Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Xre0Nmqk09.exe

Overview

General Information

Sample name:Xre0Nmqk09.exe
renamed because original name is a hash value
Original sample name:e47bbcc86c09be704eb8ffde9dcb0c70f0996fa9bf2e0e5df5b42ebb66fe97e0.exe
Analysis ID:1588803
MD5:a529f43a61267b1f6f42059dba8e179b
SHA1:57224be49c5bde441959d2c68489d5c635b164a8
SHA256:e47bbcc86c09be704eb8ffde9dcb0c70f0996fa9bf2e0e5df5b42ebb66fe97e0
Tags:exeRedLineStealeruser-adrian__luca
Infos:

Detection

AgentTesla, PureLog Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected AgentTesla
Yara detected PureLog Stealer
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Switches to a custom stack to bypass stack traces
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Outbound SMTP Connections
Uses 32bit PE files
Uses SMTP (mail sending)
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • Xre0Nmqk09.exe (PID: 7744 cmdline: "C:\Users\user\Desktop\Xre0Nmqk09.exe" MD5: A529F43A61267B1F6F42059DBA8E179B)
    • RegSvcs.exe (PID: 7804 cmdline: "C:\Users\user\Desktop\Xre0Nmqk09.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
    • Xre0Nmqk09.exe (PID: 7812 cmdline: "C:\Users\user\Desktop\Xre0Nmqk09.exe" MD5: A529F43A61267B1F6F42059DBA8E179B)
      • RegSvcs.exe (PID: 7844 cmdline: "C:\Users\user\Desktop\Xre0Nmqk09.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
      • Xre0Nmqk09.exe (PID: 7856 cmdline: "C:\Users\user\Desktop\Xre0Nmqk09.exe" MD5: A529F43A61267B1F6F42059DBA8E179B)
        • RegSvcs.exe (PID: 7872 cmdline: "C:\Users\user\Desktop\Xre0Nmqk09.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.thelamalab.com", "Username": "billing@thelamalab.com", "Password": "Thel@malab@20!9"}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    SourceRuleDescriptionAuthorStrings
    00000006.00000002.2623567257.0000000002DE7000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000006.00000002.2622508052.0000000000400000.00000040.80000000.00040000.00000000.sdmpMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
      • 0x1e4b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
      • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
      • 0x1300:$s3: 83 EC 38 53 B0 8B 88 44 24 2B 88 44 24 2F B0 EC 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
      • 0x2018a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
      • 0x1fdd0:$s5: delete[]
      • 0x1f288:$s6: constructor or from DllMain.
      00000003.00000002.1391379435.0000000003B40000.00000004.00001000.00020000.00000000.sdmpMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
      • 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
      • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
      • 0x700:$s3: 83 EC 38 53 B0 8B 88 44 24 2B 88 44 24 2F B0 EC 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
      • 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
      • 0x1e9d0:$s5: delete[]
      • 0x1de88:$s6: constructor or from DllMain.
      00000006.00000002.2624873311.00000000052D0000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000006.00000002.2624873311.00000000052D0000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          Click to see the 19 entries
          SourceRuleDescriptionAuthorStrings
          6.2.RegSvcs.exe.400000.0.raw.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
          • 0x1e4b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
          • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
          • 0x1300:$s3: 83 EC 38 53 B0 8B 88 44 24 2B 88 44 24 2F B0 EC 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
          • 0x2018a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
          • 0x1fdd0:$s5: delete[]
          • 0x1f288:$s6: constructor or from DllMain.
          6.2.RegSvcs.exe.52d0ee8.7.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            6.2.RegSvcs.exe.52d0ee8.7.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              6.2.RegSvcs.exe.52d0ee8.7.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                6.2.RegSvcs.exe.52d0ee8.7.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
                • 0x3d67d:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                • 0x3d6ef:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
                • 0x3d779:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
                • 0x3d80b:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                • 0x3d875:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                • 0x3d8e7:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                • 0x3d97d:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                • 0x3da0d:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                Click to see the 64 entries

                System Summary

                barindex
                Source: Network ConnectionAuthor: frack113: Data: DesusertionIp: 162.251.80.30, DesusertionIsIpv6: false, DesusertionPort: 587, EventID: 3, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, Initiated: true, ProcessId: 7872, Protocol: tcp, SourceIp: 192.168.2.9, SourceIsIpv6: false, SourcePort: 49772
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-11T05:41:26.551070+010020301711A Network Trojan was detected192.168.2.949772162.251.80.30587TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-11T05:41:41.776076+010028555421A Network Trojan was detected192.168.2.949772162.251.80.30587TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-11T05:41:41.776076+010028552451A Network Trojan was detected192.168.2.949772162.251.80.30587TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-11T05:41:26.551070+010028397231Malware Command and Control Activity Detected192.168.2.949772162.251.80.30587TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-11T05:41:26.551070+010028400321A Network Trojan was detected192.168.2.949772162.251.80.30587TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: 6.2.RegSvcs.exe.3de2f90.5.raw.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.thelamalab.com", "Username": "billing@thelamalab.com", "Password": "Thel@malab@20!9"}
                Source: Xre0Nmqk09.exeVirustotal: Detection: 68%Perma Link
                Source: Xre0Nmqk09.exeReversingLabs: Detection: 68%
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: Xre0Nmqk09.exeJoe Sandbox ML: detected
                Source: Xre0Nmqk09.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                Source: Binary string: _.pdb source: RegSvcs.exe, 00000006.00000002.2624873311.00000000052D0000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.2624500171.0000000003D91000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.2623193568.000000000296E000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdbUGP source: Xre0Nmqk09.exe, 00000000.00000003.1375352350.0000000003EB0000.00000004.00001000.00020000.00000000.sdmp, Xre0Nmqk09.exe, 00000000.00000003.1375557544.0000000004050000.00000004.00001000.00020000.00000000.sdmp, Xre0Nmqk09.exe, 00000003.00000003.1389659922.0000000003B90000.00000004.00001000.00020000.00000000.sdmp, Xre0Nmqk09.exe, 00000003.00000003.1389243370.0000000003D30000.00000004.00001000.00020000.00000000.sdmp, Xre0Nmqk09.exe, 00000005.00000003.1399915358.0000000003880000.00000004.00001000.00020000.00000000.sdmp, Xre0Nmqk09.exe, 00000005.00000003.1398650007.0000000003690000.00000004.00001000.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: Xre0Nmqk09.exe, 00000000.00000003.1375352350.0000000003EB0000.00000004.00001000.00020000.00000000.sdmp, Xre0Nmqk09.exe, 00000000.00000003.1375557544.0000000004050000.00000004.00001000.00020000.00000000.sdmp, Xre0Nmqk09.exe, 00000003.00000003.1389659922.0000000003B90000.00000004.00001000.00020000.00000000.sdmp, Xre0Nmqk09.exe, 00000003.00000003.1389243370.0000000003D30000.00000004.00001000.00020000.00000000.sdmp, Xre0Nmqk09.exe, 00000005.00000003.1399915358.0000000003880000.00000004.00001000.00020000.00000000.sdmp, Xre0Nmqk09.exe, 00000005.00000003.1398650007.0000000003690000.00000004.00001000.00020000.00000000.sdmp
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: 0_2_006D4696 GetFileAttributesW,FindFirstFileW,FindClose,0_2_006D4696
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: 0_2_006DC93C FindFirstFileW,FindClose,0_2_006DC93C
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: 0_2_006DC9C7 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_006DC9C7
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: 0_2_006DF200 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_006DF200
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: 0_2_006DF35D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_006DF35D
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: 0_2_006DF65E FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_006DF65E
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: 0_2_006D3A2B FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_006D3A2B
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: 0_2_006D3D4E FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_006D3D4E
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: 0_2_006DBF27 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_006DBF27

                Networking

                barindex
                Source: Network trafficSuricata IDS: 2855245 - Severity 1 - ETPRO MALWARE Agent Tesla Exfil via SMTP : 192.168.2.9:49772 -> 162.251.80.30:587
                Source: Network trafficSuricata IDS: 2855542 - Severity 1 - ETPRO MALWARE Agent Tesla CnC Exfil Activity : 192.168.2.9:49772 -> 162.251.80.30:587
                Source: Network trafficSuricata IDS: 2030171 - Severity 1 - ET MALWARE AgentTesla Exfil Via SMTP : 192.168.2.9:49772 -> 162.251.80.30:587
                Source: Network trafficSuricata IDS: 2839723 - Severity 1 - ETPRO MALWARE Win32/Agent Tesla SMTP Activity : 192.168.2.9:49772 -> 162.251.80.30:587
                Source: Network trafficSuricata IDS: 2840032 - Severity 1 - ETPRO MALWARE Win32/AgentTesla/OriginLogger Data Exfil via SMTP M2 : 192.168.2.9:49772 -> 162.251.80.30:587
                Source: global trafficTCP traffic: 192.168.2.9:49772 -> 162.251.80.30:587
                Source: Joe Sandbox ViewIP Address: 162.251.80.30 162.251.80.30
                Source: Joe Sandbox ViewASN Name: PUBLIC-DOMAIN-REGISTRYUS PUBLIC-DOMAIN-REGISTRYUS
                Source: global trafficTCP traffic: 192.168.2.9:49772 -> 162.251.80.30:587
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: 0_2_006E25E2 InternetReadFile,InternetQueryDataAvailable,InternetReadFile,0_2_006E25E2
                Source: global trafficDNS traffic detected: DNS query: mail.thelamalab.com
                Source: RegSvcs.exe, 00000006.00000002.2623567257.0000000002DE7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.thelamalab.com
                Source: RegSvcs.exe, 00000006.00000002.2624873311.00000000052D0000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.2625442326.0000000005580000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.2624500171.0000000003D91000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.2623193568.000000000296E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://account.dyn.com/
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: 0_2_006E425A OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_006E425A
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: 0_2_006E4458 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_006E4458
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: 0_2_006E425A OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_006E425A
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: 0_2_006D0219 GetKeyboardState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,0_2_006D0219
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: 0_2_006FCDAC DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_006FCDAC

                System Summary

                barindex
                Source: 6.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                Source: 6.2.RegSvcs.exe.52d0ee8.7.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 6.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                Source: 6.2.RegSvcs.exe.3de2f90.5.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 6.2.RegSvcs.exe.3de2f90.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 6.2.RegSvcs.exe.5580000.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 6.2.RegSvcs.exe.3d96458.4.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 6.2.RegSvcs.exe.52d0ee8.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 6.2.RegSvcs.exe.5580000.8.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 6.2.RegSvcs.exe.29afebe.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 6.2.RegSvcs.exe.29aefd6.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 0.2.Xre0Nmqk09.exe.3e60000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                Source: 6.2.RegSvcs.exe.52d0000.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 6.2.RegSvcs.exe.3d95570.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 3.2.Xre0Nmqk09.exe.3b40000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                Source: 6.2.RegSvcs.exe.29aefd6.1.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 6.2.RegSvcs.exe.52d0000.6.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 5.2.Xre0Nmqk09.exe.1b50000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                Source: 6.2.RegSvcs.exe.29afebe.2.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 6.2.RegSvcs.exe.3d95570.3.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 6.2.RegSvcs.exe.3d96458.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 00000006.00000002.2622508052.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
                Source: 00000003.00000002.1391379435.0000000003B40000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
                Source: 00000006.00000002.2624873311.00000000052D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 00000006.00000002.2625442326.0000000005580000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 00000005.00000002.1403377308.0000000001B50000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
                Source: 00000000.00000002.1379475830.0000000003E60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: This is a third-party compiled AutoIt script.0_2_00673B4C
                Source: Xre0Nmqk09.exeString found in binary or memory: This is a third-party compiled AutoIt script.
                Source: Xre0Nmqk09.exe, 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_493dce6f-8
                Source: Xre0Nmqk09.exe, 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_a937d81c-d
                Source: Xre0Nmqk09.exe, 00000003.00000002.1390555868.0000000000725000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_67da332e-c
                Source: Xre0Nmqk09.exe, 00000003.00000002.1390555868.0000000000725000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_8963b0ae-6
                Source: Xre0Nmqk09.exe, 00000005.00000000.1390210862.0000000000725000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_fad24012-1
                Source: Xre0Nmqk09.exe, 00000005.00000000.1390210862.0000000000725000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_d403b7e4-5
                Source: Xre0Nmqk09.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_96140d12-8
                Source: Xre0Nmqk09.exeString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_19fd1dc4-0
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: 0_2_006D4021: CreateFileW,DeviceIoControl,CloseHandle,0_2_006D4021
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: 0_2_006C8858 _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_006C8858
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: 0_2_006D545F ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_006D545F
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: 0_2_0069DBB50_2_0069DBB5
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: 0_2_0067E0600_2_0067E060
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: 0_2_006F804A0_2_006F804A
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: 0_2_006841400_2_00684140
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: 0_2_006924050_2_00692405
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: 0_2_006A65220_2_006A6522
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: 0_2_006F06650_2_006F0665
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: 0_2_006A267E0_2_006A267E
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: 0_2_006868430_2_00686843
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: 0_2_0069283A0_2_0069283A
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: 0_2_0067E8000_2_0067E800
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: 0_2_006A89DF0_2_006A89DF
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: 0_2_00688A0E0_2_00688A0E
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: 0_2_006F0AE20_2_006F0AE2
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: 0_2_006A6A940_2_006A6A94
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: 0_2_006CEB070_2_006CEB07
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: 0_2_006D8B130_2_006D8B13
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: 0_2_0069CD610_2_0069CD61
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: 0_2_006A70060_2_006A7006
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: 0_2_0068710E0_2_0068710E
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: 0_2_006831900_2_00683190
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: 0_2_006712870_2_00671287
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: 0_2_006933C70_2_006933C7
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: 0_2_0069F4190_2_0069F419
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: 0_2_006916C40_2_006916C4
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: 0_2_006856800_2_00685680
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: 0_2_006858C00_2_006858C0
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: 0_2_006978D30_2_006978D3
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: 0_2_00691BB80_2_00691BB8
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: 0_2_006A9D050_2_006A9D05
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: 0_2_0067FE400_2_0067FE40
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: 0_2_0069BFE60_2_0069BFE6
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: 0_2_00691FD00_2_00691FD0
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: 0_2_015F14780_2_015F1478
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: 3_2_01251C083_2_01251C08
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: 5_2_00EA14485_2_00EA1448
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_00408C606_2_00408C60
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0040DC116_2_0040DC11
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_00407C3F6_2_00407C3F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_00418CCC6_2_00418CCC
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_00406CA06_2_00406CA0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_004028B06_2_004028B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0041A4BE6_2_0041A4BE
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_004182446_2_00418244
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_004016506_2_00401650
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_00402F206_2_00402F20
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_004193C46_2_004193C4
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_004187886_2_00418788
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_00402F896_2_00402F89
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_00402B906_2_00402B90
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_004073A06_2_004073A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_02A7CB286_2_02A7CB28
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_02A7D7406_2_02A7D740
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_02A7CE706_2_02A7CE70
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_02A70FD06_2_02A70FD0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_02A710306_2_02A71030
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_063DC7606_2_063DC760
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_063D4DD86_2_063D4DD8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: String function: 0040E1D8 appears 44 times
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: String function: 00677F41 appears 35 times
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: String function: 00690D27 appears 70 times
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: String function: 00698B40 appears 42 times
                Source: Xre0Nmqk09.exe, 00000000.00000003.1375853923.0000000003FD3000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs Xre0Nmqk09.exe
                Source: Xre0Nmqk09.exe, 00000000.00000003.1375557544.000000000417D000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs Xre0Nmqk09.exe
                Source: Xre0Nmqk09.exe, 00000000.00000002.1379475830.0000000003E60000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilename9d02a015-5a5b-4340-adbb-c530e02a0bc4.exe4 vs Xre0Nmqk09.exe
                Source: Xre0Nmqk09.exe, 00000003.00000003.1389243370.0000000003E5D000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs Xre0Nmqk09.exe
                Source: Xre0Nmqk09.exe, 00000003.00000002.1391379435.0000000003B40000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilename9d02a015-5a5b-4340-adbb-c530e02a0bc4.exe4 vs Xre0Nmqk09.exe
                Source: Xre0Nmqk09.exe, 00000003.00000003.1388654596.0000000003CB3000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs Xre0Nmqk09.exe
                Source: Xre0Nmqk09.exe, 00000005.00000003.1398023354.00000000037B3000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs Xre0Nmqk09.exe
                Source: Xre0Nmqk09.exe, 00000005.00000003.1401022731.00000000039AD000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs Xre0Nmqk09.exe
                Source: Xre0Nmqk09.exe, 00000005.00000002.1403377308.0000000001B50000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilename9d02a015-5a5b-4340-adbb-c530e02a0bc4.exe4 vs Xre0Nmqk09.exe
                Source: Xre0Nmqk09.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                Source: 6.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                Source: 6.2.RegSvcs.exe.52d0ee8.7.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 6.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                Source: 6.2.RegSvcs.exe.3de2f90.5.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 6.2.RegSvcs.exe.3de2f90.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 6.2.RegSvcs.exe.5580000.8.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 6.2.RegSvcs.exe.3d96458.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 6.2.RegSvcs.exe.52d0ee8.7.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 6.2.RegSvcs.exe.5580000.8.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 6.2.RegSvcs.exe.29afebe.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 6.2.RegSvcs.exe.29aefd6.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 0.2.Xre0Nmqk09.exe.3e60000.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                Source: 6.2.RegSvcs.exe.52d0000.6.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 6.2.RegSvcs.exe.3d95570.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 3.2.Xre0Nmqk09.exe.3b40000.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                Source: 6.2.RegSvcs.exe.29aefd6.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 6.2.RegSvcs.exe.52d0000.6.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 5.2.Xre0Nmqk09.exe.1b50000.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                Source: 6.2.RegSvcs.exe.29afebe.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 6.2.RegSvcs.exe.3d95570.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 6.2.RegSvcs.exe.3d96458.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 00000006.00000002.2622508052.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                Source: 00000003.00000002.1391379435.0000000003B40000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                Source: 00000006.00000002.2624873311.00000000052D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 00000006.00000002.2625442326.0000000005580000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 00000005.00000002.1403377308.0000000001B50000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                Source: 00000000.00000002.1379475830.0000000003E60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@11/4@1/1
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: 0_2_006DA2D5 GetLastError,FormatMessageW,0_2_006DA2D5
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: 0_2_006C8713 AdjustTokenPrivileges,CloseHandle,0_2_006C8713
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: 0_2_006C8CC3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_006C8CC3
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: 0_2_006DB59E SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_006DB59E
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: 0_2_006EF121 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_006EF121
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: 0_2_006DC602 CoInitialize,CoCreateInstance,CoUninitialize,0_2_006DC602
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: 0_2_00674FE9 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_00674FE9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeFile created: C:\Users\user\AppData\Local\Temp\aut49BE.tmpJump to behavior
                Source: Xre0Nmqk09.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: Xre0Nmqk09.exeVirustotal: Detection: 68%
                Source: Xre0Nmqk09.exeReversingLabs: Detection: 68%
                Source: unknownProcess created: C:\Users\user\Desktop\Xre0Nmqk09.exe "C:\Users\user\Desktop\Xre0Nmqk09.exe"
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\Xre0Nmqk09.exe"
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeProcess created: C:\Users\user\Desktop\Xre0Nmqk09.exe "C:\Users\user\Desktop\Xre0Nmqk09.exe"
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\Xre0Nmqk09.exe"
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeProcess created: C:\Users\user\Desktop\Xre0Nmqk09.exe "C:\Users\user\Desktop\Xre0Nmqk09.exe"
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\Xre0Nmqk09.exe"
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\Xre0Nmqk09.exe"Jump to behavior
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeProcess created: C:\Users\user\Desktop\Xre0Nmqk09.exe "C:\Users\user\Desktop\Xre0Nmqk09.exe"Jump to behavior
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\Xre0Nmqk09.exe"Jump to behavior
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeProcess created: C:\Users\user\Desktop\Xre0Nmqk09.exe "C:\Users\user\Desktop\Xre0Nmqk09.exe"Jump to behavior
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\Xre0Nmqk09.exe"Jump to behavior
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeSection loaded: wsock32.dllJump to behavior
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeSection loaded: wsock32.dllJump to behavior
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeSection loaded: wsock32.dllJump to behavior
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                Source: Xre0Nmqk09.exeStatic file information: File size 1205760 > 1048576
                Source: Xre0Nmqk09.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                Source: Xre0Nmqk09.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                Source: Xre0Nmqk09.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                Source: Xre0Nmqk09.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Xre0Nmqk09.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                Source: Xre0Nmqk09.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                Source: Xre0Nmqk09.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: _.pdb source: RegSvcs.exe, 00000006.00000002.2624873311.00000000052D0000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.2624500171.0000000003D91000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.2623193568.000000000296E000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdbUGP source: Xre0Nmqk09.exe, 00000000.00000003.1375352350.0000000003EB0000.00000004.00001000.00020000.00000000.sdmp, Xre0Nmqk09.exe, 00000000.00000003.1375557544.0000000004050000.00000004.00001000.00020000.00000000.sdmp, Xre0Nmqk09.exe, 00000003.00000003.1389659922.0000000003B90000.00000004.00001000.00020000.00000000.sdmp, Xre0Nmqk09.exe, 00000003.00000003.1389243370.0000000003D30000.00000004.00001000.00020000.00000000.sdmp, Xre0Nmqk09.exe, 00000005.00000003.1399915358.0000000003880000.00000004.00001000.00020000.00000000.sdmp, Xre0Nmqk09.exe, 00000005.00000003.1398650007.0000000003690000.00000004.00001000.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: Xre0Nmqk09.exe, 00000000.00000003.1375352350.0000000003EB0000.00000004.00001000.00020000.00000000.sdmp, Xre0Nmqk09.exe, 00000000.00000003.1375557544.0000000004050000.00000004.00001000.00020000.00000000.sdmp, Xre0Nmqk09.exe, 00000003.00000003.1389659922.0000000003B90000.00000004.00001000.00020000.00000000.sdmp, Xre0Nmqk09.exe, 00000003.00000003.1389243370.0000000003D30000.00000004.00001000.00020000.00000000.sdmp, Xre0Nmqk09.exe, 00000005.00000003.1399915358.0000000003880000.00000004.00001000.00020000.00000000.sdmp, Xre0Nmqk09.exe, 00000005.00000003.1398650007.0000000003690000.00000004.00001000.00020000.00000000.sdmp
                Source: Xre0Nmqk09.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                Source: Xre0Nmqk09.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                Source: Xre0Nmqk09.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                Source: Xre0Nmqk09.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                Source: Xre0Nmqk09.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: 0_2_006EC304 LoadLibraryA,GetProcAddress,0_2_006EC304
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: 0_2_00698B85 push ecx; ret 0_2_00698B98
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0041C40C push cs; iretd 6_2_0041C4E2
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_00423149 push eax; ret 6_2_00423179
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0041C50E push cs; iretd 6_2_0041C4E2
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_004231C8 push eax; ret 6_2_00423179
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0040E21D push ecx; ret 6_2_0040E230
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0041C6BE push ebx; ret 6_2_0041C6BF
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_02A743A9 push es; iretd 6_2_02A743AF
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_02A74361 push ecx; iretd 6_2_02A74364
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: 0_2_00674A35 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00674A35
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: 0_2_006F55FD IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_006F55FD
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: 0_2_006933C7 EncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_006933C7
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeAPI/Special instruction interceptor: Address: 15F109C
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeAPI/Special instruction interceptor: Address: 125182C
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeAPI/Special instruction interceptor: Address: EA106C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,CloseHandle,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,6_2_004019F0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 1067Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 4007Jump to behavior
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeAPI coverage: 4.7 %
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: 0_2_006D4696 GetFileAttributesW,FindFirstFileW,FindClose,0_2_006D4696
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: 0_2_006DC93C FindFirstFileW,FindClose,0_2_006DC93C
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: 0_2_006DC9C7 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_006DC9C7
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: 0_2_006DF200 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_006DF200
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: 0_2_006DF35D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_006DF35D
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: 0_2_006DF65E FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_006DF65E
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: 0_2_006D3A2B FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_006D3A2B
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: 0_2_006D3D4E FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_006D3D4E
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: 0_2_006DBF27 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_006DBF27
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: 0_2_00674AFE GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00674AFE
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 100000Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99890Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99781Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99672Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99547Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99438Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99313Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99203Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99094Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98969Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98859Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98749Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98641Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98531Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98419Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98310Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98203Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98094Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97969Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97858Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97750Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97608Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97433Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97312Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97203Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: RegSvcs.exe, 00000006.00000002.2625120020.00000000054A3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll"
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeAPI call chain: ExitProcess graph end node
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: 0_2_006E41FD BlockInput,0_2_006E41FD
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: 0_2_00673B4C GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00673B4C
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: 0_2_006A5CCC EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_006A5CCC
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,CloseHandle,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,6_2_004019F0
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: 0_2_006EC304 LoadLibraryA,GetProcAddress,0_2_006EC304
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: 0_2_015F1368 mov eax, dword ptr fs:[00000030h]0_2_015F1368
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: 0_2_015F1308 mov eax, dword ptr fs:[00000030h]0_2_015F1308
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: 0_2_015EFCD8 mov eax, dword ptr fs:[00000030h]0_2_015EFCD8
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: 3_2_01251A98 mov eax, dword ptr fs:[00000030h]3_2_01251A98
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: 3_2_01250468 mov eax, dword ptr fs:[00000030h]3_2_01250468
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: 3_2_01251AF8 mov eax, dword ptr fs:[00000030h]3_2_01251AF8
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: 5_2_00EA12D8 mov eax, dword ptr fs:[00000030h]5_2_00EA12D8
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: 5_2_00E9FCA8 mov eax, dword ptr fs:[00000030h]5_2_00E9FCA8
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: 5_2_00EA1338 mov eax, dword ptr fs:[00000030h]5_2_00EA1338
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: 0_2_006C81F7 GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_006C81F7
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: 0_2_0069A364 SetUnhandledExceptionFilter,0_2_0069A364
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: 0_2_0069A395 SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0069A395
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0040CE09 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,6_2_0040CE09
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0040E61C _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,6_2_0040E61C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_00416F6A __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,6_2_00416F6A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_004123F1 SetUnhandledExceptionFilter,6_2_004123F1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: BCF008Jump to behavior
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: 0_2_006C8C93 LogonUserW,0_2_006C8C93
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: 0_2_00673B4C GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00673B4C
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: 0_2_00674A35 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00674A35
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: 0_2_006D4EF5 mouse_event,0_2_006D4EF5
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\Xre0Nmqk09.exe"Jump to behavior
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\Xre0Nmqk09.exe"Jump to behavior
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\Xre0Nmqk09.exe"Jump to behavior
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: 0_2_006C81F7 GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_006C81F7
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: 0_2_006D4C03 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_006D4C03
                Source: Xre0Nmqk09.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
                Source: Xre0Nmqk09.exeBinary or memory string: Shell_TrayWnd
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: 0_2_0069886B cpuid 0_2_0069886B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: GetLocaleInfoA,6_2_00417A20
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: 0_2_006A50D7 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_006A50D7
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: 0_2_006B2230 GetUserNameW,0_2_006B2230
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: 0_2_006A418A __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_006A418A
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: 0_2_00674AFE GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00674AFE
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: dump.pcap, type: PCAP
                Source: Yara matchFile source: 6.2.RegSvcs.exe.52d0ee8.7.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.RegSvcs.exe.3de2f90.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.RegSvcs.exe.3de2f90.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.RegSvcs.exe.5580000.8.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.RegSvcs.exe.3d96458.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.RegSvcs.exe.52d0ee8.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.RegSvcs.exe.5580000.8.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.RegSvcs.exe.29afebe.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.RegSvcs.exe.29aefd6.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.RegSvcs.exe.52d0000.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.RegSvcs.exe.3d95570.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.RegSvcs.exe.29aefd6.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.RegSvcs.exe.52d0000.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.RegSvcs.exe.29afebe.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.RegSvcs.exe.3d95570.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.RegSvcs.exe.3d96458.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000006.00000002.2623567257.0000000002DE7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.2624873311.00000000052D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.2625442326.0000000005580000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.2624500171.0000000003D91000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.2623193568.000000000296E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.2623567257.0000000002DDF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.2623567257.0000000002D91000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7872, type: MEMORYSTR
                Source: Yara matchFile source: 6.2.RegSvcs.exe.52d0ee8.7.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.RegSvcs.exe.3de2f90.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.RegSvcs.exe.3de2f90.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.RegSvcs.exe.5580000.8.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.RegSvcs.exe.3d96458.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.RegSvcs.exe.52d0ee8.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.RegSvcs.exe.5580000.8.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.RegSvcs.exe.29afebe.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.RegSvcs.exe.29aefd6.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.RegSvcs.exe.52d0000.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.RegSvcs.exe.3d95570.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.RegSvcs.exe.29aefd6.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.RegSvcs.exe.52d0000.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.RegSvcs.exe.29afebe.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.RegSvcs.exe.3d95570.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.RegSvcs.exe.3d96458.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000006.00000002.2624873311.00000000052D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.2625442326.0000000005580000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.2624500171.0000000003D91000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.2623193568.000000000296E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                Source: Xre0Nmqk09.exeBinary or memory string: WIN_81
                Source: Xre0Nmqk09.exeBinary or memory string: WIN_XP
                Source: Xre0Nmqk09.exeBinary or memory string: WIN_XPe
                Source: Xre0Nmqk09.exeBinary or memory string: WIN_VISTA
                Source: Xre0Nmqk09.exeBinary or memory string: WIN_7
                Source: Xre0Nmqk09.exeBinary or memory string: WIN_8
                Source: Xre0Nmqk09.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 5USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte
                Source: Yara matchFile source: 6.2.RegSvcs.exe.52d0ee8.7.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.RegSvcs.exe.3de2f90.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.RegSvcs.exe.3de2f90.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.RegSvcs.exe.5580000.8.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.RegSvcs.exe.3d96458.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.RegSvcs.exe.52d0ee8.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.RegSvcs.exe.5580000.8.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.RegSvcs.exe.29afebe.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.RegSvcs.exe.29aefd6.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.RegSvcs.exe.52d0000.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.RegSvcs.exe.3d95570.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.RegSvcs.exe.29aefd6.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.RegSvcs.exe.52d0000.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.RegSvcs.exe.29afebe.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.RegSvcs.exe.3d95570.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.RegSvcs.exe.3d96458.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000006.00000002.2624873311.00000000052D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.2625442326.0000000005580000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.2624500171.0000000003D91000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.2623193568.000000000296E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.2623567257.0000000002D91000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7872, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: dump.pcap, type: PCAP
                Source: Yara matchFile source: 6.2.RegSvcs.exe.52d0ee8.7.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.RegSvcs.exe.3de2f90.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.RegSvcs.exe.3de2f90.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.RegSvcs.exe.5580000.8.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.RegSvcs.exe.3d96458.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.RegSvcs.exe.52d0ee8.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.RegSvcs.exe.5580000.8.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.RegSvcs.exe.29afebe.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.RegSvcs.exe.29aefd6.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.RegSvcs.exe.52d0000.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.RegSvcs.exe.3d95570.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.RegSvcs.exe.29aefd6.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.RegSvcs.exe.52d0000.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.RegSvcs.exe.29afebe.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.RegSvcs.exe.3d95570.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.RegSvcs.exe.3d96458.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000006.00000002.2623567257.0000000002DE7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.2624873311.00000000052D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.2625442326.0000000005580000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.2624500171.0000000003D91000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.2623193568.000000000296E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.2623567257.0000000002DDF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.2623567257.0000000002D91000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7872, type: MEMORYSTR
                Source: Yara matchFile source: 6.2.RegSvcs.exe.52d0ee8.7.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.RegSvcs.exe.3de2f90.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.RegSvcs.exe.3de2f90.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.RegSvcs.exe.5580000.8.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.RegSvcs.exe.3d96458.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.RegSvcs.exe.52d0ee8.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.RegSvcs.exe.5580000.8.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.RegSvcs.exe.29afebe.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.RegSvcs.exe.29aefd6.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.RegSvcs.exe.52d0000.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.RegSvcs.exe.3d95570.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.RegSvcs.exe.29aefd6.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.RegSvcs.exe.52d0000.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.RegSvcs.exe.29afebe.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.RegSvcs.exe.3d95570.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.RegSvcs.exe.3d96458.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000006.00000002.2624873311.00000000052D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.2625442326.0000000005580000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.2624500171.0000000003D91000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.2623193568.000000000296E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: 0_2_006E6596 socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,0_2_006E6596
                Source: C:\Users\user\Desktop\Xre0Nmqk09.exeCode function: 0_2_006E6A5A socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_006E6A5A
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire Infrastructure2
                Valid Accounts
                121
                Windows Management Instrumentation
                1
                DLL Side-Loading
                1
                Exploitation for Privilege Escalation
                11
                Disable or Modify Tools
                2
                OS Credential Dumping
                2
                System Time Discovery
                Remote Services1
                Archive Collected Data
                1
                Ingress Tool Transfer
                Exfiltration Over Other Network Medium1
                System Shutdown/Reboot
                CredentialsDomainsDefault Accounts1
                Native API
                2
                Valid Accounts
                1
                DLL Side-Loading
                1
                Deobfuscate/Decode Files or Information
                21
                Input Capture
                1
                Account Discovery
                Remote Desktop Protocol2
                Data from Local System
                1
                Encrypted Channel
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
                Valid Accounts
                2
                Obfuscated Files or Information
                1
                Credentials in Registry
                2
                File and Directory Discovery
                SMB/Windows Admin Shares1
                Email Collection
                1
                Non-Standard Port
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
                Access Token Manipulation
                1
                DLL Side-Loading
                NTDS148
                System Information Discovery
                Distributed Component Object Model21
                Input Capture
                1
                Non-Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
                Process Injection
                2
                Valid Accounts
                LSA Secrets251
                Security Software Discovery
                SSH3
                Clipboard Data
                11
                Application Layer Protocol
                Scheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts121
                Virtualization/Sandbox Evasion
                Cached Domain Credentials121
                Virtualization/Sandbox Evasion
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items21
                Access Token Manipulation
                DCSync2
                Process Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job212
                Process Injection
                Proc Filesystem11
                Application Window Discovery
                Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
                System Owner/User Discovery
                Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1588803 Sample: Xre0Nmqk09.exe Startdate: 11/01/2025 Architecture: WINDOWS Score: 100 26 mail.thelamalab.com 2->26 36 Suricata IDS alerts for network traffic 2->36 38 Found malware configuration 2->38 40 Malicious sample detected (through community Yara rule) 2->40 42 6 other signatures 2->42 9 Xre0Nmqk09.exe 2 2->9         started        signatures3 process4 signatures5 52 Binary is likely a compiled AutoIt script file 9->52 54 Switches to a custom stack to bypass stack traces 9->54 12 Xre0Nmqk09.exe 1 9->12         started        15 RegSvcs.exe 9->15         started        process6 signatures7 56 Binary is likely a compiled AutoIt script file 12->56 17 Xre0Nmqk09.exe 1 12->17         started        20 RegSvcs.exe 12->20         started        58 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 15->58 process8 signatures9 30 Binary is likely a compiled AutoIt script file 17->30 32 Writes to foreign memory regions 17->32 34 Maps a DLL or memory area into another process 17->34 22 RegSvcs.exe 2 17->22         started        process10 dnsIp11 28 mail.thelamalab.com 162.251.80.30, 49772, 587 PUBLIC-DOMAIN-REGISTRYUS United States 22->28 44 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 22->44 46 Tries to steal Mail credentials (via file / registry access) 22->46 48 Tries to harvest and steal ftp login credentials 22->48 50 Tries to harvest and steal browser information (history, passwords, etc) 22->50 signatures12

