A85
                          • GetDC.USER32(00000000), ref: 004A5AC1
                          • GetPixel.GDI32(00000000,?,00000003), ref: 004A5ACD
                          • ReleaseDC.USER32(00000000,00000003), ref: 004A5B08
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: Window$ForegroundPixelRelease
                          • String ID:
                          • API String ID: 4156661090-0
                          • Opcode ID: f4e77e5e31d367dc6562c36a1b8ba46cec13eded2aa50ea74641c2c72c9bc58f
                          • Instruction ID: 67536d3427238618935232d979621ae4b4bb1e27277b07591d411cbbc3531f3d
                          • Opcode Fuzzy Hash: f4e77e5e31d367dc6562c36a1b8ba46cec13eded2aa50ea74641c2c72c9bc58f
                          • Instruction Fuzzy Hash: 2721C335A00104AFDB04EFA9DD84A9ABBE5EF59310F14857EF809D7362CA74EC05CB94
                          APIs
                          • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 0043134D
                          • SelectObject.GDI32(?,00000000), ref: 0043135C
                          • BeginPath.GDI32(?), ref: 00431373
                          • SelectObject.GDI32(?,00000000), ref: 0043139C
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: ObjectSelect$BeginCreatePath
                          • String ID:
                          • API String ID: 3225163088-0
                          • Opcode ID: 6177efe3e0463b56f52323921f2e94284a9212d0d564701140f77dcd2681bbb1
                          • Instruction ID: cbef909dd5e44599ebbadc9273a9976ae43ebe659a8b2bb5316251c602a8f0ac
                          • Opcode Fuzzy Hash: 6177efe3e0463b56f52323921f2e94284a9212d0d564701140f77dcd2681bbb1
                          • Instruction Fuzzy Hash: A3215C30800A08EBEB10AF25EC0477A7BA8EB083A1F144637E914962B0D77498B5DF99
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: _memcmp
                          • String ID:
                          • API String ID: 2931989736-0
                          • Opcode ID: fcb7e3524e29ee66ca7716e6981b9c77622c6b7491d1bc0ae7f1a9981127c959
                          • Instruction ID: 7ab6f9498d1e1fe838d7d2b8ef3819728241e3b7e1584b90ca72a6bf128146cf
                          • Opcode Fuzzy Hash: fcb7e3524e29ee66ca7716e6981b9c77622c6b7491d1bc0ae7f1a9981127c959
                          • Instruction Fuzzy Hash: 4A016D616002057EE2047A126E42FBFA35CDE21388B14442BFD0597342EB98AE1583ED
                          APIs
                          • GetCurrentThreadId.KERNEL32 ref: 00494ABA
                          • __beginthreadex.LIBCMT ref: 00494AD8
                          • MessageBoxW.USER32(?,?,?,?), ref: 00494AED
                          • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 00494B03
                          • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00494B0A
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: CloseCurrentHandleMessageObjectSingleThreadWait__beginthreadex
                          • String ID:
                          • API String ID: 3824534824-0
                          • Opcode ID: 725965c311364fa81fd26a45ade0c985e98d875de8d4ac2d62cf44424044cab2
                          • Instruction ID: 62ff6e46a639d9f288c1a39e552092e80cc7bcb57db32232e90ff8ea6b32af11
                          • Opcode Fuzzy Hash: 725965c311364fa81fd26a45ade0c985e98d875de8d4ac2d62cf44424044cab2
                          • Instruction Fuzzy Hash: D611E576904204BBCB008FA8DC08EAB7FACAB85321F15437AF914D3251D6759D158BA8
                          APIs
                          • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 0048821E
                          • GetLastError.KERNEL32(?,00487CE2,?,?,?), ref: 00488228
                          • GetProcessHeap.KERNEL32(00000008,?,?,00487CE2,?,?,?), ref: 00488237
                          • HeapAlloc.KERNEL32(00000000,?,00487CE2,?,?,?), ref: 0048823E
                          • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00488255
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                          • String ID:
                          • API String ID: 842720411-0
                          • Opcode ID: ce23d2e00fe44617a9eb6f4db99661d1587daa2536e4ceb62913b70e7eed1ddb
                          • Instruction ID: 08e80fda45ea7a2209704c97757be2e34c6588d3787393db159d48ddfedb8a0c
                          • Opcode Fuzzy Hash: ce23d2e00fe44617a9eb6f4db99661d1587daa2536e4ceb62913b70e7eed1ddb
                          • Instruction Fuzzy Hash: 09016DB1200604BFDB209FA9DC48D6B7BACEF8A754B500A7AF809C2220DA318C04CB64
                          APIs
                          • CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00487044,80070057,?,?,?,00487455), ref: 00487127
                          • ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00487044,80070057,?,?), ref: 00487142
                          • lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00487044,80070057,?,?), ref: 00487150
                          • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00487044,80070057,?), ref: 00487160
                          • CLSIDFromString.OLE32(?,?,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00487044,80070057,?,?), ref: 0048716C
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: From$Prog$FreeStringTasklstrcmpi
                          • String ID:
                          • API String ID: 3897988419-0
                          • Opcode ID: 62588b8b637803c7f1f1503fd55728b32f9f505751faa501c77efd1777ec0a96
                          • Instruction ID: 720b0e4b21ee49f02c25909e854e7050484e995bfb98150952692141716ccaef
                          • Opcode Fuzzy Hash: 62588b8b637803c7f1f1503fd55728b32f9f505751faa501c77efd1777ec0a96
                          • Instruction Fuzzy Hash: FC017C72605204ABDB11AF64DC88AAE7BADEB44791F240575FD08D2320E735DD419BA4
                          APIs
                          • QueryPerformanceCounter.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00495260
                          • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 0049526E
                          • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?), ref: 00495276
                          • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00495280
                          • Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 004952BC
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: PerformanceQuery$CounterSleep$Frequency
                          • String ID:
                          • API String ID: 2833360925-0
                          • Opcode ID: 9d74a113562b01f947113d823ee7a4a23bdc4d4ce373fb59ac083fef4afaa2ec
                          • Instruction ID: a2aac9299a97ebef6327196d1f6746bcdef41a167c3810a1ea9908c5c2f77cc2
                          • Opcode Fuzzy Hash: 9d74a113562b01f947113d823ee7a4a23bdc4d4ce373fb59ac083fef4afaa2ec
                          • Instruction Fuzzy Hash: ED015731D01A19DBCF00EFE8EC489EEBB78FB09311F5005B6E945B2240CB3859548BAA
                          APIs
                          • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00488121
                          • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 0048812B
                          • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 0048813A
                          • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00488141
                          • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00488157
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: HeapInformationToken$AllocErrorLastProcess
                          • String ID:
                          • API String ID: 44706859-0
                          • Opcode ID: 75196eeae92e014963134629ec3caaf34119e69da4f97e8b6a830ea6d70dda33
                          • Instruction ID: 0a4b7679591e9dc4cbbb597c268ad85184821e74d22b786ab3861df1e0465896
                          • Opcode Fuzzy Hash: 75196eeae92e014963134629ec3caaf34119e69da4f97e8b6a830ea6d70dda33
                          • Instruction Fuzzy Hash: DCF0AF70240304BFEB116FA8EC8CE6B3BACEF49754B40053AF949D2260CF609C05DB64
                          APIs
                          • GetDlgItem.USER32(?,000003E9), ref: 0048C1F7
                          • GetWindowTextW.USER32(00000000,?,00000100), ref: 0048C20E
                          • MessageBeep.USER32(00000000), ref: 0048C226
                          • KillTimer.USER32(?,0000040A), ref: 0048C242
                          • EndDialog.USER32(?,00000001), ref: 0048C25C
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: BeepDialogItemKillMessageTextTimerWindow
                          • String ID:
                          • API String ID: 3741023627-0
                          • Opcode ID: 3c04611974d5d904b34c242cf4e46874fbec325c7e972d41f138b9805b70a8d6
                          • Instruction ID: e9764b2b53ce4300718ce494a556e9c85823a15bcea673a23acd3f78a4a5366c
                          • Opcode Fuzzy Hash: 3c04611974d5d904b34c242cf4e46874fbec325c7e972d41f138b9805b70a8d6
                          • Instruction Fuzzy Hash: D601DB30804304A7EB206B64DD8EF9677B8FF00B05F000BBAF946914E0DBF469598B58
                          APIs
                          • EndPath.GDI32(?), ref: 004313BF
                          • StrokeAndFillPath.GDI32(?,?,0046B888,00000000,?), ref: 004313DB
                          • SelectObject.GDI32(?,00000000), ref: 004313EE
                          • DeleteObject.GDI32 ref: 00431401
                          • StrokePath.GDI32(?), ref: 0043141C
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: Path$ObjectStroke$DeleteFillSelect
                          • String ID:
                          • API String ID: 2625713937-0
                          • Opcode ID: 6a4a7f01cfc87adb5b69478d3cb454d25de67a4520dce794361839c529602d79
                          • Instruction ID: 61da84a461c8da0c1701233f6f234e0f6242174dea54229f3f812a48d98d616d
                          • Opcode Fuzzy Hash: 6a4a7f01cfc87adb5b69478d3cb454d25de67a4520dce794361839c529602d79
                          • Instruction Fuzzy Hash: DCF0EC31004B08EBDB116F2AEC4C7693FA4AB15366F089735E929491F1C73589B9DF5C
                          APIs
                            • Part of subcall function 00450DB6: std::exception::exception.LIBCMT ref: 00450DEC
                            • Part of subcall function 00450DB6: __CxxThrowException@8.LIBCMT ref: 00450E01
                            • Part of subcall function 00437DE1: _memmove.LIBCMT ref: 00437E22
                            • Part of subcall function 00437A51: _memmove.LIBCMT ref: 00437AAB
                          • __swprintf.LIBCMT ref: 00442ECD
                          Strings
                          • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 00442D66