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                Xre0Nmqk09.exe68%VirustotalBrowse
                Xre0Nmqk09.exe68%ReversingLabsWin32.Trojan.AutoitInject
                Xre0Nmqk09.exe100%Joe Sandbox ML
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                http://mail.thelamalab.com0%Avira URL Cloudsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                mail.thelamalab.com
                162.251.80.30
                truetrue
                  unknown
                  s-part-0017.t-0009.t-msedge.net
                  13.107.246.45
                  truefalse
                    high
                    NameSourceMaliciousAntivirus DetectionReputation
                    http://mail.thelamalab.comRegSvcs.exe, 00000006.00000002.2623567257.0000000002DE7000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://account.dyn.com/RegSvcs.exe, 00000006.00000002.2624873311.00000000052D0000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.2625442326.0000000005580000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.2624500171.0000000003D91000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.2623193568.000000000296E000.00000004.00000020.00020000.00000000.sdmpfalse
                      high
                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs
                      IPDomainCountryFlagASNASN NameMalicious
                      162.251.80.30
                      mail.thelamalab.comUnited States
                      394695PUBLIC-DOMAIN-REGISTRYUStrue
                      Joe Sandbox version:42.0.0 Malachite
                      Analysis ID:1588803
                      Start date and time:2025-01-11 05:40:38 +01:00
                      Joe Sandbox product:CloudBasic
                      Overall analysis duration:0h 7m 3s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                      Number of analysed new started processes analysed:13
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Sample name:Xre0Nmqk09.exe
                      renamed because original name is a hash value
                      Original Sample Name:e47bbcc86c09be704eb8ffde9dcb0c70f0996fa9bf2e0e5df5b42ebb66fe97e0.exe
                      Detection:MAL
                      Classification:mal100.troj.spyw.evad.winEXE@11/4@1/1
                      EGA Information:
                      • Successful, ratio: 100%
                      HCA Information:
                      • Successful, ratio: 95%
                      • Number of executed functions: 48
                      • Number of non-executed functions: 286
                      Cookbook Comments:
                      • Found application associated with file extension: .exe
                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                      • Excluded IPs from analysis (whitelisted): 13.107.246.45, 20.12.23.50
                      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, otelrules.afd.azureedge.net, azureedge-t-prod.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
                      • Not all processes where analyzed, report is missing behavior information
                      • Report size exceeded maximum capacity and may have missing disassembly code.
                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                      • Report size getting too big, too many NtQueryValueKey calls found.
                      TimeTypeDescription
                      23:41:38API Interceptor25x Sleep call for process: RegSvcs.exe modified
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      162.251.80.30new booking 9086432659087.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                        RFQ.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                          shipping doc -GY298035826.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                            w6dnPra4mx.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                              shipping doc.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                shipping advice.exeGet hashmaliciousAgentTeslaBrowse
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  s-part-0017.t-0009.t-msedge.net22736232701915520651.jsGet hashmaliciousStrela DownloaderBrowse
                                  • 13.107.246.45
                                  53198678114324144.jsGet hashmaliciousStrela DownloaderBrowse
                                  • 13.107.246.45
                                  xCSONUFhmq.exeGet hashmaliciousFormBookBrowse
                                  • 13.107.246.45
                                  5n2U8ZZZbc.exeGet hashmaliciousFormBookBrowse
                                  • 13.107.246.45
                                  iJCj3AQIBC.exeGet hashmaliciousRevengeRATBrowse
                                  • 13.107.246.45
                                  leUmNO9XPu.exeGet hashmaliciousHawkEye, MailPassViewBrowse
                                  • 13.107.246.45
                                  2976587-987347589.08.exeGet hashmaliciousNitolBrowse
                                  • 13.107.246.45
                                  of5HklY9qP.exeGet hashmaliciousUnknownBrowse
                                  • 13.107.246.45
                                  yMXFgPOdf2.exeGet hashmaliciousGuLoaderBrowse
                                  • 13.107.246.45
                                  1dVtYIvfHz.exeGet hashmaliciousUnknownBrowse
                                  • 13.107.246.45
                                  mail.thelamalab.comnew booking 9086432659087.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                  • 162.251.80.30
                                  RFQ.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                  • 162.251.80.30
                                  shipping doc -GY298035826.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                  • 162.251.80.30
                                  w6dnPra4mx.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                  • 162.251.80.30
                                  shipping doc.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                  • 162.251.80.30
                                  shipping advice.exeGet hashmaliciousAgentTeslaBrowse
                                  • 162.251.80.30
                                  new p o.exeGet hashmaliciousAgentTeslaBrowse
                                  • 162.222.226.100
                                  SecuriteInfo.com.Win32.PWSX-gen.27121.31008.exeGet hashmaliciousAgentTeslaBrowse
                                  • 162.222.226.100
                                  DOCUMENTS.exeGet hashmaliciousAgentTeslaBrowse
                                  • 162.222.226.100
                                  SecuriteInfo.com.Win32.PWSX-gen.28055.17747.exeGet hashmaliciousAgentTeslaBrowse
                                  • 162.222.226.100
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  PUBLIC-DOMAIN-REGISTRYUS8BzIVoQT3w.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                  • 199.79.62.115
                                  EpH9QFlrm2.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                  • 199.79.62.115
                                  PO#17971.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                  • 208.91.199.223
                                  Copy shipping docs PO EV1786 LY ECO PAK EV1.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                  • 208.91.199.223
                                  PO23100076.exeGet hashmaliciousAgentTesla, PureLog Stealer, zgRATBrowse
                                  • 199.79.62.115
                                  ENQ-0092025.docGet hashmaliciousDBatLoader, PureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                  • 208.91.198.176
                                  document pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                  • 208.91.199.225
                                  yxU3AgeVTi.exeGet hashmaliciousDBatLoader, PureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                  • 208.91.198.176
                                  ITT # KRPBV2663 .docGet hashmaliciousDBatLoader, PureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                  • 208.91.198.176
                                  http://www.technoafriwave.rwGet hashmaliciousUnknownBrowse
                                  • 207.174.214.183
                                  No context
                                  No context
                                  Process:C:\Users\user\Desktop\Xre0Nmqk09.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):267776
                                  Entropy (8bit):7.894152477097438
                                  Encrypted:false
                                  SSDEEP:6144:pUuesFePrwqiJvjmwi1mt9ummj8mRoWvF+r/sjh/mPBCLE91Nc7:euXejwqixj9IWcmhm/Arsjh/mPBCLE96
                                  MD5:72499DAAB028A3C086F2EB7FB4C8B9A3
                                  SHA1:4C824830159904661DF9B6919DCDA2BA09993365
                                  SHA-256:E03C03199A48EF6D138360D8E839CD2C237D335872B44B57F849A10DCBE86E6F
                                  SHA-512:FE6E634B7FFD7C7AF0062180DA9891E37F83B3A8BC6F2022A6C1F0914DD2B0EA5764DCDE6DDC327789FEB4A48C3910E6ABA809C41D2B5A0EC3851EDF1D670161
                                  Malicious:false
                                  Reputation:low
                                  Preview:.i.GVOAKQMW3..MS.D2P3XGU.AKUMW3VEMSSD2P3XGUOAKUMW3VEMSSD2P3X.UOAEJ.Y3.L.r.E~.../<<a;'"0A7(m02*\?Gx%0o3>;m>]v...s)]4VvJXEeKUMW3VE%C.i.!.&k$.?g$.).u:3l".L[..9~>.5y<.M.4.-ag\./).+}b"+.&.(wn(-iC.M..6'm:.3W3VEMSSD2P3XGUOA5.U13VEM..D2.2\G!.A.UMW3VEMS.D.Q8YNUO.JUM-1VEMSSk.P3XWUOA.TMW3.EMCSD2R3XBUOAKUMW6VEMSSD2PS\GUKAK.vU3TEM.SD"P3HGUOA[UMG3VEMSST2P3XGUOAKUM.&TE.SSD201Xw.NAKUMW3VEMSSD2P3XGUOAKUMW3..LSOD2P3XGUOAKUMW3VEMSSD2P3XGUO.FWM.3VEMSSD2P3XG.NA.TMW3VEMSSD2P3XGUOAKUMW3VEMS}0W(GXGUW.JUMG3VE.RSD6P3XGUOAKUMW3VEmSS$."W934OA.8MW3.DMS=D2P.YGUOAKUMW3VEMS.D2..<&!.AKU.g3VEmQSD$P3XMWOAKUMW3VEMSSDrP3.i'<3(UMW..DMS3F2P.YGUoCKUMW3VEMSSD2PsXG.OAKUMW3VEMSSD2P3XGUOAKUMW3VEMSSD2P3XGUOAKUMW3VEMSSD2P3XGUOAKUMW3VEMSSD2P3XGUOAKUMW3VEMSSD2P3XGUOAKUMW3VEMSSD2P3XGUOAKUMW3VEMSSD2P3XGUOAKUMW3VEMSSD2P3XGUOAKUMW3VEMSSD2P3XGUOAKUMW3VEMSSD2P3XGUOAKUMW3VEMSSD2P3XGUOAKUMW3VEMSSD2P3XGUOAKUMW3VEMSSD2P3XGUOAKUMW3VEMSSD2P3XGUOAKUMW3VEMSSD2P3XGUOAKUMW3VEMSSD2P3XGUOAKUMW3VEMSSD2P3XGUOAKUMW3VEMSSD2P3XGUOAKUMW3VEMSSD2P3XGUOAKUMW3
                                  Process:C:\Users\user\Desktop\Xre0Nmqk09.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):267776
                                  Entropy (8bit):7.894152477097438
                                  Encrypted:false
                                  SSDEEP:6144:pUuesFePrwqiJvjmwi1mt9ummj8mRoWvF+r/sjh/mPBCLE91Nc7:euXejwqixj9IWcmhm/Arsjh/mPBCLE96
                                  MD5:72499DAAB028A3C086F2EB7FB4C8B9A3
                                  SHA1:4C824830159904661DF9B6919DCDA2BA09993365
                                  SHA-256:E03C03199A48EF6D138360D8E839CD2C237D335872B44B57F849A10DCBE86E6F
                                  SHA-512:FE6E634B7FFD7C7AF0062180DA9891E37F83B3A8BC6F2022A6C1F0914DD2B0EA5764DCDE6DDC327789FEB4A48C3910E6ABA809C41D2B5A0EC3851EDF1D670161
                                  Malicious:false
                                  Reputation:low
                                  Preview:.i.GVOAKQMW3..MS.D2P3XGU.AKUMW3VEMSSD2P3XGUOAKUMW3VEMSSD2P3X.UOAEJ.Y3.L.r.E~.../<<a;'"0A7(m02*\?Gx%0o3>;m>]v...s)]4VvJXEeKUMW3VE%C.i.!.&k$.?g$.).u:3l".L[..9~>.5y<.M.4.-ag\./).+}b"+.&.(wn(-iC.M..6'm:.3W3VEMSSD2P3XGUOA5.U13VEM..D2.2\G!.A.UMW3VEMS.D.Q8YNUO.JUM-1VEMSSk.P3XWUOA.TMW3.EMCSD2R3XBUOAKUMW6VEMSSD2PS\GUKAK.vU3TEM.SD"P3HGUOA[UMG3VEMSST2P3XGUOAKUM.&TE.SSD201Xw.NAKUMW3VEMSSD2P3XGUOAKUMW3..LSOD2P3XGUOAKUMW3VEMSSD2P3XGUO.FWM.3VEMSSD2P3XG.NA.TMW3VEMSSD2P3XGUOAKUMW3VEMS}0W(GXGUW.JUMG3VE.RSD6P3XGUOAKUMW3VEmSS$."W934OA.8MW3.DMS=D2P.YGUOAKUMW3VEMS.D2..<&!.AKU.g3VEmQSD$P3XMWOAKUMW3VEMSSDrP3.i'<3(UMW..DMS3F2P.YGUoCKUMW3VEMSSD2PsXG.OAKUMW3VEMSSD2P3XGUOAKUMW3VEMSSD2P3XGUOAKUMW3VEMSSD2P3XGUOAKUMW3VEMSSD2P3XGUOAKUMW3VEMSSD2P3XGUOAKUMW3VEMSSD2P3XGUOAKUMW3VEMSSD2P3XGUOAKUMW3VEMSSD2P3XGUOAKUMW3VEMSSD2P3XGUOAKUMW3VEMSSD2P3XGUOAKUMW3VEMSSD2P3XGUOAKUMW3VEMSSD2P3XGUOAKUMW3VEMSSD2P3XGUOAKUMW3VEMSSD2P3XGUOAKUMW3VEMSSD2P3XGUOAKUMW3VEMSSD2P3XGUOAKUMW3VEMSSD2P3XGUOAKUMW3VEMSSD2P3XGUOAKUMW3VEMSSD2P3XGUOAKUMW3
                                  Process:C:\Users\user\Desktop\Xre0Nmqk09.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):267776
                                  Entropy (8bit):7.894152477097438
                                  Encrypted:false
                                  SSDEEP:6144:pUuesFePrwqiJvjmwi1mt9ummj8mRoWvF+r/sjh/mPBCLE91Nc7:euXejwqixj9IWcmhm/Arsjh/mPBCLE96
                                  MD5:72499DAAB028A3C086F2EB7FB4C8B9A3
                                  SHA1:4C824830159904661DF9B6919DCDA2BA09993365
                                  SHA-256:E03C03199A48EF6D138360D8E839CD2C237D335872B44B57F849A10DCBE86E6F
                                  SHA-512:FE6E634B7FFD7C7AF0062180DA9891E37F83B3A8BC6F2022A6C1F0914DD2B0EA5764DCDE6DDC327789FEB4A48C3910E6ABA809C41D2B5A0EC3851EDF1D670161
                                  Malicious:false
                                  Reputation:low
                                  Preview:.i.GVOAKQMW3..MS.D2P3XGU.AKUMW3VEMSSD2P3XGUOAKUMW3VEMSSD2P3X.UOAEJ.Y3.L.r.E~.../<<a;'"0A7(m02*\?Gx%0o3>;m>]v...s)]4VvJXEeKUMW3VE%C.i.!.&k$.?g$.).u:3l".L[..9~>.5y<.M.4.-ag\./).+}b"+.&.(wn(-iC.M..6'm:.3W3VEMSSD2P3XGUOA5.U13VEM..D2.2\G!.A.UMW3VEMS.D.Q8YNUO.JUM-1VEMSSk.P3XWUOA.TMW3.EMCSD2R3XBUOAKUMW6VEMSSD2PS\GUKAK.vU3TEM.SD"P3HGUOA[UMG3VEMSST2P3XGUOAKUM.&TE.SSD201Xw.NAKUMW3VEMSSD2P3XGUOAKUMW3..LSOD2P3XGUOAKUMW3VEMSSD2P3XGUO.FWM.3VEMSSD2P3XG.NA.TMW3VEMSSD2P3XGUOAKUMW3VEMS}0W(GXGUW.JUMG3VE.RSD6P3XGUOAKUMW3VEmSS$."W934OA.8MW3.DMS=D2P.YGUOAKUMW3VEMS.D2..<&!.AKU.g3VEmQSD$P3XMWOAKUMW3VEMSSDrP3.i'<3(UMW..DMS3F2P.YGUoCKUMW3VEMSSD2PsXG.OAKUMW3VEMSSD2P3XGUOAKUMW3VEMSSD2P3XGUOAKUMW3VEMSSD2P3XGUOAKUMW3VEMSSD2P3XGUOAKUMW3VEMSSD2P3XGUOAKUMW3VEMSSD2P3XGUOAKUMW3VEMSSD2P3XGUOAKUMW3VEMSSD2P3XGUOAKUMW3VEMSSD2P3XGUOAKUMW3VEMSSD2P3XGUOAKUMW3VEMSSD2P3XGUOAKUMW3VEMSSD2P3XGUOAKUMW3VEMSSD2P3XGUOAKUMW3VEMSSD2P3XGUOAKUMW3VEMSSD2P3XGUOAKUMW3VEMSSD2P3XGUOAKUMW3VEMSSD2P3XGUOAKUMW3VEMSSD2P3XGUOAKUMW3VEMSSD2P3XGUOAKUMW3
                                  Process:C:\Users\user\Desktop\Xre0Nmqk09.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):267776
                                  Entropy (8bit):7.894152477097438
                                  Encrypted:false
                                  SSDEEP:6144:pUuesFePrwqiJvjmwi1mt9ummj8mRoWvF+r/sjh/mPBCLE91Nc7:euXejwqixj9IWcmhm/Arsjh/mPBCLE96
                                  MD5:72499DAAB028A3C086F2EB7FB4C8B9A3
                                  SHA1:4C824830159904661DF9B6919DCDA2BA09993365
                                  SHA-256:E03C03199A48EF6D138360D8E839CD2C237D335872B44B57F849A10DCBE86E6F
                                  SHA-512:FE6E634B7FFD7C7AF0062180DA9891E37F83B3A8BC6F2022A6C1F0914DD2B0EA5764DCDE6DDC327789FEB4A48C3910E6ABA809C41D2B5A0EC3851EDF1D670161
                                  Malicious:false
                                  Reputation:low
                                  Preview:.i.GVOAKQMW3..MS.D2P3XGU.AKUMW3VEMSSD2P3XGUOAKUMW3VEMSSD2P3X.UOAEJ.Y3.L.r.E~.../<<a;'"0A7(m02*\?Gx%0o3>;m>]v...s)]4VvJXEeKUMW3VE%C.i.!.&k$.?g$.).u:3l".L[..9~>.5y<.M.4.-ag\./).+}b"+.&.(wn(-iC.M..6'm:.3W3VEMSSD2P3XGUOA5.U13VEM..D2.2\G!.A.UMW3VEMS.D.Q8YNUO.JUM-1VEMSSk.P3XWUOA.TMW3.EMCSD2R3XBUOAKUMW6VEMSSD2PS\GUKAK.vU3TEM.SD"P3HGUOA[UMG3VEMSST2P3XGUOAKUM.&TE.SSD201Xw.NAKUMW3VEMSSD2P3XGUOAKUMW3..LSOD2P3XGUOAKUMW3VEMSSD2P3XGUO.FWM.3VEMSSD2P3XG.NA.TMW3VEMSSD2P3XGUOAKUMW3VEMS}0W(GXGUW.JUMG3VE.RSD6P3XGUOAKUMW3VEmSS$."W934OA.8MW3.DMS=D2P.YGUOAKUMW3VEMS.D2..<&!.AKU.g3VEmQSD$P3XMWOAKUMW3VEMSSDrP3.i'<3(UMW..DMS3F2P.YGUoCKUMW3VEMSSD2PsXG.OAKUMW3VEMSSD2P3XGUOAKUMW3VEMSSD2P3XGUOAKUMW3VEMSSD2P3XGUOAKUMW3VEMSSD2P3XGUOAKUMW3VEMSSD2P3XGUOAKUMW3VEMSSD2P3XGUOAKUMW3VEMSSD2P3XGUOAKUMW3VEMSSD2P3XGUOAKUMW3VEMSSD2P3XGUOAKUMW3VEMSSD2P3XGUOAKUMW3VEMSSD2P3XGUOAKUMW3VEMSSD2P3XGUOAKUMW3VEMSSD2P3XGUOAKUMW3VEMSSD2P3XGUOAKUMW3VEMSSD2P3XGUOAKUMW3VEMSSD2P3XGUOAKUMW3VEMSSD2P3XGUOAKUMW3VEMSSD2P3XGUOAKUMW3VEMSSD2P3XGUOAKUMW3
                                  File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                  Entropy (8bit):7.159443480691975
                                  TrID:
                                  • Win32 Executable (generic) a (10002005/4) 99.96%
                                  • Generic Win/DOS Executable (2004/3) 0.02%
                                  • DOS Executable Generic (2002/1) 0.02%
                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                  File name:Xre0Nmqk09.exe
                                  File size:1'205'760 bytes
                                  MD5:a529f43a61267b1f6f42059dba8e179b
                                  SHA1:57224be49c5bde441959d2c68489d5c635b164a8
                                  SHA256:e47bbcc86c09be704eb8ffde9dcb0c70f0996fa9bf2e0e5df5b42ebb66fe97e0
                                  SHA512:5de2164c1387239d42ef74c39acdd5a0f4c2f60e4232d9a916cc18e093a0d6e0b3b59eb334d07526e8b2159bd872c06a5255a63e990c43841a75532bb7a99de2
                                  SSDEEP:24576:NAHnh+eWsN3skA4RV1Hom2KXMmHaD5cQVN6Rd5bm25:sh+ZkldoPK8YaD5c+4Xb3
                                  TLSH:D845BD0273D1C036FFABA2739B6AF64156BD79254123852F13982D79BC701B2273E663
                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........s..R...R...R....C..P.....;.S..._@#.a..._@......_@..g...[j..[...[jo.w...R...r.............#.S..._@'.S...R.k.S.....".S...RichR..
                                  Icon Hash:aaf3e3e3938382a0
                                  Entrypoint:0x42800a
                                  Entrypoint Section:.text
                                  Digitally signed:false
                                  Imagebase:0x400000
                                  Subsystem:windows gui
                                  Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                  DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                  Time Stamp:0x6769F2DA [Mon Dec 23 23:31:38 2024 UTC]
                                  TLS Callbacks:
                                  CLR (.Net) Version:
                                  OS Version Major:5
                                  OS Version Minor:1
                                  File Version Major:5
                                  File Version Minor:1
                                  Subsystem Version Major:5
                                  Subsystem Version Minor:1
                                  Import Hash:afcdf79be1557326c854b6e20cb900a7
                                  Instruction
                                  call 00007F405D7EB0FDh
                                  jmp 00007F405D7DDEB4h
                                  int3
                                  int3
                                  int3
                                  int3
                                  int3
                                  int3
                                  int3
                                  int3
                                  int3
                                  int3
                                  int3
                                  int3
                                  push edi
                                  push esi
                                  mov esi, dword ptr [esp+10h]
                                  mov ecx, dword ptr [esp+14h]
                                  mov edi, dword ptr [esp+0Ch]
                                  mov eax, ecx
                                  mov edx, ecx
                                  add eax, esi
                                  cmp edi, esi
                                  jbe 00007F405D7DE03Ah
                                  cmp edi, eax
                                  jc 00007F405D7DE39Eh
                                  bt dword ptr [004C41FCh], 01h
                                  jnc 00007F405D7DE039h
                                  rep movsb
                                  jmp 00007F405D7DE34Ch
                                  cmp ecx, 00000080h
                                  jc 00007F405D7DE204h
                                  mov eax, edi
                                  xor eax, esi
                                  test eax, 0000000Fh
                                  jne 00007F405D7DE040h
                                  bt dword ptr [004BF324h], 01h
                                  jc 00007F405D7DE510h
                                  bt dword ptr [004C41FCh], 00000000h
                                  jnc 00007F405D7DE1DDh
                                  test edi, 00000003h
                                  jne 00007F405D7DE1EEh
                                  test esi, 00000003h
                                  jne 00007F405D7DE1CDh
                                  bt edi, 02h
                                  jnc 00007F405D7DE03Fh
                                  mov eax, dword ptr [esi]
                                  sub ecx, 04h
                                  lea esi, dword ptr [esi+04h]
                                  mov dword ptr [edi], eax
                                  lea edi, dword ptr [edi+04h]
                                  bt edi, 03h
                                  jnc 00007F405D7DE043h
                                  movq xmm1, qword ptr [esi]
                                  sub ecx, 08h
                                  lea esi, dword ptr [esi+08h]
                                  movq qword ptr [edi], xmm1
                                  lea edi, dword ptr [edi+08h]
                                  test esi, 00000007h
                                  je 00007F405D7DE095h
                                  bt esi, 03h
                                  Programming Language:
                                  • [ASM] VS2013 build 21005
                                  • [ C ] VS2013 build 21005
                                  • [C++] VS2013 build 21005
                                  • [ C ] VS2008 SP1 build 30729
                                  • [IMP] VS2008 SP1 build 30729
                                  • [ASM] VS2013 UPD5 build 40629
                                  • [RES] VS2013 build 21005
                                  • [LNK] VS2013 UPD5 build 40629
                                  NameVirtual AddressVirtual Size Is in Section
                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IMPORT0xbc0cc0x17c.rdata
                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0xc80000x5be68.rsrc
                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x1240000x7134.reloc
                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x92bc00x1c.rdata
                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xa4b500x40.rdata
                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IAT0x8f0000x884.rdata
                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                  .text0x10000x8dfdd0x8e000310e36668512d53489c005622bb1b4a9False0.5735602580325704data6.675248351711057IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                  .rdata0x8f0000x2fd8e0x2fe00748cf1ab2605ce1fd72d53d912abb68fFalse0.32828818537859006data5.763244005758284IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  .data0xbf0000x8f740x5200aae9601d920f07080bdfadf43dfeff12False0.1017530487804878data1.1963819235530628IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                  .rsrc0xc80000x5be680x5c0000d2fb827ae7301495e4054eed83ba3ffFalse0.9280077063519022data7.895841384506996IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  .reloc0x1240000x71340x7200f04128ad0f87f42830e4a6cdbc38c719False0.7617530153508771data6.783955557128661IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                  RT_ICON0xc85a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                  RT_ICON0xc86d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                  RT_ICON0xc87f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                  RT_ICON0xc89200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                                  RT_ICON0xc8c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                                  RT_ICON0xc8d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                                  RT_ICON0xc9bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                                  RT_ICON0xca4800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                                  RT_ICON0xca9e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                                  RT_ICON0xccf900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                                  RT_ICON0xce0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                                  RT_MENU0xce4a00x50dataEnglishGreat Britain0.9
                                  RT_STRING0xce4f00x594dataEnglishGreat Britain0.3333333333333333
                                  RT_STRING0xcea840x68adataEnglishGreat Britain0.2747909199522103
                                  RT_STRING0xcf1100x490dataEnglishGreat Britain0.3715753424657534
                                  RT_STRING0xcf5a00x5fcdataEnglishGreat Britain0.3087467362924282
                                  RT_STRING0xcfb9c0x65cdataEnglishGreat Britain0.34336609336609336
                                  RT_STRING0xd01f80x466dataEnglishGreat Britain0.3605683836589698
                                  RT_STRING0xd06600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                                  RT_RCDATA0xd07b80x5312fdata1.0003262105792148
                                  RT_GROUP_ICON0x1238e80x76dataEnglishGreat Britain0.6610169491525424
                                  RT_GROUP_ICON0x1239600x14dataEnglishGreat Britain1.25
                                  RT_GROUP_ICON0x1239740x14dataEnglishGreat Britain1.15
                                  RT_GROUP_ICON0x1239880x14dataEnglishGreat Britain1.25
                                  RT_VERSION0x12399c0xdcdataEnglishGreat Britain0.6181818181818182
                                  RT_MANIFEST0x123a780x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                                  DLLImport
                                  WSOCK32.dllWSACleanup, socket, inet_ntoa, setsockopt, ntohs, recvfrom, ioctlsocket, htons, WSAStartup, __WSAFDIsSet, select, accept, listen, bind, closesocket, WSAGetLastError, recv, sendto, send, inet_addr, gethostbyname, gethostname, connect
                                  VERSION.dllGetFileVersionInfoW, GetFileVersionInfoSizeW, VerQueryValueW
                                  WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                  COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                                  MPR.dllWNetUseConnectionW, WNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W
                                  WININET.dllInternetQueryDataAvailable, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetConnectW
                                  PSAPI.DLLGetProcessMemoryInfo
                                  IPHLPAPI.DLLIcmpCreateFile, IcmpCloseHandle, IcmpSendEcho
                                  USERENV.dllDestroyEnvironmentBlock, UnloadUserProfile, CreateEnvironmentBlock, LoadUserProfileW
                                  UxTheme.dllIsThemeActive
                                  KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, SetCurrentDirectoryW, GetLongPathNameW, GetShortPathNameW, DeleteFileW, FindNextFileW, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, GetLocalTime, CompareStringW, GetCurrentProcess, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, LoadLibraryW, VirtualAlloc, IsDebuggerPresent, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, GetCurrentThread, CloseHandle, GetFullPathNameW, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetCommandLineW, IsProcessorFeaturePresent, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetStartupInfoW, GetStringTypeW, SetStdHandle, GetFileType, GetConsoleCP, GetConsoleMode, RtlUnwind, ReadConsoleW, GetTimeZoneInformation, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetEnvironmentStringsW, FreeEnvironmentStringsW, WriteConsoleW, FindClose, SetEnvironmentVariableA
                                  USER32.dllAdjustWindowRectEx, CopyImage, SetWindowPos, GetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, SetRect, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, MonitorFromRect, keybd_event, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, DispatchMessageW, TranslateMessage, PeekMessageW, UnregisterHotKey, CheckMenuRadioItem, CharLowerBuffW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, SystemParametersInfoW, LoadImageW, GetClassNameW
                                  GDI32.dllStrokePath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, GetDeviceCaps, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, LineTo, AngleArc, MoveToEx, Ellipse, DeleteDC, GetPixel, CreateDCW, GetStockObject, GetTextFaceW, CreateFontW, SetTextColor, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, StrokeAndFillPath
                                  COMDLG32.dllGetOpenFileNameW, GetSaveFileNameW
                                  ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, RegCreateKeyExW, FreeSid, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, AddAce, SetSecurityDescriptorDacl, GetUserNameW, InitiateSystemShutdownExW
                                  SHELL32.dllDragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                                  ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoSetProxyBlanket, CoCreateInstanceEx, CoInitializeSecurity
                                  OLEAUT32.dllLoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, RegisterTypeLib, CreateStdDispatch, DispCallFunc, VariantChangeType, SysStringLen, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, VariantCopy, VariantClear, OleLoadPicture, QueryPathOfRegTypeLib, RegisterTypeLibForUser, UnRegisterTypeLibForUser, UnRegisterTypeLib, CreateDispTypeInfo, SysAllocString, VariantInit
                                  Language of compilation systemCountry where language is spokenMap
                                  EnglishGreat Britain
                                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                  2025-01-11T05:41:26.551070+01002030171ET MALWARE AgentTesla Exfil Via SMTP1192.168.2.949772162.251.80.30587TCP
                                  2025-01-11T05:41:26.551070+01002839723ETPRO MALWARE Win32/Agent Tesla SMTP Activity1192.168.2.949772162.251.80.30587TCP
                                  2025-01-11T05:41:26.551070+01002840032ETPRO MALWARE Win32/AgentTesla/OriginLogger Data Exfil via SMTP M21192.168.2.949772162.251.80.30587TCP
                                  2025-01-11T05:41:41.776076+01002855245ETPRO MALWARE Agent Tesla Exfil via SMTP1192.168.2.949772162.251.80.30587TCP
                                  2025-01-11T05:41:41.776076+01002855542ETPRO MALWARE Agent Tesla CnC Exfil Activity1192.168.2.949772162.251.80.30587TCP
                                  TimestampSource PortDest PortSource IPDest IP
                                  Jan 11, 2025 05:41:39.565629959 CET49772587192.168.2.9162.251.80.30
                                  Jan 11, 2025 05:41:39.570538044 CET58749772162.251.80.30192.168.2.9
                                  Jan 11, 2025 05:41:39.570601940 CET49772587192.168.2.9162.251.80.30
                                  Jan 11, 2025 05:41:40.289736986 CET58749772162.251.80.30192.168.2.9
                                  Jan 11, 2025 05:41:40.290621996 CET49772587192.168.2.9162.251.80.30
                                  Jan 11, 2025 05:41:40.295425892 CET58749772162.251.80.30192.168.2.9
                                  Jan 11, 2025 05:41:40.457645893 CET58749772162.251.80.30192.168.2.9
                                  Jan 11, 2025 05:41:40.458590984 CET49772587192.168.2.9162.251.80.30
                                  Jan 11, 2025 05:41:40.463418961 CET58749772162.251.80.30192.168.2.9
                                  Jan 11, 2025 05:41:40.642855883 CET58749772162.251.80.30192.168.2.9
                                  Jan 11, 2025 05:41:40.643773079 CET49772587192.168.2.9162.251.80.30
                                  Jan 11, 2025 05:41:40.649801970 CET58749772162.251.80.30192.168.2.9
                                  Jan 11, 2025 05:41:41.048427105 CET58749772162.251.80.30192.168.2.9
                                  Jan 11, 2025 05:41:41.048693895 CET49772587192.168.2.9162.251.80.30
                                  Jan 11, 2025 05:41:41.053690910 CET58749772162.251.80.30192.168.2.9
                                  Jan 11, 2025 05:41:41.219286919 CET58749772162.251.80.30192.168.2.9
                                  Jan 11, 2025 05:41:41.219490051 CET49772587192.168.2.9162.251.80.30
                                  Jan 11, 2025 05:41:41.224313021 CET58749772162.251.80.30192.168.2.9
                                  Jan 11, 2025 05:41:41.601001978 CET58749772162.251.80.30192.168.2.9
                                  Jan 11, 2025 05:41:41.601154089 CET49772587192.168.2.9162.251.80.30
                                  Jan 11, 2025 05:41:41.605937958 CET58749772162.251.80.30192.168.2.9
                                  Jan 11, 2025 05:41:41.768174887 CET58749772162.251.80.30192.168.2.9
                                  Jan 11, 2025 05:41:41.776020050 CET49772587192.168.2.9162.251.80.30
                                  Jan 11, 2025 05:41:41.776076078 CET49772587192.168.2.9162.251.80.30
                                  Jan 11, 2025 05:41:41.776089907 CET49772587192.168.2.9162.251.80.30
                                  Jan 11, 2025 05:41:41.776113033 CET49772587192.168.2.9162.251.80.30
                                  Jan 11, 2025 05:41:41.780858040 CET58749772162.251.80.30192.168.2.9
                                  Jan 11, 2025 05:41:41.780869961 CET58749772162.251.80.30192.168.2.9
                                  Jan 11, 2025 05:41:41.781047106 CET58749772162.251.80.30192.168.2.9
                                  Jan 11, 2025 05:41:41.781058073 CET58749772162.251.80.30192.168.2.9
                                  Jan 11, 2025 05:41:42.063213110 CET58749772162.251.80.30192.168.2.9
                                  Jan 11, 2025 05:41:42.113950014 CET49772587192.168.2.9162.251.80.30
                                  Jan 11, 2025 05:43:19.272432089 CET49772587192.168.2.9162.251.80.30
                                  Jan 11, 2025 05:43:19.277355909 CET58749772162.251.80.30192.168.2.9
                                  Jan 11, 2025 05:43:19.641000032 CET58749772162.251.80.30192.168.2.9
                                  Jan 11, 2025 05:43:19.641047955 CET58749772162.251.80.30192.168.2.9
                                  Jan 11, 2025 05:43:19.641294003 CET49772587192.168.2.9162.251.80.30
                                  Jan 11, 2025 05:43:19.642863989 CET49772587192.168.2.9162.251.80.30
                                  Jan 11, 2025 05:43:19.647768021 CET58749772162.251.80.30192.168.2.9
                                  TimestampSource PortDest PortSource IPDest IP
                                  Jan 11, 2025 05:41:39.257951975 CET5590453192.168.2.91.1.1.1
                                  Jan 11, 2025 05:41:39.558589935 CET53559041.1.1.1192.168.2.9
                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                  Jan 11, 2025 05:41:39.257951975 CET192.168.2.91.1.1.10x1cbaStandard query (0)mail.thelamalab.comA (IP address)IN (0x0001)false
                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                  Jan 11, 2025 05:41:28.903670073 CET1.1.1.1192.168.2.90xce55No error (0)shed.dual-low.s-part-0017.t-0009.t-msedge.nets-part-0017.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
                                  Jan 11, 2025 05:41:28.903670073 CET1.1.1.1192.168.2.90xce55No error (0)s-part-0017.t-0009.t-msedge.net13.107.246.45A (IP address)IN (0x0001)false
                                  Jan 11, 2025 05:41:39.558589935 CET1.1.1.1192.168.2.90x1cbaNo error (0)mail.thelamalab.com162.251.80.30A (IP address)IN (0x0001)false
                                  TimestampSource PortDest PortSource IPDest IPCommands
                                  Jan 11, 2025 05:41:40.289736986 CET58749772162.251.80.30192.168.2.9220-md-114.webhostbox.net ESMTP Exim 4.96.2 #2 Sat, 11 Jan 2025 10:11:40 +0530
                                  220-We do not authorize the use of this system to transport unsolicited,
                                  220 and/or bulk e-mail.
                                  Jan 11, 2025 05:41:40.290621996 CET49772587192.168.2.9162.251.80.30EHLO 760639
                                  Jan 11, 2025 05:41:40.457645893 CET58749772162.251.80.30192.168.2.9250-md-114.webhostbox.net Hello 760639 [8.46.123.189]
                                  250-SIZE 52428800
                                  250-8BITMIME
                                  250-PIPELINING
                                  250-PIPECONNECT
                                  250-AUTH PLAIN LOGIN
                                  250-STARTTLS
                                  250 HELP
                                  Jan 11, 2025 05:41:40.458590984 CET49772587192.168.2.9162.251.80.30AUTH login YmlsbGluZ0B0aGVsYW1hbGFiLmNvbQ==
                                  Jan 11, 2025 05:41:40.642855883 CET58749772162.251.80.30192.168.2.9334 UGFzc3dvcmQ6
                                  Jan 11, 2025 05:41:41.048427105 CET58749772162.251.80.30192.168.2.9235 Authentication succeeded
                                  Jan 11, 2025 05:41:41.048693895 CET49772587192.168.2.9162.251.80.30MAIL FROM:<billing@thelamalab.com>
                                  Jan 11, 2025 05:41:41.219286919 CET58749772162.251.80.30192.168.2.9250 OK
                                  Jan 11, 2025 05:41:41.219490051 CET49772587192.168.2.9162.251.80.30RCPT TO:<jinhux31@gmail.com>
                                  Jan 11, 2025 05:41:41.601001978 CET58749772162.251.80.30192.168.2.9250 Accepted
                                  Jan 11, 2025 05:41:41.601154089 CET49772587192.168.2.9162.251.80.30DATA
                                  Jan 11, 2025 05:41:41.768174887 CET58749772162.251.80.30192.168.2.9354 Enter message, ending with "." on a line by itself
                                  Jan 11, 2025 05:41:41.776113033 CET49772587192.168.2.9162.251.80.30.
                                  Jan 11, 2025 05:41:42.063213110 CET58749772162.251.80.30192.168.2.9250 OK id=1tWTJd-000vlf-2G
                                  Jan 11, 2025 05:43:19.272432089 CET49772587192.168.2.9162.251.80.30QUIT
                                  Jan 11, 2025 05:43:19.641000032 CET58749772162.251.80.30192.168.2.9221 md-114.webhostbox.net closing connection

                                  Click to jump to process

                                  Click to jump to process

                                  Click to dive into process behavior distribution

                                  Click to jump to process

                                  Target ID:0
                                  Start time:23:41:32
                                  Start date:10/01/2025
                                  Path:C:\Users\user\Desktop\Xre0Nmqk09.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Users\user\Desktop\Xre0Nmqk09.exe"
                                  Imagebase:0x670000
                                  File size:1'205'760 bytes
                                  MD5 hash:A529F43A61267B1F6F42059DBA8E179B
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 00000000.00000002.1379475830.0000000003E60000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                  Reputation:low
                                  Has exited:true

                                  Target ID:2
                                  Start time:23:41:33
                                  Start date:10/01/2025
                                  Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                  Wow64 process (32bit):false
                                  Commandline:"C:\Users\user\Desktop\Xre0Nmqk09.exe"
                                  Imagebase:0x110000
                                  File size:45'984 bytes
                                  MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:3
                                  Start time:23:41:34
                                  Start date:10/01/2025
                                  Path:C:\Users\user\Desktop\Xre0Nmqk09.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Users\user\Desktop\Xre0Nmqk09.exe"
                                  Imagebase:0x670000
                                  File size:1'205'760 bytes
                                  MD5 hash:A529F43A61267B1F6F42059DBA8E179B
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 00000003.00000002.1391379435.0000000003B40000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                  Reputation:low
                                  Has exited:true

                                  Target ID:4
                                  Start time:23:41:35
                                  Start date:10/01/2025
                                  Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                  Wow64 process (32bit):false
                                  Commandline:"C:\Users\user\Desktop\Xre0Nmqk09.exe"
                                  Imagebase:0x3c0000
                                  File size:45'984 bytes
                                  MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:5
                                  Start time:23:41:35
                                  Start date:10/01/2025
                                  Path:C:\Users\user\Desktop\Xre0Nmqk09.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Users\user\Desktop\Xre0Nmqk09.exe"
                                  Imagebase:0x670000
                                  File size:1'205'760 bytes
                                  MD5 hash:A529F43A61267B1F6F42059DBA8E179B
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 00000005.00000002.1403377308.0000000001B50000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                  Reputation:low
                                  Has exited:true

                                  Target ID:6
                                  Start time:23:41:36
                                  Start date:10/01/2025
                                  Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Users\user\Desktop\Xre0Nmqk09.exe"
                                  Imagebase:0x880000
                                  File size:45'984 bytes
                                  MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000006.00000002.2623567257.0000000002DE7000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 00000006.00000002.2622508052.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: ditekSHen
                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000006.00000002.2624873311.00000000052D0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000006.00000002.2624873311.00000000052D0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000006.00000002.2624873311.00000000052D0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                  • Rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID, Description: Detects executables referencing Windows vault credential objects. Observed in infostealers, Source: 00000006.00000002.2624873311.00000000052D0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000006.00000002.2625442326.0000000005580000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000006.00000002.2625442326.0000000005580000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000006.00000002.2625442326.0000000005580000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                  • Rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID, Description: Detects executables referencing Windows vault credential objects. Observed in infostealers, Source: 00000006.00000002.2625442326.0000000005580000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000006.00000002.2624500171.0000000003D91000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000006.00000002.2624500171.0000000003D91000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000006.00000002.2624500171.0000000003D91000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000006.00000002.2623193568.000000000296E000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000006.00000002.2623193568.000000000296E000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000006.00000002.2623193568.000000000296E000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000006.00000002.2623567257.0000000002DDF000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000006.00000002.2623567257.0000000002D91000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000006.00000002.2623567257.0000000002D91000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  Reputation:high
                                  Has exited:false

                                  Reset < >

                                    Execution Graph

                                    Execution Coverage:3.4%
                                    Dynamic/Decrypted Code Coverage:0.4%
                                    Signature Coverage:8.2%
                                    Total number of Nodes:2000
                                    Total number of Limit Nodes:162
                                    execution_graph 97969 671066 97974 67f8cf 97969->97974 97971 67106c 98007 692f80 97971->98007 97975 67f8f0 97974->97975 98010 690143 97975->98010 97979 67f937 98020 6777c7 97979->98020 97982 6777c7 59 API calls 97983 67f94b 97982->97983 97984 6777c7 59 API calls 97983->97984 97985 67f955 97984->97985 97986 6777c7 59 API calls 97985->97986 97987 67f993 97986->97987 97988 6777c7 59 API calls 97987->97988 97989 67fa5e 97988->97989 98025 6860e7 97989->98025 97993 67fa90 97994 6777c7 59 API calls 97993->97994 97995 67fa9a 97994->97995 98053 68ffde 97995->98053 97997 67fae1 97998 67faf1 GetStdHandle 97997->97998 97999 67fb3d 97998->97999 98000 6b49d5 97998->98000 98001 67fb45 OleInitialize 97999->98001 98000->97999 98002 6b49de 98000->98002 98001->97971 98060 6d6dda 64 API calls Mailbox 98002->98060 98004 6b49e5 98061 6d74a9 CreateThread 98004->98061 98006 6b49f1 CloseHandle 98006->98001 98133 692e84 98007->98133 98009 671076 98062 69021c 98010->98062 98013 69021c 59 API calls 98014 690185 98013->98014 98015 6777c7 59 API calls 98014->98015 98016 690191 98015->98016 98069 677d2c 98016->98069 98018 67f8f6 98019 6903a2 6 API calls 98018->98019 98019->97979 98021 690ff6 Mailbox 59 API calls 98020->98021 98022 6777e8 98021->98022 98023 690ff6 Mailbox 59 API calls 98022->98023 98024 6777f6 98023->98024 98024->97982 98026 6777c7 59 API calls 98025->98026 98027 6860f7 98026->98027 98028 6777c7 59 API calls 98027->98028 98029 6860ff 98028->98029 98128 685bfd 98029->98128 98032 685bfd 59 API calls 98033 68610f 98032->98033 98034 6777c7 59 API calls 98033->98034 98035 68611a 98034->98035 98036 690ff6 Mailbox 59 API calls 98035->98036 98037 67fa68 98036->98037 98038 686259 98037->98038 98039 686267 98038->98039 98040 6777c7 59 API calls 98039->98040 98041 686272 98040->98041 98042 6777c7 59 API calls 98041->98042 98043 68627d 98042->98043 98044 6777c7 59 API calls 98043->98044 98045 686288 98044->98045 98046 6777c7 59 API calls 98045->98046 98047 686293 98046->98047 98048 685bfd 59 API calls 98047->98048 98049 68629e 98048->98049 98050 690ff6 Mailbox 59 API calls 98049->98050 98051 6862a5 RegisterWindowMessageW 98050->98051 98051->97993 98054 68ffee 98053->98054 98055 6c5cc3 98053->98055 98057 690ff6 Mailbox 59 API calls 98054->98057 98131 6d9d71 60 API calls 98055->98131 98059 68fff6 98057->98059 98058 6c5cce 98059->97997 98060->98004 98061->98006 98132 6d748f 65 API calls 98061->98132 98063 6777c7 59 API calls 98062->98063 98064 690227 98063->98064 98065 6777c7 59 API calls 98064->98065 98066 69022f 98065->98066 98067 6777c7 59 API calls 98066->98067 98068 69017b 98067->98068 98068->98013 98070 677da5 98069->98070 98071 677d38 __NMSG_WRITE 98069->98071 98082 677e8c 98070->98082 98073 677d73 98071->98073 98074 677d4e 98071->98074 98079 678189 98073->98079 98078 678087 59 API calls Mailbox 98074->98078 98077 677d56 _memmove 98077->98018 98078->98077 98086 690ff6 98079->98086 98081 678193 98081->98077 98083 677ea3 _memmove 98082->98083 98084 677e9a 98082->98084 98083->98077 98084->98083 98124 677faf 98084->98124 98089 690ffe 98086->98089 98088 691018 98088->98081 98089->98088 98091 69101c std::exception::exception 98089->98091 98096 69594c 98089->98096 98113 6935e1 DecodePointer 98089->98113 98114 6987db RaiseException 98091->98114 98093 691046 98115 698711 58 API calls _free 98093->98115 98095 691058 98095->98081 98097 6959c7 98096->98097 98101 695958 98096->98101 98122 6935e1 DecodePointer 98097->98122 98099 6959cd 98123 698d68 58 API calls __getptd_noexit 98099->98123 98100 695963 98100->98101 98116 69a3ab 58 API calls 2 library calls 98100->98116 98117 69a408 58 API calls 7 library calls 98100->98117 98118 6932df GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 98100->98118 98101->98100 98104 69598b RtlAllocateHeap 98101->98104 98107 6959b3 98101->98107 98111 6959b1 98101->98111 98119 6935e1 DecodePointer 98101->98119 98104->98101 98105 6959bf 98104->98105 98105->98089 98120 698d68 58 API calls __getptd_noexit 98107->98120 98121 698d68 58 API calls __getptd_noexit 98111->98121 98113->98089 98114->98093 98115->98095 98116->98100 98117->98100 98119->98101 98120->98111 98121->98105 98122->98099 98123->98105 98125 677fc2 98124->98125 98127 677fbf _memmove 98124->98127 98126 690ff6 Mailbox 59 API calls 98125->98126 98126->98127 98127->98083 98129 6777c7 59 API calls 98128->98129 98130 685c05 98129->98130 98130->98032 98131->98058 98134 692e90 __commit 98133->98134 98141 693457 98134->98141 98140 692eb7 __commit 98140->98009 98158 699e4b 98141->98158 98143 692e99 98144 692ec8 DecodePointer DecodePointer 98143->98144 98145 692ef5 98144->98145 98146 692ea5 98144->98146 98145->98146 98204 6989e4 59 API calls __wtof_l 98145->98204 98155 692ec2 98146->98155 98148 692f58 EncodePointer EncodePointer 98148->98146 98149 692f2c 98149->98146 98153 692f46 EncodePointer 98149->98153 98206 698aa4 61 API calls 2 library calls 98149->98206 98150 692f07 98150->98148 98150->98149 98205 698aa4 61 API calls 2 library calls 98150->98205 98153->98148 98154 692f40 98154->98146 98154->98153 98207 693460 98155->98207 98159 699e5c 98158->98159 98160 699e6f EnterCriticalSection 98158->98160 98165 699ed3 98159->98165 98160->98143 98162 699e62 98162->98160 98189 6932f5 58 API calls 3 library calls 98162->98189 98166 699edf __commit 98165->98166 98167 699ee8 98166->98167 98168 699f00 98166->98168 98190 69a3ab 58 API calls 2 library calls 98167->98190 98176 699f21 __commit 98168->98176 98193 698a5d 58 API calls __malloc_crt 98168->98193 98170 699eed 98191 69a408 58 API calls 7 library calls 98170->98191 98172 699f15 98174 699f2b 98172->98174 98175 699f1c 98172->98175 98179 699e4b __lock 58 API calls 98174->98179 98194 698d68 58 API calls __getptd_noexit 98175->98194 98176->98162 98177 699ef4 98192 6932df GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 98177->98192 98181 699f32 98179->98181 98183 699f3f 98181->98183 98184 699f57 98181->98184 98195 69a06b InitializeCriticalSectionAndSpinCount 98183->98195 98196 692f95 98184->98196 98187 699f4b 98202 699f73 LeaveCriticalSection _doexit 98187->98202 98190->98170 98191->98177 98193->98172 98194->98176 98195->98187 98197 692f9e RtlFreeHeap 98196->98197 98201 692fc7 __dosmaperr 98196->98201 98198 692fb3 98197->98198 98197->98201 98203 698d68 58 API calls __getptd_noexit 98198->98203 98200 692fb9 GetLastError 98200->98201 98201->98187 98202->98176 98203->98200 98204->98150 98205->98149 98206->98154 98210 699fb5 LeaveCriticalSection 98207->98210 98209 692ec7 98209->98140 98210->98209 98211 671016 98216 674ad2 98211->98216 98214 692f80 __cinit 67 API calls 98215 671025 98214->98215 98217 690ff6 Mailbox 59 API calls 98216->98217 98218 674ada 98217->98218 98219 67101b 98218->98219 98223 674a94 98218->98223 98219->98214 98224 674aaf 98223->98224 98225 674a9d 98223->98225 98227 674afe 98224->98227 98226 692f80 __cinit 67 API calls 98225->98226 98226->98224 98228 6777c7 59 API calls 98227->98228 98229 674b16 GetVersionExW 98228->98229 98230 677d2c 59 API calls 98229->98230 98231 674b59 98230->98231 98232 677e8c 59 API calls 98231->98232 98240 674b86 98231->98240 98233 674b7a 98232->98233 98255 677886 98233->98255 98235 674bf1 GetCurrentProcess IsWow64Process 98236 674c0a 98235->98236 98238 674c20 98236->98238 98239 674c89 GetSystemInfo 98236->98239 98237 6adc8d 98251 674c95 98238->98251 98241 674c56 98239->98241 98240->98235 98240->98237 98241->98219 98244 674c32 98247 674c95 2 API calls 98244->98247 98245 674c7d GetSystemInfo 98246 674c47 98245->98246 98246->98241 98248 674c4d FreeLibrary 98246->98248 98249 674c3a GetNativeSystemInfo 98247->98249 98248->98241 98249->98246 98252 674c2e 98251->98252 98253 674c9e LoadLibraryA 98251->98253 98252->98244 98252->98245 98253->98252 98254 674caf GetProcAddress 98253->98254 98254->98252 98256 677894 98255->98256 98257 677e8c 59 API calls 98256->98257 98258 6778a4 98257->98258 98258->98240 98259 671055 98264 672649 98259->98264 98262 692f80 __cinit 67 API calls 98263 671064 98262->98263 98265 6777c7 59 API calls 98264->98265 98266 6726b7 98265->98266 98271 673582 98266->98271 98269 672754 98270 67105a 98269->98270 98274 673416 59 API calls 2 library calls 98269->98274 98270->98262 98275 6735b0 98271->98275 98274->98269 98276 6735a1 98275->98276 98277 6735bd 98275->98277 98276->98269 98277->98276 98278 6735c4 RegOpenKeyExW 98277->98278 98278->98276 98279 6735de RegQueryValueExW 98278->98279 98280 673614 RegCloseKey 98279->98280 98281 6735ff 98279->98281 98280->98276 98281->98280 98282 6b4599 98286 6c655c 98282->98286 98284 6b45a4 98285 6c655c 85 API calls 98284->98285 98285->98284 98292 6c6596 98286->98292 98294 6c6569 98286->98294 98287 6c6598 98325 679488 84 API calls Mailbox 98287->98325 98289 6c659d 98297 679997 98289->98297 98292->98284 98294->98287 98294->98289 98294->98292 98295 6c6590 98294->98295 98324 679700 59 API calls _wcsstr 98295->98324 98298 6799b1 98297->98298 98310 6799ab 98297->98310 98299 6af9fc __i64tow 98298->98299 98300 6799f9 98298->98300 98301 6799b7 __itow 98298->98301 98307 6af903 98298->98307 98330 6938d8 83 API calls 3 library calls 98300->98330 98303 690ff6 Mailbox 59 API calls 98301->98303 98306 6799d1 98303->98306 98305 6af97b Mailbox _wcscpy 98331 6938d8 83 API calls 3 library calls 98305->98331 98306->98310 98326 677f41 98306->98326 98307->98305 98308 690ff6 Mailbox 59 API calls 98307->98308 98311 6af948 98308->98311 98315 677c8e 98310->98315 98312 690ff6 Mailbox 59 API calls 98311->98312 98313 6af96e 98312->98313 98313->98305 98314 677f41 59 API calls 98313->98314 98314->98305 98316 677ca0 98315->98316 98317 6af094 98315->98317 98332 677bb1 98316->98332 98338 6c8123 59 API calls _memmove 98317->98338 98320 6af09e 98339 6781a7 98320->98339 98321 677cac 98321->98292 98323 6af0a6 Mailbox 98324->98292 98325->98289 98327 677f50 __NMSG_WRITE _memmove 98326->98327 98328 690ff6 Mailbox 59 API calls 98327->98328 98329 677f8e 98328->98329 98329->98310 98330->98301 98331->98299 98333 677bbf 98332->98333 98334 677be5 _memmove 98332->98334 98333->98334 98335 690ff6 Mailbox 59 API calls 98333->98335 98334->98321 98336 677c34 98335->98336 98337 690ff6 Mailbox 59 API calls 98336->98337 98337->98334 98338->98320 98340 6781b2 98339->98340 98341 6781ba 98339->98341 98343 6780d7 59 API calls 2 library calls 98340->98343 98341->98323 98343->98341 98344 673633 98345 67366a 98344->98345 98346 6736e7 98345->98346 98347 673688 98345->98347 98381 6736e5 98345->98381 98351 6ad31c 98346->98351 98352 6736ed 98346->98352 98348 673695 98347->98348 98349 67375d PostQuitMessage 98347->98349 98353 6ad38f 98348->98353 98354 6736a0 98348->98354 98386 6736d8 98349->98386 98350 6736ca DefWindowProcW 98350->98386 98394 6811d0 10 API calls Mailbox 98351->98394 98356 673715 SetTimer RegisterWindowMessageW 98352->98356 98357 6736f2 98352->98357 98409 6d2a16 71 API calls _memset 98353->98409 98358 673767 98354->98358 98359 6736a8 98354->98359 98360 67373e CreatePopupMenu 98356->98360 98356->98386 98363 6ad2bf 98357->98363 98364 6736f9 KillTimer 98357->98364 98392 674531 64 API calls _memset 98358->98392 98365 6736b3 98359->98365 98366 6ad374 98359->98366 98360->98386 98362 6ad343 98395 6811f3 331 API calls Mailbox 98362->98395 98370 6ad2f8 MoveWindow 98363->98370 98371 6ad2c4 98363->98371 98389 6744cb Shell_NotifyIconW _memset 98364->98389 98373 67374b 98365->98373 98383 6736be 98365->98383 98366->98350 98408 6c817e 59 API calls Mailbox 98366->98408 98367 6ad3a1 98367->98350 98367->98386 98370->98386 98374 6ad2c8 98371->98374 98375 6ad2e7 SetFocus 98371->98375 98391 6745df 81 API calls _memset 98373->98391 98379 6ad2d1 98374->98379 98374->98383 98375->98386 98376 67370c 98390 673114 DeleteObject DestroyWindow Mailbox 98376->98390 98393 6811d0 10 API calls Mailbox 98379->98393 98381->98350 98382 67375b 98382->98386 98383->98350 98396 6744cb Shell_NotifyIconW _memset 98383->98396 98387 6ad368 98397 6743db 98387->98397 98389->98376 98390->98386 98391->98382 98392->98382 98393->98386 98394->98362 98395->98383 98396->98387 98398 674406 _memset 98397->98398 98410 674213 98398->98410 98402 67448b 98403 6744a5 Shell_NotifyIconW 98402->98403 98404 6744c1 Shell_NotifyIconW 98402->98404 98405 6744b3 98403->98405 98404->98405 98414 67410d 98405->98414 98407 6744ba 98407->98381 98408->98381 98409->98367 98411 674227 98410->98411 98412 6ad638 98410->98412 98411->98402 98436 6d3226 62 API calls _W_store_winword 98411->98436 98412->98411 98413 6ad641 DestroyIcon 98412->98413 98413->98411 98415 674129 98414->98415 98435 674200 Mailbox 98414->98435 98437 677b76 98415->98437 98418 674144 98420 677d2c 59 API calls 98418->98420 98419 6ad5dd LoadStringW 98422 6ad5f7 98419->98422 98421 674159 98420->98421 98421->98422 98423 67416a 98421->98423 98424 677c8e 59 API calls 98422->98424 98425 674205 98423->98425 98426 674174 98423->98426 98427 6ad601 98424->98427 98428 6781a7 59 API calls 98425->98428 98429 677c8e 59 API calls 98426->98429 98432 67417e _memset _wcscpy 98427->98432 98442 677e0b 98427->98442 98428->98432 98429->98432 98431 6ad623 98434 677e0b 59 API calls 98431->98434 98433 6741e6 Shell_NotifyIconW 98432->98433 98433->98435 98434->98432 98435->98407 98436->98402 98438 690ff6 Mailbox 59 API calls 98437->98438 98439 677b9b 98438->98439 98440 678189 59 API calls 98439->98440 98441 674137 98440->98441 98441->98418 98441->98419 98443 677e1f 98442->98443 98444 6af173 98442->98444 98449 677db0 98443->98449 98445 678189 59 API calls 98444->98445 98448 6af17e __NMSG_WRITE _memmove 98445->98448 98447 677e2a 98447->98431 98450 677dbf __NMSG_WRITE 98449->98450 98451 678189 59 API calls 98450->98451 98452 677dd0 _memmove 98450->98452 98453 6af130 _memmove 98451->98453 98452->98447 98454 15f0218 98469 15ede68 98454->98469 98456 15f02d9 98472 15f0108 98456->98472 98471 15ee4f3 98469->98471 98475 15f1308 GetPEB 98469->98475 98471->98456 98473 15f0111 Sleep 98472->98473 98474 15f011f 98473->98474 98475->98471 98476 67107d 98481 6771eb 98476->98481 98478 67108c 98479 692f80 __cinit 67 API calls 98478->98479 98480 671096 98479->98480 98482 6771fb __write_nolock 98481->98482 98483 6777c7 59 API calls 98482->98483 98484 6772b1 98483->98484 98512 674864 98484->98512 98486 6772ba 98519 69074f 98486->98519 98489 677e0b 59 API calls 98490 6772d3 98489->98490 98525 673f84 98490->98525 98493 6777c7 59 API calls 98494 6772eb 98493->98494 98531 677eec 98494->98531 98496 6772f4 RegOpenKeyExW 98497 6aecda RegQueryValueExW 98496->98497 98501 677316 Mailbox 98496->98501 98498 6aed6c RegCloseKey 98497->98498 98499 6aecf7 98497->98499 98498->98501 98510 6aed7e _wcscat Mailbox __NMSG_WRITE 98498->98510 98500 690ff6 Mailbox 59 API calls 98499->98500 98502 6aed10 98500->98502 98501->98478 98535 67538e 98502->98535 98505 6aed38 98506 677d2c 59 API calls 98505->98506 98507 6aed52 98506->98507 98507->98498 98508 677f41 59 API calls 98508->98510 98509 673f84 59 API calls 98509->98510 98510->98501 98510->98508 98510->98509 98511 677b52 59 API calls 98510->98511 98511->98510 98538 6a1b90 98512->98538 98515 677f41 59 API calls 98516 674897 98515->98516 98540 6748ae 98516->98540 98518 6748a1 Mailbox 98518->98486 98520 6a1b90 __write_nolock 98519->98520 98521 69075c GetFullPathNameW 98520->98521 98522 69077e 98521->98522 98523 677d2c 59 API calls 98522->98523 98524 6772c5 98523->98524 98524->98489 98526 673f92 98525->98526 98530 673fb4 _memmove 98525->98530 98528 690ff6 Mailbox 59 API calls 98526->98528 98527 690ff6 Mailbox 59 API calls 98529 673fc8 98527->98529 98528->98530 98529->98493 98530->98527 98532 677f06 98531->98532 98534 677ef9 98531->98534 98533 690ff6 Mailbox 59 API calls 98532->98533 98533->98534 98534->98496 98536 690ff6 Mailbox 59 API calls 98535->98536 98537 6753a0 RegQueryValueExW 98536->98537 98537->98505 98537->98507 98539 674871 GetModuleFileNameW 98538->98539 98539->98515 98541 6a1b90 __write_nolock 98540->98541 98542 6748bb GetFullPathNameW 98541->98542 98543 6748f7 98542->98543 98544 6748da 98542->98544 98546 677eec 59 API calls 98543->98546 98545 677d2c 59 API calls 98544->98545 98547 6748e6 98545->98547 98546->98547 98548 677886 59 API calls 98547->98548 98549 6748f2 98548->98549 98549->98518 98550 697e93 98551 697e9f __commit 98550->98551 98587 69a048 GetStartupInfoW 98551->98587 98554 697ea4 98589 698dbc GetProcessHeap 98554->98589 98555 697efc 98556 697f07 98555->98556 98672 697fe3 58 API calls 3 library calls 98555->98672 98590 699d26 98556->98590 98559 697f18 __RTC_Initialize 98611 69d812 98559->98611 98560 697f0d 98560->98559 98673 697fe3 58 API calls 3 library calls 98560->98673 98563 697f27 98564 697f33 GetCommandLineW 98563->98564 98674 697fe3 58 API calls 3 library calls 98563->98674 98630 6a5173 GetEnvironmentStringsW 98564->98630 98567 697f32 98567->98564 98570 697f4d 98571 697f58 98570->98571 98675 6932f5 58 API calls 3 library calls 98570->98675 98640 6a4fa8 98571->98640 98574 697f5e 98575 697f69 98574->98575 98676 6932f5 58 API calls 3 library calls 98574->98676 98654 69332f 98575->98654 98578 697f71 98579 697f7c __wwincmdln 98578->98579 98677 6932f5 58 API calls 3 library calls 98578->98677 98660 67492e 98579->98660 98582 697f90 98583 697f9f 98582->98583 98678 693598 58 API calls _doexit 98582->98678 98679 693320 58 API calls _doexit 98583->98679 98586 697fa4 __commit 98588 69a05e 98587->98588 98588->98554 98589->98555 98680 6933c7 36 API calls 2 library calls 98590->98680 98592 699d2b 98681 699f7c InitializeCriticalSectionAndSpinCount ___lock_fhandle 98592->98681 98594 699d30 98595 699d34 98594->98595 98683 699fca TlsAlloc 98594->98683 98682 699d9c 61 API calls 2 library calls 98595->98682 98598 699d46 98598->98595 98600 699d51 98598->98600 98599 699d39 98599->98560 98684 698a15 98600->98684 98603 699d93 98692 699d9c 61 API calls 2 library calls 98603->98692 98606 699d72 98606->98603 98608 699d78 98606->98608 98607 699d98 98607->98560 98691 699c73 58 API calls 4 library calls 98608->98691 98610 699d80 GetCurrentThreadId 98610->98560 98612 69d81e __commit 98611->98612 98613 699e4b __lock 58 API calls 98612->98613 98614 69d825 98613->98614 98615 698a15 __calloc_crt 58 API calls 98614->98615 98616 69d836 98615->98616 98617 69d8a1 GetStartupInfoW 98616->98617 98618 69d841 __commit @_EH4_CallFilterFunc@8 98616->98618 98623 69d8b6 98617->98623 98625 69d9e5 98617->98625 98618->98563 98619 69daad 98706 69dabd LeaveCriticalSection _doexit 98619->98706 98621 698a15 __calloc_crt 58 API calls 98621->98623 98622 69da32 GetStdHandle 98622->98625 98623->98621 98623->98625 98627 69d904 98623->98627 98624 69da45 GetFileType 98624->98625 98625->98619 98625->98622 98625->98624 98705 69a06b InitializeCriticalSectionAndSpinCount 98625->98705 98626 69d938 GetFileType 98626->98627 98627->98625 98627->98626 98704 69a06b InitializeCriticalSectionAndSpinCount 98627->98704 98631 697f43 98630->98631 98632 6a5184 98630->98632 98636 6a4d6b GetModuleFileNameW 98631->98636 98707 698a5d 58 API calls __malloc_crt 98632->98707 98634 6a51aa _memmove 98635 6a51c0 FreeEnvironmentStringsW 98634->98635 98635->98631 98637 6a4d9f _wparse_cmdline 98636->98637 98639 6a4ddf _wparse_cmdline 98637->98639 98708 698a5d 58 API calls __malloc_crt 98637->98708 98639->98570 98641 6a4fc1 __NMSG_WRITE 98640->98641 98645 6a4fb9 98640->98645 98642 698a15 __calloc_crt 58 API calls 98641->98642 98650 6a4fea __NMSG_WRITE 98642->98650 98643 6a5041 98644 692f95 _free 58 API calls 98643->98644 98644->98645 98645->98574 98646 698a15 __calloc_crt 58 API calls 98646->98650 98647 6a5066 98649 692f95 _free 58 API calls 98647->98649 98649->98645 98650->98643 98650->98645 98650->98646 98650->98647 98651 6a507d 98650->98651 98709 6a4857 58 API calls __wtof_l 98650->98709 98710 699006 IsProcessorFeaturePresent 98651->98710 98653 6a5089 98653->98574 98656 69333b __IsNonwritableInCurrentImage 98654->98656 98733 69a711 98656->98733 98657 693359 __initterm_e 98658 692f80 __cinit 67 API calls 98657->98658 98659 693378 _doexit __IsNonwritableInCurrentImage 98657->98659 98658->98659 98659->98578 98661 674948 98660->98661 98671 6749e7 98660->98671 98662 674982 IsThemeActive 98661->98662 98736 6935ac 98662->98736 98666 6749ae 98748 674a5b SystemParametersInfoW SystemParametersInfoW 98666->98748 98668 6749ba 98749 673b4c 98668->98749 98670 6749c2 SystemParametersInfoW 98670->98671 98671->98582 98672->98556 98673->98559 98674->98567 98678->98583 98679->98586 98680->98592 98681->98594 98682->98599 98683->98598 98685 698a1c 98684->98685 98687 698a57 98685->98687 98689 698a3a 98685->98689 98693 6a5446 98685->98693 98687->98603 98690 69a026 TlsSetValue 98687->98690 98689->98685 98689->98687 98701 69a372 Sleep 98689->98701 98690->98606 98691->98610 98692->98607 98694 6a546c 98693->98694 98695 6a5451 98693->98695 98697 6a547c HeapAlloc 98694->98697 98699 6a5462 98694->98699 98703 6935e1 DecodePointer 98694->98703 98695->98694 98696 6a545d 98695->98696 98702 698d68 58 API calls __getptd_noexit 98696->98702 98697->98694 98697->98699 98699->98685 98701->98689 98702->98699 98703->98694 98704->98627 98705->98625 98706->98618 98707->98634 98708->98639 98709->98650 98711 699011 98710->98711 98716 698e99 98711->98716 98715 69902c 98715->98653 98717 698eb3 _memset ___raise_securityfailure 98716->98717 98718 698ed3 IsDebuggerPresent 98717->98718 98724 69a395 SetUnhandledExceptionFilter UnhandledExceptionFilter 98718->98724 98721 698f97 ___raise_securityfailure 98725 69c836 98721->98725 98722 698fba 98723 69a380 GetCurrentProcess TerminateProcess 98722->98723 98723->98715 98724->98721 98726 69c83e 98725->98726 98727 69c840 IsProcessorFeaturePresent 98725->98727 98726->98722 98729 6a5b5a 98727->98729 98732 6a5b09 5 API calls 2 library calls 98729->98732 98731 6a5c3d 98731->98722 98732->98731 98734 69a714 EncodePointer 98733->98734 98734->98734 98735 69a72e 98734->98735 98735->98657 98737 699e4b __lock 58 API calls 98736->98737 98738 6935b7 DecodePointer EncodePointer 98737->98738 98801 699fb5 LeaveCriticalSection 98738->98801 98740 6749a7 98741 693614 98740->98741 98742 693638 98741->98742 98743 69361e 98741->98743 98742->98666 98743->98742 98802 698d68 58 API calls __getptd_noexit 98743->98802 98745 693628 98803 698ff6 9 API calls __wtof_l 98745->98803 98747 693633 98747->98666 98748->98668 98750 673b59 __write_nolock 98749->98750 98751 6777c7 59 API calls 98750->98751 98752 673b63 GetCurrentDirectoryW 98751->98752 98804 673778 98752->98804 98754 673b8c IsDebuggerPresent 98755 6ad4ad MessageBoxA 98754->98755 98756 673b9a 98754->98756 98757 6ad4c7 98755->98757 98756->98757 98758 673bb7 98756->98758 98787 673c73 98756->98787 99003 677373 59 API calls Mailbox 98757->99003 98885 6773e5 98758->98885 98759 673c7a SetCurrentDirectoryW 98762 673c87 Mailbox 98759->98762 98762->98670 98763 6ad4d7 98768 6ad4ed SetCurrentDirectoryW 98763->98768 98765 673bd5 GetFullPathNameW 98766 677d2c 59 API calls 98765->98766 98767 673c10 98766->98767 98901 680a8d 98767->98901 98768->98762 98771 673c2e 98772 673c38 98771->98772 99004 6d4c03 AllocateAndInitializeSid CheckTokenMembership FreeSid 98771->99004 98917 673a58 GetSysColorBrush LoadCursorW LoadIconW LoadIconW LoadIconW 98772->98917 98775 6ad50a 98775->98772 98778 6ad51b 98775->98778 98780 674864 61 API calls 98778->98780 98779 673c42 98781 673c55 98779->98781 98782 6743db 68 API calls 98779->98782 98784 6ad523 98780->98784 98925 680b30 98781->98925 98782->98781 98786 677f41 59 API calls 98784->98786 98785 673c60 98785->98787 99002 6744cb Shell_NotifyIconW _memset 98785->99002 98788 6ad530 98786->98788 98787->98759 98789 6ad53a 98788->98789 98790 6ad55f 98788->98790 98792 677e0b 59 API calls 98789->98792 98793 677e0b 59 API calls 98790->98793 98794 6ad545 98792->98794 98795 6ad55b GetForegroundWindow ShellExecuteW 98793->98795 98796 677c8e 59 API calls 98794->98796 98799 6ad58f Mailbox 98795->98799 98798 6ad552 98796->98798 98800 677e0b 59 API calls 98798->98800 98799->98787 98800->98795 98801->98740 98802->98745 98803->98747 98805 6777c7 59 API calls 98804->98805 98806 67378e 98805->98806 99005 673d43 98806->99005 98808 6737ac 98809 674864 61 API calls 98808->98809 98810 6737c0 98809->98810 98811 677f41 59 API calls 98810->98811 98812 6737cd 98811->98812 99019 674f3d 98812->99019 98815 6ad3ae 99086 6d97e5 98815->99086 98816 6737ee Mailbox 98820 6781a7 59 API calls 98816->98820 98819 6ad3cd 98822 692f95 _free 58 API calls 98819->98822 98823 673801 98820->98823 98824 6ad3da 98822->98824 99043 6793ea 98823->99043 98826 674faa 84 API calls 98824->98826 98828 6ad3e3 98826->98828 98832 673ee2 59 API calls 98828->98832 98829 677f41 59 API calls 98830 67381a 98829->98830 99046 678620 98830->99046 98834 6ad3fe 98832->98834 98833 67382c Mailbox 98835 677f41 59 API calls 98833->98835 98836 673ee2 59 API calls 98834->98836 98837 673852 98835->98837 98838 6ad41a 98836->98838 98839 678620 69 API calls 98837->98839 98840 674864 61 API calls 98838->98840 98842 673861 Mailbox 98839->98842 98841 6ad43f 98840->98841 98843 673ee2 59 API calls 98841->98843 98845 6777c7 59 API calls 98842->98845 98844 6ad44b 98843->98844 98846 6781a7 59 API calls 98844->98846 98847 67387f 98845->98847 98848 6ad459 98846->98848 99050 673ee2 98847->99050 98850 673ee2 59 API calls 98848->98850 98852 6ad468 98850->98852 98858 6781a7 59 API calls 98852->98858 98854 673899 98854->98828 98855 6738a3 98854->98855 98856 69313d _W_store_winword 60 API calls 98855->98856 98857 6738ae 98856->98857 98857->98834 98859 6738b8 98857->98859 98860 6ad48a 98858->98860 98861 69313d _W_store_winword 60 API calls 98859->98861 98862 673ee2 59 API calls 98860->98862 98863 6738c3 98861->98863 98864 6ad497 98862->98864 98863->98838 98865 6738cd 98863->98865 98864->98864 98866 69313d _W_store_winword 60 API calls 98865->98866 98867 6738d8 98866->98867 98867->98852 98868 673919 98867->98868 98870 673ee2 59 API calls 98867->98870 98868->98852 98869 673926 98868->98869 99066 67942e 98869->99066 98872 6738fc 98870->98872 98874 6781a7 59 API calls 98872->98874 98876 67390a 98874->98876 98878 673ee2 59 API calls 98876->98878 98878->98868 98880 6793ea 59 API calls 98882 673961 98880->98882 98881 679040 60 API calls 98881->98882 98882->98880 98882->98881 98883 673ee2 59 API calls 98882->98883 98884 6739a7 Mailbox 98882->98884 98883->98882 98884->98754 98886 6773f2 __write_nolock 98885->98886 98887 6aee4b _memset 98886->98887 98888 67740b 98886->98888 98890 6aee67 GetOpenFileNameW 98887->98890 98889 6748ae 60 API calls 98888->98889 98891 677414 98889->98891 98892 6aeeb6 98890->98892 99716 6909d5 98891->99716 98894 677d2c 59 API calls 98892->98894 98896 6aeecb 98894->98896 98896->98896 98898 677429 99734 6769ca 98898->99734 98902 680a9a __write_nolock 98901->98902 99986 676ee0 98902->99986 98904 680a9f 98916 673c26 98904->98916 99997 6812fe 89 API calls 98904->99997 98906 680aac 98906->98916 99998 684047 91 API calls Mailbox 98906->99998 98908 680ab5 98909 680ab9 GetFullPathNameW 98908->98909 98908->98916 98910 677d2c 59 API calls 98909->98910 98911 680ae5 98910->98911 98912 677d2c 59 API calls 98911->98912 98913 680af2 98912->98913 98914 6b50d5 _wcscat 98913->98914 98915 677d2c 59 API calls 98913->98915 98915->98916 98916->98763 98916->98771 98918 673ac2 LoadImageW RegisterClassExW 98917->98918 98919 6ad49c 98917->98919 100032 673041 7 API calls 98918->100032 100033 6748fe LoadImageW EnumResourceNamesW 98919->100033 98922 673b46 98924 6739e7 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 98922->98924 98923 6ad4a5 98924->98779 98926 6b50ed 98925->98926 98937 680b55 98925->98937 100090 6da0b5 89 API calls 4 library calls 98926->100090 98928 680e5a 98928->98785 98930 681044 98930->98928 98932 681051 98930->98932 100088 6811f3 331 API calls Mailbox 98932->100088 98933 680bab PeekMessageW 99001 680b65 Mailbox 98933->99001 98935 681058 LockWindowUpdate DestroyWindow GetMessageW 98935->98928 98939 68108a 98935->98939 98937->99001 100091 679fbd 60 API calls 98937->100091 100092 6c68bf 331 API calls 98937->100092 98938 6b52ab Sleep 98938->99001 98942 6b6082 TranslateMessage DispatchMessageW GetMessageW 98939->98942 98940 680e44 98940->98928 100087 6811d0 10 API calls Mailbox 98940->100087 98942->98942 98943 6b60b2 98942->98943 98943->98928 98944 680fbf TranslateMessage DispatchMessageW 98945 680fa3 PeekMessageW 98944->98945 98945->99001 98946 6b517a TranslateAcceleratorW 98946->98945 98946->99001 98947 690ff6 59 API calls Mailbox 98947->99001 98948 680e73 timeGetTime 98948->99001 98949 6b5c49 WaitForSingleObject 98951 6b5c66 GetExitCodeProcess CloseHandle 98949->98951 98949->99001 98984 6810f5 98951->98984 98952 680fdd Sleep 98986 680fee Mailbox 98952->98986 98953 6781a7 59 API calls 98953->99001 98954 6777c7 59 API calls 98954->98986 98956 6b5f22 Sleep 98956->98986 98957 67b89c 304 API calls 98957->99001 98959 690719 timeGetTime 98959->98986 98960 6810ae timeGetTime 100089 679fbd 60 API calls 98960->100089 98963 6b5fb9 GetExitCodeProcess 98965 6b5fcf WaitForSingleObject 98963->98965 98966 6b5fe5 CloseHandle 98963->98966 98964 679997 84 API calls 98964->99001 98965->98966 98965->99001 98966->98986 98969 6f61ac 110 API calls 98969->98986 98970 67b93d 109 API calls 98970->98986 98971 679fbd 60 API calls 98971->99001 98972 6b5c9e 98972->98984 98973 6b6041 Sleep 98973->99001 98974 6b54a2 Sleep 98974->99001 98976 677f41 59 API calls 98976->98986 98984->98785 98986->98954 98986->98959 98986->98963 98986->98969 98986->98970 98986->98972 98986->98973 98986->98974 98986->98976 98986->98984 98986->99001 100099 6d28f7 60 API calls 98986->100099 100100 679fbd 60 API calls 98986->100100 100101 678b13 69 API calls Mailbox 98986->100101 100102 67b89c 331 API calls 98986->100102 100103 6c6a50 60 API calls 98986->100103 100104 6d54e6 QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 98986->100104 100105 6d3e91 66 API calls Mailbox 98986->100105 98987 6da0b5 89 API calls 98987->99001 98989 679df0 59 API calls Mailbox 98989->99001 98990 67a000 304 API calls 98990->99001 98991 678620 69 API calls 98991->99001 98993 6c66f4 59 API calls Mailbox 98993->99001 98994 6b59ff VariantClear 98994->99001 98995 6b5a95 VariantClear 98995->99001 98996 678e34 59 API calls Mailbox 98996->99001 98997 6b5843 VariantClear 98997->99001 98998 6c7405 59 API calls 98998->99001 98999 677f41 59 API calls 98999->99001 99000 678b13 69 API calls 99000->99001 99001->98933 99001->98938 99001->98940 99001->98944 99001->98945 99001->98946 99001->98947 99001->98948 99001->98949 99001->98952 99001->98953 99001->98956 99001->98957 99001->98960 99001->98964 99001->98971 99001->98984 99001->98986 99001->98987 99001->98989 99001->98990 99001->98991 99001->98993 99001->98994 99001->98995 99001->98996 99001->98997 99001->98998 99001->98999 99001->99000 100034 67e800 99001->100034 100065 67f5c0 99001->100065 100084 67e580 331 API calls 99001->100084 100085 67fe40 331 API calls 2 library calls 99001->100085 100086 6731ce IsDialogMessageW GetClassLongW 99001->100086 100093 6f629f 59 API calls 99001->100093 100094 6d9c9f 59 API calls Mailbox 99001->100094 100095 6cd9e3 59 API calls 99001->100095 100096 6c6665 59 API calls 2 library calls 99001->100096 100097 678561 59 API calls 99001->100097 100098 67843f 59 API calls Mailbox 99001->100098 99002->98787 99003->98763 99004->98775 99006 673d50 __write_nolock 99005->99006 99007 677d2c 59 API calls 99006->99007 99012 673eb6 Mailbox 99006->99012 99009 673d82 99007->99009 99017 673db8 Mailbox 99009->99017 99127 677b52 99009->99127 99010 677b52 59 API calls 99010->99017 99011 673e89 99011->99012 99013 677f41 59 API calls 99011->99013 99012->98808 99015 673eaa 99013->99015 99014 677f41 59 API calls 99014->99017 99016 673f84 59 API calls 99015->99016 99016->99012 99017->99010 99017->99011 99017->99012 99017->99014 99018 673f84 59 API calls 99017->99018 99018->99017 99130 674d13 99019->99130 99024 6add0f 99027 674faa 84 API calls 99024->99027 99025 674f68 LoadLibraryExW 99140 674cc8 99025->99140 99029 6add16 99027->99029 99031 674cc8 3 API calls 99029->99031 99033 6add1e 99031->99033 99032 674f8f 99032->99033 99034 674f9b 99032->99034 99166 67506b 99033->99166 99035 674faa 84 API calls 99034->99035 99037 6737e6 99035->99037 99037->98815 99037->98816 99040 6add45 99174 675027 99040->99174 99042 6add52 99044 690ff6 Mailbox 59 API calls 99043->99044 99045 67380d 99044->99045 99045->98829 99047 67862b 99046->99047 99048 678652 99047->99048 99425 678b13 69 API calls Mailbox 99047->99425 99048->98833 99051 673f05 99050->99051 99052 673eec 99050->99052 99054 677d2c 59 API calls 99051->99054 99053 6781a7 59 API calls 99052->99053 99055 67388b 99053->99055 99054->99055 99056 69313d 99055->99056 99057 693149 99056->99057 99058 6931be 99056->99058 99060 69316e 99057->99060 99426 698d68 58 API calls __getptd_noexit 99057->99426 99428 6931d0 60 API calls 3 library calls 99058->99428 99060->98854 99062 6931cb 99062->98854 99063 693155 99427 698ff6 9 API calls __wtof_l 99063->99427 99065 693160 99065->98854 99067 679436 99066->99067 99068 690ff6 Mailbox 59 API calls 99067->99068 99069 679444 99068->99069 99070 673936 99069->99070 99429 67935c 59 API calls Mailbox 99069->99429 99072 6791b0 99070->99072 99430 6792c0 99072->99430 99074 690ff6 Mailbox 59 API calls 99076 673944 99074->99076 99075 6791bf 99075->99074 99075->99076 99077 679040 99076->99077 99078 6af5a5 99077->99078 99081 679057 99077->99081 99078->99081 99440 678d3b 59 API calls Mailbox 99078->99440 99080 67915f 99080->98882 99081->99080 99082 6791a0 99081->99082 99083 679158 99081->99083 99439 679e9c 60 API calls Mailbox 99082->99439 99085 690ff6 Mailbox 59 API calls 99083->99085 99085->99080 99087 675045 85 API calls 99086->99087 99088 6d9854 99087->99088 99441 6d99be 99088->99441 99091 67506b 74 API calls 99092 6d9881 99091->99092 99093 67506b 74 API calls 99092->99093 99094 6d9891 99093->99094 99095 67506b 74 API calls 99094->99095 99096 6d98ac 99095->99096 99097 67506b 74 API calls 99096->99097 99098 6d98c7 99097->99098 99099 675045 85 API calls 99098->99099 99100 6d98de 99099->99100 99101 69594c __malloc_crt 58 API calls 99100->99101 99102 6d98e5 99101->99102 99103 69594c __malloc_crt 58 API calls 99102->99103 99104 6d98ef 99103->99104 99105 67506b 74 API calls 99104->99105 99106 6d9903 99105->99106 99107 6d9393 GetSystemTimeAsFileTime 99106->99107 99108 6d9916 99107->99108 99109 6d992b 99108->99109 99110 6d9940 99108->99110 99113 692f95 _free 58 API calls 99109->99113 99111 6d99a5 99110->99111 99112 6d9946 99110->99112 99115 692f95 _free 58 API calls 99111->99115 99447 6d8d90 99112->99447 99116 6d9931 99113->99116 99118 6ad3c1 99115->99118 99119 692f95 _free 58 API calls 99116->99119 99118->98819 99121 674faa 99118->99121 99119->99118 99120 692f95 _free 58 API calls 99120->99118 99122 674fb4 99121->99122 99124 674fbb 99121->99124 99123 6955d6 __fcloseall 83 API calls 99122->99123 99123->99124 99125 674fdb FreeLibrary 99124->99125 99126 674fca 99124->99126 99125->99126 99126->98819 99128 677faf 59 API calls 99127->99128 99129 677b5d 99128->99129 99129->99009 99179 674d61 99130->99179 99133 674d3a 99134 674d53 99133->99134 99135 674d4a FreeLibrary 99133->99135 99137 69548b 99134->99137 99135->99134 99136 674d61 2 API calls 99136->99133 99183 6954a0 99137->99183 99139 674f5c 99139->99024 99139->99025 99343 674d94 99140->99343 99143 674ced 99145 674cff FreeLibrary 99143->99145 99146 674d08 99143->99146 99144 674d94 2 API calls 99144->99143 99145->99146 99147 674dd0 99146->99147 99148 690ff6 Mailbox 59 API calls 99147->99148 99149 674de5 99148->99149 99150 67538e 59 API calls 99149->99150 99151 674df1 _memmove 99150->99151 99152 674e2c 99151->99152 99153 674f21 99151->99153 99154 674ee9 99151->99154 99155 675027 69 API calls 99152->99155 99358 6d9ba5 95 API calls 99153->99358 99347 674fe9 CreateStreamOnHGlobal 99154->99347 99159 674e35 99155->99159 99158 67506b 74 API calls 99158->99159 99159->99158 99160 674ec9 99159->99160 99162 6adcd0 99159->99162 99353 675045 99159->99353 99160->99032 99163 675045 85 API calls 99162->99163 99164 6adce4 99163->99164 99165 67506b 74 API calls 99164->99165 99165->99160 99167 67507d 99166->99167 99169 6addf6 99166->99169 99382 695812 99167->99382 99171 6d9393 99402 6d91e9 99171->99402 99173 6d93a9 99173->99040 99175 675036 99174->99175 99176 6addb9 99174->99176 99407 695e90 99175->99407 99178 67503e 99178->99042 99180 674d2e 99179->99180 99181 674d6a LoadLibraryA 99179->99181 99180->99133 99180->99136 99181->99180 99182 674d7b GetProcAddress 99181->99182 99182->99180 99186 6954ac __commit 99183->99186 99184 6954bf 99232 698d68 58 API calls __getptd_noexit 99184->99232 99186->99184 99188 6954f0 99186->99188 99187 6954c4 99233 698ff6 9 API calls __wtof_l 99187->99233 99202 6a0738 99188->99202 99191 6954f5 99192 69550b 99191->99192 99193 6954fe 99191->99193 99195 695535 99192->99195 99196 695515 99192->99196 99234 698d68 58 API calls __getptd_noexit 99193->99234 99217 6a0857 99195->99217 99235 698d68 58 API calls __getptd_noexit 99196->99235 99201 6954cf __commit @_EH4_CallFilterFunc@8 99201->99139 99203 6a0744 __commit 99202->99203 99204 699e4b __lock 58 API calls 99203->99204 99214 6a0752 99204->99214 99205 6a07c6 99237 6a084e 99205->99237 99206 6a07cd 99242 698a5d 58 API calls __malloc_crt 99206->99242 99209 6a0843 __commit 99209->99191 99210 6a07d4 99210->99205 99243 69a06b InitializeCriticalSectionAndSpinCount 99210->99243 99213 699ed3 __mtinitlocknum 58 API calls 99213->99214 99214->99205 99214->99206 99214->99213 99240 696e8d 59 API calls __lock 99214->99240 99241 696ef7 LeaveCriticalSection LeaveCriticalSection _doexit 99214->99241 99215 6a07fa EnterCriticalSection 99215->99205 99225 6a0877 __wopenfile 99217->99225 99218 6a0891 99248 698d68 58 API calls __getptd_noexit 99218->99248 99220 6a0896 99249 698ff6 9 API calls __wtof_l 99220->99249 99222 695540 99236 695562 LeaveCriticalSection LeaveCriticalSection _fseek 99222->99236 99223 6a0aaf 99245 6a87f1 99223->99245 99225->99218 99231 6a0a4c 99225->99231 99250 693a0b 60 API calls 2 library calls 99225->99250 99227 6a0a45 99227->99231 99251 693a0b 60 API calls 2 library calls 99227->99251 99229 6a0a64 99229->99231 99252 693a0b 60 API calls 2 library calls 99229->99252 99231->99218 99231->99223 99232->99187 99233->99201 99234->99201 99235->99201 99236->99201 99244 699fb5 LeaveCriticalSection 99237->99244 99239 6a0855 99239->99209 99240->99214 99241->99214 99242->99210 99243->99215 99244->99239 99253 6a7fd5 99245->99253 99247 6a880a 99247->99222 99248->99220 99249->99222 99250->99227 99251->99229 99252->99231 99256 6a7fe1 __commit 99253->99256 99254 6a7ff7 99340 698d68 58 API calls __getptd_noexit 99254->99340 99256->99254 99258 6a802d 99256->99258 99257 6a7ffc 99341 698ff6 9 API calls __wtof_l 99257->99341 99264 6a809e 99258->99264 99261 6a8049 99342 6a8072 LeaveCriticalSection __unlock_fhandle 99261->99342 99263 6a8006 __commit 99263->99247 99265 6a80be 99264->99265 99266 69471a __wsopen_nolock 58 API calls 99265->99266 99270 6a80da 99266->99270 99267 6a8211 99268 699006 __invoke_watson 8 API calls 99267->99268 99269 6a87f0 99268->99269 99272 6a7fd5 __wsopen_helper 103 API calls 99269->99272 99270->99267 99271 6a8114 99270->99271 99279 6a8137 99270->99279 99273 698d34 __commit 58 API calls 99271->99273 99274 6a880a 99272->99274 99275 6a8119 99273->99275 99274->99261 99276 698d68 __wtof_l 58 API calls 99275->99276 99277 6a8126 99276->99277 99280 698ff6 __wtof_l 9 API calls 99277->99280 99278 6a81f5 99281 698d34 __commit 58 API calls 99278->99281 99279->99278 99286 6a81d3 99279->99286 99282 6a8130 99280->99282 99283 6a81fa 99281->99283 99282->99261 99284 698d68 __wtof_l 58 API calls 99283->99284 99285 6a8207 99284->99285 99287 698ff6 __wtof_l 9 API calls 99285->99287 99288 69d4d4 __alloc_osfhnd 61 API calls 99286->99288 99287->99267 99289 6a82a1 99288->99289 99290 6a82ab 99289->99290 99291 6a82ce 99289->99291 99292 698d34 __commit 58 API calls 99290->99292 99293 6a7f4d ___createFile GetModuleHandleW GetProcAddress CreateFileW 99291->99293 99294 6a82b0 99292->99294 99304 6a82f0 99293->99304 99295 698d68 __wtof_l 58 API calls 99294->99295 99297 6a82ba 99295->99297 99296 6a836e GetFileType 99298 6a83bb 99296->99298 99299 6a8379 GetLastError 99296->99299 99302 698d68 __wtof_l 58 API calls 99297->99302 99308 69d76a __set_osfhnd 59 API calls 99298->99308 99303 698d47 __dosmaperr 58 API calls 99299->99303 99300 6a833c GetLastError 99301 698d47 __dosmaperr 58 API calls 99300->99301 99305 6a8361 99301->99305 99302->99282 99306 6a83a0 CloseHandle 99303->99306 99304->99296 99304->99300 99307 6a7f4d ___createFile GetModuleHandleW GetProcAddress CreateFileW 99304->99307 99311 698d68 __wtof_l 58 API calls 99305->99311 99306->99305 99309 6a83ae 99306->99309 99310 6a8331 99307->99310 99315 6a83d9 99308->99315 99312 698d68 __wtof_l 58 API calls 99309->99312 99310->99296 99310->99300 99311->99267 99313 6a83b3 99312->99313 99313->99305 99314 6a8594 99314->99267 99317 6a8767 CloseHandle 99314->99317 99315->99314 99316 6a1b11 __lseeki64_nolock 60 API calls 99315->99316 99328 6a845a 99315->99328 99318 6a8443 99316->99318 99319 6a7f4d ___createFile GetModuleHandleW GetProcAddress CreateFileW 99317->99319 99321 698d34 __commit 58 API calls 99318->99321 99323 6a8462 99318->99323 99320 6a878e 99319->99320 99322 6a8796 GetLastError 99320->99322 99331 6a861e 99320->99331 99321->99328 99324 698d47 __dosmaperr 58 API calls 99322->99324 99326 6a0d2d __close_nolock 61 API calls 99323->99326 99327 6a10ab 70 API calls __read_nolock 99323->99327 99323->99328 99329 6a99f2 __chsize_nolock 82 API calls 99323->99329 99333 6a8611 99323->99333 99334 6a85fa 99323->99334 99338 6a1b11 60 API calls __lseeki64_nolock 99323->99338 99325 6a87a2 99324->99325 99330 69d67d __free_osfhnd 59 API calls 99325->99330 99326->99323 99327->99323 99328->99314 99328->99323 99332 69dac6 __write 78 API calls 99328->99332 99335 6a1b11 60 API calls __lseeki64_nolock 99328->99335 99329->99323 99330->99331 99331->99267 99332->99328 99336 6a0d2d __close_nolock 61 API calls 99333->99336 99334->99314 99335->99328 99337 6a8618 99336->99337 99339 698d68 __wtof_l 58 API calls 99337->99339 99338->99323 99339->99331 99340->99257 99341->99263 99342->99263 99344 674ce1 99343->99344 99345 674d9d LoadLibraryA 99343->99345 99344->99143 99344->99144 99345->99344 99346 674dae GetProcAddress 99345->99346 99346->99344 99348 675003 FindResourceExW 99347->99348 99349 675020 99347->99349 99348->99349 99350 6add5c LoadResource 99348->99350 99349->99152 99350->99349 99351 6add71 SizeofResource 99350->99351 99351->99349 99352 6add85 LockResource 99351->99352 99352->99349 99354 675054 99353->99354 99355 6addd4 99353->99355 99359 695a7d 99354->99359 99357 675062 99357->99159 99358->99152 99360 695a89 __commit 99359->99360 99361 695a9b 99360->99361 99363 695ac1 99360->99363 99372 698d68 58 API calls __getptd_noexit 99361->99372 99374 696e4e 99363->99374 99364 695aa0 99373 698ff6 9 API calls __wtof_l 99364->99373 99367 695ac7 99380 6959ee 83 API calls 5 library calls 99367->99380 99369 695ad6 99381 695af8 LeaveCriticalSection LeaveCriticalSection _fseek 99369->99381 99371 695aab __commit 99371->99357 99372->99364 99373->99371 99375 696e5e 99374->99375 99376 696e80 EnterCriticalSection 99374->99376 99375->99376 99377 696e66 99375->99377 99379 696e76 99376->99379 99378 699e4b __lock 58 API calls 99377->99378 99378->99379 99379->99367 99380->99369 99381->99371 99385 69582d 99382->99385 99384 67508e 99384->99171 99386 695839 __commit 99385->99386 99387 69587c 99386->99387 99388 69584f _memset 99386->99388 99397 695874 __commit 99386->99397 99389 696e4e __lock_file 59 API calls 99387->99389 99398 698d68 58 API calls __getptd_noexit 99388->99398 99391 695882 99389->99391 99400 69564d 72 API calls 6 library calls 99391->99400 99392 695869 99399 698ff6 9 API calls __wtof_l 99392->99399 99395 695898 99401 6958b6 LeaveCriticalSection LeaveCriticalSection _fseek 99395->99401 99397->99384 99398->99392 99399->99397 99400->99395 99401->99397 99405 69543a GetSystemTimeAsFileTime 99402->99405 99404 6d91f8 99404->99173 99406 695468 __aulldiv 99405->99406 99406->99404 99408 695e9c __commit 99407->99408 99409 695eae 99408->99409 99410 695ec3 99408->99410 99421 698d68 58 API calls __getptd_noexit 99409->99421 99412 696e4e __lock_file 59 API calls 99410->99412 99414 695ec9 99412->99414 99413 695eb3 99422 698ff6 9 API calls __wtof_l 99413->99422 99423 695b00 67 API calls 5 library calls 99414->99423 99417 695ed4 99424 695ef4 LeaveCriticalSection LeaveCriticalSection _fseek 99417->99424 99419 695ee6 99420 695ebe __commit 99419->99420 99420->99178 99421->99413 99422->99420 99423->99417 99424->99419 99425->99048 99426->99063 99427->99065 99428->99062 99429->99070 99431 6792c9 Mailbox 99430->99431 99432 6af5c8 99431->99432 99437 6792d3 99431->99437 99433 690ff6 Mailbox 59 API calls 99432->99433 99435 6af5d4 99433->99435 99434 6792da 99434->99075 99437->99434 99438 679df0 59 API calls Mailbox 99437->99438 99438->99437 99439->99080 99440->99081 99446 6d99d2 __tzset_nolock _wcscmp 99441->99446 99442 67506b 74 API calls 99442->99446 99443 6d9866 99443->99091 99443->99118 99444 6d9393 GetSystemTimeAsFileTime 99444->99446 99445 675045 85 API calls 99445->99446 99446->99442 99446->99443 99446->99444 99446->99445 99448 6d8d9b 99447->99448 99449 6d8da9 99447->99449 99450 69548b 115 API calls 99448->99450 99451 6d8dee 99449->99451 99452 69548b 115 API calls 99449->99452 99477 6d8db2 99449->99477 99450->99449 99478 6d901b 74 API calls 3 library calls 99451->99478 99454 6d8dd3 99452->99454 99454->99451 99457 6d8ddc 99454->99457 99455 6d8e32 99456 6d8e57 99455->99456 99460 6d8e36 99455->99460 99479 6d8c33 58 API calls __malloc_crt 99456->99479 99457->99477 99489 6955d6 99457->99489 99461 6d8e43 99460->99461 99463 6955d6 __fcloseall 83 API calls 99460->99463 99466 6955d6 __fcloseall 83 API calls 99461->99466 99461->99477 99462 6d8e5f 99464 6d8e85 99462->99464 99465 6d8e65 99462->99465 99463->99461 99480 6d8eb5 90 API calls 99464->99480 99467 6d8e72 99465->99467 99469 6955d6 __fcloseall 83 API calls 99465->99469 99466->99477 99471 6955d6 __fcloseall 83 API calls 99467->99471 99467->99477 99469->99467 99470 6d8e8c 99481 6d8f97 99470->99481 99471->99477 99474 6d8ea0 99476 6955d6 __fcloseall 83 API calls 99474->99476 99474->99477 99475 6955d6 __fcloseall 83 API calls 99475->99474 99476->99477 99477->99120 99478->99455 99479->99462 99480->99470 99482 6d8fa4 99481->99482 99485 6d8faa 99481->99485 99483 692f95 _free 58 API calls 99482->99483 99483->99485 99484 6d8fbb 99486 6d8e93 99484->99486 99488 692f95 _free 58 API calls 99484->99488 99485->99484 99487 692f95 _free 58 API calls 99485->99487 99486->99474 99486->99475 99487->99484 99488->99486 99490 6955e2 __commit 99489->99490 99491 69560e 99490->99491 99492 6955f6 99490->99492 99495 696e4e __lock_file 59 API calls 99491->99495 99498 695606 __commit 99491->99498 99518 698d68 58 API calls __getptd_noexit 99492->99518 99494 6955fb 99519 698ff6 9 API calls __wtof_l 99494->99519 99497 695620 99495->99497 99502 69556a 99497->99502 99498->99477 99503 695579 99502->99503 99505 69558d 99502->99505 99564 698d68 58 API calls __getptd_noexit 99503->99564 99504 695589 99520 695645 LeaveCriticalSection LeaveCriticalSection _fseek 99504->99520 99505->99504 99521 694c6d 99505->99521 99508 69557e 99565 698ff6 9 API calls __wtof_l 99508->99565 99514 6955a7 99538 6a0c52 99514->99538 99516 6955ad 99516->99504 99517 692f95 _free 58 API calls 99516->99517 99517->99504 99518->99494 99519->99498 99520->99498 99522 694c80 99521->99522 99523 694ca4 99521->99523 99522->99523 99524 694916 __fseek_nolock 58 API calls 99522->99524 99527 6a0dc7 99523->99527 99525 694c9d 99524->99525 99566 69dac6 99525->99566 99528 6955a1 99527->99528 99529 6a0dd4 99527->99529 99531 694916 99528->99531 99529->99528 99530 692f95 _free 58 API calls 99529->99530 99530->99528 99532 694920 99531->99532 99533 694935 99531->99533 99676 698d68 58 API calls __getptd_noexit 99532->99676 99533->99514 99535 694925 99677 698ff6 9 API calls __wtof_l 99535->99677 99537 694930 99537->99514 99539 6a0c5e __commit 99538->99539 99540 6a0c6b 99539->99540 99541 6a0c82 99539->99541 99693 698d34 58 API calls __getptd_noexit 99540->99693 99543 6a0d0d 99541->99543 99545 6a0c92 99541->99545 99698 698d34 58 API calls __getptd_noexit 99543->99698 99544 6a0c70 99694 698d68 58 API calls __getptd_noexit 99544->99694 99548 6a0cba 99545->99548 99549 6a0cb0 99545->99549 99552 69d446 ___lock_fhandle 59 API calls 99548->99552 99695 698d34 58 API calls __getptd_noexit 99549->99695 99550 6a0cb5 99699 698d68 58 API calls __getptd_noexit 99550->99699 99553 6a0cc0 99552->99553 99555 6a0cde 99553->99555 99556 6a0cd3 99553->99556 99696 698d68 58 API calls __getptd_noexit 99555->99696 99678 6a0d2d 99556->99678 99557 6a0d19 99700 698ff6 9 API calls __wtof_l 99557->99700 99560 6a0c77 __commit 99560->99516 99562 6a0cd9 99697 6a0d05 LeaveCriticalSection __unlock_fhandle 99562->99697 99564->99508 99565->99504 99567 69dad2 __commit 99566->99567 99568 69dadf 99567->99568 99569 69daf6 99567->99569 99667 698d34 58 API calls __getptd_noexit 99568->99667 99571 69db95 99569->99571 99573 69db0a 99569->99573 99673 698d34 58 API calls __getptd_noexit 99571->99673 99572 69dae4 99668 698d68 58 API calls __getptd_noexit 99572->99668 99576 69db28 99573->99576 99577 69db32 99573->99577 99669 698d34 58 API calls __getptd_noexit 99576->99669 99594 69d446 99577->99594 99578 69db2d 99674 698d68 58 API calls __getptd_noexit 99578->99674 99581 69db38 99583 69db4b 99581->99583 99584 69db5e 99581->99584 99603 69dbb5 99583->99603 99670 698d68 58 API calls __getptd_noexit 99584->99670 99585 69dba1 99675 698ff6 9 API calls __wtof_l 99585->99675 99586 69daeb __commit 99586->99523 99590 69db57 99672 69db8d LeaveCriticalSection __unlock_fhandle 99590->99672 99591 69db63 99671 698d34 58 API calls __getptd_noexit 99591->99671 99596 69d452 __commit 99594->99596 99595 69d4a1 EnterCriticalSection 99598 69d4c7 __commit 99595->99598 99596->99595 99597 699e4b __lock 58 API calls 99596->99597 99599 69d477 99597->99599 99598->99581 99600 69d48f 99599->99600 99601 69a06b ___lock_fhandle InitializeCriticalSectionAndSpinCount 99599->99601 99602 69d4cb ___lock_fhandle LeaveCriticalSection 99600->99602 99601->99600 99602->99595 99604 69dbc2 __write_nolock 99603->99604 99605 69dc01 99604->99605 99606 69dc20 99604->99606 99634 69dbf6 99604->99634 99608 698d34 __commit 58 API calls 99605->99608 99609 69dc78 99606->99609 99610 69dc5c 99606->99610 99607 69c836 __wtof_l 6 API calls 99611 69e416 99607->99611 99612 69dc06 99608->99612 99614 69dc91 99609->99614 99616 6a1b11 __lseeki64_nolock 60 API calls 99609->99616 99613 698d34 __commit 58 API calls 99610->99613 99611->99590 99615 698d68 __wtof_l 58 API calls 99612->99615 99619 69dc61 99613->99619 99618 6a5ebb __flsbuf 58 API calls 99614->99618 99617 69dc0d 99615->99617 99616->99614 99620 698ff6 __wtof_l 9 API calls 99617->99620 99621 69dc9f 99618->99621 99622 698d68 __wtof_l 58 API calls 99619->99622 99620->99634 99623 69dff8 99621->99623 99628 699bec __beginthreadex 58 API calls 99621->99628 99624 69dc68 99622->99624 99625 69e38b WriteFile 99623->99625 99626 69e016 99623->99626 99627 698ff6 __wtof_l 9 API calls 99624->99627 99629 69dfeb GetLastError 99625->99629 99636 69dfb8 99625->99636 99630 69e13a 99626->99630 99639 69e02c 99626->99639 99627->99634 99631 69dccb GetConsoleMode 99628->99631 99629->99636 99641 69e145 99630->99641 99644 69e22f 99630->99644 99631->99623 99633 69dd0a 99631->99633 99632 69e3c4 99632->99634 99635 698d68 __wtof_l 58 API calls 99632->99635 99633->99623 99637 69dd1a GetConsoleCP 99633->99637 99634->99607 99642 69e3f2 99635->99642 99636->99632 99636->99634 99643 69e118 99636->99643 99637->99632 99663 69dd49 99637->99663 99638 69e09b WriteFile 99638->99629 99640 69e0d8 99638->99640 99639->99632 99639->99638 99640->99639 99645 69e0fc 99640->99645 99641->99632 99646 69e1aa WriteFile 99641->99646 99647 698d34 __commit 58 API calls 99642->99647 99648 69e3bb 99643->99648 99649 69e123 99643->99649 99644->99632 99650 69e2a4 WideCharToMultiByte 99644->99650 99645->99636 99646->99629 99651 69e1f9 99646->99651 99647->99634 99653 698d47 __dosmaperr 58 API calls 99648->99653 99652 698d68 __wtof_l 58 API calls 99649->99652 99650->99629 99659 69e2eb 99650->99659 99651->99636 99651->99641 99651->99645 99655 69e128 99652->99655 99653->99634 99654 69e2f3 WriteFile 99657 69e346 GetLastError 99654->99657 99654->99659 99658 698d34 __commit 58 API calls 99655->99658 99656 693835 __write_nolock 58 API calls 99656->99663 99657->99659 99658->99634 99659->99636 99659->99644 99659->99645 99659->99654 99660 6a650a 60 API calls __write_nolock 99660->99663 99661 69de32 WideCharToMultiByte 99661->99636 99662 69de6d WriteFile 99661->99662 99662->99629 99665 69de9f 99662->99665 99663->99636 99663->99656 99663->99660 99663->99661 99663->99665 99664 6a7cae WriteConsoleW CreateFileW __putwch_nolock 99664->99665 99665->99629 99665->99636 99665->99663 99665->99664 99666 69dec7 WriteFile 99665->99666 99666->99629 99666->99665 99667->99572 99668->99586 99669->99578 99670->99591 99671->99590 99672->99586 99673->99578 99674->99585 99675->99586 99676->99535 99677->99537 99701 69d703 99678->99701 99680 6a0d91 99714 69d67d 59 API calls 2 library calls 99680->99714 99682 6a0d3b 99682->99680 99683 69d703 __commit 58 API calls 99682->99683 99692 6a0d6f 99682->99692 99687 6a0d66 99683->99687 99684 69d703 __commit 58 API calls 99688 6a0d7b CloseHandle 99684->99688 99685 6a0dbb 99685->99562 99686 6a0d99 99686->99685 99715 698d47 58 API calls 3 library calls 99686->99715 99690 69d703 __commit 58 API calls 99687->99690 99688->99680 99691 6a0d87 GetLastError 99688->99691 99690->99692 99691->99680 99692->99680 99692->99684 99693->99544 99694->99560 99695->99550 99696->99562 99697->99560 99698->99550 99699->99557 99700->99560 99702 69d70e 99701->99702 99703 69d723 99701->99703 99704 698d34 __commit 58 API calls 99702->99704 99706 698d34 __commit 58 API calls 99703->99706 99708 69d748 99703->99708 99705 69d713 99704->99705 99707 698d68 __wtof_l 58 API calls 99705->99707 99709 69d752 99706->99709 99711 69d71b 99707->99711 99708->99682 99710 698d68 __wtof_l 58 API calls 99709->99710 99712 69d75a 99710->99712 99711->99682 99713 698ff6 __wtof_l 9 API calls 99712->99713 99713->99711 99714->99686 99715->99685 99717 6a1b90 __write_nolock 99716->99717 99718 6909e2 GetLongPathNameW 99717->99718 99719 677d2c 59 API calls 99718->99719 99720 67741d 99719->99720 99721 67716b 99720->99721 99722 6777c7 59 API calls 99721->99722 99723 67717d 99722->99723 99724 6748ae 60 API calls 99723->99724 99725 677188 99724->99725 99726 6aecae 99725->99726 99727 677193 99725->99727 99732 6aecc8 99726->99732 99774 677a68 61 API calls 99726->99774 99728 673f84 59 API calls 99727->99728 99730 67719f 99728->99730 99768 6734c2 99730->99768 99733 6771b2 Mailbox 99733->98898 99735 674f3d 136 API calls 99734->99735 99736 6769ef 99735->99736 99737 6ae45a 99736->99737 99739 674f3d 136 API calls 99736->99739 99738 6d97e5 122 API calls 99737->99738 99741 6ae46f 99738->99741 99740 676a03 99739->99740 99740->99737 99742 676a0b 99740->99742 99743 6ae473 99741->99743 99744 6ae490 99741->99744 99745 676a17 99742->99745 99746 6ae47b 99742->99746 99747 674faa 84 API calls 99743->99747 99748 690ff6 Mailbox 59 API calls 99744->99748 99775 676bec 99745->99775 99882 6d4534 90 API calls _wprintf 99746->99882 99747->99746 99767 6ae4d5 Mailbox 99748->99767 