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: _memmove$Exception@8Throw__swprintfstd::exception::exception
                          • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                          • API String ID: 1943609520-557222456
                          • Opcode ID: 8461672b5eed7a3bf29f37648c2f61cafa27bb95b295860f769ebf8f3b2e77af
                          • Instruction ID: 1dc34263f94012b709d36e1440e918c336282e0f4df5ebaf730ddad74a795613
                          • Opcode Fuzzy Hash: 8461672b5eed7a3bf29f37648c2f61cafa27bb95b295860f769ebf8f3b2e77af
                          • Instruction Fuzzy Hash: 3091CE711082019FD714EF25C885C6FB7A9EF89314F00491FF8859B2A2DB78ED48CB5A
                          APIs
                            • Part of subcall function 00434750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00434743,?,?,004337AE,?), ref: 00434770
                          • CoInitialize.OLE32(00000000), ref: 0049B9BB
                          • CoCreateInstance.OLE32(004C2D6C,00000000,00000001,004C2BDC,?), ref: 0049B9D4
                          • CoUninitialize.OLE32 ref: 0049B9F1
                            • Part of subcall function 00439837: __itow.LIBCMT ref: 00439862
                            • Part of subcall function 00439837: __swprintf.LIBCMT ref: 004398AC
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: CreateFullInitializeInstanceNamePathUninitialize__itow__swprintf
                          • String ID: .lnk
                          • API String ID: 2126378814-24824748
                          • Opcode ID: 23d5b609f914a6caf1297c0946d408932be480a31a112d62c6cad5f2ba22fe1a
                          • Instruction ID: 7e2349613fdc3028a3f4830c168b7f109766e429df1ab62b0a0a94ae0aa43ee6
                          • Opcode Fuzzy Hash: 23d5b609f914a6caf1297c0946d408932be480a31a112d62c6cad5f2ba22fe1a
                          • Instruction Fuzzy Hash: 86A143746042019FCB04EF15C984E2ABBE5FF89318F10899EF8999B3A1CB35EC45CB95
                          APIs
                          • OleSetContainedObject.OLE32(?,00000001), ref: 0048B4BE
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: ContainedObject
                          • String ID: AutoIt3GUI$Container$%L
                          • API String ID: 3565006973-2366359021
                          • Opcode ID: da0fb4ec5caf888581ce9e60296cab1105a7eade35b2850f19d445e9fd090c66
                          • Instruction ID: 21e3b9cb6a7aa4663f84e7aabda6a67def51b8b80736cdd7ad771571f4894ec5
                          • Opcode Fuzzy Hash: da0fb4ec5caf888581ce9e60296cab1105a7eade35b2850f19d445e9fd090c66
                          • Instruction Fuzzy Hash: 32916B70600601AFDB54EF65C884B6ABBF4FF49715F20886EE94ACB391DB74E841CB94
                          APIs
                          • __startOneArgErrorHandling.LIBCMT ref: 004550AD
                            • Part of subcall function 004600F0: __87except.LIBCMT ref: 0046012B
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: ErrorHandling__87except__start
                          • String ID: pow
                          • API String ID: 2905807303-2276729525
                          • Opcode ID: e03635919b16bbc0a96a8f1d97758c0878ece793d988709a6f6ff666594c3021
                          • Instruction ID: bc6e02dd198f6119336b54460edfc5ad8be06ab2f65cf9b1010ce63d8af4eac8
                          • Opcode Fuzzy Hash: e03635919b16bbc0a96a8f1d97758c0878ece793d988709a6f6ff666594c3021
                          • Instruction Fuzzy Hash: 17516C6090890287DB117B14C82137F2B909F41B11F2089ABE8D5863DBFE3D8DCC9A8F
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: _memmove
                          • String ID: 3cD$_D
                          • API String ID: 4104443479-3978952248
                          • Opcode ID: cc6d747e10f3322d21a720511b3abaf6fc4be1d717081c66d19a31aa3a86178c
                          • Instruction ID: b8e16fb68dd231bc6f82ae239d12eefabbc7a8b1904848a0976dc6b2cc0f2f10
                          • Opcode Fuzzy Hash: cc6d747e10f3322d21a720511b3abaf6fc4be1d717081c66d19a31aa3a86178c
                          • Instruction Fuzzy Hash: 65516EB0D006199FDB64CF68C884AEEBBB1FF44304F24852EE85AD7350EB34A955CB55
                          APIs
                            • Part of subcall function 00434F0B: __fread_nolock.LIBCMT ref: 00434F29
                          • _wcscmp.LIBCMT ref: 00499824
                          • _wcscmp.LIBCMT ref: 00499837
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: _wcscmp$__fread_nolock
                          • String ID: FILE$P@
                          • API String ID: 4029003684-555163068
                          • Opcode ID: afec2adaf6b8254b3ff030608d24184e61bf46639249f7b8f41425bcf5c73ef7
                          • Instruction ID: 844ca108f498ff9d8333dbccdc10814d3a95c623cc0cb88d0c7570745d13a229
                          • Opcode Fuzzy Hash: afec2adaf6b8254b3ff030608d24184e61bf46639249f7b8f41425bcf5c73ef7
                          • Instruction Fuzzy Hash: 1D41AA71A00219BADF109AA5CC45FEF7BB9DF89714F00047FF904A7181D675AD058765
                          APIs
                            • Part of subcall function 004914BC: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00489296,?,?,00000034,00000800,?,00000034), ref: 004914E6
                          • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 0048983F
                            • Part of subcall function 00491487: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,004892C5,?,?,00000800,?,00001073,00000000,?,?), ref: 004914B1
                            • Part of subcall function 004913DE: GetWindowThreadProcessId.USER32(?,?), ref: 00491409
                            • Part of subcall function 004913DE: OpenProcess.KERNEL32(00000438,00000000,?,?,?,0048925A,00000034,?,?,00001004,00000000,00000000), ref: 00491419
                            • Part of subcall function 004913DE: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,0048925A,00000034,?,?,00001004,00000000,00000000), ref: 0049142F
                          • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 004898AC
                          • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 004898F9
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                          • String ID: @
                          • API String ID: 4150878124-2766056989
                          • Opcode ID: 1ec0f66b2b6496eeeaf1e073ba5ef5d7e16df9d8c8636171fc3a83632e08730d
                          • Instruction ID: bfb19a2de53be620c5cd3dced2ad20ce8388323f7fa4f7fd1f6c7990388129b3
                          • Opcode Fuzzy Hash: 1ec0f66b2b6496eeeaf1e073ba5ef5d7e16df9d8c8636171fc3a83632e08730d
                          • Instruction Fuzzy Hash: 79416076900119AFDF10EFA4CC41AEEBBB8EB09300F0441AAF955B7251DA746E45CBA4
                          APIs
                          • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,004BF910,00000000,?,?,?,?), ref: 004B79DF
                          • GetWindowLongW.USER32 ref: 004B79FC
                          • SetWindowLongW.USER32(?,000000F0,00000000), ref: 004B7A0C
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: Window$Long
                          • String ID: SysTreeView32
                          • API String ID: 847901565-1698111956
                          • Opcode ID: 258dff27e05da3aae2445e321b0ff1cb366259ea346cfa967dfc1b61d876895e
                          • Instruction ID: 3d35068527774dba960274227ccf6cdfe6ff0b78c7809509a32f712a419652de
                          • Opcode Fuzzy Hash: 258dff27e05da3aae2445e321b0ff1cb366259ea346cfa967dfc1b61d876895e
                          • Instruction Fuzzy Hash: D931E171204206AFEB118F38CC41BEB77A9EB49324F204726F875932E0D738ED518B68
                          APIs
                          • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 004B7461
                          • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 004B7475
                          • SendMessageW.USER32(?,00001002,00000000,?), ref: 004B7499
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: MessageSend$Window
                          • String ID: SysMonthCal32
                          • API String ID: 2326795674-1439706946
                          • Opcode ID: 8799e555eef9929d65743e527e2311449b4084216e9a8f4f5e7c9558314bd9a6
                          • Instruction ID: f0ed8292e7beeab627d57249a067b08cdbd0f38f981b6cbd5e003414cdbbd1e7
                          • Opcode Fuzzy Hash: 8799e555eef9929d65743e527e2311449b4084216e9a8f4f5e7c9558314bd9a6
                          • Instruction Fuzzy Hash: 38219F32540218BBDF118F64CC46FEB3B69EB88724F110215FE156B2D0DAB9AC55DBA4
                          APIs
                          • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 004B7C4A
                          • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 004B7C58
                          • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 004B7C5F
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: MessageSend$DestroyWindow
                          • String ID: msctls_updown32
                          • API String ID: 4014797782-2298589950
                          • Opcode ID: f0d51814bb6669d3161f2fa1f2724a7b5dc3df5cb1e552df171087938abd07fc
                          • Instruction ID: 30e226a068256c13a82dc9390e38b3836fc3b5835ff0e6d5d4214d0798b1e58e
                          • Opcode Fuzzy Hash: f0d51814bb6669d3161f2fa1f2724a7b5dc3df5cb1e552df171087938abd07fc
                          • Instruction Fuzzy Hash: 8F216DB1204108AFDB10DF14DCC1DA73BACEB49398B14005AFA059B3A1CB75EC118AB4
                          APIs
                          • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 004B6D3B
                          • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 004B6D4B
                          • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 004B6D70
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: MessageSend$MoveWindow
                          • String ID: Listbox
                          • API String ID: 3315199576-2633736733
                          • Opcode ID: 07e4dc875ff0c2e1442eb7fe0b2d7b06fe48a9fd8faded7ffca5b7688b0f9e03
                          • Instruction ID: 7a05d17c9a144e4301427d5d65faa1e207a8e64369c2aac39169d35d84af8b6c
                          • Opcode Fuzzy Hash: 07e4dc875ff0c2e1442eb7fe0b2d7b06fe48a9fd8faded7ffca5b7688b0f9e03
                          • Instruction Fuzzy Hash: 5521B332600118BFDF118F54CC45FFB3BBAEF89754F028129F9455B2A0C6799C5197A4
                          APIs
                          • __snwprintf.LIBCMT ref: 004A3A66