99752 6ae489 99752->99744 99753 6ae689 99754 692f95 _free 58 API calls 99753->99754 99755 6ae691 99754->99755 99756 674faa 84 API calls 99755->99756 99761 6ae69a 99756->99761 99760 692f95 _free 58 API calls 99760->99761 99761->99760 99762 674faa 84 API calls 99761->99762 99886 6cfcb1 89 API calls 4 library calls 99761->99886 99762->99761 99764 677f41 59 API calls 99764->99767 99767->99753 99767->99761 99767->99764 99868 67766f 99767->99868 99876 6774bd 99767->99876 99883 6cfc4d 59 API calls 2 library calls 99767->99883 99884 6cfb6e 61 API calls 2 library calls 99767->99884 99885 6d7621 59 API calls Mailbox 99767->99885 99769 6734d4 99768->99769 99773 6734f3 _memmove 99768->99773 99771 690ff6 Mailbox 59 API calls 99769->99771 99770 690ff6 Mailbox 59 API calls 99772 67350a 99770->99772 99771->99773 99772->99733 99773->99770 99774->99726 99776 676c15 99775->99776 99777 6ae847 99775->99777 99892 675906 60 API calls Mailbox 99776->99892 99959 6cfcb1 89 API calls 4 library calls 99777->99959 99780 6ae85a 99960 6cfcb1 89 API calls 4 library calls 99780->99960 99781 676c37 99893 675956 67 API calls 99781->99893 99783 676c4c 99783->99780 99785 676c54 99783->99785 99787 6777c7 59 API calls 99785->99787 99786 6ae876 99790 676cc1 99786->99790 99788 676c60 99787->99788 99894 690b9b 60 API calls __write_nolock 99788->99894 99792 6ae889 99790->99792 99793 676ccf 99790->99793 99791 676c6c 99794 6777c7 59 API calls 99791->99794 99795 675dcf CloseHandle 99792->99795 99796 6777c7 59 API calls 99793->99796 99797 676c78 99794->99797 99798 6ae895 99795->99798 99799 676cd8 99796->99799 99800 6748ae 60 API calls 99797->99800 99801 674f3d 136 API calls 99798->99801 99802 6777c7 59 API calls 99799->99802 99803 676c86 99800->99803 99804 6ae8b1 99801->99804 99805 676ce1 99802->99805 99895 6759b0 ReadFile SetFilePointerEx 99803->99895 99807 6ae8da 99804->99807 99812 6d97e5 122 API calls 99804->99812 99897 6746f9 99805->99897 99961 6cfcb1 89 API calls 4 library calls 99807->99961 99809 676cf8 99813 677c8e 59 API calls 99809->99813 99811 676cb2 99896 675c4e SetFilePointerEx SetFilePointerEx 99811->99896 99816 6ae8cd 99812->99816 99817 676d09 SetCurrentDirectoryW 99813->99817 99814 6ae8f1 99823 676e6c Mailbox 99814->99823 99818 6ae8f6 99816->99818 99819 6ae8d5 99816->99819 99825 676d1c Mailbox 99817->99825 99821 674faa 84 API calls 99818->99821 99820 674faa 84 API calls 99819->99820 99820->99807 99822 6ae8fb 99821->99822 99824 690ff6 Mailbox 59 API calls 99822->99824 99887 675934 99823->99887 99831 6ae92f 99824->99831 99827 690ff6 Mailbox 59 API calls 99825->99827 99829 676d2f 99827->99829 99828 673bcd 99828->98765 99828->98787 99830 67538e 59 API calls 99829->99830 99858 676d3a Mailbox __NMSG_WRITE 99830->99858 99832 67766f 59 API calls 99831->99832 99850 6ae978 Mailbox 99832->99850 99833 676e47 99955 675dcf 99833->99955 99834 6aeb69 99966 6d7581 59 API calls Mailbox 99834->99966 99837 676e53 SetCurrentDirectoryW 99837->99823 99840 6aeb8b 99967 6df835 59 API calls 2 library calls 99840->99967 99843 6aeb98 99845 692f95 _free 58 API calls 99843->99845 99844 6aec02 99970 6cfcb1 89 API calls 4 library calls 99844->99970 99845->99823 99848 67766f 59 API calls 99848->99850 99849 6aec1b 99849->99833 99850->99834 99850->99848 99859 677f41 59 API calls 99850->99859 99863 6aebbb 99850->99863 99962 6cfc4d 59 API calls 2 library calls 99850->99962 99963 6cfb6e 61 API calls 2 library calls 99850->99963 99964 6d7621 59 API calls Mailbox 99850->99964 99965 677373 59 API calls Mailbox 99850->99965 99852 6aebfa 99969 6cfb07 59 API calls 4 library calls 99852->99969 99855 677f41 59 API calls 99855->99858 99858->99833 99858->99844 99858->99852 99858->99855 99948 6759cd 67 API calls _wcscpy 99858->99948 99949 6770bd GetStringTypeW 99858->99949 99950 67702c 60 API calls __wcsnicmp 99858->99950 99951 67710a GetStringTypeW __NMSG_WRITE 99858->99951 99952 69387d GetStringTypeW _iswctype 99858->99952 99953 676a3c 165 API calls 3 library calls 99858->99953 99954 677373 59 API calls Mailbox 99858->99954 99859->99850 99968 6cfcb1 89 API calls 4 library calls 99863->99968 99865 6aebd4 99866 692f95 _free 58 API calls 99865->99866 99867 6aebe7 99866->99867 99867->99823 99869 677682 _memmove 99868->99869 99870 67770f 99868->99870 99871 690ff6 Mailbox 59 API calls 99869->99871 99872 690ff6 Mailbox 59 API calls 99870->99872 99874 677689 99871->99874 99872->99869 99873 6776b2 99873->99767 99874->99873 99875 690ff6 Mailbox 59 API calls 99874->99875 99875->99873 99877 6774d0 99876->99877 99880 67757e 99876->99880 99879 690ff6 Mailbox 59 API calls 99877->99879 99881 677502 99877->99881 99878 690ff6 59 API calls Mailbox 99878->99881 99879->99881 99880->99767 99881->99878 99881->99880 99882->99752 99883->99767 99884->99767 99885->99767 99886->99761 99888 675dcf CloseHandle 99887->99888 99889 67593c Mailbox 99888->99889 99890 675dcf CloseHandle 99889->99890 99891 67594b 99890->99891 99891->99828 99892->99781 99893->99783 99894->99791 99895->99811 99896->99790 99898 6777c7 59 API calls 99897->99898 99899 67470f 99898->99899 99900 6777c7 59 API calls 99899->99900 99901 674717 99900->99901 99902 6777c7 59 API calls 99901->99902 99903 67471f 99902->99903 99904 6777c7 59 API calls 99903->99904 99905 674727 99904->99905 99906 6ad8fb 99905->99906 99907 67475b 99905->99907 99908 6781a7 59 API calls 99906->99908 99909 6779ab 59 API calls 99907->99909 99910 6ad904 99908->99910 99911 674769 99909->99911 99912 677eec 59 API calls 99910->99912 99913 677e8c 59 API calls 99911->99913 99915 67479e 99912->99915 99914 674773 99913->99914 99914->99915 99916 6779ab 59 API calls 99914->99916 99917 6747de 99915->99917 99919 6747bd 99915->99919 99930 6ad924 99915->99930 99920 674794 99916->99920 99971 6779ab 99917->99971 99921 677b52 59 API calls 99919->99921 99924 677e8c 59 API calls 99920->99924 99925 6747c7 99921->99925 99922 6747ef 99926 674801 99922->99926 99928 6781a7 59 API calls 99922->99928 99923 6ad9f4 99927 677d2c 59 API calls 99923->99927 99924->99915 99925->99917 99931 6779ab 59 API calls 99925->99931 99929 674811 99926->99929 99932 6781a7 59 API calls 99926->99932 99943 6ad9b1 99927->99943 99928->99926 99934 674818 99929->99934 99935 6781a7 59 API calls 99929->99935 99930->99923 99933 6ad9dd 99930->99933 99942 6ad95b 99930->99942 99931->99917 99932->99929 99933->99923 99939 6ad9c8 99933->99939 99936 6781a7 59 API calls 99934->99936 99945 67481f Mailbox 99934->99945 99935->99934 99936->99945 99937 677b52 59 API calls 99937->99943 99938 6ad9b9 99940 677d2c 59 API calls 99938->99940 99941 677d2c 59 API calls 99939->99941 99940->99943 99941->99943 99942->99938 99946 6ad9a4 99942->99946 99943->99917 99943->99937 99984 677a84 59 API calls 2 library calls 99943->99984 99945->99809 99947 677d2c 59 API calls 99946->99947 99947->99943 99948->99858 99949->99858 99950->99858 99951->99858 99952->99858 99953->99858 99954->99858 99956 675dd9 99955->99956 99957 675de8 99955->99957 99956->99837 99957->99956 99958 675ded CloseHandle 99957->99958 99958->99956 99959->99780 99960->99786 99961->99814 99962->99850 99963->99850 99964->99850 99965->99850 99966->99840 99967->99843 99968->99865 99969->99844 99970->99849 99972 677a17 99971->99972 99973 6779ba 99971->99973 99975 677e8c 59 API calls 99972->99975 99973->99972 99974 6779c5 99973->99974 99977 6779e0 99974->99977 99978 6aef32 99974->99978 99976 6779e8 _memmove 99975->99976 99976->99922 99985 678087 59 API calls Mailbox 99977->99985 99979 678189 59 API calls 99978->99979 99981 6aef3c 99979->99981 99982 690ff6 Mailbox 59 API calls 99981->99982 99983 6aef5c 99982->99983 99984->99943 99985->99976 99987 676ef5 99986->99987 99988 677009 99986->99988 99987->99988 99989 690ff6 Mailbox 59 API calls 99987->99989 99988->98904 99991 676f1c 99989->99991 99990 690ff6 Mailbox 59 API calls 99996 676f91 99990->99996 99991->99990 99993 6774bd 59 API calls 99993->99996 99995 67766f 59 API calls 99995->99996 99996->99988 99996->99993 99996->99995 99999 6763a0 99996->99999 100025 6c6ac9 59 API calls Mailbox 99996->100025 99997->98906 99998->98908 100000 677b76 59 API calls 99999->100000 100017 6763c5 100000->100017 100001 6765ca 100002 67766f 59 API calls 100001->100002 100003 6765e4 Mailbox 100002->100003 100003->99996 100006 6ae41f 100030 6cfdba 91 API calls 4 library calls 100006->100030 100007 67766f 59 API calls 100007->100017 100009 6768f9 100009->100003 100031 6cfdba 91 API calls 4 library calls 100009->100031 100012 6ae42d 100014 67766f 59 API calls 100012->100014 100013 677eec 59 API calls 100013->100017 100015 6ae443 100014->100015 100015->100003 100016 6ae3bb 100018 678189 59 API calls 100016->100018 100017->100001 100017->100006 100017->100007 100017->100009 100017->100013 100017->100016 100021 677faf 59 API calls 100017->100021 100024 6ae3eb _memmove 100017->100024 100026 6760cc 60 API calls 100017->100026 100027 675ea1 59 API calls Mailbox 100017->100027 100028 675fd2 60 API calls 100017->100028 100029 677a84 59 API calls 2 library calls 100017->100029 100019 6ae3c6 100018->100019 100023 690ff6 Mailbox 59 API calls 100019->100023 100022 67659b CharUpperBuffW 100021->100022 100022->100017 100023->100024 100024->100006 100024->100009 100025->99996 100026->100017 100027->100017 100028->100017 100029->100017 100030->100012 100031->100003 100032->98922 100033->98923 100035 67e835 100034->100035 100036 6b3ed3 100035->100036 100039 67e89f 100035->100039 100049 67e8f9 100035->100049 100107 67a000 100036->100107 100038 6b3ee8 100047 67ead0 Mailbox 100038->100047 100130 6da0b5 89 API calls 4 library calls 100038->100130 100042 6777c7 59 API calls 100039->100042 100039->100049 100040 6777c7 59 API calls 100040->100049 100044 6b3f2e 100042->100044 100043 692f80 __cinit 67 API calls 100043->100049 100046 692f80 __cinit 67 API calls 100044->100046 100045 6b3f50 100045->99001 100046->100049 100048 678620 69 API calls 100047->100048 100050 67a000 331 API calls 100047->100050 100051 67f2f5 100047->100051 100054 6da0b5 89 API calls 100047->100054 100059 678ea0 59 API calls 100047->100059 100064 67ebd8 100047->100064 100106 6780d7 59 API calls 2 library calls 100047->100106 100132 6c7405 59 API calls 100047->100132 100133 6ec8d7 331 API calls 100047->100133 100134 6eb851 331 API calls Mailbox 100047->100134 100136 679df0 59 API calls Mailbox 100047->100136 100137 6e96db 331 API calls Mailbox 100047->100137 100048->100047 100049->100040 100049->100043 100049->100045 100049->100047 100053 67eaba 100049->100053 100050->100047 100135 6da0b5 89 API calls 4 library calls 100051->100135 100053->100047 100131 6da0b5 89 API calls 4 library calls 100053->100131 100054->100047 100058 6b424f 100058->99001 100059->100047 100064->99001 100066 67f7b0 100065->100066 100067 67f61a 100065->100067 100070 677f41 59 API calls 100066->100070 100068 67f626 100067->100068 100069 6b4848 100067->100069 100236 67f3f0 331 API calls 2 library calls 100068->100236 100238 6ebf80 331 API calls Mailbox 100069->100238 100076 67f6ec Mailbox 100070->100076 100073 6b4856 100077 67f790 100073->100077 100239 6da0b5 89 API calls 4 library calls 100073->100239 100075 67f65d 100075->100073 100075->100076 100075->100077 100082 674faa 84 API calls 100076->100082 100144 6dcde5 100076->100144 100224 6e474d 100076->100224 100233 6d3e73 100076->100233 100077->99001 100079 67f743 100079->100077 100237 679df0 59 API calls Mailbox 100079->100237 100082->100079 100084->99001 100085->99001 100086->99001 100087->98930 100088->98935 100089->99001 100090->98937 100091->98937 100092->98937 100093->99001 100094->99001 100095->99001 100096->99001 100097->99001 100098->99001 100099->98986 100100->98986 100101->98986 100102->98986 100103->98986 100104->98986 100105->98986 100106->100047 100108 67a01f 100107->100108 100123 67a04d Mailbox 100107->100123 100109 690ff6 Mailbox 59 API calls 100108->100109 100109->100123 100110 67b5d5 100111 6781a7 59 API calls 100110->100111 100125 67a1b7 100111->100125 100112 690ff6 59 API calls Mailbox 100112->100123 100115 6b047f 100140 6da0b5 89 API calls 4 library calls 100115->100140 100118 6781a7 59 API calls 100118->100123 100119 6777c7 59 API calls 100119->100123 100121 6b048e 100121->100038 100122 692f80 67 API calls __cinit 100122->100123 100123->100110 100123->100112 100123->100115 100123->100118 100123->100119 100123->100122 100124 6c7405 59 API calls 100123->100124 100123->100125 100126 6b0e00 100123->100126 100128 67b5da 100123->100128 100129 67a6ba 100123->100129 100138 67ca20 331 API calls 2 library calls 100123->100138 100139 67ba60 60 API calls Mailbox 100123->100139 100124->100123 100125->100038 100142 6da0b5 89 API calls 4 library calls 100126->100142 100143 6da0b5 89 API calls 4 library calls 100128->100143 100141 6da0b5 89 API calls 4 library calls 100129->100141 100130->100047 100131->100047 100132->100047 100133->100047 100134->100047 100135->100058 100136->100047 100137->100047 100138->100123 100139->100123 100140->100121 100141->100125 100142->100128 100143->100125 100145 6777c7 59 API calls 100144->100145 100146 6dce1a 100145->100146 100147 6777c7 59 API calls 100146->100147 100148 6dce23 100147->100148 100149 6dce37 100148->100149 100349 679c9c 59 API calls 100148->100349 100151 679997 84 API calls 100149->100151 100152 6dce54 100151->100152 100153 6dcf55 100152->100153 100154 6dce76 100152->100154 100155 6dcf85 Mailbox 100152->100155 100157 674f3d 136 API calls 100153->100157 100156 679997 84 API calls 100154->100156 100155->100079 100158 6dce82 100156->100158 100159 6dcf69 100157->100159 100160 6781a7 59 API calls 100158->100160 100161 6dcf81 100159->100161 100163 674f3d 136 API calls 100159->100163 100162 6dce8e 100160->100162 100161->100155 100164 6777c7 59 API calls 100161->100164 100168 6dced4 100162->100168 100169 6dcea2 100162->100169 100163->100161 100165 6dcfb6 100164->100165 100166 6777c7 59 API calls 100165->100166 100167 6dcfbf 100166->100167 100171 6777c7 59 API calls 100167->100171 100170 679997 84 API calls 100168->100170 100172 6781a7 59 API calls 100169->100172 100173 6dcee1 100170->100173 100174 6dcfc8 100171->100174 100175 6dceb2 100172->100175 100176 6781a7 59 API calls 100173->100176 100177 6777c7 59 API calls 100174->100177 100178 677e0b 59 API calls 100175->100178 100179 6dceed 100176->100179 100180 6dcfd1 100177->100180 100181 6dcebc 100178->100181 100350 6d4cd3 GetFileAttributesW 100179->100350 100183 679997 84 API calls 100180->100183 100184 679997 84 API calls 100181->100184 100186 6dcfde 100183->100186 100187 6dcec8 100184->100187 100185 6dcef6 100188 6dcf09 100185->100188 100191 677b52 59 API calls 100185->100191 100189 6746f9 59 API calls 100186->100189 100190 677c8e 59 API calls 100187->100190 100193 679997 84 API calls 100188->100193 100198 6dcf0f 100188->100198 100192 6dcff9 100189->100192 100190->100168 100191->100188 100194 677b52 59 API calls 100192->100194 100195 6dcf36 100193->100195 100197 6dd008 100194->100197 100351 6d3a2b 75 API calls Mailbox 100195->100351 100199 6dd03c 100197->100199 100201 677b52 59 API calls 100197->100201 100198->100155 100200 6781a7 59 API calls 100199->100200 100202 6dd04a 100200->100202 100203 6dd019 100201->100203 100204 677c8e 59 API calls 100202->100204 100203->100199 100205 677d2c 59 API calls 100203->100205 100206 6dd058 100204->100206 100207 6dd02e 100205->100207 100208 677c8e 59 API calls 100206->100208 100209 677d2c 59 API calls 100207->100209 100210 6dd066 100208->100210 100209->100199 100211 677c8e 59 API calls 100210->100211 100212 6dd074 100211->100212 100213 679997 84 API calls 100212->100213 100214 6dd080 100213->100214 100240 6d42ad 100214->100240 100216 6dd091 100217 6d3e73 3 API calls 100216->100217 100218 6dd09b 100217->100218 100219 679997 84 API calls 100218->100219 100223 6dd0cc 100218->100223 100220 6dd0b9 100219->100220 100294 6d93df 100220->100294 100222 674faa 84 API calls 100222->100155 100223->100222 100225 679997 84 API calls 100224->100225 100226 6e4787 100225->100226 100227 6763a0 94 API calls 100226->100227 100228 6e4797 100227->100228 100229 6e47bc 100228->100229 100230 67a000 331 API calls 100228->100230 100232 6e47c0 100229->100232 100391 679bf8 59 API calls Mailbox 100229->100391 100230->100229 100232->100079 100392 6d4696 GetFileAttributesW 100233->100392 100236->100075 100237->100079 100238->100073 100239->100077 100241 6d42c9 100240->100241 100242 6d42dc 100241->100242 100243 6d42ce 100241->100243 100245 6777c7 59 API calls 100242->100245 100244 6781a7 59 API calls 100243->100244 100246 6d42d7 Mailbox 100244->100246 100247 6d42e4 100245->100247 100246->100216 100248 6777c7 59 API calls 100247->100248 100249 6d42ec 100248->100249 100250 6777c7 59 API calls 100249->100250 100251 6d42f7 100250->100251 100252 6777c7 59 API calls 100251->100252 100253 6d42ff 100252->100253 100254 6777c7 59 API calls 100253->100254 100255 6d4307 100254->100255 100256 6777c7 59 API calls 100255->100256 100257 6d430f 100256->100257 100258 6777c7 59 API calls 100257->100258 100259 6d4317 100258->100259 100260 6777c7 59 API calls 100259->100260 100261 6d431f 100260->100261 100262 6746f9 59 API calls 100261->100262 100263 6d4336 100262->100263 100264 6746f9 59 API calls 100263->100264 100265 6d434f 100264->100265 100266 677b52 59 API calls 100265->100266 100267 6d435b 100266->100267 100268 6d436e 100267->100268 100269 677e8c 59 API calls 100267->100269 100270 677b52 59 API calls 100268->100270 100269->100268 100271 6d4377 100270->100271 100272 6d4387 100271->100272 100273 677e8c 59 API calls 100271->100273 100274 6781a7 59 API calls 100272->100274 100273->100272 100275 6d4393 100274->100275 100276 677c8e 59 API calls 100275->100276 100277 6d439f 100276->100277 100352 6d445f 59 API calls 100277->100352 100279 6d43ae 100353 6d445f 59 API calls 100279->100353 100281 6d43c1 100282 677b52 59 API calls 100281->100282 100283 6d43cb 100282->100283 100284 6d43d0 100283->100284 100285 6d43e2 100283->100285 100286 677e0b 59 API calls 100284->100286 100287 677b52 59 API calls 100285->100287 100288 6d43dd 100286->100288 100289 6d43eb 100287->100289 100292 677c8e 59 API calls 100288->100292 100290 6d4409 100289->100290 100291 677e0b 59 API calls 100289->100291 100293 677c8e 59 API calls 100290->100293 100291->100288 100292->100290 100293->100246 100295 6d93ec __write_nolock 100294->100295 100296 690ff6 Mailbox 59 API calls 100295->100296 100297 6d9449 100296->100297 100298 67538e 59 API calls 100297->100298 100299 6d9453 100298->100299 100300 6d91e9 GetSystemTimeAsFileTime 100299->100300 100301 6d945e 100300->100301 100302 675045 85 API calls 100301->100302 100303 6d9471 _wcscmp 100302->100303 100304 6d9495 100303->100304 100305 6d9542 100303->100305 100306 6d99be 96 API calls 100304->100306 100307 6d99be 96 API calls 100305->100307 100308 6d949a 100306->100308 100322 6d950e _wcscat 100307->100322 100311 6d954b 100308->100311 100371 69432e 58 API calls __wsplitpath_helper 100308->100371 100310 67506b 74 API calls 100312 6d9567 100310->100312 100311->100223 100313 67506b 74 API calls 100312->100313 100315 6d9577 100313->100315 100314 6d94c3 _wcscat _wcscpy 100372 69432e 58 API calls __wsplitpath_helper 100314->100372 100316 67506b 74 API calls 100315->100316 100317 6d9592 100316->100317 100319 67506b 74 API calls 100317->100319 100320 6d95a2 100319->100320 100321 67506b 74 API calls 100320->100321 100323 6d95bd 100321->100323 100322->100310 100322->100311 100324 67506b 74 API calls 100323->100324 100325 6d95cd 100324->100325 100326 67506b 74 API calls 100325->100326 100327 6d95dd 100326->100327 100328 67506b 74 API calls 100327->100328 100329 6d95ed 100328->100329 100354 6d9b6d GetTempPathW GetTempFileNameW 100329->100354 100331 6d95f9 100332 69548b 115 API calls 100331->100332 100343 6d960a 100332->100343 100333 6d96c4 100336 67506b 74 API calls 100336->100343 100343->100311 100343->100333 100343->100336 100355 694a93 100343->100355 100349->100149 100350->100185 100351->100198 100352->100279 100353->100281 100354->100331 100356 694a9f __commit 100355->100356 100371->100314 100372->100322 100391->100232 100393 6d3e7a 100392->100393 100394 6d46b1 FindFirstFileW 100392->100394 100393->100079 100394->100393 100395 6d46c6 FindClose 100394->100395 100395->100393 100396 6b0226 100398 67ade2 Mailbox 100396->100398 100397 67b6c1 100412 6da0b5 89 API calls 4 library calls 100397->100412 100398->100397 100400 6b0c86 100398->100400 100402 6b0c8f 100398->100402 100404 6b00e0 VariantClear 100398->100404 100407 6ee237 100398->100407 100410 679df0 59 API calls Mailbox 100398->100410 100411 6c7405 59 API calls 100398->100411 100413 6c66f4 59 API calls Mailbox 100400->100413 100404->100398 100414 6ecdf1 100407->100414 100409 6ee247 100409->100398 100410->100398 100411->100398 100412->100400 100413->100402 100415 679997 84 API calls 100414->100415 100416 6ece2e 100415->100416 100440 6ece75 Mailbox 100416->100440 100452 6edab9 100416->100452 100418 6ed0cd 100419 6ed242 100418->100419 100423 6ed0db 100418->100423 100491 6edbdc 92 API calls Mailbox 100419->100491 100422 6ed251 100422->100423 100425 6ed25d 100422->100425 100465 6ecc82 100423->100465 100424 679997 84 API calls 100443 6ecec6 Mailbox 100424->100443 100425->100440 100430 6ed114 100480 690e48 100430->100480 100433 6ed12e 100486 6da0b5 89 API calls 4 library calls 100433->100486 100434 6ed147 100435 67942e 59 API calls 100434->100435 100437 6ed153 100435->100437 100439 6791b0 59 API calls 100437->100439 100438 6ed139 GetCurrentProcess TerminateProcess 100438->100434 100441 6ed169 100439->100441 100440->100409 100450 6ed190 100441->100450 100487 678ea0 59 API calls Mailbox 100441->100487 100443->100418 100443->100424 100443->100440 100484 6df835 59 API calls 2 library calls 100443->100484 100485 6ed2f3 61 API calls 2 library calls 100443->100485 100444 6ed2b8 100444->100440 100448 6ed2cc FreeLibrary 100444->100448 100445 6ed17f 100488 6ed95d 107 API calls _free 100445->100488 100448->100440 100450->100444 100489 678ea0 59 API calls Mailbox 100450->100489 100490 679e9c 60 API calls Mailbox 100450->100490 100492 6ed95d 107 API calls _free 100450->100492 100453 677faf 59 API calls 100452->100453 100454 6edad4 CharLowerBuffW 100453->100454 100493 6cf658 100454->100493 100458 6777c7 59 API calls 100459 6edb0d 100458->100459 100460 6779ab 59 API calls 100459->100460 100461 6edb24 100460->100461 100462 677e8c 59 API calls 100461->100462 100464 6edb30 Mailbox 100462->100464 100463 6edb6c Mailbox 100463->100443 100464->100463 100500 6ed2f3 61 API calls 2 library calls 100464->100500 100466 6ecc9d 100465->100466 100470 6eccf2 100465->100470 100467 690ff6 Mailbox 59 API calls 100466->100467 100469 6eccbf 100467->100469 100468 690ff6 Mailbox 59 API calls 100468->100469 100469->100468 100469->100470 100471 6edd64 100470->100471 100472 6edf8d Mailbox 100471->100472 100473 6edd87 _strcat _wcscpy __NMSG_WRITE 100471->100473 100472->100430 100473->100472 100474 679d46 59 API calls 100473->100474 100475 679c9c 59 API calls 100473->100475 100476 679cf8 59 API calls 100473->100476 100477 679997 84 API calls 100473->100477 100478 69594c 58 API calls __malloc_crt 100473->100478 100503 6d5b29 61 API calls 2 library calls 100473->100503 100474->100473 100475->100473 100476->100473 100477->100473 100478->100473 100481 690e5d 100480->100481 100482 690ef5 VirtualProtect 100481->100482 100483 690ec3 100481->100483 100482->100483 100483->100433 100483->100434 100484->100443 100485->100443 100486->100438 100487->100445 100488->100450 100489->100450 100490->100450 100491->100422 100492->100450 100494 6cf683 __NMSG_WRITE 100493->100494 100496 6cf6b8 100494->100496 100498 6cf769 100494->100498 100499 6cf6c2 100494->100499 100496->100499 100501 677a24 61 API calls 100496->100501 100498->100499 100502 677a24 61 API calls 100498->100502 100499->100458 100499->100464 100500->100463 100501->100496 100502->100498 100503->100473
                                    APIs
                                    • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00673B7A
                                    • IsDebuggerPresent.KERNEL32 ref: 00673B8C
                                    • GetFullPathNameW.KERNEL32(00007FFF,?,?,007362F8,007362E0,?,?), ref: 00673BFD
                                      • Part of subcall function 00677D2C: _memmove.LIBCMT ref: 00677D66
                                      • Part of subcall function 00680A8D: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,00673C26,007362F8,?,?,?), ref: 00680ACE
                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 00673C81
                                    • MessageBoxA.USER32(00000000,This is a third-party compiled AutoIt script.,007293F0,00000010), ref: 006AD4BC
                                    • SetCurrentDirectoryW.KERNEL32(?,007362F8,?,?,?), ref: 006AD4F4
                                    • GetForegroundWindow.USER32(runas,?,?,?,00000001,?,00725D40,007362F8,?,?,?), ref: 006AD57A
                                    • ShellExecuteW.SHELL32(00000000,?,?), ref: 006AD581
                                      • Part of subcall function 00673A58: GetSysColorBrush.USER32(0000000F), ref: 00673A62
                                      • Part of subcall function 00673A58: LoadCursorW.USER32(00000000,00007F00), ref: 00673A71
                                      • Part of subcall function 00673A58: LoadIconW.USER32(00000063), ref: 00673A88
                                      • Part of subcall function 00673A58: LoadIconW.USER32(000000A4), ref: 00673A9A
                                      • Part of subcall function 00673A58: LoadIconW.USER32(000000A2), ref: 00673AAC
                                      • Part of subcall function 00673A58: LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00673AD2
                                      • Part of subcall function 00673A58: RegisterClassExW.USER32(?), ref: 00673B28
                                      • Part of subcall function 006739E7: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00673A15
                                      • Part of subcall function 006739E7: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00673A36
                                      • Part of subcall function 006739E7: ShowWindow.USER32(00000000,?,?), ref: 00673A4A
                                      • Part of subcall function 006739E7: ShowWindow.USER32(00000000,?,?), ref: 00673A53
                                      • Part of subcall function 006743DB: _memset.LIBCMT ref: 00674401
                                      • Part of subcall function 006743DB: Shell_NotifyIconW.SHELL32(00000000,?), ref: 006744A6
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: LoadWindow$Icon$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__memmove_memset
                                    • String ID: This is a third-party compiled AutoIt script.$runas$%p
                                    • API String ID: 529118366-4165251529
                                    • Opcode ID: 0f565ae812391b7d2e52e2bb51f711490f2ca75d99d9126243c598724538523c
                                    • Instruction ID: d4acab895c269814a38d57d7dbff6e46c1cca0389884bd7d33333251cf17bf86
                                    • Opcode Fuzzy Hash: 0f565ae812391b7d2e52e2bb51f711490f2ca75d99d9126243c598724538523c
                                    • Instruction Fuzzy Hash: B651E671D04248BADF11EBB4DC06AFE7B77BF05300F04C169F459A62A2DA784A45DB29
                                    APIs
                                    • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?,?,?,?,?,00674EEE,?,?,00000000,00000000), ref: 00674FF9
                                    • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,00674EEE,?,?,00000000,00000000), ref: 00675010
                                    • LoadResource.KERNEL32(?,00000000,?,?,00674EEE,?,?,00000000,00000000,?,?,?,?,?,?,00674F8F), ref: 006ADD60
                                    • SizeofResource.KERNEL32(?,00000000,?,?,00674EEE,?,?,00000000,00000000,?,?,?,?,?,?,00674F8F), ref: 006ADD75
                                    • LockResource.KERNEL32(Ng,?,?,00674EEE,?,?,00000000,00000000,?,?,?,?,?,?,00674F8F,00000000), ref: 006ADD88
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                    • String ID: SCRIPT$Ng
                                    • API String ID: 3051347437-838098663
                                    • Opcode ID: 32f323d82a7b61a7a96ad8b94a9b03f5effc00cf9b12d763fb63e65362b22aea
                                    • Instruction ID: 7ebd9a793b54dceff6b4643a8a56b9d2580e84ba28bdc0f69d5c874dcd6babdf
                                    • Opcode Fuzzy Hash: 32f323d82a7b61a7a96ad8b94a9b03f5effc00cf9b12d763fb63e65362b22aea
                                    • Instruction Fuzzy Hash: F3115E75200700AFD7218B65DC59F677BBAFFC9B51F108168F40A86260DBA1EC00C660
                                    APIs
                                    • GetVersionExW.KERNEL32(?), ref: 00674B2B
                                      • Part of subcall function 00677D2C: _memmove.LIBCMT ref: 00677D66
                                    • GetCurrentProcess.KERNEL32(?,006FFAEC,00000000,00000000,?), ref: 00674BF8
                                    • IsWow64Process.KERNEL32(00000000), ref: 00674BFF
                                    • GetNativeSystemInfo.KERNELBASE(00000000), ref: 00674C45
                                    • FreeLibrary.KERNEL32(00000000), ref: 00674C50
                                    • GetSystemInfo.KERNEL32(00000000), ref: 00674C81
                                    • GetSystemInfo.KERNEL32(00000000), ref: 00674C8D
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: InfoSystem$Process$CurrentFreeLibraryNativeVersionWow64_memmove
                                    • String ID:
                                    • API String ID: 1986165174-0
                                    • Opcode ID: 66d9efb39bfbe99318ae296fae782b6dc8a74a37362cd2abc148c8d61a7f9ac7
                                    • Instruction ID: b28104b6641987376ea783c9c0176974a1ff71f01f92dae0b32d25fa311b90f3
                                    • Opcode Fuzzy Hash: 66d9efb39bfbe99318ae296fae782b6dc8a74a37362cd2abc148c8d61a7f9ac7
                                    • Instruction Fuzzy Hash: 2A91B43154A7C0DEC732DB6885551EABFE6AF6A300B44899ED0CF93B41D720ED48CB69
                                    APIs
                                    • GetFileAttributesW.KERNELBASE(?,006AE7C1), ref: 006D46A6
                                    • FindFirstFileW.KERNELBASE(?,?), ref: 006D46B7
                                    • FindClose.KERNEL32(00000000), ref: 006D46C7
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: FileFind$AttributesCloseFirst
                                    • String ID:
                                    • API String ID: 48322524-0
                                    • Opcode ID: 8d19d992f104e7e36e54738f7fe09462630118159c83d276a4d69cc90a5b06e6
                                    • Instruction ID: ec534e46bb9b3c81a10a8d57b66b79977b5d0650e79276922595879305302dd1
                                    • Opcode Fuzzy Hash: 8d19d992f104e7e36e54738f7fe09462630118159c83d276a4d69cc90a5b06e6
                                    • Instruction Fuzzy Hash: BFE0D8328104005B47106778EC4D4FA775E9E46335F100716F936C12E0EBB09D50C5D5
                                    APIs
                                    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00680BBB
                                    • timeGetTime.WINMM ref: 00680E76
                                    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00680FB3
                                    • TranslateMessage.USER32(?), ref: 00680FC7
                                    • DispatchMessageW.USER32(?), ref: 00680FD5
                                    • Sleep.KERNEL32(0000000A), ref: 00680FDF
                                    • LockWindowUpdate.USER32(00000000,?,?), ref: 0068105A
                                    • DestroyWindow.USER32 ref: 00681066
                                    • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00681080
                                    • Sleep.KERNEL32(0000000A,?,?), ref: 006B52AD
                                    • TranslateMessage.USER32(?), ref: 006B608A
                                    • DispatchMessageW.USER32(?), ref: 006B6098
                                    • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 006B60AC
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: Message$DispatchPeekSleepTranslateWindow$DestroyLockTimeUpdatetime
                                    • String ID: @COM_EVENTOBJ$@GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE$@TRAY_ID$prs$prs$prs$prs
                                    • API String ID: 4003667617-202710817
                                    • Opcode ID: 677b228234e5f4104189a517e4cabfdc4517fbfafd995e7e6faa89c2dbb85f6c
                                    • Instruction ID: a99c22d5da334f0675a7c543f2ef6582e8408160543151b6faff7d93361d0493
                                    • Opcode Fuzzy Hash: 677b228234e5f4104189a517e4cabfdc4517fbfafd995e7e6faa89c2dbb85f6c
                                    • Instruction Fuzzy Hash: CBB2D2B0608741DFE764DF24C884BEAB7E6BF84304F148A1DE54A873A1DB75E885CB46
                                    APIs
                                      • Part of subcall function 006D91E9: __time64.LIBCMT ref: 006D91F3
                                      • Part of subcall function 00675045: _fseek.LIBCMT ref: 0067505D
                                    • __wsplitpath.LIBCMT ref: 006D94BE
                                      • Part of subcall function 0069432E: __wsplitpath_helper.LIBCMT ref: 0069436E
                                    • _wcscpy.LIBCMT ref: 006D94D1
                                    • _wcscat.LIBCMT ref: 006D94E4
                                    • __wsplitpath.LIBCMT ref: 006D9509
                                    • _wcscat.LIBCMT ref: 006D951F
                                    • _wcscat.LIBCMT ref: 006D9532
                                      • Part of subcall function 006D922F: _memmove.LIBCMT ref: 006D9268
                                      • Part of subcall function 006D922F: _memmove.LIBCMT ref: 006D9277
                                    • _wcscmp.LIBCMT ref: 006D9479
                                      • Part of subcall function 006D99BE: _wcscmp.LIBCMT ref: 006D9AAE
                                      • Part of subcall function 006D99BE: _wcscmp.LIBCMT ref: 006D9AC1
                                    • DeleteFileW.KERNEL32(?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 006D96DC
                                    • _wcsncpy.LIBCMT ref: 006D974F
                                    • DeleteFileW.KERNEL32(?,?), ref: 006D9785
                                    • CopyFileW.KERNELBASE(?,?,00000000,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 006D979B
                                    • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 006D97AC
                                    • DeleteFileW.KERNELBASE(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 006D97BE
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: File$Delete$_wcscat_wcscmp$__wsplitpath_memmove$Copy__time64__wsplitpath_helper_fseek_wcscpy_wcsncpy
                                    • String ID:
                                    • API String ID: 1500180987-0
                                    • Opcode ID: c5f7f0f5bcc4bc92bb48baeb2bb2c90dab13581244a7f9d0928ff8f6eee598f7
                                    • Instruction ID: c788d765a15fe48faab62110af5ed828b0541f2d6158549648dc049fd9b01524
                                    • Opcode Fuzzy Hash: c5f7f0f5bcc4bc92bb48baeb2bb2c90dab13581244a7f9d0928ff8f6eee598f7
                                    • Instruction Fuzzy Hash: B3C13CB1D00219AADF61DF95CC85EDEB7BEEF45300F0040AAF609E7251EB709A858F65
                                    APIs
                                    • GetSysColorBrush.USER32(0000000F), ref: 00673074
                                    • RegisterClassExW.USER32(00000030), ref: 0067309E
                                    • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 006730AF
                                    • InitCommonControlsEx.COMCTL32(?), ref: 006730CC
                                    • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 006730DC
                                    • LoadIconW.USER32(000000A9), ref: 006730F2
                                    • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00673101
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                    • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                    • API String ID: 2914291525-1005189915
                                    • Opcode ID: e46e53f8c385a347826ffaa4c18aca1f65bf63424db63a219350a81038888786
                                    • Instruction ID: 7c5561e8bae8dfc3443ed35fc07db07c4ee8b123cbb5ae2054244adf70d7f689
                                    • Opcode Fuzzy Hash: e46e53f8c385a347826ffaa4c18aca1f65bf63424db63a219350a81038888786
                                    • Instruction Fuzzy Hash: 723158B1840309AFEB00DFA4EC85BD9BBF1FF09311F14862AE540E62A1D3BA4584CF95
                                    APIs
                                    • GetSysColorBrush.USER32(0000000F), ref: 00673074
                                    • RegisterClassExW.USER32(00000030), ref: 0067309E
                                    • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 006730AF
                                    • InitCommonControlsEx.COMCTL32(?), ref: 006730CC
                                    • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 006730DC
                                    • LoadIconW.USER32(000000A9), ref: 006730F2
                                    • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00673101
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                    • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                    • API String ID: 2914291525-1005189915
                                    • Opcode ID: 13d4c9b16e1696b6cf388d1c3236edf11a1b47543f82cef47684cd8ef62708b2
                                    • Instruction ID: 1d5a88a1cdd3e4167581cca7bdb94107e1c6a20efdc9294aa4c06c504a682fa8
                                    • Opcode Fuzzy Hash: 13d4c9b16e1696b6cf388d1c3236edf11a1b47543f82cef47684cd8ef62708b2
                                    • Instruction Fuzzy Hash: 4121C8B1900218BFEB00EF94EC89BDDBBF5FB08701F00952AF610A62A0D7B54544CF95
                                    APIs
                                      • Part of subcall function 00674864: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,007362F8,?,006737C0,?), ref: 00674882
                                      • Part of subcall function 0069074F: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,006772C5), ref: 00690771
                                    • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 00677308
                                    • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 006AECF1
                                    • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 006AED32
                                    • RegCloseKey.ADVAPI32(?), ref: 006AED70
                                    • _wcscat.LIBCMT ref: 006AEDC9
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: NameQueryValue$CloseFileFullModuleOpenPath_wcscat
                                    • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                    • API String ID: 2673923337-2727554177
                                    • Opcode ID: b9d3f18ce461453aa7014506def9ac2aff2722f45a7543ab4971dd7a06d83ddd
                                    • Instruction ID: 9a00792b44aad35b24283aa005c6c7767a97fa9ec6b906afc27c7795448f9f82
                                    • Opcode Fuzzy Hash: b9d3f18ce461453aa7014506def9ac2aff2722f45a7543ab4971dd7a06d83ddd
                                    • Instruction Fuzzy Hash: 1771B2B14083019ED768EF25DC818ABBBF9FF45750F40852EF445C72A1EB359948CB69
                                    APIs
                                    • DefWindowProcW.USER32(?,?,?,?), ref: 006736D2
                                    • KillTimer.USER32(?,00000001), ref: 006736FC
                                    • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 0067371F
                                    • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 0067372A
                                    • CreatePopupMenu.USER32 ref: 0067373E
                                    • PostQuitMessage.USER32(00000000), ref: 0067375F
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                    • String ID: TaskbarCreated$%p
                                    • API String ID: 129472671-406408202
                                    • Opcode ID: b7799c920da9988a62ea8ddbc2d31a268eb298c5b4fbda7be07de40fe5a49499
                                    • Instruction ID: ab31abd76dec515cfdcb5f9de1e73335d94255fe8b9c2e0cbfff4d75933b72bf
                                    • Opcode Fuzzy Hash: b7799c920da9988a62ea8ddbc2d31a268eb298c5b4fbda7be07de40fe5a49499
                                    • Instruction Fuzzy Hash: 504129B1100115BBEF146F24EC49BFA3797EB45301F14C229F50AC63A2DB69EE41E769
                                    APIs
                                    • GetSysColorBrush.USER32(0000000F), ref: 00673A62
                                    • LoadCursorW.USER32(00000000,00007F00), ref: 00673A71
                                    • LoadIconW.USER32(00000063), ref: 00673A88
                                    • LoadIconW.USER32(000000A4), ref: 00673A9A
                                    • LoadIconW.USER32(000000A2), ref: 00673AAC
                                    • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00673AD2
                                    • RegisterClassExW.USER32(?), ref: 00673B28
                                      • Part of subcall function 00673041: GetSysColorBrush.USER32(0000000F), ref: 00673074
                                      • Part of subcall function 00673041: RegisterClassExW.USER32(00000030), ref: 0067309E
                                      • Part of subcall function 00673041: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 006730AF
                                      • Part of subcall function 00673041: InitCommonControlsEx.COMCTL32(?), ref: 006730CC
                                      • Part of subcall function 00673041: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 006730DC
                                      • Part of subcall function 00673041: LoadIconW.USER32(000000A9), ref: 006730F2
                                      • Part of subcall function 00673041: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00673101
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                    • String ID: #$0$AutoIt v3
                                    • API String ID: 423443420-4155596026
                                    • Opcode ID: c43fb69fce937c92db93b071797ebc9b25c209f42f57ff27bca7d4da5478baeb
                                    • Instruction ID: a2effee1c7ff45cf0b6ee4da085a3cb5d525c2e9e2b857e8a56c88631fd9e052
                                    • Opcode Fuzzy Hash: c43fb69fce937c92db93b071797ebc9b25c209f42f57ff27bca7d4da5478baeb
                                    • Instruction Fuzzy Hash: 83214D70900308BFEB109FA4EC49B9E7FB5FB08712F11C12AF944A62A1D3BA5554DF98
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: FileLibraryLoadModuleName__wcsicmp_l_memmove
                                    • String ID: /AutoIt3ExecuteLine$/AutoIt3ExecuteScript$/AutoIt3OutputDebug$/ErrorStdOut$>>>AUTOIT NO CMDEXECUTE<<<$CMDLINE$CMDLINERAW$bs
                                    • API String ID: 1825951767-2207656441
                                    • Opcode ID: 19de7605fd9018800c60055c4551e7c1fe7422d97abf89b2e40c1048b538145d
                                    • Instruction ID: 04ce5af2d50f66fa9ed8eda20d32d2ca6a10e7c51166a68be658ee9904c33be8
                                    • Opcode Fuzzy Hash: 19de7605fd9018800c60055c4551e7c1fe7422d97abf89b2e40c1048b538145d
                                    • Instruction Fuzzy Hash: EAA1627181022DAADF44EBA0CC95DEEB77ABF14300F00842EF41AA7291EF745A09CB65
                                    APIs
                                      • Part of subcall function 006903A2: MapVirtualKeyW.USER32(0000005B,00000000), ref: 006903D3
                                      • Part of subcall function 006903A2: MapVirtualKeyW.USER32(00000010,00000000), ref: 006903DB
                                      • Part of subcall function 006903A2: MapVirtualKeyW.USER32(000000A0,00000000), ref: 006903E6
                                      • Part of subcall function 006903A2: MapVirtualKeyW.USER32(000000A1,00000000), ref: 006903F1
                                      • Part of subcall function 006903A2: MapVirtualKeyW.USER32(00000011,00000000), ref: 006903F9
                                      • Part of subcall function 006903A2: MapVirtualKeyW.USER32(00000012,00000000), ref: 00690401
                                      • Part of subcall function 00686259: RegisterWindowMessageW.USER32(WM_GETCONTROLNAME,?,0067FA90), ref: 006862B4
                                    • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 0067FB2D
                                    • OleInitialize.OLE32(00000000), ref: 0067FBAA
                                    • CloseHandle.KERNEL32(00000000), ref: 006B49F2
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                    • String ID: <gs$\ds$%p$cs
                                    • API String ID: 1986988660-2848024899
                                    • Opcode ID: df02fde079c789f1ee79632327830e9cffc7b7910cc19f5dcf9f6aaf0114b117
                                    • Instruction ID: 7a5dc03e00d97ab313dce89a011c345504d5f60bda65ceab88c68585193b0d11
                                    • Opcode Fuzzy Hash: df02fde079c789f1ee79632327830e9cffc7b7910cc19f5dcf9f6aaf0114b117
                                    • Instruction Fuzzy Hash: CB81BBB0D05280AEE784EF39E9416557BE6FB9970A750C23ED019C7262EB3D8604CF6D
                                    APIs
                                    • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 015F0529
                                    • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 015F074F
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1378935431.00000000015ED000.00000040.00000020.00020000.00000000.sdmp, Offset: 015ED000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_15ed000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: CreateFileFreeVirtual
                                    • String ID:
                                    • API String ID: 204039940-0
                                    • Opcode ID: d349c2c11462b54f33c86561be68849ac3e84e681e3d8bb3fdc8e10bc75df865
                                    • Instruction ID: 659b84d6e750ceabf803801e40be0c593ba4d9d98f41051273645a5f448766c7
                                    • Opcode Fuzzy Hash: d349c2c11462b54f33c86561be68849ac3e84e681e3d8bb3fdc8e10bc75df865
                                    • Instruction Fuzzy Hash: D0A1F674E00209EBDF14CFA4C998BAEBBB6BF48304F248559E611BB2C1D7759A41CF54
                                    APIs
                                    • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00673A15
                                    • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00673A36
                                    • ShowWindow.USER32(00000000,?,?), ref: 00673A4A
                                    • ShowWindow.USER32(00000000,?,?), ref: 00673A53
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: Window$CreateShow
                                    • String ID: AutoIt v3$edit
                                    • API String ID: 1584632944-3779509399
                                    • Opcode ID: a6aac0f11fa0f2ce828b0da36506642405d6ae313be18589210921ac008c90b5
                                    • Instruction ID: 7cb57f8435370f4adcaaac88a41afaa03111df445e088af33889cc6fd6c30e87
                                    • Opcode Fuzzy Hash: a6aac0f11fa0f2ce828b0da36506642405d6ae313be18589210921ac008c90b5
                                    • Instruction Fuzzy Hash: 0BF030706002947EFA301717AC08E373E7EEBC7F61B02C029B900A2170C5A95810CAB4
                                    APIs
                                      • Part of subcall function 015F0108: Sleep.KERNELBASE(000001F4), ref: 015F0119
                                    • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 015F0345
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1378935431.00000000015ED000.00000040.00000020.00020000.00000000.sdmp, Offset: 015ED000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_15ed000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: CreateFileSleep
                                    • String ID: P3XGUOAKUMW3VEMSSD2
                                    • API String ID: 2694422964-3268898088
                                    • Opcode ID: 19e5696bfe0e4dde0b62711eec24509025f4f61f86bc55ad81dfeb04e712e6c4
                                    • Instruction ID: 0fdc91d77ef6867ccb6e2788b43fd4d3746a1e43d9b54dd6d1c36ff655e3a4cc
                                    • Opcode Fuzzy Hash: 19e5696bfe0e4dde0b62711eec24509025f4f61f86bc55ad81dfeb04e712e6c4
                                    • Instruction Fuzzy Hash: 98519F70D04249EBEF11DBA4C818BEFBBB5AF55300F044199E609BB2C1D7B90B04CBA5
                                    APIs
                                    • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 006AD5EC
                                      • Part of subcall function 00677D2C: _memmove.LIBCMT ref: 00677D66
                                    • _memset.LIBCMT ref: 0067418D
                                    • _wcscpy.LIBCMT ref: 006741E1
                                    • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 006741F1
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: IconLoadNotifyShell_String_memmove_memset_wcscpy
                                    • String ID: Line:
                                    • API String ID: 3942752672-1585850449
                                    • Opcode ID: 0b4603ecae3a358ae159a62ea5c6f8011e4324417a447b804016807f82e190a1
                                    • Instruction ID: 98268ef7f56c37e26edbdee91471e54f085db2f5874d01a9b135948fb8a3d5bd
                                    • Opcode Fuzzy Hash: 0b4603ecae3a358ae159a62ea5c6f8011e4324417a447b804016807f82e190a1
                                    • Instruction Fuzzy Hash: C631D371408314AAE761EB60DC49BEB77EAAF44300F10C51EF199921A2EF749648C79A
                                    APIs
                                      • Part of subcall function 00674F3D: LoadLibraryExW.KERNEL32(?,00000000,00000002,?,007362F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00674F6F
                                    • _free.LIBCMT ref: 006AE68C
                                    • _free.LIBCMT ref: 006AE6D3
                                      • Part of subcall function 00676BEC: SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00676D0D
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: _free$CurrentDirectoryLibraryLoad
                                    • String ID: >>>AUTOIT SCRIPT<<<$Bad directive syntax error
                                    • API String ID: 2861923089-1757145024
                                    • Opcode ID: 0d77d291bed7626ac96229f7ad6fe3acd5cf2225ada0e2550a49c5c091ebf8fb
                                    • Instruction ID: 6fc75d3876c8a832c8d69004d7efbde66a3d34f8fb30346517a989d8fd9c9faa
                                    • Opcode Fuzzy Hash: 0d77d291bed7626ac96229f7ad6fe3acd5cf2225ada0e2550a49c5c091ebf8fb
                                    • Instruction Fuzzy Hash: 5B918C71910219AFCF44EFA4C8919EDB7BAFF1A300B10846EF815AB291EB359D05CF64
                                    APIs
                                    • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,00000003,00000000,80000001,80000001,?,006735A1,SwapMouseButtons,00000004,?), ref: 006735D4
                                    • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,006735A1,SwapMouseButtons,00000004,?,?,?,?,00672754), ref: 006735F5
                                    • RegCloseKey.KERNELBASE(00000000,?,?,006735A1,SwapMouseButtons,00000004,?,?,?,?,00672754), ref: 00673617
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: CloseOpenQueryValue
                                    • String ID: Control Panel\Mouse
                                    • API String ID: 3677997916-824357125
                                    • Opcode ID: 1c4afb262aa3cc2cf37e1cd89829907175ede30022071c2041186aac3052edd0
                                    • Instruction ID: eda3a76da945a0f2f5249b9b08994be987a9e5d49e0653df75bed142c4b99739
                                    • Opcode Fuzzy Hash: 1c4afb262aa3cc2cf37e1cd89829907175ede30022071c2041186aac3052edd0
                                    • Instruction Fuzzy Hash: 64114571611228BFDB20CF64DC80EFEBBBAEF04740F109469E809D7310E6719E40ABA0
                                    APIs
                                    • CreateProcessW.KERNELBASE(?,00000000), ref: 015EF935
                                    • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 015EF959
                                    • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 015EF97B
                                    • TerminateProcess.KERNELBASE(00000000,00000000,?), ref: 015EFC84
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1378935431.00000000015ED000.00000040.00000020.00020000.00000000.sdmp, Offset: 015ED000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_15ed000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: Process$ContextCreateMemoryReadTerminateThreadWow64
                                    • String ID:
                                    • API String ID: 572931308-0
                                    • Opcode ID: a08d661af1579fd21ac3dcfb20f4bf99dc511b72db546338f3390fc10d84f6f3
                                    • Instruction ID: c30f7385dd9cda684bba28cc3abf3f404b56e43a99a35d163acd8e71d42a368b
                                    • Opcode Fuzzy Hash: a08d661af1579fd21ac3dcfb20f4bf99dc511b72db546338f3390fc10d84f6f3
                                    • Instruction Fuzzy Hash: 30620930A14258DBEB24CBA4C854BDEB776FF58300F1091A9D60DEB390EB759E81CB59
                                    APIs
                                      • Part of subcall function 00675045: _fseek.LIBCMT ref: 0067505D
                                      • Part of subcall function 006D99BE: _wcscmp.LIBCMT ref: 006D9AAE
                                      • Part of subcall function 006D99BE: _wcscmp.LIBCMT ref: 006D9AC1
                                    • _free.LIBCMT ref: 006D992C
                                    • _free.LIBCMT ref: 006D9933
                                    • _free.LIBCMT ref: 006D999E
                                      • Part of subcall function 00692F95: RtlFreeHeap.NTDLL(00000000,00000000,?,00699C64), ref: 00692FA9
                                      • Part of subcall function 00692F95: GetLastError.KERNEL32(00000000,?,00699C64), ref: 00692FBB
                                    • _free.LIBCMT ref: 006D99A6
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: _free$_wcscmp$ErrorFreeHeapLast_fseek