                            • Part of subcall function 00437DE1: _memmove.LIBCMT ref: 00437E22
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: __snwprintf_memmove
                          • String ID: , $$AUTOITCALLVARIABLE%d$%L
                          • API String ID: 3506404897-2952655123
                          • Opcode ID: 0aeeaf6444dfc5cdf7bb621e09da94bd422f85f0cc79ba743cc4c62a1177bed3
                          • Instruction ID: 81d4d209a21bb3768b80cdfff0c54c03e09ac0e2ca255a42007bc923672af35b
                          • Opcode Fuzzy Hash: 0aeeaf6444dfc5cdf7bb621e09da94bd422f85f0cc79ba743cc4c62a1177bed3
                          • Instruction Fuzzy Hash: 1621D771600218AFCF10EF55CC82EAEB7B4AF59305F50045FF449A7182EB38EA45CB69
                          APIs
                          • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 004B7772
                          • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 004B7787
                          • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 004B7794
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: MessageSend
                          • String ID: msctls_trackbar32
                          • API String ID: 3850602802-1010561917
                          • Opcode ID: d95081a6d7b482862e9a47de923438df400c95e2d48fea4248f28c7f382e6306
                          • Instruction ID: 4d002ee341036f4516498d048434b8dfb708241e377bf6e21e54254f52cb28f0
                          • Opcode Fuzzy Hash: d95081a6d7b482862e9a47de923438df400c95e2d48fea4248f28c7f382e6306
                          • Instruction Fuzzy Hash: 0D112732200208BFEF205F61CC01FEB77A8EFC8B54F11052AFA4192190C675E811CB24
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: __calloc_crt
                          • String ID: N$@BO
                          • API String ID: 3494438863-3527719973
                          • Opcode ID: dcb799494872f50fa8a5612cf66b0a1ae91f4076f6f735b4d3a21d77c7fa4f28
                          • Instruction ID: 30456713e9f58cedc83cb407f947787b8cf90f2b2998e9bc8037ac3aee294be5
                          • Opcode Fuzzy Hash: dcb799494872f50fa8a5612cf66b0a1ae91f4076f6f735b4d3a21d77c7fa4f28
                          • Instruction Fuzzy Hash: 6CF0CD71204A225BF7648F16BC51B733794E704335B92016FEA04DF187EB389845CACC
                          APIs
                          • __lock.LIBCMT ref: 00459B94
                            • Part of subcall function 00459C0B: __mtinitlocknum.LIBCMT ref: 00459C1D
                            • Part of subcall function 00459C0B: EnterCriticalSection.KERNEL32(00000000,?,00459A7C,0000000D), ref: 00459C36
                          • __updatetlocinfoEx_nolock.LIBCMT ref: 00459BA4
                            • Part of subcall function 00459100: ___addlocaleref.LIBCMT ref: 0045911C
                            • Part of subcall function 00459100: ___removelocaleref.LIBCMT ref: 00459127
                            • Part of subcall function 00459100: ___freetlocinfo.LIBCMT ref: 0045913B
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: CriticalEnterEx_nolockSection___addlocaleref___freetlocinfo___removelocaleref__lock__mtinitlocknum__updatetlocinfo
                          • String ID: 8N$8N
                          • API String ID: 547918592-2090888977
                          • Opcode ID: b4b4c0219642781cebe0d1c177be5dfc987db7148f23142ad3a7d1283a012362
                          • Instruction ID: 400b8ae72845e6b40a1cf3a95068927f3f4dbad9022b707306787b2a0e685e7c
                          • Opcode Fuzzy Hash: b4b4c0219642781cebe0d1c177be5dfc987db7148f23142ad3a7d1283a012362
                          • Instruction Fuzzy Hash: ABE08671543351EEEA10F7A7A94372D76506B00727F20015FF855690C3DEFC2908851F
                          APIs
                          • LoadLibraryA.KERNEL32(kernel32.dll,?,00434BD0,?,00434DEF,?,P@,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00434C11
                          • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00434C23
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: AddressLibraryLoadProc
                          • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                          • API String ID: 2574300362-3689287502
                          • Opcode ID: 6a5e8ac1967581cefa35dad01d767a06f40bda90f1aa0659b2094a184e98d471
                          • Instruction ID: 0ac4f03420925c1dac39e4d5aab1b6e5e6b11c277e9009490f686bcd3c1b6f45
                          • Opcode Fuzzy Hash: 6a5e8ac1967581cefa35dad01d767a06f40bda90f1aa0659b2094a184e98d471
                          • Instruction Fuzzy Hash: 9CD08C30510712CFCB205B75DC08247B6E5AF08342B119C3A9489C2650E6B8E8808618
                          APIs
                          • LoadLibraryA.KERNEL32(kernel32.dll,?,00434B83,?), ref: 00434C44
                          • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00434C56
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: AddressLibraryLoadProc
                          • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                          • API String ID: 2574300362-1355242751
                          • Opcode ID: c72dbb7b357fc79cfabcdc662476c91260f4ce7f67aaa5c06ab88f088c6a0b64
                          • Instruction ID: ff736fbbfc9e0f9ce16649831654e7fde91ea51e4d16e048d657f5d335459bc0
                          • Opcode Fuzzy Hash: c72dbb7b357fc79cfabcdc662476c91260f4ce7f67aaa5c06ab88f088c6a0b64
                          • Instruction Fuzzy Hash: 48D0C230510713CFC7204F36CC0824672D4AF04341F21DC3BD49AC6264E678E880CA18
                          APIs
                          • LoadLibraryA.KERNEL32(advapi32.dll,?,004B1039), ref: 004B0DF5
                          • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 004B0E07
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: AddressLibraryLoadProc
                          • String ID: RegDeleteKeyExW$advapi32.dll
                          • API String ID: 2574300362-4033151799
                          • Opcode ID: 3f08a6163326457d7195897a896fd6371346c246eff9f70a8d7465fa83b254e7
                          • Instruction ID: 7b05e3af93d8642ffbb834e61b36acaf385eba6a70ebae9d3019088a3a7431c3
                          • Opcode Fuzzy Hash: 3f08a6163326457d7195897a896fd6371346c246eff9f70a8d7465fa83b254e7
                          • Instruction Fuzzy Hash: A9D0EC71510712DFD7205B79C80968776D5AF14352F118D3E9495D2690E6B8E8A08658
                          APIs
                          • LoadLibraryA.KERNEL32(kernel32.dll,00000001,004A8CF4,?,004BF910), ref: 004A90EE
                          • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 004A9100
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: AddressLibraryLoadProc
                          • String ID: GetModuleHandleExW$kernel32.dll
                          • API String ID: 2574300362-199464113
                          • Opcode ID: 01bc308dea32346226bd5dd66a0382cdcba64908a0569a46468fe70c561e0fb5
                          • Instruction ID: faf8af35db1ce046db43d281dc2e505e7e37994fc1fe7cd97d2bb1bd206e368f
                          • Opcode Fuzzy Hash: 01bc308dea32346226bd5dd66a0382cdcba64908a0569a46468fe70c561e0fb5
                          • Instruction Fuzzy Hash: 93D0EC34510723DFEB209B35DC1864676D4AF15351B118D3AD499D6690E678DC848654
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: LocalTime__swprintf
                          • String ID: %.3d$WIN_XPe
                          • API String ID: 2070861257-2409531811
                          • Opcode ID: 01325be9e4c6051e35a4448efc3e6cc06b7580211db6628caa1201aa3ad72352
                          • Instruction ID: 1d1f92d7850e3c3dd8e182353387dc0caddab29a077c05ed2daa4556f180122f
                          • Opcode Fuzzy Hash: 01325be9e4c6051e35a4448efc3e6cc06b7580211db6628caa1201aa3ad72352
                          • Instruction Fuzzy Hash: B1D05B71804118FBC7189B959C89CFD737CA718302F104563F80AE2060E23D9B56D76F
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: a65d427c20d39d62de57b59e79ea3fbaba15adc0930c4c353b9c890cfb359279
                          • Instruction ID: ee2b8da15ca11c6c739890c66bc4d8178e52eac77f165498d78cee1b0589de84
                          • Opcode Fuzzy Hash: a65d427c20d39d62de57b59e79ea3fbaba15adc0930c4c353b9c890cfb359279
                          • Instruction Fuzzy Hash: 1CC1B074A04216EFCB14DFA4C894EAEBBB5FF48704B208999E809DB351D734ED81DB94
                          APIs
                          • CharLowerBuffW.USER32(?,?), ref: 004AE0BE
                          • CharLowerBuffW.USER32(?,?), ref: 004AE101
                            • Part of subcall function 004AD7A5: CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 004AD7C5
                          • VirtualAlloc.KERNEL32(00000000,00000077,00003000,00000040), ref: 004AE301
                          • _memmove.LIBCMT ref: 004AE314
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: BuffCharLower$AllocVirtual_memmove
                          • String ID:
                          • API String ID: 3659485706-0
                          • Opcode ID: 82225728b38104ff9a49db83fe23b21830db10bc2d2ab117fc3e1b77855114c7
                          • Instruction ID: 7bfe68dc16036f5598c4543002d435e84518da6fe6d3a770a91897647d100ceb
                          • Opcode Fuzzy Hash: 82225728b38104ff9a49db83fe23b21830db10bc2d2ab117fc3e1b77855114c7
                          • Instruction Fuzzy Hash: B1C168716083019FC714DF29C480A6ABBE4FF9A318F14896EF8999B351D735E906CB86
                          APIs
                          • CoInitialize.OLE32(00000000), ref: 004A80C3
                          • CoUninitialize.OLE32 ref: 004A80CE
                            • Part of subcall function 0048D56C: CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 0048D5D4
                          • VariantInit.OLEAUT32(?), ref: 004A80D9
                          • VariantClear.OLEAUT32(?), ref: 004A83AA
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: Variant$ClearCreateInitInitializeInstanceUninitialize
                          • String ID:
                          • API String ID: 780911581-0
                          • Opcode ID: d9d845acb7bb8352719a493293ea408f1a897c95de110c31809698f406013b6a
                          • Instruction ID: af64c381ab31acfe6a70703340d28455f8d13ab560cdff11b59fe90c2b880563
                          • Opcode Fuzzy Hash: d9d845acb7bb8352719a493293ea408f1a897c95de110c31809698f406013b6a
                          • Instruction Fuzzy Hash: 7EA135756047019FCB04EF15C881A2AB7E4FF9A358F04445EF9999B3A1CB78EC05CB8A
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: Variant$AllocClearCopyInitString
                          • String ID:
                          • API String ID: 2808897238-0