                                    • String ID:
                                    • API String ID: 1552873950-0
                                    • Opcode ID: c040f5d591410a8d3afab51092a26b6f5939c84b98243336257d617f1f09bfd3
                                    • Instruction ID: 04d26628c3312264504d8e26a493efd654ea5775377f53fe0e751bf36bb491d8
                                    • Opcode Fuzzy Hash: c040f5d591410a8d3afab51092a26b6f5939c84b98243336257d617f1f09bfd3
                                    • Instruction Fuzzy Hash: 0D5150B1D04218AFDF649F64CC81A9EBB7AEF48310F1444AEB609A7341DB715E90CF59
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                                    • String ID:
                                    • API String ID: 2782032738-0
                                    • Opcode ID: 14470a6213cb86a88b8286372661136e60ed3d9327b1e96cf2061ba74b92ecb7
                                    • Instruction ID: 48277aec15c6a869f795d69ee64fb081d4d716d748e1e98a1e8f207ed9dcd67b
                                    • Opcode Fuzzy Hash: 14470a6213cb86a88b8286372661136e60ed3d9327b1e96cf2061ba74b92ecb7
                                    • Instruction Fuzzy Hash: 9641B170A006069FDF288EA9C880DAF77AFAF85360B24816DE855C7F44EE719D428B44
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: _memmove
                                    • String ID: AU3!P/p$EA06
                                    • API String ID: 4104443479-1365913961
                                    • Opcode ID: bf05d32f781d4c24815221c36c90161c3215b5b8e06ad0b6b5269b097f57e39f
                                    • Instruction ID: 7b12da08131816e9fb0d264fd8c1d7f8854cb88079c0802447f29181d3ead549
                                    • Opcode Fuzzy Hash: bf05d32f781d4c24815221c36c90161c3215b5b8e06ad0b6b5269b097f57e39f
                                    • Instruction Fuzzy Hash: 1F41A031A045549BDF219B6488597FE7FA7AF41320F18C069FC8B9B382DF654D4187E1
                                    APIs
                                    • _memset.LIBCMT ref: 006AEE62
                                    • GetOpenFileNameW.COMDLG32(?), ref: 006AEEAC
                                      • Part of subcall function 006748AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,006748A1,?,?,006737C0,?), ref: 006748CE
                                      • Part of subcall function 006909D5: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 006909F4
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: Name$Path$FileFullLongOpen_memset
                                    • String ID: X
                                    • API String ID: 3777226403-3081909835
                                    • Opcode ID: 8ea3035cb43b3207096f62161567d7f749fd0dff8380524f14b929b7c84a2172
                                    • Instruction ID: 0582505e035271659e9f45f5e097358e3529c1167d34770c1f8b9dbf84d9746a
                                    • Opcode Fuzzy Hash: 8ea3035cb43b3207096f62161567d7f749fd0dff8380524f14b929b7c84a2172
                                    • Instruction Fuzzy Hash: A621C630A002589BDF51DF94C845BEE7BFEAF49300F04805AE508EB241DBB8594A8FA5
                                    APIs
                                    • GetTempPathW.KERNEL32(00000104,?), ref: 006D9B82
                                    • GetTempFileNameW.KERNELBASE(?,aut,00000000,?), ref: 006D9B99
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: Temp$FileNamePath
                                    • String ID: aut
                                    • API String ID: 3285503233-3010740371
                                    • Opcode ID: a24641b1ac21919e067b83027182f81450aadd18af915ecba485214adf5ff2f9
                                    • Instruction ID: 1a41a9a2cd7b6559b2df1862b05de3a87d40257bec1ad40d6a6c066133f0033b
                                    • Opcode Fuzzy Hash: a24641b1ac21919e067b83027182f81450aadd18af915ecba485214adf5ff2f9
                                    • Instruction Fuzzy Hash: 1ED05E7954030EBBDB10ABD8EC0EFAA772CEB04700F0042A1BE54D11A2DEB49698CB91
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 9f2cfc7c8f0ff5e8025f1f5df05ebbac0d15eb8f72451071a94718830894386e
                                    • Instruction ID: db37c54837e1c7cb889c17caa14c5cf838004041ca99ad0774b82c439175142c
                                    • Opcode Fuzzy Hash: 9f2cfc7c8f0ff5e8025f1f5df05ebbac0d15eb8f72451071a94718830894386e
                                    • Instruction Fuzzy Hash: C2F17A70A083409FC754DF29C484A6ABBE6FF88314F14892EF9999B351D731E946CF82
                                    APIs
                                    • _memset.LIBCMT ref: 00674401
                                    • Shell_NotifyIconW.SHELL32(00000000,?), ref: 006744A6
                                    • Shell_NotifyIconW.SHELL32(00000001,?), ref: 006744C3
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: IconNotifyShell_$_memset
                                    • String ID:
                                    • API String ID: 1505330794-0
                                    • Opcode ID: 3bce71cfb9c4ed253d3823809839c2bf37a10d19011ffd985cf5523dc3025f72
                                    • Instruction ID: 4584f91b91f903b193b73e2c98ceae9f5a42f4b592cf4e7e648788c409bc8154
                                    • Opcode Fuzzy Hash: 3bce71cfb9c4ed253d3823809839c2bf37a10d19011ffd985cf5523dc3025f72
                                    • Instruction Fuzzy Hash: 28318FB05043019FD720DF24D8887ABBBF9FB49305F00892EE59E83351DB75A948CB96
                                    APIs
                                    • __FF_MSGBANNER.LIBCMT ref: 00695963
                                      • Part of subcall function 0069A3AB: __NMSG_WRITE.LIBCMT ref: 0069A3D2
                                      • Part of subcall function 0069A3AB: __NMSG_WRITE.LIBCMT ref: 0069A3DC
                                    • __NMSG_WRITE.LIBCMT ref: 0069596A
                                      • Part of subcall function 0069A408: GetModuleFileNameW.KERNEL32(00000000,007343BA,00000104,?,00000001,00000000), ref: 0069A49A
                                      • Part of subcall function 0069A408: ___crtMessageBoxW.LIBCMT ref: 0069A548
                                      • Part of subcall function 006932DF: ___crtCorExitProcess.LIBCMT ref: 006932E5
                                      • Part of subcall function 006932DF: ExitProcess.KERNEL32 ref: 006932EE
                                      • Part of subcall function 00698D68: __getptd_noexit.LIBCMT ref: 00698D68
                                    • RtlAllocateHeap.NTDLL(015B0000,00000000,00000001,00000000,?,?,?,00691013,?), ref: 0069598F
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: ExitProcess___crt$AllocateFileHeapMessageModuleName__getptd_noexit
                                    • String ID:
                                    • API String ID: 1372826849-0
                                    • Opcode ID: dcd225c16689230db3bcd0cba876f6af16256ce0fcd7ffd8b8636d4fcbda1c61
                                    • Instruction ID: bbe44b280d0e29a9b1aac89222ab1992f3b0999f5e4af426280fbbb969bab75e
                                    • Opcode Fuzzy Hash: dcd225c16689230db3bcd0cba876f6af16256ce0fcd7ffd8b8636d4fcbda1c61
                                    • Instruction Fuzzy Hash: B601D232200B51EEFE663B64D842AAE728F9F42735F10002EF506EBB81DA709D018369
                                    APIs
                                    • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000,?,?,006D97D2,?,?,?,?,?,00000004), ref: 006D9B45
                                    • SetFileTime.KERNELBASE(00000000,?,00000000,?,?,006D97D2,?,?,?,?,?,00000004,00000001,?,?,00000004), ref: 006D9B5B
                                    • CloseHandle.KERNEL32(00000000,?,006D97D2,?,?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 006D9B62
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: File$CloseCreateHandleTime
                                    • String ID:
                                    • API String ID: 3397143404-0
                                    • Opcode ID: fde5fb266b731dc4075d81dd4a8b791e5f6014175690c4da4b47a3837889f84a
                                    • Instruction ID: 2ba435cfd05662e43205fb16abf3f07a9bd48d13af676263f3aa16a788118283
                                    • Opcode Fuzzy Hash: fde5fb266b731dc4075d81dd4a8b791e5f6014175690c4da4b47a3837889f84a
                                    • Instruction Fuzzy Hash: 1AE08632580214B7D7211B54EC09FDE7B1AAF05761F144121FB14691E087B12521D7D8
                                    APIs
                                    • _free.LIBCMT ref: 006D8FA5
                                      • Part of subcall function 00692F95: RtlFreeHeap.NTDLL(00000000,00000000,?,00699C64), ref: 00692FA9
                                      • Part of subcall function 00692F95: GetLastError.KERNEL32(00000000,?,00699C64), ref: 00692FBB
                                    • _free.LIBCMT ref: 006D8FB6
                                    • _free.LIBCMT ref: 006D8FC8
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: _free$ErrorFreeHeapLast
                                    • String ID:
                                    • API String ID: 776569668-0
                                    • Opcode ID: 358057a8cee776a4634d1da6a11f7167cf7af4a4bc472a0de26b354d0d310ced
                                    • Instruction ID: 27cfe816ad5c93395b0ce5546dbf4d76fa500cd56ac6737daaa8814c82fe458c
                                    • Opcode Fuzzy Hash: 358057a8cee776a4634d1da6a11f7167cf7af4a4bc472a0de26b354d0d310ced
                                    • Instruction Fuzzy Hash: 79E012A1A097026ECE64AB78AD54ED367EF5F48390B18081EB409DB742DE24F8518128
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: CALL
                                    • API String ID: 0-4196123274
                                    • Opcode ID: 8a99044d283c448c73c57d2e398653ae37504fd9d74a38664b9646c65bd46c69
                                    • Instruction ID: ffa529e2633b954870b67d75dc334bba83b3702352d589b4919dd289b4df300c
                                    • Opcode Fuzzy Hash: 8a99044d283c448c73c57d2e398653ae37504fd9d74a38664b9646c65bd46c69
                                    • Instruction Fuzzy Hash: C32237B0508241DFDB64DF54C494B6ABBE2BF85300F14C96DE89A8B362D731ED81DB86
                                    APIs
                                    • CreateProcessW.KERNELBASE(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?), ref: 015F01F2
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1378935431.00000000015ED000.00000040.00000020.00020000.00000000.sdmp, Offset: 015ED000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_15ed000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: CreateProcess
                                    • String ID: D
                                    • API String ID: 963392458-2746444292
                                    • Opcode ID: c44042240367ae80eaa8206569f06584b606a7a7c9118113533914ad92b6354f
                                    • Instruction ID: 3965384d6b5f46eef598c71cb7389a49f398227f0232e379dd25e142b7bfdf76
                                    • Opcode Fuzzy Hash: c44042240367ae80eaa8206569f06584b606a7a7c9118113533914ad92b6354f
                                    • Instruction Fuzzy Hash: 0701FB71A4030DABDB20EBE0CC49FEE7779BB54701F44851DBB16AA1C1EA7496088BA1
                                    APIs
                                    • CreateProcessW.KERNELBASE(?,00000000), ref: 015EF935
                                    • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 015EF959
                                    • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 015EF97B
                                    • TerminateProcess.KERNELBASE(00000000,00000000,?), ref: 015EFC84
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1378935431.00000000015ED000.00000040.00000020.00020000.00000000.sdmp, Offset: 015ED000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_15ed000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: Process$ContextCreateMemoryReadTerminateThreadWow64
                                    • String ID:
                                    • API String ID: 572931308-0
                                    • Opcode ID: b327fbffe67f088a8ec06bc3364a8d9e1395271827ab643009cfd88a26bb8519
                                    • Instruction ID: e241bae0dedc354f02449f9654e25b5bfd443f5e85b8da9a213ab55bd7c258fb
                                    • Opcode Fuzzy Hash: b327fbffe67f088a8ec06bc3364a8d9e1395271827ab643009cfd88a26bb8519
                                    • Instruction Fuzzy Hash: B712DE20E18658C6EB24DF64D8507DEB272FF68300F1094E9910DEB7A5E77A4E81CF5A
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: _memmove
                                    • String ID:
                                    • API String ID: 4104443479-0
                                    • Opcode ID: 888ce228c65e5e126e2c0d83d6bef63a0f4650b727a1fb86e52d4496ebb79edc
                                    • Instruction ID: 10d59b149c8a7cad5485830e02157cb6f3149e0a6c8f462bf6d73cd988f75d3e
                                    • Opcode Fuzzy Hash: 888ce228c65e5e126e2c0d83d6bef63a0f4650b727a1fb86e52d4496ebb79edc
                                    • Instruction Fuzzy Hash: 6C31D4B1604506AFC714DF28C8D1EA9F3AAFF48320725C62DE919CB791DB30E860CB90
                                    APIs
                                    • IsThemeActive.UXTHEME ref: 00674992
                                      • Part of subcall function 006935AC: __lock.LIBCMT ref: 006935B2
                                      • Part of subcall function 006935AC: DecodePointer.KERNEL32(00000001,?,006749A7,006C81BC), ref: 006935BE
                                      • Part of subcall function 006935AC: EncodePointer.KERNEL32(?,?,006749A7,006C81BC), ref: 006935C9
                                      • Part of subcall function 00674A5B: SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 00674A73
                                      • Part of subcall function 00674A5B: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00674A88
                                      • Part of subcall function 00673B4C: GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00673B7A
                                      • Part of subcall function 00673B4C: IsDebuggerPresent.KERNEL32 ref: 00673B8C
                                      • Part of subcall function 00673B4C: GetFullPathNameW.KERNEL32(00007FFF,?,?,007362F8,007362E0,?,?), ref: 00673BFD
                                      • Part of subcall function 00673B4C: SetCurrentDirectoryW.KERNEL32(?), ref: 00673C81
                                    • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 006749D2
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: InfoParametersSystem$CurrentDirectoryPointer$ActiveDebuggerDecodeEncodeFullNamePathPresentTheme__lock
                                    • String ID:
                                    • API String ID: 1438897964-0
                                    • Opcode ID: 3536537ce4fd12b86748f2efb118d5740db1370c4a71768f97c6d0cd4751a9d6
                                    • Instruction ID: fef912a0c3b355c97330e55de293b313919329c0e783ea617d3e62a821e6285f
                                    • Opcode Fuzzy Hash: 3536537ce4fd12b86748f2efb118d5740db1370c4a71768f97c6d0cd4751a9d6
                                    • Instruction Fuzzy Hash: 6811AC71908311ABD700EF29EC0591AFBF9FF99710F00C52EF048832A2DB749544CB9A
                                    APIs
                                      • Part of subcall function 0069594C: __FF_MSGBANNER.LIBCMT ref: 00695963
                                      • Part of subcall function 0069594C: __NMSG_WRITE.LIBCMT ref: 0069596A
                                      • Part of subcall function 0069594C: RtlAllocateHeap.NTDLL(015B0000,00000000,00000001,00000000,?,?,?,00691013,?), ref: 0069598F
                                    • std::exception::exception.LIBCMT ref: 0069102C
                                    • __CxxThrowException@8.LIBCMT ref: 00691041
                                      • Part of subcall function 006987DB: RaiseException.KERNEL32(?,?,?,0072BAF8,00000000,?,?,?,?,00691046,?,0072BAF8,?,00000001), ref: 00698830
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: AllocateExceptionException@8HeapRaiseThrowstd::exception::exception
                                    • String ID:
                                    • API String ID: 3902256705-0
                                    • Opcode ID: b84f9fb5d4448ada9249649475d361c93e0c22cf1d5faebe3bb4592c4b2c3663
                                    • Instruction ID: fcb31a194e95326f41e545e74a1c42809b82d6ae039a07bf07f8b202f47a03c1
                                    • Opcode Fuzzy Hash: b84f9fb5d4448ada9249649475d361c93e0c22cf1d5faebe3bb4592c4b2c3663
                                    • Instruction Fuzzy Hash: 56F0A93550025DA6CF21AA94EC059DF77AE9F02350F30052AF8149AA92DF769E819294
                                    APIs
                                      • Part of subcall function 00698D68: __getptd_noexit.LIBCMT ref: 00698D68
                                    • __lock_file.LIBCMT ref: 0069561B
                                      • Part of subcall function 00696E4E: __lock.LIBCMT ref: 00696E71
                                    • __fclose_nolock.LIBCMT ref: 00695626
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                                    • String ID:
                                    • API String ID: 2800547568-0
                                    • Opcode ID: b14ac47beb5ad3d3561c4341bd8467de14ae226d2ea74220d6201de50c24fb44
                                    • Instruction ID: 67528152ef347ae7573b02831d9b1c28bb85b271ef7c4863e9a279aa38e9a9fa
                                    • Opcode Fuzzy Hash: b14ac47beb5ad3d3561c4341bd8467de14ae226d2ea74220d6201de50c24fb44
                                    • Instruction Fuzzy Hash: 8AF02B71800B009EDF627F35880276E77AB1F41334F55410DF412AB9D1CF7C4A019B59
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: ProtectVirtual
                                    • String ID:
                                    • API String ID: 544645111-0
                                    • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                    • Instruction ID: 2efb89a920f2fd5c7df2aad1c010cbbc2f1521efda5d8d0b4ec0e436f7707c37
                                    • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                    • Instruction Fuzzy Hash: 4D31B371A00105DFEB18DF58D4809A9F7AAFF59310B648AA5E909CBB51D731EEC1DB80
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: ClearVariant
                                    • String ID:
                                    • API String ID: 1473721057-0
                                    • Opcode ID: caf7f809efe22ceedf8d616597cd83a1c5e2f5cf11d71e19f17ece3bd0d288fa
                                    • Instruction ID: d09044d9c810189435b4795f679147417112c389019961e064f665bc591ee830
                                    • Opcode Fuzzy Hash: caf7f809efe22ceedf8d616597cd83a1c5e2f5cf11d71e19f17ece3bd0d288fa
                                    • Instruction Fuzzy Hash: 0E4147B4508341CFDB24CF54C484B5ABBE2BF85308F19899CE8994B762C732E885CB52
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: _memmove
                                    • String ID:
                                    • API String ID: 4104443479-0
                                    • Opcode ID: 68d7cc2c9334143b23bac9bf692d8915d71cbab29f30bc7ab7360eecc2f6c154
                                    • Instruction ID: f05e97ef1c4f8bfc3a518c1f13f90d5a996ea7ddf3a1dd7cb774448d4945e5c7
                                    • Opcode Fuzzy Hash: 68d7cc2c9334143b23bac9bf692d8915d71cbab29f30bc7ab7360eecc2f6c154
                                    • Instruction Fuzzy Hash: 14213671604609EBDF20AF60FC417797BBAFF15350F21C56EE48AC5191EB3098A18B4A
                                    APIs
                                      • Part of subcall function 00674D13: FreeLibrary.KERNEL32(00000000,?), ref: 00674D4D
                                      • Part of subcall function 0069548B: __wfsopen.LIBCMT ref: 00695496
                                    • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,007362F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00674F6F
                                      • Part of subcall function 00674CC8: FreeLibrary.KERNEL32(00000000), ref: 00674D02
                                      • Part of subcall function 00674DD0: _memmove.LIBCMT ref: 00674E1A
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: Library$Free$Load__wfsopen_memmove
                                    • String ID:
                                    • API String ID: 1396898556-0
                                    • Opcode ID: 0f18ce6ca65cea3b4daf0ad2d7c963ce554e405d8e131e144d47e1e33fa85d42
                                    • Instruction ID: bdbfc1dbd4b783c78ddbab4a55801a1fa88541a156920deb841024116000f323
                                    • Opcode Fuzzy Hash: 0f18ce6ca65cea3b4daf0ad2d7c963ce554e405d8e131e144d47e1e33fa85d42
                                    • Instruction Fuzzy Hash: 1F11C431700209AACB55FF70CC0ABAE77AA9F81700F10C42DF546A6281DF759A059BA4
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: ClearVariant
                                    • String ID:
                                    • API String ID: 1473721057-0
                                    • Opcode ID: 53f3718def1d02c0990dff7860ace996fd2ae9a45f219777b3650e67889c5db1
                                    • Instruction ID: a456af6b9ae1a08923c9b9393935376cda2006833fba58192944cc2fcb92eccb
                                    • Opcode Fuzzy Hash: 53f3718def1d02c0990dff7860ace996fd2ae9a45f219777b3650e67889c5db1
                                    • Instruction Fuzzy Hash: 972133B4508341CFDB24DF64C444A5BBBE2BF84304F04896CE99A4B721C732E885CB52
                                    APIs
                                    • __lock_file.LIBCMT ref: 00694AD6
                                      • Part of subcall function 00698D68: __getptd_noexit.LIBCMT ref: 00698D68
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: __getptd_noexit__lock_file
                                    • String ID:
                                    • API String ID: 2597487223-0
                                    • Opcode ID: e37d43f8ad40edd9d41c3d5ce4d894666c66c3b5e44297511e7427d84b4c35cc
                                    • Instruction ID: 0e8120cf190f52d468789bf65316be6b0f09788407355751a4b36072a6a76235
                                    • Opcode Fuzzy Hash: e37d43f8ad40edd9d41c3d5ce4d894666c66c3b5e44297511e7427d84b4c35cc
                                    • Instruction Fuzzy Hash: 43F0A4719402099FDF91AF74CC06BDE37ABAF01325F084518B4149B5D5CF788A52DF59
                                    APIs
                                    • FreeLibrary.KERNEL32(?,?,007362F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00674FDE
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: FreeLibrary
                                    • String ID:
                                    • API String ID: 3664257935-0
                                    • Opcode ID: 72d52b4d69be7dbbae9f44c70f798e5e108653b9d0f1def6e68b490f5df821df
                                    • Instruction ID: a8511c51a6b3b91140ba9c75f8f65e2197e4a6f95b89e3baf7b9bb9077cf9c51
                                    • Opcode Fuzzy Hash: 72d52b4d69be7dbbae9f44c70f798e5e108653b9d0f1def6e68b490f5df821df
                                    • Instruction Fuzzy Hash: CCF03971105712CFCB349F64E498862BBE6BF44329321CA3EE1DB82A10CB35A840DF40
                                    APIs
                                    • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 006909F4
                                      • Part of subcall function 00677D2C: _memmove.LIBCMT ref: 00677D66
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: LongNamePath_memmove
                                    • String ID:
                                    • API String ID: 2514874351-0
                                    • Opcode ID: 1007208b1c341a7488843e79f852250eb2ddad76a6cca0e28fff968b7edae99f
                                    • Instruction ID: cedf295cde8706f16b55c025126d547996e542b0c5739749a4adb44d875e5cd6
                                    • Opcode Fuzzy Hash: 1007208b1c341a7488843e79f852250eb2ddad76a6cca0e28fff968b7edae99f
                                    • Instruction Fuzzy Hash: 1FE0CD3690422857C720E69C9C05FFA77EEDF89790F0441B5FC0CD7204D9A09D818694
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: __wfsopen
                                    • String ID:
                                    • API String ID: 197181222-0
                                    • Opcode ID: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                                    • Instruction ID: 28e828051b8ea6e48d21f440fcb5c6d35e0fbde2574f1a9473b733f4c5589313
                                    • Opcode Fuzzy Hash: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                                    • Instruction Fuzzy Hash: BDB0927684020C77DE822E82EC02A593B5E9B40B78F808020FB0C18562A673A6A09689
                                    APIs
                                    • Sleep.KERNELBASE(000001F4), ref: 015F0119
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1378935431.00000000015ED000.00000040.00000020.00020000.00000000.sdmp, Offset: 015ED000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_15ed000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: Sleep
                                    • String ID:
                                    • API String ID: 3472027048-0
                                    • Opcode ID: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                                    • Instruction ID: 2efbad2a00b35fdb99a5b5675fff596bb8ab22d7de5059badc1d5574adab5dbe
                                    • Opcode Fuzzy Hash: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                                    • Instruction Fuzzy Hash: 5AE09A7498110DAFDB00DFA4D94969D7BB4EF04301F1005A5FD05D6681DA309A648A62
                                    APIs
                                    • Sleep.KERNELBASE(000001F4), ref: 015F0119
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1378935431.00000000015ED000.00000040.00000020.00020000.00000000.sdmp, Offset: 015ED000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_15ed000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: Sleep
                                    • String ID:
                                    • API String ID: 3472027048-0
                                    • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                    • Instruction ID: f6a1af5fc9001b3e3f9423312f249303f37b61bc541718fb2583c620924c26e6
                                    • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                    • Instruction Fuzzy Hash: 27E0E67498110DDFDB00DFB4D94969D7BB4FF04301F100165FD01D2281D6309D60CA62
                                    APIs
                                      • Part of subcall function 00672612: GetWindowLongW.USER32(?,000000EB), ref: 00672623
                                    • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 006FCE50
                                    • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 006FCE91
                                    • GetWindowLongW.USER32(FFFFFDD9,000000F0), ref: 006FCED6
                                    • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 006FCF00
                                    • SendMessageW.USER32 ref: 006FCF29
                                    • _wcsncpy.LIBCMT ref: 006FCFA1
                                    • GetKeyState.USER32(00000011), ref: 006FCFC2
                                    • GetKeyState.USER32(00000009), ref: 006FCFCF
                                    • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 006FCFE5
                                    • GetKeyState.USER32(00000010), ref: 006FCFEF
                                    • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 006FD018
                                    • SendMessageW.USER32 ref: 006FD03F
                                    • SendMessageW.USER32(?,00001030,?,006FB602), ref: 006FD145
                                    • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 006FD15B
                                    • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 006FD16E
                                    • SetCapture.USER32(?), ref: 006FD177
                                    • ClientToScreen.USER32(?,?), ref: 006FD1DC
                                    • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 006FD1E9
                                    • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 006FD203
                                    • ReleaseCapture.USER32 ref: 006FD20E
                                    • GetCursorPos.USER32(?), ref: 006FD248
                                    • ScreenToClient.USER32(?,?), ref: 006FD255
                                    • SendMessageW.USER32(?,00001012,00000000,?), ref: 006FD2B1
                                    • SendMessageW.USER32 ref: 006FD2DF
                                    • SendMessageW.USER32(?,00001111,00000000,?), ref: 006FD31C
                                    • SendMessageW.USER32 ref: 006FD34B
                                    • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 006FD36C
                                    • SendMessageW.USER32(?,0000110B,00000009,?), ref: 006FD37B
                                    • GetCursorPos.USER32(?), ref: 006FD39B
                                    • ScreenToClient.USER32(?,?), ref: 006FD3A8
                                    • GetParent.USER32(?), ref: 006FD3C8
                                    • SendMessageW.USER32(?,00001012,00000000,?), ref: 006FD431
                                    • SendMessageW.USER32 ref: 006FD462
                                    • ClientToScreen.USER32(?,?), ref: 006FD4C0
                                    • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 006FD4F0
                                    • SendMessageW.USER32(?,00001111,00000000,?), ref: 006FD51A
                                    • SendMessageW.USER32 ref: 006FD53D
                                    • ClientToScreen.USER32(?,?), ref: 006FD58F
                                    • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 006FD5C3
                                      • Part of subcall function 006725DB: GetWindowLongW.USER32(?,000000EB), ref: 006725EC
                                    • GetWindowLongW.USER32(?,000000F0), ref: 006FD65F
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease_wcsncpy
                                    • String ID: @GUI_DRAGID$@U=u$F$prs
                                    • API String ID: 3977979337-469367293
                                    • Opcode ID: 1fb6ab80725e2951796dec38fe00d263e41239f8c73d2e7bb7db035a8da2599b
                                    • Instruction ID: f5ddec59c1ea2db97121879403a635c692e529171f7cd13d340c09fb0d92c5f1
                                    • Opcode Fuzzy Hash: 1fb6ab80725e2951796dec38fe00d263e41239f8c73d2e7bb7db035a8da2599b
                                    • Instruction Fuzzy Hash: 64429A74208249EFD721CF28C944ABABBE7FF49324F14452DF695873A1CB31A851CB96
                                    APIs
                                    • SendMessageW.USER32(?,00000400,00000000,00000000), ref: 006F873F
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: MessageSend
                                    • String ID: %d/%02d/%02d$@U=u
                                    • API String ID: 3850602802-2764005415
                                    • Opcode ID: 3b42bc381ed0b7e5f6985e8f4656dcf0102ed6af94454d48fa43845ca1950272
                                    • Instruction ID: 8e46a8a528ef783545197abcff3b3f922e2f8b280a914c24fec85e2720024f95
                                    • Opcode Fuzzy Hash: 3b42bc381ed0b7e5f6985e8f4656dcf0102ed6af94454d48fa43845ca1950272
                                    • Instruction Fuzzy Hash: 1412AE71500208AFEB259F24CC49FBE7BBAEF85710F2441A9FA15EB2A1DF709941CB50
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: _memmove$_memset
                                    • String ID: 0wr$DEFINE$Oah$Q\E$[:<:]]$[:>:]]$\b(?<=\w)$\b(?=\w)
                                    • API String ID: 1357608183-3592995527
                                    • Opcode ID: 05af2191ec1f2780b3623ad00ef21a13a39d2e73ebb4b5bfc8dcb86494af4051
                                    • Instruction ID: 2eb0f07e2e093e68b59ba2a9effdde2f8a7d5f4fb9d504239fcd28b0b720a60a
                                    • Opcode Fuzzy Hash: 05af2191ec1f2780b3623ad00ef21a13a39d2e73ebb4b5bfc8dcb86494af4051
                                    • Instruction Fuzzy Hash: 9C937F71A042169BDB24DF58C891BFDB7B2FF48710F24816EE955AB381E7709E82CB50
                                    APIs
                                    • GetForegroundWindow.USER32(00000000,?), ref: 00674A3D
                                    • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 006ADA8E
                                    • IsIconic.USER32(?), ref: 006ADA97
                                    • ShowWindow.USER32(?,00000009), ref: 006ADAA4
                                    • SetForegroundWindow.USER32(?), ref: 006ADAAE
                                    • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 006ADAC4
                                    • GetCurrentThreadId.KERNEL32 ref: 006ADACB
                                    • GetWindowThreadProcessId.USER32(?,00000000), ref: 006ADAD7
                                    • AttachThreadInput.USER32(?,00000000,00000001), ref: 006ADAE8
                                    • AttachThreadInput.USER32(?,00000000,00000001), ref: 006ADAF0
                                    • AttachThreadInput.USER32(00000000,?,00000001), ref: 006ADAF8
                                    • SetForegroundWindow.USER32(?), ref: 006ADAFB
                                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 006ADB10
                                    • keybd_event.USER32(00000012,00000000), ref: 006ADB1B
                                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 006ADB25
                                    • keybd_event.USER32(00000012,00000000), ref: 006ADB2A
                                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 006ADB33
                                    • keybd_event.USER32(00000012,00000000), ref: 006ADB38
                                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 006ADB42
                                    • keybd_event.USER32(00000012,00000000), ref: 006ADB47
                                    • SetForegroundWindow.USER32(?), ref: 006ADB4A
                                    • AttachThreadInput.USER32(?,?,00000000), ref: 006ADB71
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                                    • String ID: Shell_TrayWnd
                                    • API String ID: 4125248594-2988720461
                                    • Opcode ID: f5bd627c11fea187dffd1e961fe72802f2e5c3b3d5bf1e67d6de680b24ea6f78
                                    • Instruction ID: 06c8937bb8c9861885b7dbcecb63e95f4cc4f533f03c292058b30bba17917082
                                    • Opcode Fuzzy Hash: f5bd627c11fea187dffd1e961fe72802f2e5c3b3d5bf1e67d6de680b24ea6f78
                                    • Instruction Fuzzy Hash: 3E315271A40318BBEB216F619C49FBE7E6EEF45B50F114025FA05EA2D0CAB05D01EFA4
                                    APIs
                                      • Part of subcall function 006C8CC3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 006C8D0D
                                      • Part of subcall function 006C8CC3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 006C8D3A
                                      • Part of subcall function 006C8CC3: GetLastError.KERNEL32 ref: 006C8D47
                                    • _memset.LIBCMT ref: 006C889B
                                    • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?,?,?,?,00000001,?,?), ref: 006C88ED
                                    • CloseHandle.KERNEL32(?), ref: 006C88FE
                                    • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 006C8915
                                    • GetProcessWindowStation.USER32 ref: 006C892E
                                    • SetProcessWindowStation.USER32(00000000), ref: 006C8938
                                    • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 006C8952
                                      • Part of subcall function 006C8713: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,006C8851), ref: 006C8728
                                      • Part of subcall function 006C8713: CloseHandle.KERNEL32(?,?,006C8851), ref: 006C873A
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLookupPrivilegeValue_memset
                                    • String ID: $default$winsta0
                                    • API String ID: 2063423040-1027155976
                                    • Opcode ID: 24b37879f15cb579aa56140743a5ae5a10f4b917777546ae6be3d1d38129541d
                                    • Instruction ID: 3b7b9f73b9ccefc5d6b7eb761adce08ac7e1264144f95ff4caa175fdfeac356d
                                    • Opcode Fuzzy Hash: 24b37879f15cb579aa56140743a5ae5a10f4b917777546ae6be3d1d38129541d
                                    • Instruction Fuzzy Hash: EE812471900259AEDF219FA4DC45EFEBBBAEF04304F18416EF910A7261DB318A14DB64
                                    APIs
                                    • OpenClipboard.USER32(006FF910), ref: 006E4284
                                    • IsClipboardFormatAvailable.USER32(0000000D), ref: 006E4292
                                    • GetClipboardData.USER32(0000000D), ref: 006E429A
                                    • CloseClipboard.USER32 ref: 006E42A6
                                    • GlobalLock.KERNEL32(00000000), ref: 006E42C2
                                    • CloseClipboard.USER32 ref: 006E42CC
                                    • GlobalUnlock.KERNEL32(00000000), ref: 006E42E1
                                    • IsClipboardFormatAvailable.USER32(00000001), ref: 006E42EE
                                    • GetClipboardData.USER32(00000001), ref: 006E42F6
                                    • GlobalLock.KERNEL32(00000000), ref: 006E4303
                                    • GlobalUnlock.KERNEL32(00000000), ref: 006E4337
                                    • CloseClipboard.USER32 ref: 006E4447
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: Clipboard$Global$Close$AvailableDataFormatLockUnlock$Open
                                    • String ID:
                                    • API String ID: 3222323430-0
                                    • Opcode ID: a7ab6d05462c35b5a5f69d10a54d5a2fdb9da82699853754d0a17145ed98e628
                                    • Instruction ID: 732941dbb92a946a934776c3c1a852df91f20025be13c3d22607fbb629840d64
                                    • Opcode Fuzzy Hash: a7ab6d05462c35b5a5f69d10a54d5a2fdb9da82699853754d0a17145ed98e628
                                    • Instruction Fuzzy Hash: 4E518D31204342AFD311AF75DC86FBE77AAAF84B00F10452DB65AD62A1DF70DA05CB66
                                    APIs
                                    • FindFirstFileW.KERNEL32(?,?), ref: 006DC9F8
                                    • FindClose.KERNEL32(00000000), ref: 006DCA4C
                                    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 006DCA71
                                    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 006DCA88
                                    • FileTimeToSystemTime.KERNEL32(?,?), ref: 006DCAAF
                                    • __swprintf.LIBCMT ref: 006DCAFB
                                    • __swprintf.LIBCMT ref: 006DCB3E
                                      • Part of subcall function 00677F41: _memmove.LIBCMT ref: 00677F82
                                    • __swprintf.LIBCMT ref: 006DCB92
                                      • Part of subcall function 006938D8: __woutput_l.LIBCMT ref: 00693931
                                    • __swprintf.LIBCMT ref: 006DCBE0
                                      • Part of subcall function 006938D8: __flsbuf.LIBCMT ref: 00693953
                                      • Part of subcall function 006938D8: __flsbuf.LIBCMT ref: 0069396B
                                    • __swprintf.LIBCMT ref: 006DCC2F
                                    • __swprintf.LIBCMT ref: 006DCC7E
                                    • __swprintf.LIBCMT ref: 006DCCCD
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem__woutput_l_memmove
                                    • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                                    • API String ID: 3953360268-2428617273
                                    • Opcode ID: 94fe8403045b3e5ba74e34308fc79a789324a87f140f756329dd0282e5cda67f
                                    • Instruction ID: 013124d0332a3ddbced1e2c6d1250c4a1ba2d5510838359a069b5df322740204
                                    • Opcode Fuzzy Hash: 94fe8403045b3e5ba74e34308fc79a789324a87f140f756329dd0282e5cda67f
                                    • Instruction Fuzzy Hash: CAA131B1508305ABC740EB54C985DAFB7EEFF94700F40492EF59AC7291EA34DA09CB66
                                    APIs
                                    • FindFirstFileW.KERNEL32(?,?,76F88FB0,?,00000000), ref: 006DF221
                                    • _wcscmp.LIBCMT ref: 006DF236
                                    • _wcscmp.LIBCMT ref: 006DF24D
                                    • GetFileAttributesW.KERNEL32(?), ref: 006DF25F
                                    • SetFileAttributesW.KERNEL32(?,?), ref: 006DF279
                                    • FindNextFileW.KERNEL32(00000000,?), ref: 006DF291
                                    • FindClose.KERNEL32(00000000), ref: 006DF29C
                                    • FindFirstFileW.KERNEL32(*.*,?), ref: 006DF2B8
                                    • _wcscmp.LIBCMT ref: 006DF2DF
                                    • _wcscmp.LIBCMT ref: 006DF2F6
                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 006DF308
                                    • SetCurrentDirectoryW.KERNEL32(0072A5A0), ref: 006DF326
                                    • FindNextFileW.KERNEL32(00000000,00000010), ref: 006DF330
                                    • FindClose.KERNEL32(00000000), ref: 006DF33D
                                    • FindClose.KERNEL32(00000000), ref: 006DF34F
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: Find$File$_wcscmp$Close$AttributesCurrentDirectoryFirstNext
                                    • String ID: *.*
                                    • API String ID: 1803514871-438819550
                                    • Opcode ID: 1059a3eb425d3efc0699ffb9492f37422c352f5bb151a95a31799d1190e12b31
                                    • Instruction ID: fd8ba4bb88efdb1f94c3074841c54c345480216d6cac2925a5adfd025da1f526
                                    • Opcode Fuzzy Hash: 1059a3eb425d3efc0699ffb9492f37422c352f5bb151a95a31799d1190e12b31
                                    • Instruction Fuzzy Hash: 0031C3769002196BDF20DBF4EC98AEE77AE9F08360F114176E805D3390EB75DB45CA94
                                    APIs
                                    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 006F0BDE
                                    • RegCreateKeyExW.ADVAPI32(?,?,00000000,006FF910,00000000,?,00000000,?,?), ref: 006F0C4C
                                    • RegCloseKey.ADVAPI32(00000000,00000001,00000000,00000000,00000000), ref: 006F0C94
                                    • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000002,?), ref: 006F0D1D
                                    • RegCloseKey.ADVAPI32(?), ref: 006F103D
                                    • RegCloseKey.ADVAPI32(00000000), ref: 006F104A
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: Close$ConnectCreateRegistryValue
                                    • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                    • API String ID: 536824911-966354055
                                    • Opcode ID: d2362cf100d7bf058fa7ed64b5f4fa23f8c0d6b9e847ef3c9abcfa795a236c54
                                    • Instruction ID: e55da2a6a26af1930ada615ad7c019775028c814b433e7679d298f640e28e3aa
                                    • Opcode Fuzzy Hash: d2362cf100d7bf058fa7ed64b5f4fa23f8c0d6b9e847ef3c9abcfa795a236c54
                                    • Instruction Fuzzy Hash: F4026C752006119FDB54EF14C891E2AB7E6FF89724F04885DFA8A9B362CB30ED41CB95
                                    APIs
                                    • FindFirstFileW.KERNEL32(?,?,76F88FB0,?,00000000), ref: 006DF37E
                                    • _wcscmp.LIBCMT ref: 006DF393
                                    • _wcscmp.LIBCMT ref: 006DF3AA
                                      • Part of subcall function 006D45C1: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 006D45DC
                                    • FindNextFileW.KERNEL32(00000000,?), ref: 006DF3D9
                                    • FindClose.KERNEL32(00000000), ref: 006DF3E4
                                    • FindFirstFileW.KERNEL32(*.*,?), ref: 006DF400
                                    • _wcscmp.LIBCMT ref: 006DF427
                                    • _wcscmp.LIBCMT ref: 006DF43E
                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 006DF450
                                    • SetCurrentDirectoryW.KERNEL32(0072A5A0), ref: 006DF46E
                                    • FindNextFileW.KERNEL32(00000000,00000010), ref: 006DF478
                                    • FindClose.KERNEL32(00000000), ref: 006DF485
                                    • FindClose.KERNEL32(00000000), ref: 006DF497
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: Find$File$_wcscmp$Close$CurrentDirectoryFirstNext$Create
                                    • String ID: *.*
                                    • API String ID: 1824444939-438819550
                                    • Opcode ID: e03bad368ec05b9f4b9ff291f534baa1243e116457471d5d2f73b274e935633e
                                    • Instruction ID: fd8bca4188b6b7badf0fdf3287fa8cd57a89f807eb97d7be18b73368fcc1ea4d
                                    • Opcode Fuzzy Hash: e03bad368ec05b9f4b9ff291f534baa1243e116457471d5d2f73b274e935633e
                                    • Instruction Fuzzy Hash: AC31F8729012197FCF109BA4EC88AEF77AE9F49320F150176E801E33A1DB74DE45CA94
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: ANY)$ANYCRLF)$BSR_ANYCRLF)$BSR_UNICODE)$CR)$CRLF)$LF)$LIMIT_MATCH=$LIMIT_RECURSION=$NO_AUTO_POSSESS)$NO_START_OPT)$Oah$PJq$UCP)$UTF)$UTF16)$opxls0opxls0opxls0opxls0opxls8opxls5opxlscopxls0opxls7opxls4opxls4opxlscopxls8opxlsbopxls4opxls5opxls0opxls8opxls9opxls9opxlsbopxl
                                    • API String ID: 0-2183263460
                                    • Opcode ID: c1921b699cdb8ebe8168fdb002a02268e576dc423322bca0c6274d64e61f53e1
                                    • Instruction ID: ea22890c04f16c230147e4d53cc180740b6f3c79faaa3e7624a12842611e3389
                                    • Opcode Fuzzy Hash: c1921b699cdb8ebe8168fdb002a02268e576dc423322bca0c6274d64e61f53e1
                                    • Instruction Fuzzy Hash: 50726F71E002199BDB14DF59C890BFEB7B6EF4A310F14816AE949EB381DB749D81CB90
                                    APIs
                                      • Part of subcall function 006C874A: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 006C8766
                                      • Part of subcall function 006C874A: GetLastError.KERNEL32(?,006C822A,?,?,?), ref: 006C8770
                                      • Part of subcall function 006C874A: GetProcessHeap.KERNEL32(00000008,?,?,006C822A,?,?,?), ref: 006C877F
                                      • Part of subcall function 006C874A: HeapAlloc.KERNEL32(00000000,?,006C822A,?,?,?), ref: 006C8786
                                      • Part of subcall function 006C874A: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 006C879D
                                      • Part of subcall function 006C87E7: GetProcessHeap.KERNEL32(00000008,006C8240,00000000,00000000,?,006C8240,?), ref: 006C87F3
                                      • Part of subcall function 006C87E7: HeapAlloc.KERNEL32(00000000,?,006C8240,?), ref: 006C87FA
                                      • Part of subcall function 006C87E7: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,006C8240,?), ref: 006C880B
                                    • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 006C825B
                                    • _memset.LIBCMT ref: 006C8270
                                    • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 006C828F
                                    • GetLengthSid.ADVAPI32(?), ref: 006C82A0
                                    • GetAce.ADVAPI32(?,00000000,?), ref: 006C82DD
                                    • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 006C82F9
                                    • GetLengthSid.ADVAPI32(?), ref: 006C8316
                                    • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 006C8325
                                    • HeapAlloc.KERNEL32(00000000), ref: 006C832C
                                    • GetLengthSid.ADVAPI32(?,00000008,?), ref: 006C834D
                                    • CopySid.ADVAPI32(00000000), ref: 006C8354
                                    • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 006C8385
                                    • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 006C83AB
                                    • SetUserObjectSecurity.USER32(?,00000004,?), ref: 006C83BF
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                                    • String ID:
                                    • API String ID: 3996160137-0
                                    • Opcode ID: 1a4975a264170f873c0508a145cc7d3071d1b06869bea6e63d88831d5ac2fc48
                                    • Instruction ID: 4b3fd3af101abf8463d5ac4d33d544e760c5f4513ea8848be5d49f43410eb56c
                                    • Opcode Fuzzy Hash: 1a4975a264170f873c0508a145cc7d3071d1b06869bea6e63d88831d5ac2fc48
                                    • Instruction Fuzzy Hash: 64612A71A00219AFDF109F95DC84EFEBBBAFF04700B14926DF815A7291DB359A05CB60
                                    APIs
                                      • Part of subcall function 006F10A5: CharUpperBuffW.USER32(?,?,?,?,?,?,?,006F0038,?,?), ref: 006F10BC
                                    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 006F0737
                                      • Part of subcall function 00679997: __itow.LIBCMT ref: 006799C2
                                      • Part of subcall function 00679997: __swprintf.LIBCMT ref: 00679A0C
                                    • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 006F07D6
                                    • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 006F086E
                                    • RegCloseKey.ADVAPI32(000000FE,000000FE,00000000,?,00000000), ref: 006F0AAD
                                    • RegCloseKey.ADVAPI32(00000000), ref: 006F0ABA
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: CloseQueryValue$BuffCharConnectRegistryUpper__itow__swprintf
                                    • String ID:
                                    • API String ID: 1240663315-0
                                    • Opcode ID: 351cdbc83c380e671c92275277368e1a1311f2272dc1fa3c841bb3e84e3757c0
                                    • Instruction ID: 35d87f76b7c5de73172befdf70d7b875c67c1afb9c8f76d137f03d9df8282177
                                    • Opcode Fuzzy Hash: 351cdbc83c380e671c92275277368e1a1311f2272dc1fa3c841bb3e84e3757c0
                                    • Instruction Fuzzy Hash: 2EE15C31204304AFDB14DF28C891E6ABBEAEF89714B04856DF94ADB362DA31ED01CB55
                                    APIs
                                    • GetKeyboardState.USER32(?), ref: 006D0241
                                    • GetAsyncKeyState.USER32(000000A0), ref: 006D02C2
                                    • GetKeyState.USER32(000000A0), ref: 006D02DD
                                    • GetAsyncKeyState.USER32(000000A1), ref: 006D02F7
                                    • GetKeyState.USER32(000000A1), ref: 006D030C
                                    • GetAsyncKeyState.USER32(00000011), ref: 006D0324
                                    • GetKeyState.USER32(00000011), ref: 006D0336
                                    • GetAsyncKeyState.USER32(00000012), ref: 006D034E
                                    • GetKeyState.USER32(00000012), ref: 006D0360
                                    • GetAsyncKeyState.USER32(0000005B), ref: 006D0378
                                    • GetKeyState.USER32(0000005B), ref: 006D038A
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: State$Async$Keyboard
                                    • String ID:
                                    • API String ID: 541375521-0
                                    • Opcode ID: 31d72b12f208b2af82d368fc4780a8544d3357ed003d7101d63c384fe303068c
                                    • Instruction ID: 9868aa1a9e7d055cc42599e57b887650199119f1ecbedd389dfc3e7e27954435
                                    • Opcode Fuzzy Hash: 31d72b12f208b2af82d368fc4780a8544d3357ed003d7101d63c384fe303068c
                                    • Instruction Fuzzy Hash: CC41A434D047CA6AFF719B6488087F5BEA26F12340F58409FD5C6463C2EB949AC8C7A2
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: ERCP$Oah$VUUU$VUUU$VUUU$VUUU$opxls0opxls0opxls0opxls0opxls8opxls5opxlscopxls0opxls7opxls4opxls4opxlscopxls8opxlsbopxls4opxls5opxls0opxls8opxls9opxls9opxlsbopxl
                                    • API String ID: 0-3214653728
                                    • Opcode ID: dcb473074bf8dafb0eb18fb29e15240b436e25f7f81d9821e1cbe9505fb61475
                                    • Instruction ID: 34da8b04677aba4d69bc3c81ac6a5b1ad52388bff74f4e5c92029bb2c502605c
                                    • Opcode Fuzzy Hash: dcb473074bf8dafb0eb18fb29e15240b436e25f7f81d9821e1cbe9505fb61475
                                    • Instruction Fuzzy Hash: B0A25DB0E0421A8BDF24DF58C9907EDB7B2BF54314F1482AAD856A7380EB749EC5DB50
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                    • String ID:
                                    • API String ID: 1737998785-0
                                    • Opcode ID: 1aa3016b9c4180a7224e16a32f31b3e28a075c1f91aab444c8e803cb8a42fe2c
                                    • Instruction ID: 1617d6ff7925176962b8c8956f4b81693ce9cc578446d5e48263ea093eecf02b