                          • Opcode ID: 078a7bcf3c078cbf3f66e5fd65bbfb7992060a6bc44122d3510f3b43b44665df
                          • Instruction ID: e07d27d010c06c55b65112b7424c3798da38cbb11ba45ddd3400a51f7896e079
                          • Opcode Fuzzy Hash: 078a7bcf3c078cbf3f66e5fd65bbfb7992060a6bc44122d3510f3b43b44665df
                          • Instruction Fuzzy Hash: 1C51F7747003019ACBA8BF66D891A3EB3E5AF45314F21DC1FE586DB291DB78D885870D
                          APIs
                          • GetWindowRect.USER32(00E5E548,?), ref: 004B9863
                          • ScreenToClient.USER32(00000002,00000002), ref: 004B9896
                          • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,00000002,?,?), ref: 004B9903
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: Window$ClientMoveRectScreen
                          • String ID:
                          • API String ID: 3880355969-0
                          • Opcode ID: 31da4bdc92ac023c65ad5f9bc9b43339f75802d1ae0b4997b61e607e802dd459
                          • Instruction ID: fb97e32b4fc6a61b2e5be8e88d5a3be1efcfd92e1f0390b3e5d7481e6896d6b0
                          • Opcode Fuzzy Hash: 31da4bdc92ac023c65ad5f9bc9b43339f75802d1ae0b4997b61e607e802dd459
                          • Instruction Fuzzy Hash: 1B514D74A00608AFCB14DF64D880AEE7BB5FF45360F10826AFA559B3A0D734AD51CBA4
                          APIs
                          • SendMessageW.USER32(?,0000110A,00000004,00000000), ref: 00489AD2
                          • __itow.LIBCMT ref: 00489B03
                            • Part of subcall function 00489D53: SendMessageW.USER32(?,0000113E,00000000,00000000), ref: 00489DBE
                          • SendMessageW.USER32(?,0000110A,00000001,?), ref: 00489B6C
                          • __itow.LIBCMT ref: 00489BC3
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: MessageSend$__itow
                          • String ID:
                          • API String ID: 3379773720-0
                          • Opcode ID: b0ba78b4311b23f210d2f4f80b22dd7a5157a520417991c1e763581047cd0376
                          • Instruction ID: ea05e8f9c470d455b1e09682da42dcaa079daa3867837a899d848bcdd8bfea9d
                          • Opcode Fuzzy Hash: b0ba78b4311b23f210d2f4f80b22dd7a5157a520417991c1e763581047cd0376
                          • Instruction Fuzzy Hash: 4841D5B0A00608ABDF21EF55C845BFE7BB9EF48724F04042EF905A3291DB78AD44CB59
                          APIs
                          • socket.WSOCK32(00000002,00000002,00000011), ref: 004A69D1
                          • WSAGetLastError.WSOCK32(00000000), ref: 004A69E1
                            • Part of subcall function 00439837: __itow.LIBCMT ref: 00439862
                            • Part of subcall function 00439837: __swprintf.LIBCMT ref: 004398AC
                          • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 004A6A45
                          • WSAGetLastError.WSOCK32(00000000), ref: 004A6A51
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: ErrorLast$__itow__swprintfsocket
                          • String ID:
                          • API String ID: 2214342067-0
                          • Opcode ID: b5de05217b6337f7d1f4f3bfe01da78d02f33d63695350284382cdfd3830bb65
                          • Instruction ID: dd9f4a190b6f4f9e5aa65011d06a0a31312308adfd242bc16a5d5cc7be01d057
                          • Opcode Fuzzy Hash: b5de05217b6337f7d1f4f3bfe01da78d02f33d63695350284382cdfd3830bb65
                          • Instruction Fuzzy Hash: 1841C3747002006FEB50BF25DC86F2E77A49B59B18F14C56EFA199B3C2DAB89D008B59
                          APIs
                          • #16.WSOCK32(?,?,00000000,00000000,00000000,00000000,?,?,00000000,004BF910), ref: 004A64A7
                          • _strlen.LIBCMT ref: 004A64D9
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: _strlen
                          • String ID:
                          • API String ID: 4218353326-0
                          • Opcode ID: 0c72af583b88bb71b1add66067b0cce0f4fe6c05b197565f2b960e2ce0536e8c
                          • Instruction ID: 991a0e93809402c3f49d5bf5e64f740e0246e6f9c61296e897c0a34710219b1b
                          • Opcode Fuzzy Hash: 0c72af583b88bb71b1add66067b0cce0f4fe6c05b197565f2b960e2ce0536e8c
                          • Instruction Fuzzy Hash: E341CA71A00104ABCB14FBA5ECC5FAEB7A9AF19314F15815FF81997292DB38AD04CB58
                          APIs
                          • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 0049B89E
                          • GetLastError.KERNEL32(?,00000000), ref: 0049B8C4
                          • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 0049B8E9
                          • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 0049B915
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: CreateHardLink$DeleteErrorFileLast
                          • String ID:
                          • API String ID: 3321077145-0
                          • Opcode ID: b5ed0fe867dde7b75be1850398daa512076c130df3f72bce850afe8cc3e7c51e
                          • Instruction ID: 221d724c031c03bd9df16268ae837bc093be7c224e7b1a82cd5e5cfc044f642f
                          • Opcode Fuzzy Hash: b5ed0fe867dde7b75be1850398daa512076c130df3f72bce850afe8cc3e7c51e
                          • Instruction Fuzzy Hash: 4C411B39600610DFCB14EF15C585A5DBBE1EF89314F15809AEC4A9B362CB78FD05CB99
                          APIs
                          • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 004B88DE
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: InvalidateRect
                          • String ID:
                          • API String ID: 634782764-0
                          • Opcode ID: 8e3464546924ee10d4de309376f6756893be46e60e26d199cb7dd37cf6f57085
                          • Instruction ID: 3c4731f0cc8bbb40f4d3b531e89c5f3fdb129d65c86a0b66bbc03424fff69f5d
                          • Opcode Fuzzy Hash: 8e3464546924ee10d4de309376f6756893be46e60e26d199cb7dd37cf6f57085
                          • Instruction Fuzzy Hash: 0C31E574600108BFEF24AE28CC45BFA7BA8EB05350F54411BFA15D62A1CA78E950DB6F
                          APIs
                          • ClientToScreen.USER32(?,?), ref: 004BAB60
                          • GetWindowRect.USER32(?,?), ref: 004BABD6
                          • PtInRect.USER32(?,?,004BC014), ref: 004BABE6
                          • MessageBeep.USER32(00000000), ref: 004BAC57
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: Rect$BeepClientMessageScreenWindow
                          • String ID:
                          • API String ID: 1352109105-0
                          • Opcode ID: 3158ee15c186e550a57d7e198dc34b00eadb648a4243249d93e62778fe4975f0
                          • Instruction ID: a2a9e88d65a5cf8f2c3dcb1218ff35892b1abe717ff715c2ffb395a5c54b948d
                          • Opcode Fuzzy Hash: 3158ee15c186e550a57d7e198dc34b00eadb648a4243249d93e62778fe4975f0
                          • Instruction Fuzzy Hash: 9F418E30600619DFCF11DF58D884AAA7BF5FB49344F1881BAE914DB361D734E861CBAA
                          APIs
                          • GetKeyboardState.USER32(?,00000000,?,00000001), ref: 00490B27
                          • SetKeyboardState.USER32(00000080,?,00000001), ref: 00490B43
                          • PostMessageW.USER32(00000000,00000102,00000001,00000001), ref: 00490BA9
                          • SendInput.USER32(00000001,00000000,0000001C,00000000,?,00000001), ref: 00490BFB
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: KeyboardState$InputMessagePostSend
                          • String ID:
                          • API String ID: 432972143-0
                          • Opcode ID: 2da292853287392b82afeb22cb6a615ed62cb2cbff78bbe1a1d699f79916b4ad
                          • Instruction ID: 29ce5f3adfb0ef6573d03536dc45297ad45a31b2bca6de983ad32eb2a16f65d2
                          • Opcode Fuzzy Hash: 2da292853287392b82afeb22cb6a615ed62cb2cbff78bbe1a1d699f79916b4ad
                          • Instruction Fuzzy Hash: 85312630D40218AEEF348AA98C05BFEBFA9AB45318F04437BE594522D1C37CA985975A
                          APIs
                          • GetKeyboardState.USER32(?,75A4C0D0,?,00008000), ref: 00490C66
                          • SetKeyboardState.USER32(00000080,?,00008000), ref: 00490C82
                          • PostMessageW.USER32(00000000,00000101,00000000), ref: 00490CE1
                          • SendInput.USER32(00000001,?,0000001C,75A4C0D0,?,00008000), ref: 00490D33
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: KeyboardState$InputMessagePostSend
                          • String ID:
                          • API String ID: 432972143-0
                          • Opcode ID: fa9a944b897baf3728395cfeb06b3d10558360f81a4a84eb5dcb082b4717c931
                          • Instruction ID: ef330e49430cd798cab964a9a694be86a0b0ffe0a80aff15c68f8e1af64f1605
                          • Opcode Fuzzy Hash: fa9a944b897baf3728395cfeb06b3d10558360f81a4a84eb5dcb082b4717c931
                          • Instruction Fuzzy Hash: F6310530940218AEFF388A658C087FFBFA6AB45314F04473BE485522D1C33D9D49979A
                          APIs
                          • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 004661FB
                          • __isleadbyte_l.LIBCMT ref: 00466229
                          • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 00466257
                          • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 0046628D
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                          • String ID:
                          • API String ID: 3058430110-0
                          • Opcode ID: 6971e780dd21f018cc849ab235de7e8f62da7bfe9b12c0f2d28748be19d9c0f8
                          • Instruction ID: fd082ba18617af2429c82f5f7e67c1110c0ab91f2fcc6f70e9821f1ca68b6feb
                          • Opcode Fuzzy Hash: 6971e780dd21f018cc849ab235de7e8f62da7bfe9b12c0f2d28748be19d9c0f8
                          • Instruction Fuzzy Hash: 1231F230600246AFDF219F65CC44BAB7FA9FF42310F16416AE82497291FB34E950CB96
                          APIs
                          • GetForegroundWindow.USER32 ref: 004B4F02
                            • Part of subcall function 00493641: GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0049365B
                            • Part of subcall function 00493641: GetCurrentThreadId.KERNEL32 ref: 00493662
                            • Part of subcall function 00493641: AttachThreadInput.USER32(00000000,?,00495005), ref: 00493669
                          • GetCaretPos.USER32(?), ref: 004B4F13
                          • ClientToScreen.USER32(00000000,?), ref: 004B4F4E