                                    • Opcode Fuzzy Hash: 1aa3016b9c4180a7224e16a32f31b3e28a075c1f91aab444c8e803cb8a42fe2c
                                    • Instruction Fuzzy Hash: 05216D35301211AFEB10AF65EC49B7E77AAEF44721F14802AF946DB2A1CF74AD01CB58
                                    APIs
                                      • Part of subcall function 006748AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,006748A1,?,?,006737C0,?), ref: 006748CE
                                      • Part of subcall function 006D4CD3: GetFileAttributesW.KERNEL32(?,006D3947), ref: 006D4CD4
                                    • FindFirstFileW.KERNEL32(?,?), ref: 006D3ADF
                                    • DeleteFileW.KERNEL32(?,?,00000000,?,?,?,?), ref: 006D3B87
                                    • MoveFileW.KERNEL32(?,?), ref: 006D3B9A
                                    • DeleteFileW.KERNEL32(?,?,?,?,?), ref: 006D3BB7
                                    • FindNextFileW.KERNEL32(00000000,00000010), ref: 006D3BD9
                                    • FindClose.KERNEL32(00000000,?,?,?,?), ref: 006D3BF5
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: File$Find$Delete$AttributesCloseFirstFullMoveNameNextPath
                                    • String ID: \*.*
                                    • API String ID: 4002782344-1173974218
                                    • Opcode ID: 63e5f5471a9056d4b40c970277ddea6365501e56e70f15af4aa2d5ee13fc0dfb
                                    • Instruction ID: d887b3fd5049128e602706559209ed02eeedb4e917870210d302f71f3c87d18e
                                    • Opcode Fuzzy Hash: 63e5f5471a9056d4b40c970277ddea6365501e56e70f15af4aa2d5ee13fc0dfb
                                    • Instruction Fuzzy Hash: AF519031C0125C9ACF45EBA0CD929EDB77AAF14300F6481AAE44677291EF316F09CBA5
                                    APIs
                                      • Part of subcall function 00677F41: _memmove.LIBCMT ref: 00677F82
                                    • FindFirstFileW.KERNEL32(?,?,*.*,?,?,00000000,00000000), ref: 006DF6AB
                                    • Sleep.KERNEL32(0000000A), ref: 006DF6DB
                                    • _wcscmp.LIBCMT ref: 006DF6EF
                                    • _wcscmp.LIBCMT ref: 006DF70A
                                    • FindNextFileW.KERNEL32(?,?), ref: 006DF7A8
                                    • FindClose.KERNEL32(00000000), ref: 006DF7BE
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: Find$File_wcscmp$CloseFirstNextSleep_memmove
                                    • String ID: *.*
                                    • API String ID: 713712311-438819550
                                    • Opcode ID: b94b45b2db688cf959f2d603606e53746b1d3eefe95ef734f9d14db1ad063163
                                    • Instruction ID: 219c19ccbae539badb62c1de357352c5d83f70037af7e1d1f373e6d244cf6b9b
                                    • Opcode Fuzzy Hash: b94b45b2db688cf959f2d603606e53746b1d3eefe95ef734f9d14db1ad063163
                                    • Instruction Fuzzy Hash: BF415F71D0021A9FCF51DF64DC85AEEBBB6FF05310F14456AE81AA6391EB309E44CB94
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: _memmove
                                    • String ID:
                                    • API String ID: 4104443479-0
                                    • Opcode ID: 067483502cc949499964306f48a47cdc10315086ec21061284731c29b1cf4a2e
                                    • Instruction ID: b8776e55cd1b0e8fe0104bf78273b0250c87472eb5e722f868d1b7f08fc0b283
                                    • Opcode Fuzzy Hash: 067483502cc949499964306f48a47cdc10315086ec21061284731c29b1cf4a2e
                                    • Instruction Fuzzy Hash: D2126A70A0060ADFDF14DFA4D985AEEB7B6FF48300F10866DE806A7251EB36AD15CB54
                                    APIs
                                      • Part of subcall function 00690FF6: std::exception::exception.LIBCMT ref: 0069102C
                                      • Part of subcall function 00690FF6: __CxxThrowException@8.LIBCMT ref: 00691041
                                    • _memmove.LIBCMT ref: 006C062F
                                    • _memmove.LIBCMT ref: 006C0744
                                    • _memmove.LIBCMT ref: 006C07EB
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: _memmove$Exception@8Throwstd::exception::exception
                                    • String ID: yZh
                                    • API String ID: 1300846289-2807879289
                                    • Opcode ID: 9e67fe9132a64cbdb3b5bfb1c1bfa86576f37668b34fd191713c29b8d46637e7
                                    • Instruction ID: ec0e31eef32d693f51e81c6ef7872919a8b3689485f11d306184cf59e8e42811
                                    • Opcode Fuzzy Hash: 9e67fe9132a64cbdb3b5bfb1c1bfa86576f37668b34fd191713c29b8d46637e7
                                    • Instruction Fuzzy Hash: 44027FB0A00205DFDF54DF64D981ABEBBB6EF44300F1480ADE80ADB255EB35DA51CB95
                                    APIs
                                      • Part of subcall function 006C8CC3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 006C8D0D
                                      • Part of subcall function 006C8CC3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 006C8D3A
                                      • Part of subcall function 006C8CC3: GetLastError.KERNEL32 ref: 006C8D47
                                    • ExitWindowsEx.USER32(?,00000000), ref: 006D549B
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                    • String ID: $@$SeShutdownPrivilege
                                    • API String ID: 2234035333-194228
                                    • Opcode ID: 978212077ad5616a4fa62350794d503ff4e1b60126739ce83bc36957e690a10c
                                    • Instruction ID: 191781a2e5b94244e6d0906d58960c4b1c7bdef4b71c798efb74c10b354ce832
                                    • Opcode Fuzzy Hash: 978212077ad5616a4fa62350794d503ff4e1b60126739ce83bc36957e690a10c
                                    • Instruction Fuzzy Hash: 6B012471E54A112AE7786778EC4AFFA729AEB00352F200037FC07D27C3DA500C8081A6
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: __itow__swprintf
                                    • String ID: Oah
                                    • API String ID: 674341424-3137904739
                                    • Opcode ID: ca1cfd11377e0ec3881290da90cda11860045692a40e1f07a8d3551fcad717da
                                    • Instruction ID: 7c387df0a7934e3a8942e5b6d4bd0eefb71b6870bbda3b3e5e6c509d0103deda
                                    • Opcode Fuzzy Hash: ca1cfd11377e0ec3881290da90cda11860045692a40e1f07a8d3551fcad717da
                                    • Instruction Fuzzy Hash: 6E22CEB15083119FC724EF14C891BAFB7E6AF84700F008A1DF99A97391DB71EA45CB96
                                    APIs
                                    • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 006E65EF
                                    • WSAGetLastError.WSOCK32(00000000), ref: 006E65FE
                                    • bind.WSOCK32(00000000,?,00000010), ref: 006E661A
                                    • listen.WSOCK32(00000000,00000005), ref: 006E6629
                                    • WSAGetLastError.WSOCK32(00000000), ref: 006E6643
                                    • closesocket.WSOCK32(00000000,00000000), ref: 006E6657
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: ErrorLast$bindclosesocketlistensocket
                                    • String ID:
                                    • API String ID: 1279440585-0
                                    • Opcode ID: c52d3ab49666eed14c4952ba73824010c53fb19555eb4fb48e0a62d3b0aa50aa
                                    • Instruction ID: 6e117345bf26e7a08d269bef33e84239bc8a7ceb9010bde613caa5884a52de7e
                                    • Opcode Fuzzy Hash: c52d3ab49666eed14c4952ba73824010c53fb19555eb4fb48e0a62d3b0aa50aa
                                    • Instruction Fuzzy Hash: F02189302012009FCB10AF65D889A7EB7FAEF48360F148169F95AA73D2CA70AD01CB65
                                    APIs
                                      • Part of subcall function 00672612: GetWindowLongW.USER32(?,000000EB), ref: 00672623
                                    • DefDlgProcW.USER32(?,?,?,?,?), ref: 006719FA
                                    • GetSysColor.USER32(0000000F), ref: 00671A4E
                                    • SetBkColor.GDI32(?,00000000), ref: 00671A61
                                      • Part of subcall function 00671290: DefDlgProcW.USER32(?,00000020,?), ref: 006712D8
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: ColorProc$LongWindow
                                    • String ID:
                                    • API String ID: 3744519093-0
                                    • Opcode ID: f7519bc8cd2ff85e48519ec56963fc58a684dedc00c2369bc0dbb86b2c9d6bfa
                                    • Instruction ID: e4af9ba11739f73b446b76141737bae6025e36987885fd7c0b32f224e60f0e65
                                    • Opcode Fuzzy Hash: f7519bc8cd2ff85e48519ec56963fc58a684dedc00c2369bc0dbb86b2c9d6bfa
                                    • Instruction Fuzzy Hash: 1EA14470115548BAE628AB2C8C54DFF259FDF43352B24C11FF50ADE292EE24CD02D6BA
                                    APIs
                                      • Part of subcall function 006E80A0: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 006E80CB
                                    • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 006E6AB1
                                    • WSAGetLastError.WSOCK32(00000000), ref: 006E6ADA
                                    • bind.WSOCK32(00000000,?,00000010), ref: 006E6B13
                                    • WSAGetLastError.WSOCK32(00000000), ref: 006E6B20
                                    • closesocket.WSOCK32(00000000,00000000), ref: 006E6B34
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: ErrorLast$bindclosesocketinet_addrsocket
                                    • String ID:
                                    • API String ID: 99427753-0
                                    • Opcode ID: 4605256d50188fac15ae7486bfb3a53d282737de5a63188a64c7ac3756ff0fc7
                                    • Instruction ID: ac01d0e027ae76874988b33ae25f974c9eea6aba42230b44c1093b4bbba4b6e7
                                    • Opcode Fuzzy Hash: 4605256d50188fac15ae7486bfb3a53d282737de5a63188a64c7ac3756ff0fc7
                                    • Instruction Fuzzy Hash: 4F418275640210AFEB50AB64DC86F7E77E69B44720F04C05CFA1AAB3D2DA709D018BA5
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                    • String ID:
                                    • API String ID: 292994002-0
                                    • Opcode ID: f5991061dc5bd35c3c25147b5efc3c6ea78e401b79345e21ab64a172d77d3cf5
                                    • Instruction ID: 77efa87172e6e928be75318aa09388955b57fc30aa93aeb8579740353eb02590
                                    • Opcode Fuzzy Hash: f5991061dc5bd35c3c25147b5efc3c6ea78e401b79345e21ab64a172d77d3cf5
                                    • Instruction Fuzzy Hash: D411D031300A146BE7215F26DC44B7ABB9BEF85721B408029EB1AD7261CB309D02CAA8
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: Dts$Dts$Dts$Dts$Variable must be of type 'Object'.
                                    • API String ID: 0-1148895469
                                    • Opcode ID: dcb1fa3d0c5cbfd6630f308f6601761e1790bfa69118ce1bd7b021adc36fdcc0
                                    • Instruction ID: 8e0a6df4ec1d543d8bacfcce3e19eba3167465b13f82c4f56747dff60bb3809f
                                    • Opcode Fuzzy Hash: dcb1fa3d0c5cbfd6630f308f6601761e1790bfa69118ce1bd7b021adc36fdcc0
                                    • Instruction Fuzzy Hash: A1A28F75A04215CFCB24CF58C580AA9B7B3FF58310F24C1A9E91A9B352D736ED86CB91
                                    APIs
                                    • CoInitialize.OLE32(00000000), ref: 006DC69D
                                    • CoCreateInstance.OLE32(00702D6C,00000000,00000001,00702BDC,?), ref: 006DC6B5
                                      • Part of subcall function 00677F41: _memmove.LIBCMT ref: 00677F82
                                    • CoUninitialize.OLE32 ref: 006DC922
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: CreateInitializeInstanceUninitialize_memmove
                                    • String ID: .lnk
                                    • API String ID: 2683427295-24824748
                                    • Opcode ID: d68c5054f709aae1f6141fca14a92f96f5462b24274ff201947029f03c922ac9
                                    • Instruction ID: 171e8011584f77e3e94381d40a35b362b6efbd2d108a72d8320f40a324574f73
                                    • Opcode Fuzzy Hash: d68c5054f709aae1f6141fca14a92f96f5462b24274ff201947029f03c922ac9
                                    • Instruction Fuzzy Hash: 04A13C71104205AFD340EF54C891EABB7F9FF95314F00896DF15A972A2EB70EA09CB66
                                    APIs
                                    • LoadLibraryA.KERNEL32(kernel32.dll,?,006B1D88,?), ref: 006EC312
                                    • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 006EC324
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: AddressLibraryLoadProc
                                    • String ID: GetSystemWow64DirectoryW$kernel32.dll
                                    • API String ID: 2574300362-1816364905
                                    • Opcode ID: 652deee4f4516910ab79a708ba9b08551beea41f0e8e10f7a005ff14a4c8f75f
                                    • Instruction ID: aead09e9881696e45a66ea465fb49378c3dc18ce9da0f829ff3e057513fb4329
                                    • Opcode Fuzzy Hash: 652deee4f4516910ab79a708ba9b08551beea41f0e8e10f7a005ff14a4c8f75f
                                    • Instruction Fuzzy Hash: CDE0C270201313CFCB308F2AD818AD676E6EF08325B80D439E895C3310E770D841CBA0
                                    APIs
                                    • CreateToolhelp32Snapshot.KERNEL32 ref: 006EF151
                                    • Process32FirstW.KERNEL32(00000000,?), ref: 006EF15F
                                      • Part of subcall function 00677F41: _memmove.LIBCMT ref: 00677F82
                                    • Process32NextW.KERNEL32(00000000,?), ref: 006EF21F
                                    • CloseHandle.KERNEL32(00000000,?,?,?), ref: 006EF22E
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32_memmove
                                    • String ID:
                                    • API String ID: 2576544623-0
                                    • Opcode ID: 8337481f61e7e803c0f603d79f1f9285ac2c7299705372f70be731d13ba1aa55
                                    • Instruction ID: 1dc81569ee1050a063337b7479a6a9e1f44df82be4203fb9a213c0b591ca4bcd
                                    • Opcode Fuzzy Hash: 8337481f61e7e803c0f603d79f1f9285ac2c7299705372f70be731d13ba1aa55
                                    • Instruction Fuzzy Hash: 3B519F71504300AFD350EF24DC85EABB7EAFF94710F10882DF59A97291EB70AA04CB96
                                    APIs
                                    • lstrlenW.KERNEL32(?,?,?,00000000), ref: 006CEB19
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: lstrlen
                                    • String ID: ($|
                                    • API String ID: 1659193697-1631851259
                                    • Opcode ID: 384a320f833afe8955fe596f2ecaa697f78dcd434604d3c5e373eb0b0675a6e7
                                    • Instruction ID: cc9bf7c42ccdfee1ba25d942fe87663844da286c1f77119877d78f915123e95b
                                    • Opcode Fuzzy Hash: 384a320f833afe8955fe596f2ecaa697f78dcd434604d3c5e373eb0b0675a6e7
                                    • Instruction Fuzzy Hash: 19323675A006059FDB28CF19C481EAAB7F2FF48310B15C46EE89ADB3A1E771E941CB44
                                    APIs
                                    • InternetQueryDataAvailable.WININET(00000001,?,00000000,00000000,00000000,?,?,?,?,?,?,?,?,006E1AFE,00000000), ref: 006E26D5
                                    • InternetReadFile.WININET(00000001,00000000,00000001,00000001), ref: 006E270C
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: Internet$AvailableDataFileQueryRead
                                    • String ID:
                                    • API String ID: 599397726-0
                                    • Opcode ID: 040668bd45cac2ac57e3fc7c33c3485af0f8233883d63944c10cc6aa6b8b4993
                                    • Instruction ID: cd7fefb5b2b0073547777df1c00a0237bdc5943a73de57063bd9fc5b44dba1ef
                                    • Opcode Fuzzy Hash: 040668bd45cac2ac57e3fc7c33c3485af0f8233883d63944c10cc6aa6b8b4993
                                    • Instruction Fuzzy Hash: 4141C47150134ABFEF20DF96DC95EBBB7BFEB40714F10406EFA01A6240EA719E419654
                                    APIs
                                    • SetErrorMode.KERNEL32(00000001), ref: 006DB5AE
                                    • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 006DB608
                                    • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 006DB655
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: ErrorMode$DiskFreeSpace
                                    • String ID:
                                    • API String ID: 1682464887-0
                                    • Opcode ID: abfc0ddcafb822f5161d10806999659ad236c91138a022af3e82149c27043cb1
                                    • Instruction ID: 769c41310f7de4df90a630fc4458792c38a4b22bd2fa7f132a0955452d18602d
                                    • Opcode Fuzzy Hash: abfc0ddcafb822f5161d10806999659ad236c91138a022af3e82149c27043cb1
                                    • Instruction Fuzzy Hash: E9216035A00118EFCB00EFA5D880EADBBF9FF48310F1480AAE905AB351DB31A915CB55
                                    APIs
                                      • Part of subcall function 00690FF6: std::exception::exception.LIBCMT ref: 0069102C
                                      • Part of subcall function 00690FF6: __CxxThrowException@8.LIBCMT ref: 00691041
                                    • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 006C8D0D
                                    • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 006C8D3A
                                    • GetLastError.KERNEL32 ref: 006C8D47
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: AdjustErrorException@8LastLookupPrivilegePrivilegesThrowTokenValuestd::exception::exception
                                    • String ID:
                                    • API String ID: 1922334811-0
                                    • Opcode ID: 381da5420b944b7ae5b0047b9fd1277237d440d67f4e4ca759acbe8242d4dc87
                                    • Instruction ID: 457e7ed05f9c838860d090fb6f58da694044e33dd508e25375d2e5fff7033416
                                    • Opcode Fuzzy Hash: 381da5420b944b7ae5b0047b9fd1277237d440d67f4e4ca759acbe8242d4dc87
                                    • Instruction Fuzzy Hash: B7115BB1414209AFE7289F54DC86D7BB7BEEF44710B20852EE85697641EB31AC41CA64
                                    APIs
                                    • CreateFileW.KERNEL32(?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 006D404B
                                    • DeviceIoControl.KERNEL32(00000000,002D1400,00000007,0000000C,?,0000000C,?,00000000), ref: 006D4088
                                    • CloseHandle.KERNEL32(00000000,?,?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 006D4091
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: CloseControlCreateDeviceFileHandle
                                    • String ID:
                                    • API String ID: 33631002-0
                                    • Opcode ID: 32ef2155d81dd70bb2138c4306a4a88c07c5a067ab16d14a3631cd14e98b3646
                                    • Instruction ID: 1e8c5bb3d0de0dea1d033a3d6c18a0a91399a28cd431e0b9c5625aecccf7ce60
                                    • Opcode Fuzzy Hash: 32ef2155d81dd70bb2138c4306a4a88c07c5a067ab16d14a3631cd14e98b3646
                                    • Instruction Fuzzy Hash: 42115EB2D00228BBE7109BE89C45FBABBBDEB08710F000656BA04E7290C6745D0587A1
                                    APIs
                                    • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 006D4C2C
                                    • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 006D4C43
                                    • FreeSid.ADVAPI32(?), ref: 006D4C53
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: AllocateCheckFreeInitializeMembershipToken
                                    • String ID:
                                    • API String ID: 3429775523-0
                                    • Opcode ID: d738c825330e84cf8830569856f92e1b7d76dc6eb10f497fe8400d6d5d30a0bb
                                    • Instruction ID: 3a6fc91d911e29ace0140377b192a6aebaa427d7b4689c40e33450aa0d18b632
                                    • Opcode Fuzzy Hash: d738c825330e84cf8830569856f92e1b7d76dc6eb10f497fe8400d6d5d30a0bb
                                    • Instruction Fuzzy Hash: C7F04975A1130CBFDF04DFF4DC99ABEBBBDEF08201F0044A9A901E2281EA706A44CB50
                                    APIs
                                    • __time64.LIBCMT ref: 006D8B25
                                      • Part of subcall function 0069543A: GetSystemTimeAsFileTime.KERNEL32(00000000,?,?,?,006D91F8,00000000,?,?,?,?,006D93A9,00000000,?), ref: 00695443
                                      • Part of subcall function 0069543A: __aulldiv.LIBCMT ref: 00695463
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: Time$FileSystem__aulldiv__time64
                                    • String ID: 0us
                                    • API String ID: 2893107130-1080988087
                                    • Opcode ID: ea575deb8c66b2daceb71372249ad38339e9bf6f71b6bc8d6315377301d8505b
                                    • Instruction ID: b38903deba7285dd956482a77cbc862375a4aca2d5cdb081ecf3d8a85d131a28
                                    • Opcode Fuzzy Hash: ea575deb8c66b2daceb71372249ad38339e9bf6f71b6bc8d6315377301d8505b
                                    • Instruction Fuzzy Hash: B621D2726256108FD729CF29D841A52B3E2EBA4311B288E6DD0E5CB2D0CA35B905CB94
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 9fdf128ce8a3cd2ffe7ac8472e51a0cc05a136c19e95924e0e176d2b7b350e6b
                                    • Instruction ID: 36c251bdcc117f080977208f589aeefc4251ca910e8ff00f94a426ab4dae6c14
                                    • Opcode Fuzzy Hash: 9fdf128ce8a3cd2ffe7ac8472e51a0cc05a136c19e95924e0e176d2b7b350e6b
                                    • Instruction Fuzzy Hash: 9022AF74A00216CFDB24DF54C481AEEB7F6FF08314F14C1A9E85A9B351E736A989CB91
                                    APIs
                                    • FindFirstFileW.KERNEL32(?,?), ref: 006DC966
                                    • FindClose.KERNEL32(00000000), ref: 006DC996
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: Find$CloseFileFirst
                                    • String ID:
                                    • API String ID: 2295610775-0
                                    • Opcode ID: bb66b5e9d65855aa7c264488745da3a7ee91aaa9be47e7c988a846a9b42ad07c
                                    • Instruction ID: d40316d603d53349c39b5a297b356b922312e68da7c29ac0e8257422baa6f33b
                                    • Opcode Fuzzy Hash: bb66b5e9d65855aa7c264488745da3a7ee91aaa9be47e7c988a846a9b42ad07c
                                    • Instruction Fuzzy Hash: 8D118E326002049FDB10EF29C845A2AF7EAEF84320F00851EF9A9DB391DB30AC01CB95
                                    APIs
                                    • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,00000016,?,006E977D,?,006FFB84,?), ref: 006DA302
                                    • FormatMessageW.KERNEL32(00001000,00000000,000000FF,00000000,?,00000FFF,00000000,00000016,?,006E977D,?,006FFB84,?), ref: 006DA314
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: ErrorFormatLastMessage
                                    • String ID:
                                    • API String ID: 3479602957-0
                                    • Opcode ID: 6d8b78adb5b5e6c79d06fbc32ff3ccb89f2b291d75f806804003c7b1a726ea92
                                    • Instruction ID: 7d6157bf2ba5d2707594dfc4a54e427eacdffcae3cfc5cab46676fb5c05f691d
                                    • Opcode Fuzzy Hash: 6d8b78adb5b5e6c79d06fbc32ff3ccb89f2b291d75f806804003c7b1a726ea92
                                    • Instruction Fuzzy Hash: 30F0823554822DABDB10AFE4CC48FEA776EBF09761F00816AF908D6281D6309940CBE5
                                    APIs
                                    • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,006C8851), ref: 006C8728
                                    • CloseHandle.KERNEL32(?,?,006C8851), ref: 006C873A
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: AdjustCloseHandlePrivilegesToken
                                    • String ID:
                                    • API String ID: 81990902-0
                                    • Opcode ID: a91e62c935247b9ab205613935edf71e18ed3e4982514a66e1ebe03661232337
                                    • Instruction ID: 34322553927eca91fd9ee7de9d4c119f8faebfa46ff24e626e60f9979abc52ce
                                    • Opcode Fuzzy Hash: a91e62c935247b9ab205613935edf71e18ed3e4982514a66e1ebe03661232337
                                    • Instruction Fuzzy Hash: CEE04632000601EEEB212B20EC09E777BAEEF00390724892DB4A680830DB22ACD0DB10
                                    APIs
                                    • SetUnhandledExceptionFilter.KERNEL32(00000000,?,00698F97,?,?,?,00000001), ref: 0069A39A
                                    • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 0069A3A3
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: ExceptionFilterUnhandled
                                    • String ID:
                                    • API String ID: 3192549508-0
                                    • Opcode ID: 54ef90e953daa28156c29d6f65ff20810f49494028603d167d60bd41a16c6079
                                    • Instruction ID: 8cc9c2593c67a16715a7537d901223cf3461acf85ce684c7193e48a34511cf87
                                    • Opcode Fuzzy Hash: 54ef90e953daa28156c29d6f65ff20810f49494028603d167d60bd41a16c6079
                                    • Instruction Fuzzy Hash: 44B09232054208ABCB102B91EC09BA83F6BEF44AA2F405020F60D84064CF625450CAD5
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: afe148dcdf3c5bee27d61625799885f2dc018109738cdac6943139587bfc850e
                                    • Instruction ID: 4908d35f47d1998c3673ed9b14da5d765866276ff5a4733b986dca82b4b324b2
                                    • Opcode Fuzzy Hash: afe148dcdf3c5bee27d61625799885f2dc018109738cdac6943139587bfc850e
                                    • Instruction Fuzzy Hash: 13320262D29F018DDB279634D832326A28DAFB73C4F15D737E819B5EA6EF29D4834104
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: f37537436348c353d248ec3456fc1ce11ff2799a2439a3ee4addf1c5aaf9a1bc
                                    • Instruction ID: 75f8e2a4bf85ee647c167c77f9a1ff7262e0704aebd807a4da8232172726dc38
                                    • Opcode Fuzzy Hash: f37537436348c353d248ec3456fc1ce11ff2799a2439a3ee4addf1c5aaf9a1bc
                                    • Instruction Fuzzy Hash: 81B1FF20D2AF418DD723A6398831336FA5CAFBB2D9F51D71BFC2670D62EB2585834145
                                    APIs
                                    • BlockInput.USER32(00000001), ref: 006E4218
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: BlockInput
                                    • String ID:
                                    • API String ID: 3456056419-0
                                    • Opcode ID: 6c905180ec137fcfd5e935ca0f15388d47e66ef4de29e75c781d879ba9737026
                                    • Instruction ID: 8e37aebef3959d0a2681582ba021bbdc674255fe241693d0cbbb03e932a2de4f
                                    • Opcode Fuzzy Hash: 6c905180ec137fcfd5e935ca0f15388d47e66ef4de29e75c781d879ba9737026
                                    • Instruction Fuzzy Hash: 29E04F312402149FC710EF6AD844A9AF7EAAF94760F00C02AFD49C7352DE71E945CBA0
                                    APIs
                                    • mouse_event.USER32(00000004,00000000,00000000,00000000,00000000), ref: 006D4F18
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: mouse_event
                                    • String ID:
                                    • API String ID: 2434400541-0
                                    • Opcode ID: 5ea1d74a6648c17939fb691d4d01a217b0dcb740ea87235d379ab37a071de228
                                    • Instruction ID: d36e01396c12c9a80254cb473834fa3d2955a8f91eb784c4218fdb4fdd94723c
                                    • Opcode Fuzzy Hash: 5ea1d74a6648c17939fb691d4d01a217b0dcb740ea87235d379ab37a071de228
                                    • Instruction Fuzzy Hash: 80D05EF09642053BFC284B20AC0FFB6020BE3C0781F84598B3201897E19CF16C01E038
                                    APIs
                                    • LogonUserW.ADVAPI32(?,00000001,?,?,00000000,006C88D1), ref: 006C8CB3
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: LogonUser
                                    • String ID:
                                    • API String ID: 1244722697-0
                                    • Opcode ID: e2a5997e3664e01f8a507f07f16ef3e035c54b51436e7d7848a2d8569feba405
                                    • Instruction ID: 68f7dc1e39a8cea8a715e82e486462af8185abb0cf24f91ef8e5787956ba9689
                                    • Opcode Fuzzy Hash: e2a5997e3664e01f8a507f07f16ef3e035c54b51436e7d7848a2d8569feba405
                                    • Instruction Fuzzy Hash: B7D05E3226050EABEF018FA8DC01EBE3B6AEB04B01F408111FE15C50A1C775D835EB60
                                    APIs
                                    • GetUserNameW.ADVAPI32(?,?), ref: 006B2242
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: NameUser
                                    • String ID:
                                    • API String ID: 2645101109-0
                                    • Opcode ID: be45faf218987cdfcb126e3ac658571e4ba16b0ead39308351c0bbe24f0c7898
                                    • Instruction ID: 1a1596d63415dce1ffc6ef6afa496027b7163be78657fee93afb73a3eb53c9c1
                                    • Opcode Fuzzy Hash: be45faf218987cdfcb126e3ac658571e4ba16b0ead39308351c0bbe24f0c7898
                                    • Instruction Fuzzy Hash: E7C04CF1810109EBDB05DB90D998DFE77BDAB05304F104055A101F2100DB749B44CF71
                                    APIs
                                    • SetUnhandledExceptionFilter.KERNEL32(?), ref: 0069A36A
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: ExceptionFilterUnhandled
                                    • String ID:
                                    • API String ID: 3192549508-0
                                    • Opcode ID: e4e622103c1a552195955e5f537f634b57d9409eb8fdcec1e3b70811428a3981
                                    • Instruction ID: 2368ce59db3f11b152140def0b982337ce8f7e29373e245c014616476a1faf3a
                                    • Opcode Fuzzy Hash: e4e622103c1a552195955e5f537f634b57d9409eb8fdcec1e3b70811428a3981
                                    • Instruction Fuzzy Hash: 65A0113200020CAB8B002B82EC088A8BFAEEA002A0B008020F80C800228F32A8208AC0
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 54eaa2b327ce64da49d49a06f56053cfe0bc520e683f5205ee3c936026f6c73a
                                    • Instruction ID: 16ec8f7f4bca3aefc18a7ea18e3b8544c533ef3321c504d2e73ee163a05b1725
                                    • Opcode Fuzzy Hash: 54eaa2b327ce64da49d49a06f56053cfe0bc520e683f5205ee3c936026f6c73a
                                    • Instruction Fuzzy Hash: 57220730501655CFDF38AB19C894BBD77A3EB41340FA4866AD4478B396DB38ADC2CB61
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                    • Instruction ID: 32c1e3ad7dab94bf39124aa34cacd25c2694deaf87f9a0cad1951523131fb338
                                    • Opcode Fuzzy Hash: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                    • Instruction Fuzzy Hash: 7AC196322050530ADF1D4639D4741BEBAEA5EA37B132A075DE4B3DFAC5EF20D564D620
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                    • Instruction ID: 6e3889ba4d1a65a662c7f4234af5aae71342442bb45aa2e4af1b5bc88d02b15d
                                    • Opcode Fuzzy Hash: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                    • Instruction Fuzzy Hash: 87C1963320519309DF6D463AD4740BEBBEA5AA37B131A075DE4B2DFAD4EF20D524E620
                                    APIs
                                    • SetTextColor.GDI32(?,00000000), ref: 006FA89F
                                    • GetSysColorBrush.USER32(0000000F), ref: 006FA8D0
                                    • GetSysColor.USER32(0000000F), ref: 006FA8DC
                                    • SetBkColor.GDI32(?,000000FF), ref: 006FA8F6
                                    • SelectObject.GDI32(?,?), ref: 006FA905
                                    • InflateRect.USER32(?,000000FF,000000FF), ref: 006FA930
                                    • GetSysColor.USER32(00000010), ref: 006FA938
                                    • CreateSolidBrush.GDI32(00000000), ref: 006FA93F
                                    • FrameRect.USER32(?,?,00000000), ref: 006FA94E
                                    • DeleteObject.GDI32(00000000), ref: 006FA955
                                    • InflateRect.USER32(?,000000FE,000000FE), ref: 006FA9A0
                                    • FillRect.USER32(?,?,?), ref: 006FA9D2
                                    • GetWindowLongW.USER32(?,000000F0), ref: 006FA9FD
                                      • Part of subcall function 006FAB60: GetSysColor.USER32(00000012), ref: 006FAB99
                                      • Part of subcall function 006FAB60: SetTextColor.GDI32(?,?), ref: 006FAB9D
                                      • Part of subcall function 006FAB60: GetSysColorBrush.USER32(0000000F), ref: 006FABB3
                                      • Part of subcall function 006FAB60: GetSysColor.USER32(0000000F), ref: 006FABBE
                                      • Part of subcall function 006FAB60: GetSysColor.USER32(00000011), ref: 006FABDB
                                      • Part of subcall function 006FAB60: CreatePen.GDI32(00000000,00000001,00743C00), ref: 006FABE9
                                      • Part of subcall function 006FAB60: SelectObject.GDI32(?,00000000), ref: 006FABFA
                                      • Part of subcall function 006FAB60: SetBkColor.GDI32(?,00000000), ref: 006FAC03
                                      • Part of subcall function 006FAB60: SelectObject.GDI32(?,?), ref: 006FAC10
                                      • Part of subcall function 006FAB60: InflateRect.USER32(?,000000FF,000000FF), ref: 006FAC2F
                                      • Part of subcall function 006FAB60: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 006FAC46
                                      • Part of subcall function 006FAB60: GetWindowLongW.USER32(00000000,000000F0), ref: 006FAC5B
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
                                    • String ID: @U=u
                                    • API String ID: 4124339563-2594219639
                                    • Opcode ID: 173152dc3a4e81e2ffd407860782f33294776c975129b90249cb0623ff736960
                                    • Instruction ID: ab9374e524d46e26bd6f8fd4184e3f243f4821a2a07b04192c883baaac3474d2
                                    • Opcode Fuzzy Hash: 173152dc3a4e81e2ffd407860782f33294776c975129b90249cb0623ff736960
                                    • Instruction Fuzzy Hash: 70A191B2008305BFD7109F64DC08E7B7BAAFF89321F105A29FA66962A0D771D945CB52
                                    APIs
                                    • CharUpperBuffW.USER32(?,?,006FF910), ref: 006F38AF
                                    • IsWindowVisible.USER32(?), ref: 006F38D3
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: BuffCharUpperVisibleWindow
                                    • String ID: @U=u$ADDSTRING$CHECK$CURRENTTAB$DELSTRING$EDITPASTE$FINDSTRING$GETCURRENTCOL$GETCURRENTLINE$GETCURRENTSELECTION$GETLINE$GETLINECOUNT$GETSELECTED$HIDEDROPDOWN$ISCHECKED$ISENABLED$ISVISIBLE$SELECTSTRING$SENDCOMMANDID$SETCURRENTSELECTION$SHOWDROPDOWN$TABLEFT$TABRIGHT$UNCHECK
                                    • API String ID: 4105515805-3469695742
                                    • Opcode ID: eb768091788776c517f3771e3d9e77f334d95cfb712395203c3aad22492c6e9b
                                    • Instruction ID: c4460383cdddf35428f66dbe841c4fd7d83e12c57642aca8377c0cb9cb9946a5
                                    • Opcode Fuzzy Hash: eb768091788776c517f3771e3d9e77f334d95cfb712395203c3aad22492c6e9b
                                    • Instruction Fuzzy Hash: EBD19E302043299FCB54EF14C491ABA77A7EF94344F10846CB9865B3A2CB35EE4BCB95
                                    APIs
                                    • DestroyWindow.USER32(?,?,?), ref: 00672CA2
                                    • DeleteObject.GDI32(00000000), ref: 00672CE8
                                    • DeleteObject.GDI32(00000000), ref: 00672CF3
                                    • DestroyIcon.USER32(00000000,?,?,?), ref: 00672CFE
                                    • DestroyWindow.USER32(00000000,?,?,?), ref: 00672D09
                                    • SendMessageW.USER32(?,00001308,?,00000000), ref: 006AC68B
                                    • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 006AC6C4
                                    • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 006ACAED
                                      • Part of subcall function 00671B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00672036,?,00000000,?,?,?,?,006716CB,00000000,?), ref: 00671B9A
                                    • SendMessageW.USER32(?,00001053), ref: 006ACB2A
                                    • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 006ACB41
                                    • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 006ACB57
                                    • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 006ACB62
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: Destroy$ImageList_MessageSendWindow$DeleteObject$IconInvalidateMoveRectRemove
                                    • String ID: 0$@U=u
                                    • API String ID: 464785882-975001249
                                    • Opcode ID: 767544565447a09bd92a4f22bb2b2a2bbdbc9c9d1f5d8882655e57ae609f5be9
                                    • Instruction ID: 98e14e48d7621d8441d8e999733504a6aaf462420d1d424c254de67680c0c9e4
                                    • Opcode Fuzzy Hash: 767544565447a09bd92a4f22bb2b2a2bbdbc9c9d1f5d8882655e57ae609f5be9
                                    • Instruction Fuzzy Hash: 7C12AF30604202EFDB51DF24C894BA9BBE6FF56320F548569E599DB262C731EC42CF91
                                    APIs
                                    • DestroyWindow.USER32(00000000), ref: 006E77F1
                                    • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 006E78B0
                                    • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 006E78EE
                                    • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000006), ref: 006E7900
                                    • CreateWindowExW.USER32(00000006,AutoIt v3,?,88C00000,?,?,?,?,00000000,00000000,00000000), ref: 006E7946
                                    • GetClientRect.USER32(00000000,?), ref: 006E7952
                                    • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000), ref: 006E7996
                                    • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 006E79A5
                                    • GetStockObject.GDI32(00000011), ref: 006E79B5
                                    • SelectObject.GDI32(00000000,00000000), ref: 006E79B9
                                    • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?), ref: 006E79C9
                                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 006E79D2
                                    • DeleteDC.GDI32(00000000), ref: 006E79DB
                                    • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 006E7A07
                                    • SendMessageW.USER32(00000030,00000000,00000001), ref: 006E7A1E
                                    • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,00000000,00000000,00000000), ref: 006E7A59
                                    • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 006E7A6D
                                    • SendMessageW.USER32(00000404,00000001,00000000), ref: 006E7A7E
                                    • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,00000000,00000000,00000000), ref: 006E7AAE
                                    • GetStockObject.GDI32(00000011), ref: 006E7AB9
                                    • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 006E7AC4
                                    • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?,?,?,?), ref: 006E7ACE
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                    • String ID: @U=u$AutoIt v3$DISPLAY$msctls_progress32$static
                                    • API String ID: 2910397461-2771358697
                                    • Opcode ID: aaf56851497a1a620299fe14ffbe79217c9dbfef9bd75464be64edd0dd15a712
                                    • Instruction ID: 747f41f3520ca2a325479276a1cdcc5b42ca747a56183bb2705b2945463c2fab
                                    • Opcode Fuzzy Hash: aaf56851497a1a620299fe14ffbe79217c9dbfef9bd75464be64edd0dd15a712
                                    • Instruction Fuzzy Hash: F6A16F71A40215BFEB14DBA4DC4AFAF7BAAEF44711F018118FA15A72E0DB74AD00CB64
                                    APIs
                                    • GetSysColor.USER32(00000012), ref: 006FAB99
                                    • SetTextColor.GDI32(?,?), ref: 006FAB9D
                                    • GetSysColorBrush.USER32(0000000F), ref: 006FABB3
                                    • GetSysColor.USER32(0000000F), ref: 006FABBE
                                    • CreateSolidBrush.GDI32(?), ref: 006FABC3
                                    • GetSysColor.USER32(00000011), ref: 006FABDB
                                    • CreatePen.GDI32(00000000,00000001,00743C00), ref: 006FABE9
                                    • SelectObject.GDI32(?,00000000), ref: 006FABFA
                                    • SetBkColor.GDI32(?,00000000), ref: 006FAC03
                                    • SelectObject.GDI32(?,?), ref: 006FAC10
                                    • InflateRect.USER32(?,000000FF,000000FF), ref: 006FAC2F
                                    • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 006FAC46
                                    • GetWindowLongW.USER32(00000000,000000F0), ref: 006FAC5B
                                    • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 006FACA7
                                    • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 006FACCE
                                    • InflateRect.USER32(?,000000FD,000000FD), ref: 006FACEC
                                    • DrawFocusRect.USER32(?,?), ref: 006FACF7
                                    • GetSysColor.USER32(00000011), ref: 006FAD05
                                    • SetTextColor.GDI32(?,00000000), ref: 006FAD0D
                                    • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 006FAD21
                                    • SelectObject.GDI32(?,006FA869), ref: 006FAD38
                                    • DeleteObject.GDI32(?), ref: 006FAD43
                                    • SelectObject.GDI32(?,?), ref: 006FAD49
                                    • DeleteObject.GDI32(?), ref: 006FAD4E
                                    • SetTextColor.GDI32(?,?), ref: 006FAD54
                                    • SetBkColor.GDI32(?,?), ref: 006FAD5E
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                    • String ID: @U=u
                                    • API String ID: 1996641542-2594219639
                                    • Opcode ID: b59898aac9c3926d95565aeed92c828f17042768fee44b5118bb86d2a4a80df2
                                    • Instruction ID: c217d9827507d4e898cf5b13fffd436ad2e32ed0119392d452512629e93cb584
                                    • Opcode Fuzzy Hash: b59898aac9c3926d95565aeed92c828f17042768fee44b5118bb86d2a4a80df2
                                    • Instruction Fuzzy Hash: D8612BB1900218EFDF11DFA8DC49EBE7B7AFF09320F109125FA15AB2A1D6759940DB90
                                    APIs
                                    • SetErrorMode.KERNEL32(00000001), ref: 006DAF89
                                    • GetDriveTypeW.KERNEL32(?,006FFAC0,?,\\.\,006FF910), ref: 006DB066
                                    • SetErrorMode.KERNEL32(00000000,006FFAC0,?,\\.\,006FF910), ref: 006DB1C4
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: ErrorMode$DriveType
                                    • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                    • API String ID: 2907320926-4222207086
                                    • Opcode ID: 34bf58a62465065c26cbd87b08898f457dbf6498d3e449f08742270864b0c173
                                    • Instruction ID: 6a1df11559d7646f1fac6e62a6e38f86a70252b708dfa8d08f7afbe2a549a57b
                                    • Opcode Fuzzy Hash: 34bf58a62465065c26cbd87b08898f457dbf6498d3e449f08742270864b0c173
                                    • Instruction Fuzzy Hash: 9D51BF70E84305EB8F00DB10DD92DBD73B3EB54741B22902BE41AA7395CB799D42DB5A
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: __wcsnicmp
                                    • String ID: #OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                    • API String ID: 1038674560-86951937
                                    • Opcode ID: 9f887c96118a54acc803dc595980c0e8a5f3ead6e22e98651c12f779092773ca
                                    • Instruction ID: 2f8c2f95e2e07aaa12897e489bd5609f6ed979393c1822ae846482f6b81bad77
                                    • Opcode Fuzzy Hash: 9f887c96118a54acc803dc595980c0e8a5f3ead6e22e98651c12f779092773ca
                                    • Instruction Fuzzy Hash: 32812C71600615BBCF60BB64CC82FEE779FAF12700F148029F949AA2C2EB61DE55C655
                                    APIs
                                    • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 006F8D34
                                    • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 006F8D45
                                    • CharNextW.USER32(0000014E), ref: 006F8D74
                                    • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 006F8DB5
                                    • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 006F8DCB
                                    • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 006F8DDC
                                    • SendMessageW.USER32(?,000000C2,00000001,0000014E), ref: 006F8DF9
                                    • SetWindowTextW.USER32(?,0000014E), ref: 006F8E45
                                    • SendMessageW.USER32(?,000000B1,000F4240,000F423F), ref: 006F8E5B
                                    • SendMessageW.USER32(?,00001002,00000000,?), ref: 006F8E8C
                                    • _memset.LIBCMT ref: 006F8EB1
                                    • SendMessageW.USER32(00000000,00001060,00000001,00000004), ref: 006F8EFA
                                    • _memset.LIBCMT ref: 006F8F59
                                    • SendMessageW.USER32(?,00001053,000000FF,?), ref: 006F8F83
                                    • SendMessageW.USER32(?,00001074,?,00000001), ref: 006F8FDB
                                    • SendMessageW.USER32(?,0000133D,?,?), ref: 006F9088
                                    • InvalidateRect.USER32(?,00000000,00000001), ref: 006F90AA
                                    • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 006F90F4
                                    • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 006F9121
                                    • DrawMenuBar.USER32(?), ref: 006F9130
                                    • SetWindowTextW.USER32(?,0000014E), ref: 006F9158
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: MessageSend$Menu$InfoItemTextWindow_memset$CharDrawInvalidateNextRect
                                    • String ID: 0$@U=u
                                    • API String ID: 1073566785-975001249
                                    • Opcode ID: 504328522755c0c73ab381db78927dc7ea05c4de78fba618088871a62182d3d4
                                    • Instruction ID: 5b646adfdf98cfd94c7fe7a34d65de07e8f7c312baf415de9e3075fd4fb9d612
                                    • Opcode Fuzzy Hash: 504328522755c0c73ab381db78927dc7ea05c4de78fba618088871a62182d3d4
                                    • Instruction Fuzzy Hash: 89E16F7090121DAEDF20DF64CC88AFE7BBAEF05710F108199FA159B291DB748A81DF65
                                    APIs
                                    • GetCursorPos.USER32(?), ref: 006F4C51
                                    • GetDesktopWindow.USER32 ref: 006F4C66
                                    • GetWindowRect.USER32(00000000), ref: 006F4C6D
                                    • GetWindowLongW.USER32(?,000000F0), ref: 006F4CCF
                                    • DestroyWindow.USER32(?), ref: 006F4CFB
                                    • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 006F4D24
                                    • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 006F4D42
                                    • SendMessageW.USER32(?,00000439,00000000,00000030), ref: 006F4D68
                                    • SendMessageW.USER32(?,00000421,?,?), ref: 006F4D7D
                                    • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 006F4D90
                                    • IsWindowVisible.USER32(?), ref: 006F4DB0
                                    • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 006F4DCB
                                    • SendMessageW.USER32(?,00000411,00000001,00000030), ref: 006F4DDF
                                    • GetWindowRect.USER32(?,?), ref: 006F4DF7
                                    • MonitorFromPoint.USER32(?,?,00000002), ref: 006F4E1D
                                    • GetMonitorInfoW.USER32(00000000,?), ref: 006F4E37
                                    • CopyRect.USER32(?,?), ref: 006F4E4E
                                    • SendMessageW.USER32(?,00000412,00000000), ref: 006F4EB9
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                    • String ID: ($0$tooltips_class32
                                    • API String ID: 698492251-4156429822
                                    • Opcode ID: 508c950a7c6672be29b0e8afc9f18f21184935796d249e0107816f8d6eab4c71
                                    • Instruction ID: 819ad8ab6201c582dbb42b32e6780ad7d83b49a40257ccab9c2892c7645bd211
                                    • Opcode Fuzzy Hash: 508c950a7c6672be29b0e8afc9f18f21184935796d249e0107816f8d6eab4c71
                                    • Instruction Fuzzy Hash: 90B15771608341AFDB44DF64C845B6BBBE6BF88314F00891CF6999B2A1DB71EC05CBA5
                                    APIs
                                    • GetFileVersionInfoSizeW.VERSION(?,?), ref: 006D46E8
                                    • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 006D470E
                                    • _wcscpy.LIBCMT ref: 006D473C
                                    • _wcscmp.LIBCMT ref: 006D4747
                                    • _wcscat.LIBCMT ref: 006D475D
                                    • _wcsstr.LIBCMT ref: 006D4768
                                    • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 006D4784
                                    • _wcscat.LIBCMT ref: 006D47CD
                                    • _wcscat.LIBCMT ref: 006D47D4
                                    • _wcsncpy.LIBCMT ref: 006D47FF
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: _wcscat$FileInfoVersion$QuerySizeValue_wcscmp_wcscpy_wcsncpy_wcsstr
                                    • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                    • API String ID: 699586101-1459072770
                                    • Opcode ID: 38db2cdb9bb70fd54934854b89d93775eea67f8ddd1c04f9d4954d1b126f4412
                                    • Instruction ID: c124fc04cb85361dd1ef1eb18c261f00d1d8481ea327745639169256848dff38
                                    • Opcode Fuzzy Hash: 38db2cdb9bb70fd54934854b89d93775eea67f8ddd1c04f9d4954d1b126f4412
                                    • Instruction Fuzzy Hash: 0941F572A00215BBDF10B7649C43EBF77AEEF42750F10016AF905E6682EF35DA0196A9
                                    APIs
                                    • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 006728BC
                                    • GetSystemMetrics.USER32(00000007), ref: 006728C4
                                    • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 006728EF
                                    • GetSystemMetrics.USER32(00000008), ref: 006728F7
                                    • GetSystemMetrics.USER32(00000004), ref: 0067291C
                                    • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 00672939
                                    • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 00672949
                                    • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 0067297C
                                    • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00672990
                                    • GetClientRect.USER32(00000000,000000FF), ref: 006729AE
                                    • GetStockObject.GDI32(00000011), ref: 006729CA
                                    • SendMessageW.USER32(00000000,00000030,00000000), ref: 006729D5
                                      • Part of subcall function 00672344: GetCursorPos.USER32(?), ref: 00672357
                                      • Part of subcall function 00672344: ScreenToClient.USER32(007367B0,?), ref: 00672374
                                      • Part of subcall function 00672344: GetAsyncKeyState.USER32(00000001), ref: 00672399
                                      • Part of subcall function 00672344: GetAsyncKeyState.USER32(00000002), ref: 006723A7