                          • GetForegroundWindow.USER32 ref: 004B4F54
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                          • String ID:
                          • API String ID: 2759813231-0
                          • Opcode ID: af133547668b53a49938c43808d20135dcce965d06ff6ace9cfbe79f35fc32df
                          • Instruction ID: b6627148cd030bbe35f4939c6b5f23225a86e137d84697d49c2c2db7a36dfb13
                          • Opcode Fuzzy Hash: af133547668b53a49938c43808d20135dcce965d06ff6ace9cfbe79f35fc32df
                          • Instruction Fuzzy Hash: 69312D71D00108AFCB14EFBAC8859EFF7F9EF99304F10446AE415E7201DA75AE058BA4
                          APIs
                          • CreateToolhelp32Snapshot.KERNEL32 ref: 00493C7A
                          • Process32FirstW.KERNEL32(00000000,?), ref: 00493C88
                          • Process32NextW.KERNEL32(00000000,?), ref: 00493CA8
                          • CloseHandle.KERNEL32(00000000), ref: 00493D52
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                          • String ID:
                          • API String ID: 420147892-0
                          • Opcode ID: 9cfc1f1386abc203da53634bdc5ea8907c9710f25ba758fa700921ccbf1c56e4
                          • Instruction ID: f335d3ff080c91af2b568f3d5377112cea61bd4ea3decdc4368de04a79fdabdb
                          • Opcode Fuzzy Hash: 9cfc1f1386abc203da53634bdc5ea8907c9710f25ba758fa700921ccbf1c56e4
                          • Instruction Fuzzy Hash: DC31F471108304DFD710EF55C891AAFBBE8EF89318F40093EF485822A1EB749E49CB56
                          APIs
                            • Part of subcall function 00432612: GetWindowLongW.USER32(?,000000EB), ref: 00432623
                          • GetCursorPos.USER32(?), ref: 004BC4D2
                          • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,0046B9AB,?,?,?,?,?), ref: 004BC4E7
                          • GetCursorPos.USER32(?), ref: 004BC534
                          • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,0046B9AB,?,?,?), ref: 004BC56E
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: Cursor$LongMenuPopupProcTrackWindow
                          • String ID:
                          • API String ID: 2864067406-0
                          • Opcode ID: 5bf64ab07096634b44ba6adc9acb717850839a7747ed7e6b325c4f3e59331e37
                          • Instruction ID: bacc3030bf76d08f61a04910ad348a1d3e55127de64586fd5cbc4ec974674914
                          • Opcode Fuzzy Hash: 5bf64ab07096634b44ba6adc9acb717850839a7747ed7e6b325c4f3e59331e37
                          • Instruction Fuzzy Hash: B5318135510428FFCB259F58C8D8EFB7BB5EB09310F44416AF9098B361C735A960DBA8
                          APIs
                            • Part of subcall function 0048810A: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00488121
                            • Part of subcall function 0048810A: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 0048812B
                            • Part of subcall function 0048810A: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 0048813A
                            • Part of subcall function 0048810A: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00488141
                            • Part of subcall function 0048810A: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00488157
                          • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 004886A3
                          • _memcmp.LIBCMT ref: 004886C6
                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 004886FC
                          • HeapFree.KERNEL32(00000000), ref: 00488703
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                          • String ID:
                          • API String ID: 1592001646-0
                          • Opcode ID: 01cc38c879496336a1003486fd99a942cc57ea7bdb10a28244448c834f403ccb
                          • Instruction ID: b44742dbf9dca8e60e990751f040fcbca84940cb96d594b5295ba7bb79a6d869
                          • Opcode Fuzzy Hash: 01cc38c879496336a1003486fd99a942cc57ea7bdb10a28244448c834f403ccb
                          • Instruction Fuzzy Hash: B0217C71E40108EFDB10EFA8CA49BEEB7B8EF45305F55445EE844A7241EB35AE05CB58
                          APIs
                          • __setmode.LIBCMT ref: 004509AE
                            • Part of subcall function 00435A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00497896,?,?,00000000), ref: 00435A2C
                            • Part of subcall function 00435A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00497896,?,?,00000000,?,?), ref: 00435A50
                          • _fprintf.LIBCMT ref: 004509E5
                          • OutputDebugStringW.KERNEL32(?), ref: 00485DBB
                            • Part of subcall function 00454AAA: _flsall.LIBCMT ref: 00454AC3
                          • __setmode.LIBCMT ref: 00450A1A
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: ByteCharMultiWide__setmode$DebugOutputString_flsall_fprintf
                          • String ID:
                          • API String ID: 521402451-0
                          • Opcode ID: 4f3b364da7a036f1364cb101cee8c711343dd61765e58c6661a92b3e6a9d8f24
                          • Instruction ID: 562e98a9a5bba183c54968324944e72ff5d1b2d75fade75d606a2ea874634575
                          • Opcode Fuzzy Hash: 4f3b364da7a036f1364cb101cee8c711343dd61765e58c6661a92b3e6a9d8f24
                          • Instruction Fuzzy Hash: 2B116D355041047FDB04B3BA9C469BE77A89F8531DF10015FF90457183EE2C4D9A979D
                          APIs
                          • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 004A17A3
                            • Part of subcall function 004A182D: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 004A184C
                            • Part of subcall function 004A182D: InternetCloseHandle.WININET(00000000), ref: 004A18E9
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: Internet$CloseConnectHandleOpen
                          • String ID:
                          • API String ID: 1463438336-0
                          • Opcode ID: ff5704977cd6b8a98888ded24334e7bfcbf4ec2010ac4127ae4fcc3e8ae82f32
                          • Instruction ID: decc90da9851b16754c2cb2c9a1a134a68df5f673a37bd41cddd589d7fcd1d44
                          • Opcode Fuzzy Hash: ff5704977cd6b8a98888ded24334e7bfcbf4ec2010ac4127ae4fcc3e8ae82f32
                          • Instruction Fuzzy Hash: F221F635200601BFEB129F64CC40FBBBBA9FF5A710F10412FF91596660DB79D811A7A8
                          APIs
                          • GetFileAttributesW.KERNEL32(?,004BFAC0), ref: 00493A64
                          • GetLastError.KERNEL32 ref: 00493A73
                          • CreateDirectoryW.KERNEL32(?,00000000), ref: 00493A82
                          • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,004BFAC0), ref: 00493ADF
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: CreateDirectory$AttributesErrorFileLast
                          • String ID:
                          • API String ID: 2267087916-0
                          • Opcode ID: 18b4b4d0b656188786adcd842b53e764ba9b276a0815c1c1359f3b083923a971
                          • Instruction ID: d039559c0c3c6e171d4b91e80f0c9dc42bc9f3a94182d567af0919a391b3a76f
                          • Opcode Fuzzy Hash: 18b4b4d0b656188786adcd842b53e764ba9b276a0815c1c1359f3b083923a971
                          • Instruction Fuzzy Hash: A62194745082019F8B10DF28C88586B7BE4EE5A369F104A3FF4D9C72A1D7359E4ACB5A
                          APIs
                          • _free.LIBCMT ref: 00465101
                            • Part of subcall function 0045571C: __FF_MSGBANNER.LIBCMT ref: 00455733
                            • Part of subcall function 0045571C: __NMSG_WRITE.LIBCMT ref: 0045573A
                            • Part of subcall function 0045571C: RtlAllocateHeap.NTDLL(00E40000,00000000,00000001,00000000,?,?,?,00450DD3,?), ref: 0045575F
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: AllocateHeap_free
                          • String ID:
                          • API String ID: 614378929-0
                          • Opcode ID: 4c167ee86c61cb58c5c8ae78fc1c590ec5c227e359fd79150809891710ec09e3
                          • Instruction ID: b2949bf79be9261998477489246c6bb8b46537fd038dcc6eb08de171396e66c4
                          • Opcode Fuzzy Hash: 4c167ee86c61cb58c5c8ae78fc1c590ec5c227e359fd79150809891710ec09e3
                          • Instruction Fuzzy Hash: F711E7B1D00A11AFCB312F75EC057AE37985B063A6F10453FFD09A6252EE3C8D45869E
                          APIs
                          • _memset.LIBCMT ref: 004344CF
                            • Part of subcall function 0043407C: _memset.LIBCMT ref: 004340FC
                            • Part of subcall function 0043407C: _wcscpy.LIBCMT ref: 00434150
                            • Part of subcall function 0043407C: Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00434160
                          • KillTimer.USER32(?,00000001,?,?), ref: 00434524
                          • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00434533
                          • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 0046D4B9
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: IconNotifyShell_Timer_memset$Kill_wcscpy
                          • String ID:
                          • API String ID: 1378193009-0
                          • Opcode ID: 0a64aea06e6ce9b391dbfeff2eabfc0a35df323df7c6c666c7276223eb3d24d3
                          • Instruction ID: 001abae7789dfa77c0979a5510598bd2e1201795355f12436f38be45fb6ef840
                          • Opcode Fuzzy Hash: 0a64aea06e6ce9b391dbfeff2eabfc0a35df323df7c6c666c7276223eb3d24d3
                          • Instruction Fuzzy Hash: 8321D370D04794AFE7328B248845BE7BBEC9B05309F04009FE78E56242D7782E88CB4A
                          APIs
                            • Part of subcall function 00435A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00497896,?,?,00000000), ref: 00435A2C
                            • Part of subcall function 00435A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00497896,?,?,00000000,?,?), ref: 00435A50
                          • gethostbyname.WSOCK32(?,?,?), ref: 004A6399
                          • WSAGetLastError.WSOCK32(00000000), ref: 004A63A4
                          • _memmove.LIBCMT ref: 004A63D1
                          • inet_ntoa.WSOCK32(?), ref: 004A63DC
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: ByteCharMultiWide$ErrorLast_memmovegethostbynameinet_ntoa
                          • String ID:
                          • API String ID: 1504782959-0
                          • Opcode ID: 0d297e1ce715eabc32487149c9465d4b4f6a40478239e23191458876f64fcc4d
                          • Instruction ID: f5b88c3366b729028e0b465fb793f6a7097c4bb9c344c37ab3b307d69f8d570d
                          • Opcode Fuzzy Hash: 0d297e1ce715eabc32487149c9465d4b4f6a40478239e23191458876f64fcc4d
                          • Instruction Fuzzy Hash: 2E119371500109AFCB00FBA5DD86DEE77B8AF19314B14412AF505A7262DB349F14DB69
                          APIs
                          • SendMessageW.USER32(?,000000B0,?,?), ref: 00488B61
                          • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00488B73
                          • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00488B89
                          • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00488BA4
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: MessageSend
                          • String ID:
                          • API String ID: 3850602802-0
                          • Opcode ID: 019437fbba57819f97421e338b692ff087a25cdec58e2a3cc2d481b8e9f6e516
                          • Instruction ID: be6c6b708449e1320dab14155f15f78223038653fec082c67d76d981a27b2da4
                          • Opcode Fuzzy Hash: 019437fbba57819f97421e338b692ff087a25cdec58e2a3cc2d481b8e9f6e516
                          • Instruction Fuzzy Hash: 90113A79901218BFDB11DBA5CC84E9EBB74EB48310F6040A6E900B7290DA716E11DB94
                          APIs
                            • Part of subcall function 00432612: GetWindowLongW.USER32(?,000000EB), ref: 00432623
                          • DefDlgProcW.USER32(?,00000020,?), ref: 004312D8
                          • GetClientRect.USER32(?,?), ref: 0046B5FB
                          • GetCursorPos.USER32(?), ref: 0046B605
                          • ScreenToClient.USER32(?,?), ref: 0046B610
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: Client$CursorLongProcRectScreenWindow
                          • String ID:
                          • API String ID: 4127811313-0
                          • Opcode ID: 5880c8494b0f533c72820ebad36af210bac67bdaaa240055db53594a632fc853
                          • Instruction ID: 9cfac9065d0f922733ef4150bb410e5354b3a3bcc2d54429c7b9744bfc93a2e4
                          • Opcode Fuzzy Hash: 5880c8494b0f533c72820ebad36af210bac67bdaaa240055db53594a632fc853
                          • Instruction Fuzzy Hash: 59112B35500059FBCB10EF99D8859FF77B8FB09300F4005A6FA11E7251C734BA568BA9
                          APIs
                          • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000,00000000), ref: 0048D84D
                          • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 0048D864
                          • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 0048D879
                          • RegisterTypeLibForUser.OLEAUT32(?,?,00000000), ref: 0048D897
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: Type$Register$FileLoadModuleNameUser
                          • String ID:
                          • API String ID: 1352324309-0
                          • Opcode ID: 912b193220bb14a7961c931ddd6e6d6db261d255a3850abe1ca04051a7883f56
                          • Instruction ID: 1b9caa12b41934868637f1137be22a53875872c5a3e9a601de2d21c0d19f96ce
                          • Opcode Fuzzy Hash: 912b193220bb14a7961c931ddd6e6d6db261d255a3850abe1ca04051a7883f56
                          • Instruction Fuzzy Hash: 60115275A06304DBE320AF51DC08F9BBBBCEF00700F10497AA525D6190D7B4E549ABA5
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                          • String ID:
                          • API String ID: 3016257755-0
                          • Opcode ID: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                          • Instruction ID: 28c744ff2f87b86975b6df1f002b2063e6344aeda8ec72286f16d6602a6e1d6e
                          • Opcode Fuzzy Hash: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                          • Instruction Fuzzy Hash: 25014C7244814ABBCF165F84CC01CEE3F62BB18359F598456FE1898131E23BD9B1AB96
                          APIs
                          • GetWindowRect.USER32(?,?), ref: 004BB2E4
                          • ScreenToClient.USER32(?,?), ref: 004BB2FC
                          • ScreenToClient.USER32(?,?), ref: 004BB320
                          • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 004BB33B
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: ClientRectScreen$InvalidateWindow
                          • String ID:
                          • API String ID: 357397906-0
                          • Opcode ID: a518392d6bbca83a4ad9600f9d642c8dfd3cda363d6032af9f4cbaba327217bc
                          • Instruction ID: abc8358ba2db95d4d8af01185c77c1af934d7bf35c6ddab4150fa2b8251ee018
                          • Opcode Fuzzy Hash: a518392d6bbca83a4ad9600f9d642c8dfd3cda363d6032af9f4cbaba327217bc
                          • Instruction Fuzzy Hash: D6114775D00609EFDB41CF99C844AEEBBF5FF18310F108166E914E3620D775AA558F94
                          APIs
                          • EnterCriticalSection.KERNEL32(?), ref: 00496BE6
                            • Part of subcall function 004976C4: _memset.LIBCMT ref: 004976F9
                          • _memmove.LIBCMT ref: 00496C09
                          • _memset.LIBCMT ref: 00496C16
                          • LeaveCriticalSection.KERNEL32(?), ref: 00496C26
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: CriticalSection_memset$EnterLeave_memmove
                          • String ID:
                          • API String ID: 48991266-0
                          • Opcode ID: 3300c88ab316c7b9bf073b0d4a20f36e4f3364aea9093623d244bfc2bf6acd47
                          • Instruction ID: 07e5677f8ba46f438ce65dbfe3b837f458b658d2804001bb351c84bc3a49b38a
                          • Opcode Fuzzy Hash: 3300c88ab316c7b9bf073b0d4a20f36e4f3364aea9093623d244bfc2bf6acd47
                          • Instruction Fuzzy Hash: 20F0303A100100BBCF056F56DC85A8ABF29EF45325B0480A6FE085E227C735A815CBB8
                          APIs
                          • GetSysColor.USER32(00000008), ref: 00432231
                          • SetTextColor.GDI32(?,000000FF), ref: 0043223B
                          • SetBkMode.GDI32(?,00000001), ref: 00432250
                          • GetStockObject.GDI32(00000005), ref: 00432258
                          • GetWindowDC.USER32(?,00000000), ref: 0046BE83
                          • GetPixel.GDI32(00000000,00000000,00000000), ref: 0046BE90
                          • GetPixel.GDI32(00000000,?,00000000), ref: 0046BEA9
                          • GetPixel.GDI32(00000000,00000000,?), ref: 0046BEC2
                          • GetPixel.GDI32(00000000,?,?), ref: 0046BEE2
                          • ReleaseDC.USER32(?,00000000), ref: 0046BEED
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: Pixel$Color$ModeObjectReleaseStockTextWindow
                          • String ID:
                          • API String ID: 1946975507-0
                          • Opcode ID: 0efafcc7998f5acc0d9b43945beb39e4f6f3cb3c0976d3f70c05c839031b4f4c
                          • Instruction ID: eada655894c1a0ec08da87cc7db9a939d211872530865d313df21f1b8497a3d0
                          • Opcode Fuzzy Hash: 0efafcc7998f5acc0d9b43945beb39e4f6f3cb3c0976d3f70c05c839031b4f4c
                          • Instruction Fuzzy Hash: 7EE03932104244ABDF215FA8EC0D7D93B10EB05332F008376FA6D980E197B24994DB16
                          APIs
                          • GetCurrentThread.KERNEL32 ref: 0048871B
                          • OpenThreadToken.ADVAPI32(00000000,?,?,?,004882E6), ref: 00488722
                          • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,004882E6), ref: 0048872F
                          • OpenProcessToken.ADVAPI32(00000000,?,?,?,004882E6), ref: 00488736
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: CurrentOpenProcessThreadToken
                          • String ID:
                          • API String ID: 3974789173-0
                          • Opcode ID: 802032cc05765ba0af61c860e6ea5ca56e5bbb3591430d2de927062f4e4924b2
                          • Instruction ID: 347d384f763158cc324a8abbf51bc1a71f3589b0a44ce4d76aef45ee09074202
                          • Opcode Fuzzy Hash: 802032cc05765ba0af61c860e6ea5ca56e5bbb3591430d2de927062f4e4924b2
                          • Instruction Fuzzy Hash: 8AE08636615211ABD7206FB05D0CB5B3BBCEF54791F144838B649C9050DA388449C754
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID:
                          • String ID: %L
                          • API String ID: 0-1940408768
                          • Opcode ID: 289aeef7c98ace8fe28776b951211b5c845e19813ce34c89221fe376d9c03d82
                          • Instruction ID: 1c104f26fbb69cad1d058a9b85c08d299fe767c31f82a2eede6e967104ff1677
                          • Opcode Fuzzy Hash: 289aeef7c98ace8fe28776b951211b5c845e19813ce34c89221fe376d9c03d82
                          • Instruction Fuzzy Hash: 58B1C471D0010AAACF24EF94C4819FEB7B5EF5C314F51A02BE941A7291DB389D82CB9D
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: __itow_s
                          • String ID: xbO$xbO
                          • API String ID: 3653519197-426669150
                          • Opcode ID: ad70f6037c522d48275f3732b7c034acd29042bc795bff8b498e229b1b36b7ea
                          • Instruction ID: 845f6965280580b7760cd6c1828b31985a464b0d274ac7e4b113f496b17eab1c
                          • Opcode Fuzzy Hash: ad70f6037c522d48275f3732b7c034acd29042bc795bff8b498e229b1b36b7ea
                          • Instruction Fuzzy Hash: A3B19070600109EFCB14DF65C891EBABBB9FF59344F14805BF9459B292EB38D941CB98
                          APIs
                            • Part of subcall function 0044FC86: _wcscpy.LIBCMT ref: 0044FCA9
                            • Part of subcall function 00439837: __itow.LIBCMT ref: 00439862
                            • Part of subcall function 00439837: __swprintf.LIBCMT ref: 004398AC
                          • __wcsnicmp.LIBCMT ref: 0049B02D
                          • WNetUseConnectionW.MPR(00000000,?,?,00000000,?,?,00000100,?), ref: 0049B0F6
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: Connection__itow__swprintf__wcsnicmp_wcscpy
                          • String ID: LPT
                          • API String ID: 3222508074-1350329615
                          • Opcode ID: 8f7414943c2566c2f2075d254bcd9e126adb19de2891a04e03a35c6c7cdbaa9f
                          • Instruction ID: 1fadece54e1a2d9a2170c11f2936b1475ca77b7ede9437f89960b467744d3231
                          • Opcode Fuzzy Hash: 8f7414943c2566c2f2075d254bcd9e126adb19de2891a04e03a35c6c7cdbaa9f