                                    • SetTimer.USER32(00000000,00000000,00000028,00671256), ref: 006729FC
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                    • String ID: @U=u$AutoIt v3 GUI
                                    • API String ID: 1458621304-2077007950
                                    • Opcode ID: 7564753e80ca5ba4ef0be1f19860318d101d3febf95fda2bf18ba42647d1e675
                                    • Instruction ID: d3118d01cb0730b5964e0d46826aafd961ca142c409706b682ad896c981f795b
                                    • Opcode Fuzzy Hash: 7564753e80ca5ba4ef0be1f19860318d101d3febf95fda2bf18ba42647d1e675
                                    • Instruction Fuzzy Hash: EEB14B71A0020AAFDB14DFA8DC55BEE7BB6FF08315F108129FA19E6290DB74A841CB55
                                    APIs
                                    • LoadIconW.USER32(00000063), ref: 006CC4D4
                                    • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 006CC4E6
                                    • SetWindowTextW.USER32(?,?), ref: 006CC4FD
                                    • GetDlgItem.USER32(?,000003EA), ref: 006CC512
                                    • SetWindowTextW.USER32(00000000,?), ref: 006CC518
                                    • GetDlgItem.USER32(?,000003E9), ref: 006CC528
                                    • SetWindowTextW.USER32(00000000,?), ref: 006CC52E
                                    • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 006CC54F
                                    • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 006CC569
                                    • GetWindowRect.USER32(?,?), ref: 006CC572
                                    • SetWindowTextW.USER32(?,?), ref: 006CC5DD
                                    • GetDesktopWindow.USER32 ref: 006CC5E3
                                    • GetWindowRect.USER32(00000000), ref: 006CC5EA
                                    • MoveWindow.USER32(?,?,?,?,00000000,00000000), ref: 006CC636
                                    • GetClientRect.USER32(?,?), ref: 006CC643
                                    • PostMessageW.USER32(?,00000005,00000000,00000000), ref: 006CC668
                                    • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 006CC693
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer
                                    • String ID: @U=u
                                    • API String ID: 3869813825-2594219639
                                    • Opcode ID: 05285a1aa256936b8503f009ca8403d0457344e07be7d4d4dec2d0041696bd0e
                                    • Instruction ID: e19b1a11b27ab8363ddf1bf8dbf4ac8376aa826885400e9e395435c222bae53d
                                    • Opcode Fuzzy Hash: 05285a1aa256936b8503f009ca8403d0457344e07be7d4d4dec2d0041696bd0e
                                    • Instruction Fuzzy Hash: 2B516E70900709AFDB209FA8DD85FBEBBF6FF04715F00452CE686A26A0CB74A915CB50
                                    APIs
                                    • CharUpperBuffW.USER32(?,?), ref: 006F40F6
                                    • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 006F41B6
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: BuffCharMessageSendUpper
                                    • String ID: @U=u$DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
                                    • API String ID: 3974292440-1753161424
                                    • Opcode ID: 5afce2045bf5a41983bb3fba844dc9087acdd7d6247e43fcb485f20578dee424
                                    • Instruction ID: 1ed469220ddf8947eb27cad8f8efa67c37274449ae45456c224f4b3185a4eb32
                                    • Opcode Fuzzy Hash: 5afce2045bf5a41983bb3fba844dc9087acdd7d6247e43fcb485f20578dee424
                                    • Instruction Fuzzy Hash: D7A19C302142159FCB54EF24C841A7AB3E7BF84314F14886CB99A9BB92DF30ED0ACB55
                                    APIs
                                      • Part of subcall function 00672612: GetWindowLongW.USER32(?,000000EB), ref: 00672623
                                    • DragQueryPoint.SHELL32(?,?), ref: 006FC917
                                      • Part of subcall function 006FADF1: ClientToScreen.USER32(?,?), ref: 006FAE1A
                                      • Part of subcall function 006FADF1: GetWindowRect.USER32(?,?), ref: 006FAE90
                                      • Part of subcall function 006FADF1: PtInRect.USER32(?,?,006FC304), ref: 006FAEA0
                                    • SendMessageW.USER32(?,000000B0,?,?), ref: 006FC980
                                    • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 006FC98B
                                    • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 006FC9AE
                                    • _wcscat.LIBCMT ref: 006FC9DE
                                    • SendMessageW.USER32(?,000000C2,00000001,?), ref: 006FC9F5
                                    • SendMessageW.USER32(?,000000B0,?,?), ref: 006FCA0E
                                    • SendMessageW.USER32(?,000000B1,?,?), ref: 006FCA25
                                    • SendMessageW.USER32(?,000000B1,?,?), ref: 006FCA47
                                    • DragFinish.SHELL32(?), ref: 006FCA4E
                                    • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 006FCB41
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen_wcscat
                                    • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID$@U=u$prs
                                    • API String ID: 169749273-2419492147
                                    • Opcode ID: fc19be568b5eb3800c3722f7f0bea8bbe3ac7694e29c115c3fe3deb844647bc5
                                    • Instruction ID: a819cb79fcf3599f8c7952da769579902b4f31cd6e68be9e1cc00b5155a8d531
                                    • Opcode Fuzzy Hash: fc19be568b5eb3800c3722f7f0bea8bbe3ac7694e29c115c3fe3deb844647bc5
                                    • Instruction Fuzzy Hash: 05618A71108304AFC700EF64DC85DAFBBEAEF89710F00492EF695931A1DB709A49CB66
                                    APIs
                                    • LoadCursorW.USER32(00000000,00007F89), ref: 006E5309
                                    • LoadCursorW.USER32(00000000,00007F8A), ref: 006E5314
                                    • LoadCursorW.USER32(00000000,00007F00), ref: 006E531F
                                    • LoadCursorW.USER32(00000000,00007F03), ref: 006E532A
                                    • LoadCursorW.USER32(00000000,00007F8B), ref: 006E5335
                                    • LoadCursorW.USER32(00000000,00007F01), ref: 006E5340
                                    • LoadCursorW.USER32(00000000,00007F81), ref: 006E534B
                                    • LoadCursorW.USER32(00000000,00007F88), ref: 006E5356
                                    • LoadCursorW.USER32(00000000,00007F80), ref: 006E5361
                                    • LoadCursorW.USER32(00000000,00007F86), ref: 006E536C
                                    • LoadCursorW.USER32(00000000,00007F83), ref: 006E5377
                                    • LoadCursorW.USER32(00000000,00007F85), ref: 006E5382
                                    • LoadCursorW.USER32(00000000,00007F82), ref: 006E538D
                                    • LoadCursorW.USER32(00000000,00007F84), ref: 006E5398
                                    • LoadCursorW.USER32(00000000,00007F04), ref: 006E53A3
                                    • LoadCursorW.USER32(00000000,00007F02), ref: 006E53AE
                                    • GetCursorInfo.USER32(?), ref: 006E53BE
                                    • GetLastError.KERNEL32(00000001,00000000), ref: 006E53E9
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: Cursor$Load$ErrorInfoLast
                                    • String ID:
                                    • API String ID: 3215588206-0
                                    • Opcode ID: f372270ed54bb73702953917eed7dbde17f1da2a8ce6b83099a27e901638a1c8
                                    • Instruction ID: 20aa910c430cd9153fecba79c3bd97a41890fde9b3371435759f787d84c46026
                                    • Opcode Fuzzy Hash: f372270ed54bb73702953917eed7dbde17f1da2a8ce6b83099a27e901638a1c8
                                    • Instruction Fuzzy Hash: B4417170E04319AADB109FBA8C49D6EFFF9EF51B10B10452FB509E7291DAB8A401CE65
                                    APIs
                                    • GetClassNameW.USER32(?,?,00000100), ref: 006CAAA5
                                    • __swprintf.LIBCMT ref: 006CAB46
                                    • _wcscmp.LIBCMT ref: 006CAB59
                                    • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 006CABAE
                                    • _wcscmp.LIBCMT ref: 006CABEA
                                    • GetClassNameW.USER32(?,?,00000400), ref: 006CAC21
                                    • GetDlgCtrlID.USER32(?), ref: 006CAC73
                                    • GetWindowRect.USER32(?,?), ref: 006CACA9
                                    • GetParent.USER32(?), ref: 006CACC7
                                    • ScreenToClient.USER32(00000000), ref: 006CACCE
                                    • GetClassNameW.USER32(?,?,00000100), ref: 006CAD48
                                    • _wcscmp.LIBCMT ref: 006CAD5C
                                    • GetWindowTextW.USER32(?,?,00000400), ref: 006CAD82
                                    • _wcscmp.LIBCMT ref: 006CAD96
                                      • Part of subcall function 0069386C: _iswctype.LIBCMT ref: 00693874
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: _wcscmp$ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_iswctype
                                    • String ID: %s%u
                                    • API String ID: 3744389584-679674701
                                    • Opcode ID: 14953e37895103a85b295d356e323b34b3028f2e958688d2674fea3f0b016815
                                    • Instruction ID: b246d5c1c9f3c5fe7decfb80b74cb226f822f2dddc95437ace4be296f7f90e58
                                    • Opcode Fuzzy Hash: 14953e37895103a85b295d356e323b34b3028f2e958688d2674fea3f0b016815
                                    • Instruction Fuzzy Hash: A5A1B07160420AABD714DFA4C884FFAF7AAFF04319F00462DF99AC2650DB30E945CB92
                                    APIs
                                    • GetClassNameW.USER32(00000008,?,00000400), ref: 006CB3DB
                                    • _wcscmp.LIBCMT ref: 006CB3EC
                                    • GetWindowTextW.USER32(00000001,?,00000400), ref: 006CB414
                                    • CharUpperBuffW.USER32(?,00000000), ref: 006CB431
                                    • _wcscmp.LIBCMT ref: 006CB44F
                                    • _wcsstr.LIBCMT ref: 006CB460
                                    • GetClassNameW.USER32(00000018,?,00000400), ref: 006CB498
                                    • _wcscmp.LIBCMT ref: 006CB4A8
                                    • GetWindowTextW.USER32(00000002,?,00000400), ref: 006CB4CF
                                    • GetClassNameW.USER32(00000018,?,00000400), ref: 006CB518
                                    • _wcscmp.LIBCMT ref: 006CB528
                                    • GetClassNameW.USER32(00000010,?,00000400), ref: 006CB550
                                    • GetWindowRect.USER32(00000004,?), ref: 006CB5B9
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: ClassName_wcscmp$Window$Text$BuffCharRectUpper_wcsstr
                                    • String ID: @$ThumbnailClass
                                    • API String ID: 1788623398-1539354611
                                    • Opcode ID: 3c2782d0c5c147578ca33a23398f301e3796d34d787f29b59d44f7bd04eb6cdc
                                    • Instruction ID: 07a8d506dcea4b26026829ce50d06cb896bab9053e0228c5cb3a7c2ee9ce1fea
                                    • Opcode Fuzzy Hash: 3c2782d0c5c147578ca33a23398f301e3796d34d787f29b59d44f7bd04eb6cdc
                                    • Instruction Fuzzy Hash: 4081B0710083059BDB04DF10D886FBAB7EAEF44314F08A56EFD898A296DB34DD45CBA1
                                    APIs
                                    • _memset.LIBCMT ref: 006FA4C8
                                    • DestroyWindow.USER32(?,?), ref: 006FA542
                                      • Part of subcall function 00677D2C: _memmove.LIBCMT ref: 00677D66
                                    • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 006FA5BC
                                    • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 006FA5DE
                                    • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 006FA5F1
                                    • DestroyWindow.USER32(00000000), ref: 006FA613
                                    • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00670000,00000000), ref: 006FA64A
                                    • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 006FA663
                                    • GetDesktopWindow.USER32 ref: 006FA67C
                                    • GetWindowRect.USER32(00000000), ref: 006FA683
                                    • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 006FA69B
                                    • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 006FA6B3
                                      • Part of subcall function 006725DB: GetWindowLongW.USER32(?,000000EB), ref: 006725EC
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_memmove_memset
                                    • String ID: 0$@U=u$tooltips_class32
                                    • API String ID: 1297703922-1130792468
                                    • Opcode ID: 507135eb4fe8260fba9ec1319cd1a41a7db0da8581494315e5ba91d0b47b6cb4
                                    • Instruction ID: 3a4788bb07af6ff161354b449fd4903203a17ba5a6d423e82a2423a1f055fffd
                                    • Opcode Fuzzy Hash: 507135eb4fe8260fba9ec1319cd1a41a7db0da8581494315e5ba91d0b47b6cb4
                                    • Instruction Fuzzy Hash: 19716CB1144209AFE720DF68CC45FB677E6EB88304F08852DFA89873A1D775A902CB16
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: __wcsnicmp
                                    • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:
                                    • API String ID: 1038674560-1810252412
                                    • Opcode ID: a76daae7acea918ff513d0664f75f3de7bec5f102394e544d6b0e8bc342e9278
                                    • Instruction ID: 7f86ca2a62b623cfe76fb4a7297003a4845b9a64e738f7c4e4d4431699ef44a7
                                    • Opcode Fuzzy Hash: a76daae7acea918ff513d0664f75f3de7bec5f102394e544d6b0e8bc342e9278
                                    • Instruction Fuzzy Hash: D331EE70A44325A6DB14FA60DD43FFE77AAEF20750F64402CB909721E2EF696F04C599
                                    APIs
                                    • CharUpperBuffW.USER32(?,?), ref: 006F46AB
                                    • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 006F46F6
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: BuffCharMessageSendUpper
                                    • String ID: @U=u$CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                    • API String ID: 3974292440-383632319
                                    • Opcode ID: 53bf3145203bdcd736bce53d7e0ead8838a9c8a516a42d19080f342af41b06d0
                                    • Instruction ID: 35a94c3a4cea3b03a7b91087dad940f7d0279a14ff4de21aacebe8394f504dce
                                    • Opcode Fuzzy Hash: 53bf3145203bdcd736bce53d7e0ead8838a9c8a516a42d19080f342af41b06d0
                                    • Instruction Fuzzy Hash: BF9177302043058FCB44EF24C451A7AB7E7AF84354F04886CB99A5BBA2DB34ED4ACB95
                                    APIs
                                    • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 006FBB6E
                                    • LoadLibraryExW.KERNEL32(?,00000000,00000032,?,?,00000001,?,?,?,006F6D80,?), ref: 006FBBCA
                                    • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 006FBC03
                                    • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 006FBC46
                                    • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 006FBC7D
                                    • FreeLibrary.KERNEL32(?), ref: 006FBC89
                                    • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 006FBC99
                                    • DestroyIcon.USER32(?), ref: 006FBCA8
                                    • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 006FBCC5
                                    • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 006FBCD1
                                      • Part of subcall function 0069313D: __wcsicmp_l.LIBCMT ref: 006931C6
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: Load$Image$IconLibraryMessageSend$DestroyExtractFree__wcsicmp_l
                                    • String ID: .dll$.exe$.icl$@U=u
                                    • API String ID: 1212759294-1639919054
                                    • Opcode ID: d91925bbef46d34d6f71448a04614bb7b6ae3171c9b6befe109904b38c299b63
                                    • Instruction ID: 6a169841bc88f3582aadf0259d6d6ca11e4d108877cce7edf86dd2baf829a65d
                                    • Opcode Fuzzy Hash: d91925bbef46d34d6f71448a04614bb7b6ae3171c9b6befe109904b38c299b63
                                    • Instruction Fuzzy Hash: 2A619F71500219BAEB14DF64DC85FFA7BAEFF08710F105119FA15D62D1DB74A990CBA0
                                    APIs
                                    • LoadStringW.USER32(00000066,?,00000FFF,006FFB78), ref: 006DA0FC
                                      • Part of subcall function 00677F41: _memmove.LIBCMT ref: 00677F82
                                    • LoadStringW.USER32(?,?,00000FFF,?), ref: 006DA11E
                                    • __swprintf.LIBCMT ref: 006DA177
                                    • __swprintf.LIBCMT ref: 006DA190
                                    • _wprintf.LIBCMT ref: 006DA246
                                    • _wprintf.LIBCMT ref: 006DA264
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: LoadString__swprintf_wprintf$_memmove
                                    • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR$%p
                                    • API String ID: 311963372-902205313
                                    • Opcode ID: cce2dab04582d7d41401d2d710f752aeda67207d2bf56499c7289ff0e8986bd5
                                    • Instruction ID: c510541ec273bbe490cfe10c2e8a4c32e710c5e3aa98bce060dc988e50b4a21e
                                    • Opcode Fuzzy Hash: cce2dab04582d7d41401d2d710f752aeda67207d2bf56499c7289ff0e8986bd5
                                    • Instruction Fuzzy Hash: BC519071C04219BACF55EBE0CD82EEEB77AEF04300F148169F509621A1EB356F48DB55
                                    APIs
                                      • Part of subcall function 00679997: __itow.LIBCMT ref: 006799C2
                                      • Part of subcall function 00679997: __swprintf.LIBCMT ref: 00679A0C
                                    • CharLowerBuffW.USER32(?,?), ref: 006DA636
                                    • GetDriveTypeW.KERNEL32 ref: 006DA683
                                    • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 006DA6CB
                                    • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 006DA702
                                    • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 006DA730
                                      • Part of subcall function 00677D2C: _memmove.LIBCMT ref: 00677D66
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: SendString$BuffCharDriveLowerType__itow__swprintf_memmove
                                    • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                    • API String ID: 2698844021-4113822522
                                    • Opcode ID: 59afed8e417963b9b3247682a9333f508ebb69d518c5f9af064c9dd88a7177d7
                                    • Instruction ID: 10c668d6c0c8444372357078f25bf697c2dc11ade7c7b6f5d4ea7ce841278f5b
                                    • Opcode Fuzzy Hash: 59afed8e417963b9b3247682a9333f508ebb69d518c5f9af064c9dd88a7177d7
                                    • Instruction Fuzzy Hash: AE5159755083049FC740EF24D88186AB7FAFF88718F14896DF89A57261DB31AE0ACB52
                                    APIs
                                    • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 006DA47A
                                    • __swprintf.LIBCMT ref: 006DA49C
                                    • CreateDirectoryW.KERNEL32(?,00000000), ref: 006DA4D9
                                    • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 006DA4FE
                                    • _memset.LIBCMT ref: 006DA51D
                                    • _wcsncpy.LIBCMT ref: 006DA559
                                    • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 006DA58E
                                    • CloseHandle.KERNEL32(00000000), ref: 006DA599
                                    • RemoveDirectoryW.KERNEL32(?), ref: 006DA5A2
                                    • CloseHandle.KERNEL32(00000000), ref: 006DA5AC
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove__swprintf_memset_wcsncpy
                                    • String ID: :$\$\??\%s
                                    • API String ID: 2733774712-3457252023
                                    • Opcode ID: 8eff99c55a2cf4745de3e3ec4f01e3021561af20260e7fdf4107fc1dc12a69f6
                                    • Instruction ID: 02b20381abfa09ea115c71531a96d8124ffd51872250aa8d7090313d77795bf9
                                    • Opcode Fuzzy Hash: 8eff99c55a2cf4745de3e3ec4f01e3021561af20260e7fdf4107fc1dc12a69f6
                                    • Instruction Fuzzy Hash: 053190B690411AAADB219BA0DC48FEB33BEAF88701F1041B6F508D6250E67097458B25
                                    APIs
                                      • Part of subcall function 00672612: GetWindowLongW.USER32(?,000000EB), ref: 00672623
                                    • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 006FC4EC
                                    • GetFocus.USER32 ref: 006FC4FC
                                    • GetDlgCtrlID.USER32(00000000), ref: 006FC507
                                    • _memset.LIBCMT ref: 006FC632
                                    • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 006FC65D
                                    • GetMenuItemCount.USER32(?), ref: 006FC67D
                                    • GetMenuItemID.USER32(?,00000000), ref: 006FC690
                                    • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 006FC6C4
                                    • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 006FC70C
                                    • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 006FC744
                                    • DefDlgProcW.USER32(?,00000111,?,?,?,?,?,?,?), ref: 006FC779
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow_memset
                                    • String ID: 0
                                    • API String ID: 1296962147-4108050209
                                    • Opcode ID: 8bf75796b46cf0902dc9efe2b5951ad5bb5e34e67c66b43be3ed9445991f16ab
                                    • Instruction ID: f741ee2ece887f5e75bbf63c896f1c14c00bc3c4d803770194cde817d399d07c
                                    • Opcode Fuzzy Hash: 8bf75796b46cf0902dc9efe2b5951ad5bb5e34e67c66b43be3ed9445991f16ab
                                    • Instruction Fuzzy Hash: 40816D70508349AFD710DF14CA84ABBBBEAFF88364F10492DFA9597291D730D905CBA2
                                    APIs
                                      • Part of subcall function 006C874A: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 006C8766
                                      • Part of subcall function 006C874A: GetLastError.KERNEL32(?,006C822A,?,?,?), ref: 006C8770
                                      • Part of subcall function 006C874A: GetProcessHeap.KERNEL32(00000008,?,?,006C822A,?,?,?), ref: 006C877F
                                      • Part of subcall function 006C874A: HeapAlloc.KERNEL32(00000000,?,006C822A,?,?,?), ref: 006C8786
                                      • Part of subcall function 006C874A: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 006C879D
                                      • Part of subcall function 006C87E7: GetProcessHeap.KERNEL32(00000008,006C8240,00000000,00000000,?,006C8240,?), ref: 006C87F3
                                      • Part of subcall function 006C87E7: HeapAlloc.KERNEL32(00000000,?,006C8240,?), ref: 006C87FA
                                      • Part of subcall function 006C87E7: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,006C8240,?), ref: 006C880B
                                    • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 006C8458
                                    • _memset.LIBCMT ref: 006C846D
                                    • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 006C848C
                                    • GetLengthSid.ADVAPI32(?), ref: 006C849D
                                    • GetAce.ADVAPI32(?,00000000,?), ref: 006C84DA
                                    • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 006C84F6
                                    • GetLengthSid.ADVAPI32(?), ref: 006C8513
                                    • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 006C8522
                                    • HeapAlloc.KERNEL32(00000000), ref: 006C8529
                                    • GetLengthSid.ADVAPI32(?,00000008,?), ref: 006C854A
                                    • CopySid.ADVAPI32(00000000), ref: 006C8551
                                    • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 006C8582
                                    • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 006C85A8
                                    • SetUserObjectSecurity.USER32(?,00000004,?), ref: 006C85BC
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                                    • String ID:
                                    • API String ID: 3996160137-0
                                    • Opcode ID: db05fe9ef4e8150c6b4dedac327541df1ccb63c45e34dd9b73e88a466974708d
                                    • Instruction ID: 53de58a41834b1a18ba25023235089fc8cbddfeffefff4e8ad77fa53f1dd928f
                                    • Opcode Fuzzy Hash: db05fe9ef4e8150c6b4dedac327541df1ccb63c45e34dd9b73e88a466974708d
                                    • Instruction Fuzzy Hash: 0061157190021AAFDF209FA5DC45EFEBBBAFF08300B54816DE815A7291DB719A15CB60
                                    APIs
                                    • GetDC.USER32(00000000), ref: 006E76A2
                                    • CreateCompatibleBitmap.GDI32(00000000,00000007,?), ref: 006E76AE
                                    • CreateCompatibleDC.GDI32(?), ref: 006E76BA
                                    • SelectObject.GDI32(00000000,?), ref: 006E76C7
                                    • StretchBlt.GDI32(00000006,00000000,00000000,00000007,?,?,?,?,00000007,?,00CC0020), ref: 006E771B
                                    • GetDIBits.GDI32(00000006,?,00000000,00000000,00000000,00000028,00000000), ref: 006E7757
                                    • GetDIBits.GDI32(00000006,?,00000000,?,00000000,00000028,00000000), ref: 006E777B
                                    • SelectObject.GDI32(00000006,?), ref: 006E7783
                                    • DeleteObject.GDI32(?), ref: 006E778C
                                    • DeleteDC.GDI32(00000006), ref: 006E7793
                                    • ReleaseDC.USER32(00000000,?), ref: 006E779E
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                    • String ID: (
                                    • API String ID: 2598888154-3887548279
                                    • Opcode ID: 1c505e2667ee8655539e68ac1d310cfe046f7256cc52ebc767c7473b812e1c58
                                    • Instruction ID: 7a44cbce1416877812045671960ee243d4edebc4e6982d34e3f02b9022ce60c6
                                    • Opcode Fuzzy Hash: 1c505e2667ee8655539e68ac1d310cfe046f7256cc52ebc767c7473b812e1c58
                                    • Instruction Fuzzy Hash: 91514775904349EFCB15CFA9CC84EAEBBBAEF48710F14852DF95A97210D731A940CB64
                                    APIs
                                    • timeGetTime.WINMM ref: 006D521C
                                      • Part of subcall function 00690719: timeGetTime.WINMM(?,753DB400,00680FF9), ref: 0069071D
                                    • Sleep.KERNEL32(0000000A), ref: 006D5248
                                    • EnumThreadWindows.USER32(?,Function_000651CA,00000000), ref: 006D526C
                                    • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 006D528E
                                    • SetActiveWindow.USER32 ref: 006D52AD
                                    • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 006D52BB
                                    • SendMessageW.USER32(00000010,00000000,00000000), ref: 006D52DA
                                    • Sleep.KERNEL32(000000FA), ref: 006D52E5
                                    • IsWindow.USER32 ref: 006D52F1
                                    • EndDialog.USER32(00000000), ref: 006D5302
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                    • String ID: @U=u$BUTTON
                                    • API String ID: 1194449130-2582809321
                                    • Opcode ID: aeb3df8d8a7bfe0b50b4e2977aa4ce023823208a5fb642bb54fe08b32b8a2d09
                                    • Instruction ID: f7c0e8db09e7dee8af63362df7cc30a6b0d054c759dbc597ff401334aebc4872
                                    • Opcode Fuzzy Hash: aeb3df8d8a7bfe0b50b4e2977aa4ce023823208a5fb642bb54fe08b32b8a2d09
                                    • Instruction Fuzzy Hash: DC21A1B0604704AFFB145F60EC88A363B6BFF59347F01642AF402827B1DB659D14DA2A
                                    APIs
                                      • Part of subcall function 00690B9B: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,00676C6C,?,00008000), ref: 00690BB7
                                      • Part of subcall function 006748AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,006748A1,?,?,006737C0,?), ref: 006748CE
                                    • SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00676D0D
                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 00676E5A
                                      • Part of subcall function 006759CD: _wcscpy.LIBCMT ref: 00675A05
                                      • Part of subcall function 0069387D: _iswctype.LIBCMT ref: 00693885
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: CurrentDirectory$FullNamePath_iswctype_wcscpy
                                    • String ID: #include depth exceeded. Make sure there are no recursive includes$>>>AUTOIT SCRIPT<<<$AU3!$Bad directive syntax error$EA06$Error opening the file$Unterminated string
                                    • API String ID: 537147316-1018226102
                                    • Opcode ID: f15352a4aba8696d2ce1107d41b1eda02234ccc97c18d99d0262a49396226e1d
                                    • Instruction ID: abee76331208fceba6da951e3abdaf9b083e242ff15358ac6cf0e01d264f61da
                                    • Opcode Fuzzy Hash: f15352a4aba8696d2ce1107d41b1eda02234ccc97c18d99d0262a49396226e1d
                                    • Instruction Fuzzy Hash: 0E02BC701083419FC764EF24C881AAFBBE6FF89314F04892DF48A972A1DB71D949CB56
                                    APIs
                                    • _memset.LIBCMT ref: 006745F9
                                    • GetMenuItemCount.USER32(00736890), ref: 006AD7CD
                                    • GetMenuItemCount.USER32(00736890), ref: 006AD87D
                                    • GetCursorPos.USER32(?), ref: 006AD8C1
                                    • SetForegroundWindow.USER32(00000000), ref: 006AD8CA
                                    • TrackPopupMenuEx.USER32(00736890,00000000,?,00000000,00000000,00000000), ref: 006AD8DD
                                    • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 006AD8E9
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow_memset
                                    • String ID:
                                    • API String ID: 2751501086-0
                                    • Opcode ID: 3e7e097729259e1ad159b1434d800bc36367d03cf969385b1a74767e09f45afc
                                    • Instruction ID: 5a8e23506206894b1cc2d6f7b1048a0277e5fa1d3caba7493d1e7ebdbad80992
                                    • Opcode Fuzzy Hash: 3e7e097729259e1ad159b1434d800bc36367d03cf969385b1a74767e09f45afc
                                    • Instruction Fuzzy Hash: 2F71E670604215BFEB24AF24DC49FEABF66FF06364F204216F519A62E1CBB19C50DB94
                                    APIs
                                    • VariantInit.OLEAUT32(?), ref: 006E8BEC
                                    • CoInitialize.OLE32(00000000), ref: 006E8C19
                                    • CoUninitialize.OLE32 ref: 006E8C23
                                    • GetRunningObjectTable.OLE32(00000000,?), ref: 006E8D23
                                    • SetErrorMode.KERNEL32(00000001,00000029), ref: 006E8E50
                                    • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,00702C0C), ref: 006E8E84
                                    • CoGetObject.OLE32(?,00000000,00702C0C,?), ref: 006E8EA7
                                    • SetErrorMode.KERNEL32(00000000), ref: 006E8EBA
                                    • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 006E8F3A
                                    • VariantClear.OLEAUT32(?), ref: 006E8F4A
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize
                                    • String ID: ,,p
                                    • API String ID: 2395222682-2804055044
                                    • Opcode ID: d943c96df2de7ebc4c3cbc6877dcc03172b22b6d2839210dc3a7fea555e7a784
                                    • Instruction ID: 29ecb8eec9d35690c5a974d1b6999cc99d7e290f139a3407ae931ff3779b0344
                                    • Opcode Fuzzy Hash: d943c96df2de7ebc4c3cbc6877dcc03172b22b6d2839210dc3a7fea555e7a784
                                    • Instruction Fuzzy Hash: 83C154B1208345AFD700DF65C88496BB7EAFF89748F00492DF58A9B251DB31ED06CB62
                                    APIs
                                      • Part of subcall function 00672612: GetWindowLongW.USER32(?,000000EB), ref: 00672623
                                      • Part of subcall function 00672344: GetCursorPos.USER32(?), ref: 00672357
                                      • Part of subcall function 00672344: ScreenToClient.USER32(007367B0,?), ref: 00672374
                                      • Part of subcall function 00672344: GetAsyncKeyState.USER32(00000001), ref: 00672399
                                      • Part of subcall function 00672344: GetAsyncKeyState.USER32(00000002), ref: 006723A7
                                    • ImageList_DragLeave.COMCTL32(00000000,00000000,00000001,?,?), ref: 006FC2E4
                                    • ImageList_EndDrag.COMCTL32 ref: 006FC2EA
                                    • ReleaseCapture.USER32 ref: 006FC2F0
                                    • SetWindowTextW.USER32(?,00000000), ref: 006FC39A
                                    • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 006FC3AD
                                    • DefDlgProcW.USER32(?,00000202,?,?,00000000,00000001,?,?), ref: 006FC48F
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: AsyncDragImageList_StateWindow$CaptureClientCursorLeaveLongMessageProcReleaseScreenSendText
                                    • String ID: @GUI_DRAGFILE$@GUI_DROPID$@U=u$prs$prs
                                    • API String ID: 1924731296-3922780090
                                    • Opcode ID: 1c9c4b6844c549065a5149adf0bd711e2e9fea3a6e8c26b1e22b65124d3641e3
                                    • Instruction ID: d7804a7a355324203010d620fccadbf976e98b5cec075f12f28b917fb29ac751
                                    • Opcode Fuzzy Hash: 1c9c4b6844c549065a5149adf0bd711e2e9fea3a6e8c26b1e22b65124d3641e3
                                    • Instruction Fuzzy Hash: EE518C70208309AFD704DF24C895FBA7BE6FF88310F10852DF6958B2A2DB75A944CB56
                                    APIs
                                    • CharUpperBuffW.USER32(?,?,?,?,?,?,?,006F0038,?,?), ref: 006F10BC
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: BuffCharUpper
                                    • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                    • API String ID: 3964851224-909552448
                                    • Opcode ID: 3574f8326f817cc80bb2506bab32eb5b90e756aa9bbeae7f3aba5a05ce88a306
                                    • Instruction ID: 44bc24c16943ac0e0ec8cecc180c6c32e0d9f29aeac0cfb60e6c9abc04a50422
                                    • Opcode Fuzzy Hash: 3574f8326f817cc80bb2506bab32eb5b90e756aa9bbeae7f3aba5a05ce88a306
                                    • Instruction Fuzzy Hash: AB416C3011025ECFDF10EF94E891AFA3726AF12380F104468FE915B691DB35AE9ACB60
                                    APIs
                                    • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 006F77CD
                                    • CreateCompatibleDC.GDI32(00000000), ref: 006F77D4
                                    • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 006F77E7
                                    • SelectObject.GDI32(00000000,00000000), ref: 006F77EF
                                    • GetPixel.GDI32(00000000,00000000,00000000), ref: 006F77FA
                                    • DeleteDC.GDI32(00000000), ref: 006F7803
                                    • GetWindowLongW.USER32(?,000000EC), ref: 006F780D
                                    • SetLayeredWindowAttributes.USER32(?,00000000,00000000,00000001), ref: 006F7821
                                    • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?,?), ref: 006F782D
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                                    • String ID: @U=u$static
                                    • API String ID: 2559357485-3553413495
                                    • Opcode ID: eee88d8dc9141a4e3a16a325343ff0dbc55ac336d3dc96e29a7523f0d7cf5a96
                                    • Instruction ID: 39ae83c1b7900e5592ea67afb98c36ae0ddb36b69202bb745737a3a2eb829160
                                    • Opcode Fuzzy Hash: eee88d8dc9141a4e3a16a325343ff0dbc55ac336d3dc96e29a7523f0d7cf5a96
                                    • Instruction Fuzzy Hash: 0F317C32105219BBDF119FB4DC09FEB3B6AFF09361F115225FA25A61A0CB71D821DBA4
                                    APIs
                                      • Part of subcall function 00677D2C: _memmove.LIBCMT ref: 00677D66
                                      • Part of subcall function 00677A84: _memmove.LIBCMT ref: 00677B0D
                                    • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 006D55D2
                                    • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 006D55E8
                                    • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 006D55F9
                                    • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 006D560B
                                    • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 006D561C
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: SendString$_memmove
                                    • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                    • API String ID: 2279737902-1007645807
                                    • Opcode ID: e617c45a2c0eb95a6c33ba07542603a5b1657f1f20a800a58cd26055009ca44b
                                    • Instruction ID: ce27f5947a53cc25830039a5ceecb3a013aa7db425331939a08ad982bec2fac4
                                    • Opcode Fuzzy Hash: e617c45a2c0eb95a6c33ba07542603a5b1657f1f20a800a58cd26055009ca44b
                                    • Instruction Fuzzy Hash: 161104609601A97AD720F761DC4ADFFBB7EEF92B00F40042EB805A21D2EEA44D05C5A1
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: _wcscpy$CleanupStartup_memmove_strcatgethostbynamegethostnameinet_ntoa
                                    • String ID: 0.0.0.0
                                    • API String ID: 208665112-3771769585
                                    • Opcode ID: f4914bc76ddbb5b82ba5250987a2fd41401cc80deae55f5925b93bb983da81ad
                                    • Instruction ID: fb37b1aac9cd237dc5b86efc8847cb825a5bc66606ca7a2a14e5b389e0daa91a
                                    • Opcode Fuzzy Hash: f4914bc76ddbb5b82ba5250987a2fd41401cc80deae55f5925b93bb983da81ad
                                    • Instruction Fuzzy Hash: 64113A31D04115ABCF20EB20EC46EEB77BEDF01710F1401BAF4149A251EF719E81D655
                                    APIs
                                      • Part of subcall function 00679997: __itow.LIBCMT ref: 006799C2
                                      • Part of subcall function 00679997: __swprintf.LIBCMT ref: 00679A0C
                                    • CoInitialize.OLE32(00000000), ref: 006DD855
                                    • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 006DD8E8
                                    • SHGetDesktopFolder.SHELL32(?), ref: 006DD8FC
                                    • CoCreateInstance.OLE32(00702D7C,00000000,00000001,0072A89C,?), ref: 006DD948
                                    • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 006DD9B7
                                    • CoTaskMemFree.OLE32(?,?), ref: 006DDA0F
                                    • _memset.LIBCMT ref: 006DDA4C
                                    • SHBrowseForFolderW.SHELL32(?), ref: 006DDA88
                                    • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 006DDAAB
                                    • CoTaskMemFree.OLE32(00000000), ref: 006DDAB2
                                    • CoTaskMemFree.OLE32(00000000,00000001,00000000), ref: 006DDAE9
                                    • CoUninitialize.OLE32(00000001,00000000), ref: 006DDAEB
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize__itow__swprintf_memset
                                    • String ID:
                                    • API String ID: 1246142700-0
                                    • Opcode ID: 8875a52a5d60b61f2e6c69fb645b207f9289f22a8ddd14e369bd3451da7cab25
                                    • Instruction ID: baa7d20056c5ad7558f72633cff3781c24559112a660b608ef5af00d820f6664
                                    • Opcode Fuzzy Hash: 8875a52a5d60b61f2e6c69fb645b207f9289f22a8ddd14e369bd3451da7cab25
                                    • Instruction Fuzzy Hash: DDB1EA75A00109AFDB54DFA4C888DAEBBFAEF48314B1484A9F509EB351DB30ED45CB54
                                    APIs
                                    • GetKeyboardState.USER32(?), ref: 006D05A7
                                    • SetKeyboardState.USER32(?), ref: 006D0612
                                    • GetAsyncKeyState.USER32(000000A0), ref: 006D0632
                                    • GetKeyState.USER32(000000A0), ref: 006D0649
                                    • GetAsyncKeyState.USER32(000000A1), ref: 006D0678
                                    • GetKeyState.USER32(000000A1), ref: 006D0689
                                    • GetAsyncKeyState.USER32(00000011), ref: 006D06B5
                                    • GetKeyState.USER32(00000011), ref: 006D06C3
                                    • GetAsyncKeyState.USER32(00000012), ref: 006D06EC
                                    • GetKeyState.USER32(00000012), ref: 006D06FA
                                    • GetAsyncKeyState.USER32(0000005B), ref: 006D0723
                                    • GetKeyState.USER32(0000005B), ref: 006D0731
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: State$Async$Keyboard
                                    • String ID:
                                    • API String ID: 541375521-0
                                    • Opcode ID: e3c5d1416c7dc80dc56b75f31e6ae281ce5cbe8b54347383ffe2c8886c191b00
                                    • Instruction ID: 67f5e0f6cf9f0e24418ef99ace01890df1f8e8e647fd1966ad2614ed77a9a06f
                                    • Opcode Fuzzy Hash: e3c5d1416c7dc80dc56b75f31e6ae281ce5cbe8b54347383ffe2c8886c191b00
                                    • Instruction Fuzzy Hash: 8351F960E047C429FB34DBB099557EAAFB69F02380F08459F99C25A3C2DAA4DA4CCB55
                                    APIs
                                    • GetDlgItem.USER32(?,00000001), ref: 006CC746
                                    • GetWindowRect.USER32(00000000,?), ref: 006CC758
                                    • MoveWindow.USER32(00000001,0000000A,?,00000001,?,00000000), ref: 006CC7B6
                                    • GetDlgItem.USER32(?,00000002), ref: 006CC7C1
                                    • GetWindowRect.USER32(00000000,?), ref: 006CC7D3
                                    • MoveWindow.USER32(00000001,?,00000000,00000001,?,00000000), ref: 006CC827
                                    • GetDlgItem.USER32(?,000003E9), ref: 006CC835
                                    • GetWindowRect.USER32(00000000,?), ref: 006CC846
                                    • MoveWindow.USER32(00000000,0000000A,00000000,?,?,00000000), ref: 006CC889
                                    • GetDlgItem.USER32(?,000003EA), ref: 006CC897
                                    • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 006CC8B4
                                    • InvalidateRect.USER32(?,00000000,00000001), ref: 006CC8C1
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: Window$ItemMoveRect$Invalidate
                                    • String ID:
                                    • API String ID: 3096461208-0
                                    • Opcode ID: 03f874e9ca3f2da6a76a6898614a182baf446c9bb206e98ea5841bdc34609294
                                    • Instruction ID: a0e75ce1bb5b4fa116eccfc054349a9c0d1162da02fdc2e872830934a8f9d513
                                    • Opcode Fuzzy Hash: 03f874e9ca3f2da6a76a6898614a182baf446c9bb206e98ea5841bdc34609294
                                    • Instruction Fuzzy Hash: 44510E71B00205ABDB18CF69DD99EBEBBB6EF88711F14812DF519D6290DB70A940CB50
                                    APIs
                                      • Part of subcall function 00671B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00672036,?,00000000,?,?,?,?,006716CB,00000000,?), ref: 00671B9A
                                    • DestroyWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,?), ref: 006720D3
                                    • KillTimer.USER32(-00000001,?,?,?,?,006716CB,00000000,?,?,00671AE2,?,?), ref: 0067216E
                                    • DestroyAcceleratorTable.USER32(00000000), ref: 006ABEF6
                                    • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,006716CB,00000000,?,?,00671AE2,?,?), ref: 006ABF27
                                    • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,006716CB,00000000,?,?,00671AE2,?,?), ref: 006ABF3E
                                    • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,006716CB,00000000,?,?,00671AE2,?,?), ref: 006ABF5A
                                    • DeleteObject.GDI32(00000000), ref: 006ABF6C
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                    • String ID:
                                    • API String ID: 641708696-0
                                    • Opcode ID: db925f8eef354e92eaa34643c2a0bad0ae8e57b05a1feaad5cda12428073d868
                                    • Instruction ID: 846771417c67b40db60889b034825f383ea7735a62b58b3c2bbaa0cb59e5cfcf
                                    • Opcode Fuzzy Hash: db925f8eef354e92eaa34643c2a0bad0ae8e57b05a1feaad5cda12428073d868
                                    • Instruction Fuzzy Hash: 5B61C930100602EFEB25AF14DD68BAAB7F3FF45302F54D428E14686A61C739AC91DFA4
                                    APIs
                                      • Part of subcall function 006725DB: GetWindowLongW.USER32(?,000000EB), ref: 006725EC
                                    • GetSysColor.USER32(0000000F), ref: 006721D3
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: ColorLongWindow
                                    • String ID:
                                    • API String ID: 259745315-0
                                    • Opcode ID: 7f71379a95c97283c150a48096d7081b5e122f0503f2d31f738a0739229ad3fe
                                    • Instruction ID: 69748a07ec40bc6e5df761f52fbe8e5af0cffe86ea2c289c32a3b21294157aeb
                                    • Opcode Fuzzy Hash: 7f71379a95c97283c150a48096d7081b5e122f0503f2d31f738a0739229ad3fe
                                    • Instruction Fuzzy Hash: E1416231100141AADB259F28DC98BF93767EF16335F248265FD798A2E6C7318E42DB61
                                    APIs
                                    • CharLowerBuffW.USER32(?,?,006FF910), ref: 006DAB76
                                    • GetDriveTypeW.KERNEL32(00000061,0072A620,00000061), ref: 006DAC40
                                    • _wcscpy.LIBCMT ref: 006DAC6A
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: BuffCharDriveLowerType_wcscpy
                                    • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                    • API String ID: 2820617543-1000479233
                                    • Opcode ID: 75943f68092d9f3bde2ef6fe4f8b9db640442302dfa8d3969b62aafb4c7377d4
                                    • Instruction ID: c6722e8917629214ee00a088b1452cf5c44ab14a63816be3044fa0cd8f21a391
                                    • Opcode Fuzzy Hash: 75943f68092d9f3bde2ef6fe4f8b9db640442302dfa8d3969b62aafb4c7377d4
                                    • Instruction Fuzzy Hash: 1051AE305183019FC750EF58C881AAAB7EBEF85310F14882EF496973A2DB31DD4ACA57
                                    APIs
                                    • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 006F896E
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: InvalidateRect
                                    • String ID: @U=u
                                    • API String ID: 634782764-2594219639
                                    • Opcode ID: 35769ef68257eb9c0e027ec18a067234404929ba3835013fb27e590fb75804c6
                                    • Instruction ID: 80b3c1ed1b31e6f2f3400e3952d42d6c8dd262de1ebaffab2f79a7b4d3604762
                                    • Opcode Fuzzy Hash: 35769ef68257eb9c0e027ec18a067234404929ba3835013fb27e590fb75804c6
                                    • Instruction Fuzzy Hash: 0E515E31A0020DBEEF209F288C85BB97B67FF05350F604196F625E72A1DF71A990DB55
                                    APIs
                                    • LoadImageW.USER32(00000000,?,00000001,00000010,00000010,00000010), ref: 006AC547
                                    • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 006AC569
                                    • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 006AC581
                                    • ExtractIconExW.SHELL32(?,00000000,?,00000000,00000001), ref: 006AC59F
                                    • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 006AC5C0
                                    • DestroyIcon.USER32(00000000), ref: 006AC5CF
                                    • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 006AC5EC
                                    • DestroyIcon.USER32(?), ref: 006AC5FB
                                      • Part of subcall function 006FA71E: DeleteObject.GDI32(00000000), ref: 006FA757
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: Icon$DestroyExtractImageLoadMessageSend$DeleteObject
                                    • String ID: @U=u
                                    • API String ID: 2819616528-2594219639
                                    • Opcode ID: c5d384c441ed3bb7c22a71579cc71416c04a1de36601d57a368733d1d9307e85
                                    • Instruction ID: ee471e414430c60b4a5ce5f858dc0a1b2a8b6d415e121ed0e1a74ae81318dd9f
                                    • Opcode Fuzzy Hash: c5d384c441ed3bb7c22a71579cc71416c04a1de36601d57a368733d1d9307e85
                                    • Instruction Fuzzy Hash: 87515B74A00209EFDB24EF24CC55FAA77A6EF59720F108529F90697290DB70ED91DB50
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: __i64tow__itow__swprintf
                                    • String ID: %.15g$0x%p$False$True
                                    • API String ID: 421087845-2263619337
                                    • Opcode ID: 4294e169edb54183b224423b4b539c6ea6abf80b28405c7ab349d0456c15d73c
                                    • Instruction ID: 17b7993a0e08e5b86e2f319d728774e8569fa82a6692caa28e680a2088a2c439
                                    • Opcode Fuzzy Hash: 4294e169edb54183b224423b4b539c6ea6abf80b28405c7ab349d0456c15d73c
                                    • Instruction Fuzzy Hash: 6541E571504605AFEF24EB78DC42EB773EAEB05300F24886EE64DD7291EA719D42DB11
                                    APIs
                                    • _memset.LIBCMT ref: 006F73D9
                                    • CreateMenu.USER32 ref: 006F73F4
                                    • SetMenu.USER32(?,00000000), ref: 006F7403
                                    • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 006F7490
                                    • IsMenu.USER32(?), ref: 006F74A6
                                    • CreatePopupMenu.USER32 ref: 006F74B0
                                    • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 006F74DD
                                    • DrawMenuBar.USER32 ref: 006F74E5
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: Menu$CreateItem$DrawInfoInsertPopup_memset
                                    • String ID: 0$F
                                    • API String ID: 176399719-3044882817
                                    • Opcode ID: b45feb0ce03b58f960471fde0772196a7a01234b1ae06feea23f91875a7c1508
                                    • Instruction ID: 8dceda2bfd38ed5f878df61942b66bb436638fa2eef0a4778ec35289c12f58d0