                          • Instruction Fuzzy Hash: 4C619375A00215EFCF14DF94D992EAEBBB4EB08350F10406AF816AB351D778AE44CB99
                          APIs
                          • Sleep.KERNEL32(00000000), ref: 00442968
                          • GlobalMemoryStatusEx.KERNEL32(?), ref: 00442981
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: GlobalMemorySleepStatus
                          • String ID: @
                          • API String ID: 2783356886-2766056989
                          • Opcode ID: a5dbd513ff2efd448b15a9e56a5f51acc60c0dd497d39e05ac874576e2c633bb
                          • Instruction ID: 7f63ea04729ada54793b515282d8fc33302b16c75a41dee6fbc9c7e034b949e8
                          • Opcode Fuzzy Hash: a5dbd513ff2efd448b15a9e56a5f51acc60c0dd497d39e05ac874576e2c633bb
                          • Instruction Fuzzy Hash: F45138714187449BD320EF11D886BABBBE8FB89344F41485EF2D8810A1DB759929CB5A
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: ClearVariant
                          • String ID: DdO$DdO
                          • API String ID: 1473721057-3688882967
                          • Opcode ID: e322f38a577d94c2223799ae7836a9420ed80380bb95a18256db276d736b5187
                          • Instruction ID: 80f26a36df3eaa3945cfe7a8cc9e57fe0dfe68cc6fe60363518c350c4ad2a585
                          • Opcode Fuzzy Hash: e322f38a577d94c2223799ae7836a9420ed80380bb95a18256db276d736b5187
                          • Instruction Fuzzy Hash: 195122786043418FDB54DF18C480A2BBBF1BB99354F54986EE8858B321D339EC91CF4A
                          APIs
                          • _memset.LIBCMT ref: 004A259E
                          • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 004A25D4
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: CrackInternet_memset
                          • String ID: |
                          • API String ID: 1413715105-2343686810
                          • Opcode ID: 5d2af376f292f6c985fa9d9edc5caf52bcd5cad43d04bae6728bc464681a8250
                          • Instruction ID: ef0063a33eb437d73ed0c89e47420f7099f6d16eaf468581e8660f4b1d24e7f4
                          • Opcode Fuzzy Hash: 5d2af376f292f6c985fa9d9edc5caf52bcd5cad43d04bae6728bc464681a8250
                          • Instruction Fuzzy Hash: E9313971801119ABCF11EFA5CC85EEEBFB8FF19304F10105AF914B6162DB355916DB64
                          APIs
                          • SendMessageW.USER32(?,00001132,00000000,?), ref: 004B7B61
                          • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 004B7B76
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: MessageSend
                          • String ID: '
                          • API String ID: 3850602802-1997036262
                          • Opcode ID: c02239a3a0af4f938d99d75c8c0db705bb55c81b402c45e2cb12fd5940c2ff0d
                          • Instruction ID: 9982d7110f106f463a02453332080d964272b63a703186e82a0fb48849733d7c
                          • Opcode Fuzzy Hash: c02239a3a0af4f938d99d75c8c0db705bb55c81b402c45e2cb12fd5940c2ff0d
                          • Instruction Fuzzy Hash: 08413974A082099FDB54CF68C880BEABBB5FF48304F10416AE904EB381D774A951CFA4
                          APIs
                          • DestroyWindow.USER32(?,?,?,?), ref: 004B6B17
                          • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 004B6B53
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: Window$DestroyMove
                          • String ID: static
                          • API String ID: 2139405536-2160076837
                          • Opcode ID: 5be553ee0ab6215fc6c76fad21b2b55bb37ef88bb6d36c875915c7e2fbe85155
                          • Instruction ID: 16530a0ceb86f8bc0f5ddbe55308d52785fe629b78d8bb438af0c17eafb4909b
                          • Opcode Fuzzy Hash: 5be553ee0ab6215fc6c76fad21b2b55bb37ef88bb6d36c875915c7e2fbe85155
                          • Instruction Fuzzy Hash: 5931AE71110604AADB109F69CC40BFB73B9FF48724F11862AF9A9D3290DA38AC51CB68
                          APIs
                          • _memset.LIBCMT ref: 00492911
                          • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 0049294C
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: InfoItemMenu_memset
                          • String ID: 0
                          • API String ID: 2223754486-4108050209
                          • Opcode ID: 6f23188f22fd76218405b73235eba642143b92113db448d8c8e764de99adc904
                          • Instruction ID: 4783cfa0e4c92332b82c53b4b3f56daa05678e51c35307234d707232dc34c6ba
                          • Opcode Fuzzy Hash: 6f23188f22fd76218405b73235eba642143b92113db448d8c8e764de99adc904
                          • Instruction Fuzzy Hash: 1531F471600305BBDF24DE48CA45BAFBFB8EF45350F14003AE980A62A1D7B89944CB59
                          APIs
                          • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 004B6761
                          • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 004B676C
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: MessageSend
                          • String ID: Combobox
                          • API String ID: 3850602802-2096851135
                          • Opcode ID: e542e55905173c821667088946b297fbac814ff45512ab7898c47cb65a283a13
                          • Instruction ID: 13a17a7c40439ca74728f3ed4e4104743290fc8ac9792b8509954a086f73af58
                          • Opcode Fuzzy Hash: e542e55905173c821667088946b297fbac814ff45512ab7898c47cb65a283a13
                          • Instruction Fuzzy Hash: 341186752002087FEF119F55CC81EFB376AEB48368F11452AF91897290DA7D9C5187B4
                          APIs
                            • Part of subcall function 00431D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00431D73
                            • Part of subcall function 00431D35: GetStockObject.GDI32(00000011), ref: 00431D87
                            • Part of subcall function 00431D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00431D91
                          • GetWindowRect.USER32(00000000,?), ref: 004B6C71
                          • GetSysColor.USER32(00000012), ref: 004B6C8B
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: Window$ColorCreateMessageObjectRectSendStock
                          • String ID: static
                          • API String ID: 1983116058-2160076837
                          • Opcode ID: 97661a0327282c03e8f235e58f039e6fda912b35d2eb303bb798c520744f16ca
                          • Instruction ID: 806d0c5983c38ed6b3aa1ef88c8929a7845e43f4714302c9d2c02c2b88e674c0
                          • Opcode Fuzzy Hash: 97661a0327282c03e8f235e58f039e6fda912b35d2eb303bb798c520744f16ca
                          • Instruction Fuzzy Hash: 22211472610209AFDF14DFB8CC45AFA7BB8FB08314F11462AFD99D2250D639E861DB64
                          APIs
                          • GetWindowTextLengthW.USER32(00000000), ref: 004B69A2
                          • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 004B69B1
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: LengthMessageSendTextWindow
                          • String ID: edit
                          • API String ID: 2978978980-2167791130
                          • Opcode ID: dedbe89c6e7fc2b54ab55831016cde4ced33e6ebfe68fd1c4f5555089a9151d9
                          • Instruction ID: a92fb91f5f7af9a0311891073e77b379c3d7dc61e83910852eb032209a177ce1
                          • Opcode Fuzzy Hash: dedbe89c6e7fc2b54ab55831016cde4ced33e6ebfe68fd1c4f5555089a9151d9
                          • Instruction Fuzzy Hash: D6118FB1100208ABEF108E68DC40AFB37A9EB05378F614726F9A5972E0C77DDC559778
                          APIs
                          • _memset.LIBCMT ref: 00492A22
                          • GetMenuItemInfoW.USER32(00000030,?,00000000,00000030), ref: 00492A41
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: InfoItemMenu_memset
                          • String ID: 0
                          • API String ID: 2223754486-4108050209
                          • Opcode ID: 2ff79ea5066d1411ba82203cd3800e97373e026e5437c213b79ea39a5f17f5e0
                          • Instruction ID: e36571b5be2ced7d85662dea750a09ec2866ef944b460403f31d0dd329ad172f
                          • Opcode Fuzzy Hash: 2ff79ea5066d1411ba82203cd3800e97373e026e5437c213b79ea39a5f17f5e0
                          • Instruction Fuzzy Hash: 2F11B173901115BBCF30DA58DE44FAF7BA8AB46304F044033E955A72A0D7B8AD0AC799
                          APIs
                          • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 004A222C
                          • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 004A2255
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: Internet$OpenOption
                          • String ID: <local>
                          • API String ID: 942729171-4266983199
                          • Opcode ID: a7873518de14be4ad99e472cbeee9d6915c63ff3d26d3a5acb95074d04e9eeb6
                          • Instruction ID: e5b87c98a616f7687c1b55fc1d72f2022e07f405056192c5712bd549e515313c
                          • Opcode Fuzzy Hash: a7873518de14be4ad99e472cbeee9d6915c63ff3d26d3a5acb95074d04e9eeb6
                          • Instruction Fuzzy Hash: 50110271501225BADB248F598D84FFBFBA8FF2B351F1082ABF90456140D2B89885E6F5
                          APIs
                          • GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,00433C14,P@,?,?,?), ref: 0044096E
                            • Part of subcall function 00437BCC: _memmove.LIBCMT ref: 00437C06
                          • _wcscat.LIBCMT ref: 00474CB7
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: FullNamePath_memmove_wcscat
                          • String ID: SO
                          • API String ID: 257928180-2479146506
                          • Opcode ID: f640a01947042bb984440560f6d20ee6d56e1fd79a1f909e18ed8c23b144510d
                          • Instruction ID: 8a93b79f6fbb8d2b6d62b81810beafe023177904b06bca0f440e0f5800237d7e
                          • Opcode Fuzzy Hash: f640a01947042bb984440560f6d20ee6d56e1fd79a1f909e18ed8c23b144510d
                          • Instruction Fuzzy Hash: 4711A9B0A052099BDB10EB64CC05EDDB7F8EF0C744F0044ABBB48D3281EA78A698471D
                          APIs
                            • Part of subcall function 00437DE1: _memmove.LIBCMT ref: 00437E22
                            • Part of subcall function 0048AA99: GetClassNameW.USER32(?,?,000000FF), ref: 0048AABC
                          • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00488E73
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: ClassMessageNameSend_memmove
                          • String ID: ComboBox$ListBox
                          • API String ID: 372448540-1403004172
                          • Opcode ID: bb5b7fd2184ba98cee1837e067857dd95e3cf6f51950d97822d0590a7fad73ae
                          • Instruction ID: fece98cf40a6e7d2ae50ef8bd21292d33f1aecab9c8d06d885305fdd1cd9a917
                          • Opcode Fuzzy Hash: bb5b7fd2184ba98cee1837e067857dd95e3cf6f51950d97822d0590a7fad73ae
                          • Instruction Fuzzy Hash: A501F1B1601218AB9B19FBA5CC419FE7368EF05320B540A1FB875A72E2DE395808D758
                          APIs
                            • Part of subcall function 00437DE1: _memmove.LIBCMT ref: 00437E22
                            • Part of subcall function 0048AA99: GetClassNameW.USER32(?,?,000000FF), ref: 0048AABC
                          • SendMessageW.USER32(?,00000180,00000000,?), ref: 00488D6B
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: ClassMessageNameSend_memmove
                          • String ID: ComboBox$ListBox
                          • API String ID: 372448540-1403004172
                          • Opcode ID: 1d279658681ebc459c54ac8f0394bdb6f350b327e4290a68ea7992c7a310e9dd
                          • Instruction ID: 570ceb4a2caab3ca2d951da0503db09feda6ecbb2da58a2a8fd7bf1e0c8b9474
                          • Opcode Fuzzy Hash: 1d279658681ebc459c54ac8f0394bdb6f350b327e4290a68ea7992c7a310e9dd
                          • Instruction Fuzzy Hash: 6F01D4B1A41108ABDB25FBE1C952AFF73A8DF15310F54041FB805632D1DE185E08D379
                          APIs
                            • Part of subcall function 00437DE1: _memmove.LIBCMT ref: 00437E22
                            • Part of subcall function 0048AA99: GetClassNameW.USER32(?,?,000000FF), ref: 0048AABC
                          • SendMessageW.USER32(?,00000182,?,00000000), ref: 00488DEE
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: ClassMessageNameSend_memmove
                          • String ID: ComboBox$ListBox
                          • API String ID: 372448540-1403004172
                          • Opcode ID: 7a22e16fc2b551d3725e4d3f4fa7bb96f0827b1b119c7b76876299320dd2b3d2
                          • Instruction ID: bfe0d8a037d827473189c8e2db0657162e1c9bc5bdf54c0f63ecc03088ce3393
                          • Opcode Fuzzy Hash: 7a22e16fc2b551d3725e4d3f4fa7bb96f0827b1b119c7b76876299320dd2b3d2
                          • Instruction Fuzzy Hash: E401F2B1A41108A7DB25FAA5C942AFF73A8DF15310F54041FB80573292DE295E09D37A
                          APIs
                          • VariantInit.OLEAUT32(?), ref: 0048C534
                            • Part of subcall function 0048C816: _memmove.LIBCMT ref: 0048C860
                            • Part of subcall function 0048C816: VariantInit.OLEAUT32(00000000), ref: 0048C882
                            • Part of subcall function 0048C816: VariantCopy.OLEAUT32(00000000,?), ref: 0048C88C
                          • VariantClear.OLEAUT32(?), ref: 0048C556
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: Variant$Init$ClearCopy_memmove
                          • String ID: d}N
                          • API String ID: 2932060187-3144339906
                          • Opcode ID: 0f4c647d8e20e7535b84ad809df390941b7fd4e83684d1975135b24033d67448
                          • Instruction ID: 0d65bf68f8bf063ed6aed938753a6c6a4516173e0f1b0e78834a1493c0181d1c
                          • Opcode Fuzzy Hash: 0f4c647d8e20e7535b84ad809df390941b7fd4e83684d1975135b24033d67448
                          • Instruction Fuzzy Hash: 9C11FEB19007089FC710EF9AD8C489BF7F8FF18314B50862FE58A97611D775AA49CB94
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: ClassName_wcscmp
                          • String ID: #32770
                          • API String ID: 2292705959-463685578
                          • Opcode ID: 85abd6fcf0a461ff045ff7c2ae55f24fe335122da948ee2d1666548b439ac6ba
                          • Instruction ID: 44387a7d758c3264ec622efcab41a87c00c277669179181dd4605749715c5b15
                          • Opcode Fuzzy Hash: 85abd6fcf0a461ff045ff7c2ae55f24fe335122da948ee2d1666548b439ac6ba
                          • Instruction Fuzzy Hash: A4E02B3250022C37D7109A59AC05FA7F7ACDB44B61F00006BFC04D2041D9609A0587D4
                          APIs
                            • Part of subcall function 0046B314: _memset.LIBCMT ref: 0046B321
                            • Part of subcall function 00450940: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,0046B2F0,?,?,?,0043100A), ref: 00450945
                          • IsDebuggerPresent.KERNEL32(?,?,?,0043100A), ref: 0046B2F4
                          • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,0043100A), ref: 0046B303
                          Strings
                          • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 0046B2FE
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString_memset
                          • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                          • API String ID: 3158253471-631824599
                          • Opcode ID: 9e3dea6128a92d49b0573efd6c6a2f3e5d9cc92ced928cc3e840fb6f353937e5
                          • Instruction ID: 3890f5a22ad3d3ee27d1d14132c95837abdd7a8851f6d0b0af0251468cc490d5
                          • Opcode Fuzzy Hash: 9e3dea6128a92d49b0573efd6c6a2f3e5d9cc92ced928cc3e840fb6f353937e5
                          • Instruction Fuzzy Hash: 99E06D702007008BD7209F29E9043467BE4EF04308F008A7FE846C7341E7B8D488CBAA
                          APIs
                          • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 00487C82
                            • Part of subcall function 00453358: _doexit.LIBCMT ref: 00453362
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: Message_doexit
                          • String ID: AutoIt$Error allocating memory.
                          • API String ID: 1993061046-4017498283
                          • Opcode ID: 7d3f89fbec6095bd0ea8eccb5519b608be17ba8e51abda20fca7507cb941e6a9
                          • Instruction ID: a885d4eec8b380295b94f6eb7b850c34cb42d270d9e7439c2efddc1ecffbda6a
                          • Opcode Fuzzy Hash: 7d3f89fbec6095bd0ea8eccb5519b608be17ba8e51abda20fca7507cb941e6a9
                          • Instruction Fuzzy Hash: 5DD0123638435836D11536A66C07FCA76484B05B57F24042BFF08595D349D9958552AD
                          APIs
                          • GetSystemDirectoryW.KERNEL32(?), ref: 00471775
                            • Part of subcall function 004ABFF0: LoadLibraryA.KERNEL32(kernel32.dll,?,0047195E,?), ref: 004ABFFE
                            • Part of subcall function 004ABFF0: GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 004AC010
                          • FreeLibrary.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00000104), ref: 0047196D
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: Library$AddressDirectoryFreeLoadProcSystem
                          • String ID: WIN_XPe
                          • API String ID: 582185067-3257408948
                          • Opcode ID: c59efba94aee473e82419ebdfb4e8259092d574c20b2653d0f325f65c657f8b2
                          • Instruction ID: f720cd1170433683870a1732567ca8b07221a6d9f4672d56c8dc4c8784964812
                          • Opcode Fuzzy Hash: c59efba94aee473e82419ebdfb4e8259092d574c20b2653d0f325f65c657f8b2
                          • Instruction Fuzzy Hash: 1BF06D70800008DFCB19DBA9CD84BECBBF8BB18300F5440A6E00AB21A0C7384F86CF69
                          APIs
                          • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 004B596E
                          • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 004B5981
                            • Part of subcall function 00495244: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 004952BC
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: FindMessagePostSleepWindow
                          • String ID: Shell_TrayWnd
                          • API String ID: 529655941-2988720461
                          • Opcode ID: 403bb92a008d0a202e41cbc142a891abf4ab4a50418faeb9e98c317189773568
                          • Instruction ID: 80dad7ed3e4a9ae142dda815327e331912c758405f682364ca3aa8149d900a42
                          • Opcode Fuzzy Hash: 403bb92a008d0a202e41cbc142a891abf4ab4a50418faeb9e98c317189773568
                          • Instruction Fuzzy Hash: D3D0A931380300B7EA64AB309C0BFA22A10AB00B00F10093AB20DAA0D0C8E49800CB68
                          APIs
                          • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 004B59AE
                          • PostMessageW.USER32(00000000), ref: 004B59B5
                            • Part of subcall function 00495244: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 004952BC
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: FindMessagePostSleepWindow
                          • String ID: Shell_TrayWnd
                          • API String ID: 529655941-2988720461
                          • Opcode ID: 62c59be4e5d2e95fd8567e3bc2fb720b1f2178e56eda63641b668ebc025373e7
                          • Instruction ID: c18fb7a50edf298c607add2f3e5e688371f20f9b6fa14ba6b49af372ffc852ae
                          • Opcode Fuzzy Hash: 62c59be4e5d2e95fd8567e3bc2fb720b1f2178e56eda63641b668ebc025373e7
                          • Instruction Fuzzy Hash: 43D0C9317807117BEA64AB759C0BF966A14AB14B55F10093AB649AA1D1C9E4A804CB6C
                          APIs
                          • DestroyIcon.USER32(0001044F), ref: 00433646
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1359744564.0000000000431000.00000020.00000001.01000000.00000003.sdmp, Offset: 00430000, based on PE: true
                          • Associated: 00000000.00000002.1359716672.0000000000430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360151080.00000000004E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360242754.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1360285046.00000000004F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_430000_egpTyFpA8v.jbxd
                          Similarity
                          • API ID: DestroyIcon
                          • String ID: P@$RO
                          • API String ID: 1234817797-4139288655
                          • Opcode ID: d76864e7080d552f08f0fc666a40888ddc084c9ce7ece3c44f89fbe4d00a0d6b
                          • Instruction ID: c68cdefdc7e98b755eb04d22cd41da75e14e62a9627e1f04935f347ea6f3edb2
                          • Opcode Fuzzy Hash: d76864e7080d552f08f0fc666a40888ddc084c9ce7ece3c44f89fbe4d00a0d6b
                          • Instruction Fuzzy Hash: 72C012F0300E48D746146765581923625559E88315B1257BB675A8F391CE1C88018A1D