                                    • Opcode Fuzzy Hash: b45feb0ce03b58f960471fde0772196a7a01234b1ae06feea23f91875a7c1508
                                    • Instruction Fuzzy Hash: 78411675A01209EFDB20DF64D884AEABBFAFF59310F144429FA5597360D735A910CB60
                                    APIs
                                      • Part of subcall function 00677F41: _memmove.LIBCMT ref: 00677F82
                                      • Part of subcall function 006CB0C4: GetClassNameW.USER32(?,?,000000FF), ref: 006CB0E7
                                    • SendMessageW.USER32(?,0000018C,000000FF,00000002), ref: 006C94F6
                                    • GetDlgCtrlID.USER32 ref: 006C9501
                                    • GetParent.USER32 ref: 006C951D
                                    • SendMessageW.USER32(00000000,?,00000111,?), ref: 006C9520
                                    • GetDlgCtrlID.USER32(?), ref: 006C9529
                                    • GetParent.USER32(?), ref: 006C9545
                                    • SendMessageW.USER32(00000000,?,?,00000111), ref: 006C9548
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: MessageSend$CtrlParent$ClassName_memmove
                                    • String ID: @U=u$ComboBox$ListBox
                                    • API String ID: 1536045017-2258501812
                                    • Opcode ID: 10fb0547145a23aadfc35393318fb2dfe3c974e652618c75265807062d2333b7
                                    • Instruction ID: b327d87acb4d1720d8588b3f49d1e4ea1f9916de54625be02ddeed827a08e974
                                    • Opcode Fuzzy Hash: 10fb0547145a23aadfc35393318fb2dfe3c974e652618c75265807062d2333b7
                                    • Instruction Fuzzy Hash: 2E21C470A04204BBCF05AB64CC85EFEBB76EF45300F10416DF562972E1DB795919DB20
                                    APIs
                                      • Part of subcall function 00677F41: _memmove.LIBCMT ref: 00677F82
                                      • Part of subcall function 006CB0C4: GetClassNameW.USER32(?,?,000000FF), ref: 006CB0E7
                                    • SendMessageW.USER32(?,00000186,00000002,00000000), ref: 006C95DF
                                    • GetDlgCtrlID.USER32 ref: 006C95EA
                                    • GetParent.USER32 ref: 006C9606
                                    • SendMessageW.USER32(00000000,?,00000111,?), ref: 006C9609
                                    • GetDlgCtrlID.USER32(?), ref: 006C9612
                                    • GetParent.USER32(?), ref: 006C962E
                                    • SendMessageW.USER32(00000000,?,?,00000111), ref: 006C9631
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: MessageSend$CtrlParent$ClassName_memmove
                                    • String ID: @U=u$ComboBox$ListBox
                                    • API String ID: 1536045017-2258501812
                                    • Opcode ID: cdeaa030abaac33386045b9bf3a75c951057d51bb7317959759798301c776048
                                    • Instruction ID: eaefebb25f4b2683ba529e80d9d74e69ff9b00ae86c319363e1419626a225b67
                                    • Opcode Fuzzy Hash: cdeaa030abaac33386045b9bf3a75c951057d51bb7317959759798301c776048
                                    • Instruction Fuzzy Hash: 1521B374A00204BBDF01AB75CCC5EFEBB7AEF49300F104059F911972E1DB799919DA24
                                    APIs
                                    • GetParent.USER32 ref: 006C9651
                                    • GetClassNameW.USER32(00000000,?,00000100), ref: 006C9666
                                    • _wcscmp.LIBCMT ref: 006C9678
                                    • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 006C96F3
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: ClassMessageNameParentSend_wcscmp
                                    • String ID: @U=u$SHELLDLL_DefView$details$largeicons$list$smallicons
                                    • API String ID: 1704125052-1428604138
                                    • Opcode ID: e9fe4a7a8f2154acb038f20385ba58eeb3fab513ebebe7ffc926f30d84f6205c
                                    • Instruction ID: 287aa8a5c807965df419418d9ffebd033f371f8f1305c1812327a4b52626f665
                                    • Opcode Fuzzy Hash: e9fe4a7a8f2154acb038f20385ba58eeb3fab513ebebe7ffc926f30d84f6205c
                                    • Instruction Fuzzy Hash: 2711CA76248327BAFB012622EC0EEF6779EDF05760F20002EFA00A55E1FE55595195AC
                                    APIs
                                    • _memset.LIBCMT ref: 0069707B
                                      • Part of subcall function 00698D68: __getptd_noexit.LIBCMT ref: 00698D68
                                    • __gmtime64_s.LIBCMT ref: 00697114
                                    • __gmtime64_s.LIBCMT ref: 0069714A
                                    • __gmtime64_s.LIBCMT ref: 00697167
                                    • __allrem.LIBCMT ref: 006971BD
                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 006971D9
                                    • __allrem.LIBCMT ref: 006971F0
                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0069720E
                                    • __allrem.LIBCMT ref: 00697225
                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00697243
                                    • __invoke_watson.LIBCMT ref: 006972B4
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@__gmtime64_s$__getptd_noexit__invoke_watson_memset
                                    • String ID:
                                    • API String ID: 384356119-0
                                    • Opcode ID: 85949ae18b549cd2d12431497598bef6b028e5a4746e3945652a320069ef6a5a
                                    • Instruction ID: 815fbd3cbb3229d09030d856ac69b5a48803b8fbabefc5a72e48aeb589f98e4d
                                    • Opcode Fuzzy Hash: 85949ae18b549cd2d12431497598bef6b028e5a4746e3945652a320069ef6a5a
                                    • Instruction Fuzzy Hash: AD71D9B1A14716ABDB14AF79CC41B9AB3AEAF51324F14422EF414D7B81E770DF408B94
                                    APIs
                                    • _memset.LIBCMT ref: 006D2A31
                                    • GetMenuItemInfoW.USER32(00736890,000000FF,00000000,00000030), ref: 006D2A92
                                    • SetMenuItemInfoW.USER32(00736890,00000004,00000000,00000030), ref: 006D2AC8
                                    • Sleep.KERNEL32(000001F4), ref: 006D2ADA
                                    • GetMenuItemCount.USER32(?), ref: 006D2B1E
                                    • GetMenuItemID.USER32(?,00000000), ref: 006D2B3A
                                    • GetMenuItemID.USER32(?,-00000001), ref: 006D2B64
                                    • GetMenuItemID.USER32(?,?), ref: 006D2BA9
                                    • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 006D2BEF
                                    • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 006D2C03
                                    • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 006D2C24
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: ItemMenu$Info$CheckCountRadioSleep_memset
                                    • String ID:
                                    • API String ID: 4176008265-0
                                    • Opcode ID: e3de487f69dc60309cf110b66afc547fcca47bef2132a82463c1644be1bfa586
                                    • Instruction ID: b299af16daf3644aea666c1a9b493c09098a912c1173667aa76b7048df18ce04
                                    • Opcode Fuzzy Hash: e3de487f69dc60309cf110b66afc547fcca47bef2132a82463c1644be1bfa586
                                    • Instruction Fuzzy Hash: 30619EB0D0024AAFDB21CF64C8A8DFE7BBAFB65308F14445AE84197351D771AD46DB20
                                    APIs
                                    • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 006F7214
                                    • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 006F7217
                                    • GetWindowLongW.USER32(?,000000F0), ref: 006F723B
                                    • _memset.LIBCMT ref: 006F724C
                                    • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 006F725E
                                    • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 006F72D6
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: MessageSend$LongWindow_memset
                                    • String ID:
                                    • API String ID: 830647256-0
                                    • Opcode ID: 56884ca30298a96c6146dc4e6d5259b8ea06dce37bed5b95e8bb5be4eaf847a0
                                    • Instruction ID: 2e00b6b846bde406efbc0ec37856f991facd5985c3387949103097d03a205a89
                                    • Opcode Fuzzy Hash: 56884ca30298a96c6146dc4e6d5259b8ea06dce37bed5b95e8bb5be4eaf847a0
                                    • Instruction Fuzzy Hash: 71617A71900208AFDB20DFA8CC81EFE77FAAB09710F144159FA14A73A1C774AE46DB64
                                    APIs
                                    • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 006C7135
                                    • SafeArrayAllocData.OLEAUT32(?), ref: 006C718E
                                    • VariantInit.OLEAUT32(?), ref: 006C71A0
                                    • SafeArrayAccessData.OLEAUT32(?,?), ref: 006C71C0
                                    • VariantCopy.OLEAUT32(?,?), ref: 006C7213
                                    • SafeArrayUnaccessData.OLEAUT32(?), ref: 006C7227
                                    • VariantClear.OLEAUT32(?), ref: 006C723C
                                    • SafeArrayDestroyData.OLEAUT32(?), ref: 006C7249
                                    • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 006C7252
                                    • VariantClear.OLEAUT32(?), ref: 006C7264
                                    • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 006C726F
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                    • String ID:
                                    • API String ID: 2706829360-0
                                    • Opcode ID: f5dabbdb7d53349ed55bd1db80445a1e2ca4e275382f7877f159aee9446b5b4f
                                    • Instruction ID: b91325507c43a1c88e971415f81468e57e42ed0d5da2e8a18ba5627880d1ce81
                                    • Opcode Fuzzy Hash: f5dabbdb7d53349ed55bd1db80445a1e2ca4e275382f7877f159aee9446b5b4f
                                    • Instruction Fuzzy Hash: 05414F35A00119AFCB00DF68D844EBEBBFAEF48354F048069F955A7261CB34AA45CF94
                                    APIs
                                      • Part of subcall function 00672612: GetWindowLongW.USER32(?,000000EB), ref: 00672623
                                    • GetSystemMetrics.USER32(0000000F), ref: 006FD78A
                                    • GetSystemMetrics.USER32(0000000F), ref: 006FD7AA
                                    • MoveWindow.USER32(00000003,?,?,?,?,00000000,?,?,?), ref: 006FD9E5
                                    • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 006FDA03
                                    • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 006FDA24
                                    • ShowWindow.USER32(00000003,00000000), ref: 006FDA43
                                    • InvalidateRect.USER32(?,00000000,00000001), ref: 006FDA68
                                    • DefDlgProcW.USER32(?,00000005,?,?), ref: 006FDA8B
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: Window$MessageMetricsSendSystem$InvalidateLongMoveProcRectShow
                                    • String ID: @U=u
                                    • API String ID: 1211466189-2594219639
                                    • Opcode ID: 96cd6ca93210999cc8cef9daf6d3f54454b8eebe30e1c8e2c1854c122e2e9d84
                                    • Instruction ID: 16346737f69d0e9ea3cecbc6e25be663c018baed73c1efc4f71e3c4cd545e99c
                                    • Opcode Fuzzy Hash: 96cd6ca93210999cc8cef9daf6d3f54454b8eebe30e1c8e2c1854c122e2e9d84
                                    • Instruction Fuzzy Hash: 9BB17971600229EBDF14CF68C9857FD7BB3BF08701F088169EE489B299DB74A950CB54
                                    APIs
                                      • Part of subcall function 00679997: __itow.LIBCMT ref: 006799C2
                                      • Part of subcall function 00679997: __swprintf.LIBCMT ref: 00679A0C
                                    • CoInitialize.OLE32 ref: 006E8718
                                    • CoUninitialize.OLE32 ref: 006E8723
                                    • CoCreateInstance.OLE32(?,00000000,00000017,00702BEC,?), ref: 006E8783
                                    • IIDFromString.OLE32(?,?), ref: 006E87F6
                                    • VariantInit.OLEAUT32(?), ref: 006E8890
                                    • VariantClear.OLEAUT32(?), ref: 006E88F1
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize__itow__swprintf
                                    • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                    • API String ID: 834269672-1287834457
                                    • Opcode ID: e2cb8a57d00016974aedb2e88b62477a9ad1793b30c6705288b8011f25dfe6e3
                                    • Instruction ID: b1f11a6a731a998adb448642079f5c29fa38094f8169c52ba533715fe5571614
                                    • Opcode Fuzzy Hash: e2cb8a57d00016974aedb2e88b62477a9ad1793b30c6705288b8011f25dfe6e3
                                    • Instruction Fuzzy Hash: 9F61AC70609341AFD710DF25C848B6FBBEAAF88714F10481DF9899B291CB30ED45CBA6
                                    APIs
                                    • SetWindowLongW.USER32(?,000000EB), ref: 00672EAE
                                      • Part of subcall function 00671DB3: GetClientRect.USER32(?,?), ref: 00671DDC
                                      • Part of subcall function 00671DB3: GetWindowRect.USER32(?,?), ref: 00671E1D
                                      • Part of subcall function 00671DB3: ScreenToClient.USER32(?,?), ref: 00671E45
                                    • GetDC.USER32 ref: 006ACF82
                                    • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 006ACF95
                                    • SelectObject.GDI32(00000000,00000000), ref: 006ACFA3
                                    • SelectObject.GDI32(00000000,00000000), ref: 006ACFB8
                                    • ReleaseDC.USER32(?,00000000), ref: 006ACFC0
                                    • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 006AD04B
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                    • String ID: @U=u$U
                                    • API String ID: 4009187628-4110099822
                                    • Opcode ID: 29409e12443bf551a1df705656654915903b9b7d3e2acf672c2445cec4ac3d91
                                    • Instruction ID: f0cbab3fb99c9b0da7c056192eac9e80b1cacc798d602b9cae7b5c1f712bb2b6
                                    • Opcode Fuzzy Hash: 29409e12443bf551a1df705656654915903b9b7d3e2acf672c2445cec4ac3d91
                                    • Instruction Fuzzy Hash: 08719330500205EFCF21AF64C894AFA7BB7FF4A364F14826AED565A266C7318C52DF60
                                    APIs
                                    • WSAStartup.WSOCK32(00000101,?), ref: 006E5AA6
                                    • inet_addr.WSOCK32(?,?,?), ref: 006E5AEB
                                    • gethostbyname.WSOCK32(?), ref: 006E5AF7
                                    • IcmpCreateFile.IPHLPAPI ref: 006E5B05
                                    • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 006E5B75
                                    • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 006E5B8B
                                    • IcmpCloseHandle.IPHLPAPI(00000000), ref: 006E5C00
                                    • WSACleanup.WSOCK32 ref: 006E5C06
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                    • String ID: Ping
                                    • API String ID: 1028309954-2246546115
                                    • Opcode ID: c7db5b9f85cff718ca3a002cd29961c03ba1d1c462dc57d0e9517911ca4a64d5
                                    • Instruction ID: ac319af9cfb7af4702bd1cf4e0b09996af2a8d325d7e80278ddb4042e451e86d
                                    • Opcode Fuzzy Hash: c7db5b9f85cff718ca3a002cd29961c03ba1d1c462dc57d0e9517911ca4a64d5
                                    • Instruction Fuzzy Hash: 2351B1316047009FDB20EF25CC95B6AB7E6EF44714F14896DF55ADB2A1DB70E800CB5A
                                    APIs
                                    • SetErrorMode.KERNEL32(00000001), ref: 006DB73B
                                    • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 006DB7B1
                                    • GetLastError.KERNEL32 ref: 006DB7BB
                                    • SetErrorMode.KERNEL32(00000000,READY), ref: 006DB828
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: Error$Mode$DiskFreeLastSpace
                                    • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                    • API String ID: 4194297153-14809454
                                    • Opcode ID: a0e55251f76f6f0e361e419e065c93a4ffd97f2d0b5b57b4fc90f02dab3b0944
                                    • Instruction ID: 16938b9aa23fe7a11784abbcd30331d59e89cca146b4e7885e77e91a51a86fc3
                                    • Opcode Fuzzy Hash: a0e55251f76f6f0e361e419e065c93a4ffd97f2d0b5b57b4fc90f02dab3b0944
                                    • Instruction Fuzzy Hash: 02319035E00209EFDB00EF64D885AFE7BBAEF84700F15902AE506D7395DB719942CB91
                                    APIs
                                    • DeleteObject.GDI32(00000000), ref: 006F645A
                                    • GetDC.USER32(00000000), ref: 006F6462
                                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 006F646D
                                    • ReleaseDC.USER32(00000000,00000000), ref: 006F6479
                                    • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 006F64B5
                                    • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 006F64C6
                                    • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,006F9299,?,?,000000FF,00000000,?,000000FF,?), ref: 006F6500
                                    • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 006F6520
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                    • String ID: @U=u
                                    • API String ID: 3864802216-2594219639
                                    • Opcode ID: e5678e3466a9445f1804ad5a027566ab749ca378843f3ff78d6706922bbeaf46
                                    • Instruction ID: 907fee1a71cc48215f549471de05a7703e89b2a410df04e1092af323277bdd66
                                    • Opcode Fuzzy Hash: e5678e3466a9445f1804ad5a027566ab749ca378843f3ff78d6706922bbeaf46
                                    • Instruction Fuzzy Hash: CA314D72201214BFEB118F50DC8AFFA3FAAEF09765F045065FE08EA295DA759841CB64
                                    APIs
                                    • __swprintf.LIBCMT ref: 006D419D
                                    • __swprintf.LIBCMT ref: 006D41AA
                                      • Part of subcall function 006938D8: __woutput_l.LIBCMT ref: 00693931
                                    • FindResourceW.KERNEL32(?,?,0000000E), ref: 006D41D4
                                    • LoadResource.KERNEL32(?,00000000), ref: 006D41E0
                                    • LockResource.KERNEL32(00000000), ref: 006D41ED
                                    • FindResourceW.KERNEL32(?,?,00000003), ref: 006D420D
                                    • LoadResource.KERNEL32(?,00000000), ref: 006D421F
                                    • SizeofResource.KERNEL32(?,00000000), ref: 006D422E
                                    • LockResource.KERNEL32(?), ref: 006D423A
                                    • CreateIconFromResourceEx.USER32(?,?,00000001,00030000,00000000,00000000,00000000), ref: 006D429B
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: Resource$FindLoadLock__swprintf$CreateFromIconSizeof__woutput_l
                                    • String ID:
                                    • API String ID: 1433390588-0
                                    • Opcode ID: 2e6d99b018f0ccfcbd966a6c4f92a2f13d0f073ca8373e76d91363a202b53cb0
                                    • Instruction ID: ea0e01d5c10d04c43105573fe5c23da0fe4157b45bdfb11a1fb6ad597eaddb30
                                    • Opcode Fuzzy Hash: 2e6d99b018f0ccfcbd966a6c4f92a2f13d0f073ca8373e76d91363a202b53cb0
                                    • Instruction Fuzzy Hash: 943170B1A0521AAFDB159FA0DD85EBF7BAEEF04301F004526F915D2250EB34DE61CBA4
                                    APIs
                                    • GetCurrentThreadId.KERNEL32 ref: 006D1700
                                    • GetForegroundWindow.USER32(00000000,?,?,?,?,?,006D0778,?,00000001), ref: 006D1714
                                    • GetWindowThreadProcessId.USER32(00000000), ref: 006D171B
                                    • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,006D0778,?,00000001), ref: 006D172A
                                    • GetWindowThreadProcessId.USER32(?,00000000), ref: 006D173C
                                    • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,006D0778,?,00000001), ref: 006D1755
                                    • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,006D0778,?,00000001), ref: 006D1767
                                    • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,006D0778,?,00000001), ref: 006D17AC
                                    • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,006D0778,?,00000001), ref: 006D17C1
                                    • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,006D0778,?,00000001), ref: 006D17CC
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                    • String ID:
                                    • API String ID: 2156557900-0
                                    • Opcode ID: d9f650161ba522c913acadbe10cf094bc23a609ad8367e3fb72084d353394045
                                    • Instruction ID: 3e86f91bd28b359852d73256cae35bd059c10f0721a33e6eeda421add10dfe6f
                                    • Opcode Fuzzy Hash: d9f650161ba522c913acadbe10cf094bc23a609ad8367e3fb72084d353394045
                                    • Instruction Fuzzy Hash: 673180B5A04205BBEB259F14DC84BB977ABBB56712F108016F804CA3B0DBB49D81CB55
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: Variant$ClearInit$_memset
                                    • String ID: ,,p$Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                    • API String ID: 2862541840-3042336286
                                    • Opcode ID: 513591291d60de04102f07243670aa99965e3ee5f827672efe0bb1339f3820ab
                                    • Instruction ID: f0a9e283606b79cd4fb0767c5f535c7e51bb5efea8e744eaa576db279ced85d4
                                    • Opcode Fuzzy Hash: 513591291d60de04102f07243670aa99965e3ee5f827672efe0bb1339f3820ab
                                    • Instruction Fuzzy Hash: 7B919C71A01355ABEF24DFA6C848FEEB7BAEF45310F10815AF515AB280D7709945CFA0
                                    APIs
                                    • EnumChildWindows.USER32(?,006CAA64), ref: 006CA9A2
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: ChildEnumWindows
                                    • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                    • API String ID: 3555792229-1603158881
                                    • Opcode ID: 5ec5e9c329a6b787e52fcf35ab806c7717741ff42e4785439d906e528a2da7ee
                                    • Instruction ID: 670d4414691a4716d689cfc164a53fa6ad9e06e943a68a374426b7280e9cf455
                                    • Opcode Fuzzy Hash: 5ec5e9c329a6b787e52fcf35ab806c7717741ff42e4785439d906e528a2da7ee
                                    • Instruction Fuzzy Hash: 2691843090010AABDF58DFA0C482FF9FB7AFF04308F54812DD55AA7651DB30699ACB95
                                    APIs
                                    • IsWindow.USER32(015CE010), ref: 006FB6A5
                                    • IsWindowEnabled.USER32(015CE010), ref: 006FB6B1
                                    • SendMessageW.USER32(?,0000041C,00000000,00000000), ref: 006FB795
                                    • SendMessageW.USER32(015CE010,000000B0,?,?), ref: 006FB7CC
                                    • IsDlgButtonChecked.USER32(?,?), ref: 006FB809
                                    • GetWindowLongW.USER32(015CE010,000000EC), ref: 006FB82B
                                    • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 006FB843
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                                    • String ID: @U=u
                                    • API String ID: 4072528602-2594219639
                                    • Opcode ID: d6627af45c4a323e17d448c8d2845da60930316fb7586617874fd51f5ca610ad
                                    • Instruction ID: 4e7eb30db9473a837654375deee5ed03b8f02c1f2a972054233746dfaf748ea2
                                    • Opcode Fuzzy Hash: d6627af45c4a323e17d448c8d2845da60930316fb7586617874fd51f5ca610ad
                                    • Instruction Fuzzy Hash: 8A718E34604208AFEB20AF64C8A4FFA7BBBFF5A300F145069FA55973A1C771A941CB54
                                    APIs
                                    • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 006F7093
                                    • SendMessageW.USER32(?,00001036,00000000,?), ref: 006F70A7
                                    • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 006F70C1
                                    • _wcscat.LIBCMT ref: 006F711C
                                    • SendMessageW.USER32(?,00001057,00000000,?), ref: 006F7133
                                    • SendMessageW.USER32(?,00001061,?,0000000F), ref: 006F7161
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: MessageSend$Window_wcscat
                                    • String ID: @U=u$SysListView32
                                    • API String ID: 307300125-1908207174
                                    • Opcode ID: a3620a88f56ed61e95731af5261d65266444c5e62f73c760101742adb562c40b
                                    • Instruction ID: d23e349a72b8734615bc9e5c3658593ad08c29f1ce7b4a98e593b795be51b0dc
                                    • Opcode Fuzzy Hash: a3620a88f56ed61e95731af5261d65266444c5e62f73c760101742adb562c40b
                                    • Instruction Fuzzy Hash: B141817190430CABEB21DFA4CC85BFE77AAEF08350F10456AF644E7292D6719D85CB64
                                    APIs
                                    • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 006F655B
                                    • GetWindowLongW.USER32(015CE010,000000F0), ref: 006F658E
                                    • GetWindowLongW.USER32(015CE010,000000F0), ref: 006F65C3
                                    • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 006F65F5
                                    • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 006F661F
                                    • GetWindowLongW.USER32(00000000,000000F0), ref: 006F6630
                                    • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 006F664A
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: LongWindow$MessageSend
                                    • String ID: @U=u
                                    • API String ID: 2178440468-2594219639
                                    • Opcode ID: 8bf2d1be48ccf922d26347a692b4d70268499e85657a186d0de509b19a8887ac
                                    • Instruction ID: 8f64abe4580c485eeb150b651ac21b39f3830f816eec9ec8f1530b8d99e35a36
                                    • Opcode Fuzzy Hash: 8bf2d1be48ccf922d26347a692b4d70268499e85657a186d0de509b19a8887ac
                                    • Instruction Fuzzy Hash: 79310531604158AFEB20CF18DC85FA537E2FB4A710F194168F611DB2B6CB71AC40DB65
                                    APIs
                                    • GetModuleFileNameW.KERNEL32(?,?,00000104,?,006FF910), ref: 006E903D
                                    • FreeLibrary.KERNEL32(00000000,00000001,00000000,?,006FF910), ref: 006E9071
                                    • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 006E91EB
                                    • SysFreeString.OLEAUT32(?), ref: 006E9215
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: Free$FileLibraryModuleNamePathQueryStringType
                                    • String ID:
                                    • API String ID: 560350794-0
                                    • Opcode ID: 3ea27b5393d3b106926f281e6504c206666dc04626eadca4b73691f3460026d0
                                    • Instruction ID: 2f61364f676df13981cfc00ce1054e3bbc18f6f3ccaa344dc77b0ad436bcde02
                                    • Opcode Fuzzy Hash: 3ea27b5393d3b106926f281e6504c206666dc04626eadca4b73691f3460026d0
                                    • Instruction Fuzzy Hash: 85F10771A01209EFDB04DF95C888EEEB7BAFF49314F108059F515AB291DB31AE46CB60
                                    APIs
                                    • _memset.LIBCMT ref: 006EF9C9
                                    • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 006EFB5C
                                    • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 006EFB80
                                    • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 006EFBC0
                                    • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 006EFBE2
                                    • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 006EFD5E
                                    • GetLastError.KERNEL32(00000000,00000001,00000000), ref: 006EFD90
                                    • CloseHandle.KERNEL32(?), ref: 006EFDBF
                                    • CloseHandle.KERNEL32(?), ref: 006EFE36
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: Directory$CloseCurrentHandleSystem$CreateErrorLastProcess_memset
                                    • String ID:
                                    • API String ID: 4090791747-0
                                    • Opcode ID: 2228992a0c121972adb1cca79dfd2561bae48f4b1008bb68f692bd5add27fcc2
                                    • Instruction ID: 538a070260a3222d6975ff1f51e7e2b28e23f504aca4536128c6f94334e3808f
                                    • Opcode Fuzzy Hash: 2228992a0c121972adb1cca79dfd2561bae48f4b1008bb68f692bd5add27fcc2
                                    • Instruction Fuzzy Hash: 7DE1D331205381DFCB54EF25C891A6ABBE6BF84314F14856DF8998B3A2DB31EC41CB56
                                    APIs
                                      • Part of subcall function 006D48AA: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,006D38D3,?), ref: 006D48C7
                                      • Part of subcall function 006D48AA: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,006D38D3,?), ref: 006D48E0
                                      • Part of subcall function 006D4CD3: GetFileAttributesW.KERNEL32(?,006D3947), ref: 006D4CD4
                                    • lstrcmpiW.KERNEL32(?,?), ref: 006D4FE2
                                    • _wcscmp.LIBCMT ref: 006D4FFC
                                    • MoveFileW.KERNEL32(?,?), ref: 006D5017
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: FileFullNamePath$AttributesMove_wcscmplstrcmpi
                                    • String ID:
                                    • API String ID: 793581249-0
                                    • Opcode ID: 3937329d46a3c60315aeddd3d440639905aeae5314d19d9a118e1202b3a4aa33
                                    • Instruction ID: 58f4d69ab49c861403d0ce27006b4c13ab3e7c6f1d2c67e629103d458a48c122
                                    • Opcode Fuzzy Hash: 3937329d46a3c60315aeddd3d440639905aeae5314d19d9a118e1202b3a4aa33
                                    • Instruction Fuzzy Hash: 7F5166B24087859BC764DB50CC819DFB3DDAF85340F10492FF189D7651EF74A588876A
                                    APIs
                                    • GetProcessHeap.KERNEL32(00000008,0000000C,00000000,00000000,?,006C8A84,00000B00,?,?), ref: 006C8E0C
                                    • HeapAlloc.KERNEL32(00000000,?,006C8A84,00000B00,?,?), ref: 006C8E13
                                    • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,006C8A84,00000B00,?,?), ref: 006C8E28
                                    • GetCurrentProcess.KERNEL32(?,00000000,?,006C8A84,00000B00,?,?), ref: 006C8E30
                                    • DuplicateHandle.KERNEL32(00000000,?,006C8A84,00000B00,?,?), ref: 006C8E33
                                    • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,006C8A84,00000B00,?,?), ref: 006C8E43
                                    • GetCurrentProcess.KERNEL32(006C8A84,00000000,?,006C8A84,00000B00,?,?), ref: 006C8E4B
                                    • DuplicateHandle.KERNEL32(00000000,?,006C8A84,00000B00,?,?), ref: 006C8E4E
                                    • CreateThread.KERNEL32(00000000,00000000,006C8E74,00000000,00000000,00000000), ref: 006C8E68
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                    • String ID:
                                    • API String ID: 1957940570-0
                                    • Opcode ID: ac9df4b6e6af089e492f343a292302e904f3cc2e165e3acfd0b18746dae9762c
                                    • Instruction ID: 409500b46042fb295ab031afaee95aa952ff39edf851ecca846c6926b4f7487c
                                    • Opcode Fuzzy Hash: ac9df4b6e6af089e492f343a292302e904f3cc2e165e3acfd0b18746dae9762c
                                    • Instruction Fuzzy Hash: 7701A4B6240308FFE710EBA5DC89F6B3BADEF89711F015421FA05DB2A1CA709810CA20
                                    APIs
                                      • Part of subcall function 006C7652: CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,006C758C,80070057,?,?,?,006C799D), ref: 006C766F
                                      • Part of subcall function 006C7652: ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,006C758C,80070057,?,?), ref: 006C768A
                                      • Part of subcall function 006C7652: lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,006C758C,80070057,?,?), ref: 006C7698
                                      • Part of subcall function 006C7652: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,006C758C,80070057,?), ref: 006C76A8
                                    • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,?,?,?), ref: 006E9B1B
                                    • _memset.LIBCMT ref: 006E9B28
                                    • _memset.LIBCMT ref: 006E9C6B
                                    • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,00000000), ref: 006E9C97
                                    • CoTaskMemFree.OLE32(?), ref: 006E9CA2
                                    Strings
                                    • NULL Pointer assignment, xrefs: 006E9CF0
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: FreeFromProgTask_memset$CreateInitializeInstanceSecuritylstrcmpi
                                    • String ID: NULL Pointer assignment
                                    • API String ID: 1300414916-2785691316
                                    • Opcode ID: bf5c1d3bcbfe1464fb4ea1be45da154d4b72ecd60de20bc19dd569c535f13ef2
                                    • Instruction ID: 5350fc12054320e1a86cb882c1bdfcf690ae70980807e7c3b69e9d38d29007b7
                                    • Opcode Fuzzy Hash: bf5c1d3bcbfe1464fb4ea1be45da154d4b72ecd60de20bc19dd569c535f13ef2
                                    • Instruction Fuzzy Hash: DC914971D01229ABDB10DFA5DC84ADEBBBAEF08710F20816AF519A7241DB705A45CFA0
                                    APIs
                                      • Part of subcall function 006D3E91: CreateToolhelp32Snapshot.KERNEL32 ref: 006D3EB6
                                      • Part of subcall function 006D3E91: Process32FirstW.KERNEL32(00000000,?), ref: 006D3EC4
                                      • Part of subcall function 006D3E91: CloseHandle.KERNEL32(00000000), ref: 006D3F8E
                                    • OpenProcess.KERNEL32(00000001,00000000,?), ref: 006EECB8
                                    • GetLastError.KERNEL32 ref: 006EECCB
                                    • OpenProcess.KERNEL32(00000001,00000000,?), ref: 006EECFA
                                    • TerminateProcess.KERNEL32(00000000,00000000), ref: 006EED77
                                    • GetLastError.KERNEL32(00000000), ref: 006EED82
                                    • CloseHandle.KERNEL32(00000000), ref: 006EEDB7
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                    • String ID: SeDebugPrivilege
                                    • API String ID: 2533919879-2896544425
                                    • Opcode ID: a298dd105373dbdc79d9f5728f372f1abd70a402df01a8c8095163ec65b44b0d
                                    • Instruction ID: 09d7e820f26acfda78618a7d07ea641aefd3b854e1bf6bb2f8a8bbc0bdda7e61
                                    • Opcode Fuzzy Hash: a298dd105373dbdc79d9f5728f372f1abd70a402df01a8c8095163ec65b44b0d
                                    • Instruction Fuzzy Hash: B7418B712012019FDB15EF25CC95FBDB7A2AF80714F08806DF9469B3C2DB76A804CB9A
                                    APIs
                                    • ShowWindow.USER32(007367B0,00000000,015CE010,?,?,007367B0,?,006FB862,?,?), ref: 006FB9CC
                                    • EnableWindow.USER32(00000000,00000000), ref: 006FB9F0
                                    • ShowWindow.USER32(007367B0,00000000,015CE010,?,?,007367B0,?,006FB862,?,?), ref: 006FBA50
                                    • ShowWindow.USER32(00000000,00000004,?,006FB862,?,?), ref: 006FBA62
                                    • EnableWindow.USER32(00000000,00000001), ref: 006FBA86
                                    • SendMessageW.USER32(?,0000130C,?,00000000), ref: 006FBAA9
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: Window$Show$Enable$MessageSend
                                    • String ID: @U=u
                                    • API String ID: 642888154-2594219639
                                    • Opcode ID: 5738dce09df7d426f68a79889cef64924e6b902cf9c1e52d7e1ab1d82b540e9a
                                    • Instruction ID: 7c3e0238458a7b9aea5ef3ed236f2af0f14e0f055a0b770cb1c35c6b55e1ea53
                                    • Opcode Fuzzy Hash: 5738dce09df7d426f68a79889cef64924e6b902cf9c1e52d7e1ab1d82b540e9a
                                    • Instruction Fuzzy Hash: 35414E34604249AFDB21CF18C899BE57BE2FF06310F1852A9FB588F6A2C771E845CB51
                                    APIs
                                    • LoadIconW.USER32(00000000,00007F03), ref: 006D32C5
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: IconLoad
                                    • String ID: blank$info$question$stop$warning
                                    • API String ID: 2457776203-404129466
                                    • Opcode ID: a0691f9e9cb78909b8f1a88a0ab19f4d3629251393761b3fba4f16bfdb906a8a
                                    • Instruction ID: d036e47af424e915db0b990ab942a863c4d98a76a0f1c9d766cf99aa5b5b24b5
                                    • Opcode Fuzzy Hash: a0691f9e9cb78909b8f1a88a0ab19f4d3629251393761b3fba4f16bfdb906a8a
                                    • Instruction Fuzzy Hash: 8411DA71E48376BBEB016B54EC43DABB7DEEF19770F20002BF500A6381E6759B4145AA
                                    APIs
                                    • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 006D454E
                                    • LoadStringW.USER32(00000000), ref: 006D4555
                                    • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 006D456B
                                    • LoadStringW.USER32(00000000), ref: 006D4572
                                    • _wprintf.LIBCMT ref: 006D4598
                                    • MessageBoxW.USER32(00000000,?,?,00011010), ref: 006D45B6
                                    Strings
                                    • %s (%d) : ==> %s: %s %s, xrefs: 006D4593
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: HandleLoadModuleString$Message_wprintf
                                    • String ID: %s (%d) : ==> %s: %s %s
                                    • API String ID: 3648134473-3128320259
                                    • Opcode ID: fd52e8d2c925fe8817d82f390425b9ab3cb10ce972f76d30c6d5a8476aa578d4
                                    • Instruction ID: 4926833b4ebb5092cd94d7ea5393aaa228cbfdc2d2c62ad07dff78fde1c2db95
                                    • Opcode Fuzzy Hash: fd52e8d2c925fe8817d82f390425b9ab3cb10ce972f76d30c6d5a8476aa578d4
                                    • Instruction Fuzzy Hash: DA0162F2900208BFE750EBA0DD89EF7776DDB08301F0015A6BB45D2151EA749E858B75
                                    APIs
                                    • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,006AC417,00000004,00000000,00000000,00000000), ref: 00672ACF
                                    • ShowWindow.USER32(FFFFFFFF,00000000,00000000,00000000,?,006AC417,00000004,00000000,00000000,00000000,000000FF), ref: 00672B17
                                    • ShowWindow.USER32(FFFFFFFF,00000006,00000000,00000000,?,006AC417,00000004,00000000,00000000,00000000), ref: 006AC46A
                                    • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,006AC417,00000004,00000000,00000000,00000000), ref: 006AC4D6
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: ShowWindow
                                    • String ID:
                                    • API String ID: 1268545403-0
                                    • Opcode ID: 40d9e3a74659ad712dff0373c79de908b177ae07fafff373f82590642587d03f
                                    • Instruction ID: 070c4158cedc15aab430b27edb96574e8f6fc0c75e1a0f83bef5309ef3796298
                                    • Opcode Fuzzy Hash: 40d9e3a74659ad712dff0373c79de908b177ae07fafff373f82590642587d03f
                                    • Instruction Fuzzy Hash: 5F41F930608782AAD7359B289CB97BA7BD3EF4A310F18C51DE04F86661C6759C86DB14
                                    APIs
                                    • InterlockedExchange.KERNEL32(?,000001F5), ref: 006D737F
                                      • Part of subcall function 00690FF6: std::exception::exception.LIBCMT ref: 0069102C
                                      • Part of subcall function 00690FF6: __CxxThrowException@8.LIBCMT ref: 00691041
                                    • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,?,00000000), ref: 006D73B6
                                    • EnterCriticalSection.KERNEL32(?), ref: 006D73D2
                                    • _memmove.LIBCMT ref: 006D7420
                                    • _memmove.LIBCMT ref: 006D743D
                                    • LeaveCriticalSection.KERNEL32(?), ref: 006D744C
                                    • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,00000000,00000000), ref: 006D7461
                                    • InterlockedExchange.KERNEL32(?,000001F6), ref: 006D7480
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterException@8LeaveThrowstd::exception::exception
                                    • String ID:
                                    • API String ID: 256516436-0
                                    • Opcode ID: 9cbeb8f8c000df37265acac51424c18838badeaa68e7037c8911a3b938a2c755
                                    • Instruction ID: cdf81fd9c2084a453a6c9cf5f41ed377411dd858e8ffca239696642241ea4da7
                                    • Opcode Fuzzy Hash: 9cbeb8f8c000df37265acac51424c18838badeaa68e7037c8911a3b938a2c755
                                    • Instruction Fuzzy Hash: 7A31AF31904205EBDF10DFA4DC85AAEBBB9EF45710B1441BAF904AB246DB319A10DBA5
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: _memcmp
                                    • String ID:
                                    • API String ID: 2931989736-0
                                    • Opcode ID: 127488d7fb86f866bac2a9a8ebe37a45e44aa3c2a55d4eeab52f6f634543558b
                                    • Instruction ID: 1bbc478963356b865265e4dbeb90986ba1e3584debeb7a830f4543bb80f454de
                                    • Opcode Fuzzy Hash: 127488d7fb86f866bac2a9a8ebe37a45e44aa3c2a55d4eeab52f6f634543558b
                                    • Instruction Fuzzy Hash: 242198B2B00206B7EE55A6218D46FBB339FDF113B4B18401DFE0D96783E756DD1281A5
                                    APIs
                                      • Part of subcall function 00679997: __itow.LIBCMT ref: 006799C2
                                      • Part of subcall function 00679997: __swprintf.LIBCMT ref: 00679A0C
                                      • Part of subcall function 0068FEC6: _wcscpy.LIBCMT ref: 0068FEE9
                                    • _wcstok.LIBCMT ref: 006DEEFF
                                    • _wcscpy.LIBCMT ref: 006DEF8E
                                    • _memset.LIBCMT ref: 006DEFC1
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: _wcscpy$__itow__swprintf_memset_wcstok
                                    • String ID: X
                                    • API String ID: 774024439-3081909835
                                    • Opcode ID: 600196352122886e96eb12015ad9ce3bbe1b16743e878eb8463c7df0e7b6a687
                                    • Instruction ID: ee6dc6508db69677ca34522782ad81b61ce10fbd2d636150fdc1e21b9d8a6e00
                                    • Opcode Fuzzy Hash: 600196352122886e96eb12015ad9ce3bbe1b16743e878eb8463c7df0e7b6a687
                                    • Instruction Fuzzy Hash: 68C193719083009FC754EF24C881A5AB7E6FF84310F14896DF99A9B3A2DB30ED45CB96
                                    APIs
                                    • __WSAFDIsSet.WSOCK32(00000000,?,00000000,00000000,?,00000064,00000000), ref: 006E6F14
                                    • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 006E6F35
                                    • WSAGetLastError.WSOCK32(00000000), ref: 006E6F48
                                    • htons.WSOCK32(?,?,?,00000000,?), ref: 006E6FFE
                                    • inet_ntoa.WSOCK32(?), ref: 006E6FBB
                                      • Part of subcall function 006CAE14: _strlen.LIBCMT ref: 006CAE1E
                                      • Part of subcall function 006CAE14: _memmove.LIBCMT ref: 006CAE40
                                    • _strlen.LIBCMT ref: 006E7058
                                    • _memmove.LIBCMT ref: 006E70C1
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: _memmove_strlen$ErrorLasthtonsinet_ntoa
                                    • String ID:
                                    • API String ID: 3619996494-0
                                    • Opcode ID: 76fa58f30ef51ead1ce29973a2c980ab45a22b0d8dabacde65526e26456e6e5b
                                    • Instruction ID: 91f9f40042f09262e9544608ebd6e2db9d041874cdb68734b93da48048cdc741
                                    • Opcode Fuzzy Hash: 76fa58f30ef51ead1ce29973a2c980ab45a22b0d8dabacde65526e26456e6e5b
                                    • Instruction Fuzzy Hash: 3A81C071508340AFD750EB25CC85E6BB3EBEF84714F10891DF55A9B2A2DB70AD01CBA6
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 03778301b308c502fc52c37931e985ca47566ee2d025234ad739e486e7abee10
                                    • Instruction ID: 9ec01f16c1807a53bf29019f3663a26f3d6d670391d76ea7c3e5240161ffb05d
                                    • Opcode Fuzzy Hash: 03778301b308c502fc52c37931e985ca47566ee2d025234ad739e486e7abee10
                                    • Instruction Fuzzy Hash: 5B714D70900109EFDB14DF58CC49ABEBBBAFF86314F14C15AF919AA251C734AA51CF64
                                    APIs
                                    • _memset.LIBCMT ref: 006EF75C
                                    • _memset.LIBCMT ref: 006EF825
                                    • ShellExecuteExW.SHELL32(?), ref: 006EF86A
                                      • Part of subcall function 00679997: __itow.LIBCMT ref: 006799C2
                                      • Part of subcall function 00679997: __swprintf.LIBCMT ref: 00679A0C
                                      • Part of subcall function 0068FEC6: _wcscpy.LIBCMT ref: 0068FEE9
                                    • GetProcessId.KERNEL32(00000000), ref: 006EF8E1
                                    • CloseHandle.KERNEL32(00000000), ref: 006EF910
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: _memset$CloseExecuteHandleProcessShell__itow__swprintf_wcscpy
                                    • String ID: @
                                    • API String ID: 3522835683-2766056989
                                    • Opcode ID: a6af6f867926da3fa3b19596168ecc56b9171f860606bc71546a53785ab8b2bf
                                    • Instruction ID: 79bb24f76e6066c06e54bbdb59700b4869d37d14bc247005908c5856b1c1fb6e
                                    • Opcode Fuzzy Hash: a6af6f867926da3fa3b19596168ecc56b9171f860606bc71546a53785ab8b2bf
                                    • Instruction Fuzzy Hash: 19619B75A007599FCF14EF65C5809AEBBF6FF48310B14846DE85AAB351CB30AE41CB94
                                    APIs
                                    • GetParent.USER32(?), ref: 006D149C
                                    • GetKeyboardState.USER32(?), ref: 006D14B1
                                    • SetKeyboardState.USER32(?), ref: 006D1512
                                    • PostMessageW.USER32(?,00000101,00000010,?), ref: 006D1540
                                    • PostMessageW.USER32(?,00000101,00000011,?), ref: 006D155F
                                    • PostMessageW.USER32(?,00000101,00000012,?), ref: 006D15A5
                                    • PostMessageW.USER32(?,00000101,0000005B,?), ref: 006D15C8
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: MessagePost$KeyboardState$Parent
                                    • String ID:
                                    • API String ID: 87235514-0
                                    • Opcode ID: 603b3a1572dde036ed6a54ca473121781ea46ee19a71e5ea484298493dd40ba5
                                    • Instruction ID: b440c324d827ccf6fa2f2737c95451b26169998f793271f7782f80c9201f7eff
                                    • Opcode Fuzzy Hash: 603b3a1572dde036ed6a54ca473121781ea46ee19a71e5ea484298493dd40ba5
                                    • Instruction Fuzzy Hash: E351C1A0E086D53EFB3647648C45BFA7EAB5B47304F08848AE1D54DAD2C2D8EC84D760
                                    APIs
                                    • GetParent.USER32(00000000), ref: 006D12B5
                                    • GetKeyboardState.USER32(?), ref: 006D12CA
                                    • SetKeyboardState.USER32(?), ref: 006D132B
                                    • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 006D1357
                                    • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 006D1374
                                    • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 006D13B8
                                    • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 006D13D9
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: MessagePost$KeyboardState$Parent
                                    • String ID:
                                    • API String ID: 87235514-0
                                    • Opcode ID: 99b908197d8f1dd52313ecfefb7bc3e5e7494a16ce1acca453fb1bebc12576a4
                                    • Instruction ID: 1a0572427bf6739c49d4ae45e92d364a9bee014370a3f377b9ed75878272646c
                                    • Opcode Fuzzy Hash: 99b908197d8f1dd52313ecfefb7bc3e5e7494a16ce1acca453fb1bebc12576a4
                                    • Instruction Fuzzy Hash: 2051D1A0D046D57DFB3287248C55BBABEAB6F07300F08858AE1D48EBC2D7D5AC94D760
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: _wcsncpy$LocalTime
                                    • String ID:
                                    • API String ID: 2945705084-0
                                    • Opcode ID: 6276e47a7f1e820493abd6af71eb4d8ce398ef500b0851cd4b9ee3d8721014b2
                                    • Instruction ID: 1cf1729045f96dba655526cce389be15b47e5bfaadece926a6915fa0ff289d8c
                                    • Opcode Fuzzy Hash: 6276e47a7f1e820493abd6af71eb4d8ce398ef500b0851cd4b9ee3d8721014b2
                                    • Instruction Fuzzy Hash: A741A365C2052876CF50EBF488869CFB3AEAF04310F50855AF519E7B21EA34E715C7AE
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: @U=u
                                    • API String ID: 0-2594219639
                                    • Opcode ID: 84d10ecef727cc1582fe46d39b8f4a7f2cc43a3eb1f5e966405ec5cc702b703b
                                    • Instruction ID: 83d858d1121f91dd34a9f8d26f96278f3900b06675025c51013318fb355dccb1
                                    • Opcode Fuzzy Hash: 84d10ecef727cc1582fe46d39b8f4a7f2cc43a3eb1f5e966405ec5cc702b703b
                                    • Instruction Fuzzy Hash: 9E41E0B690420CAFD720DFA8CC48FF9BBA6EB09310F144165EA19E73E1C770AD41CA61
                                    APIs
                                    • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 006CDAC5
                                    • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 006CDAFB
                                    • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 006CDB0C
                                    • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 006CDB8E
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: ErrorMode$AddressCreateInstanceProc
                                    • String ID: ,,p$DllGetClassObject
                                    • API String ID: 753597075-2413456817
                                    • Opcode ID: 71f2f389b3d607fa0aa45303304e092a25205696a0280fb31a33ba52b77e9d15
                                    • Instruction ID: 0b94cebd6ec7bade078fe025da3a95be14feb5ab2a6c09f20c14384e397e1492
                                    • Opcode Fuzzy Hash: 71f2f389b3d607fa0aa45303304e092a25205696a0280fb31a33ba52b77e9d15
                                    • Instruction Fuzzy Hash: 75413BB1600209EFDB15CF54C884FAABBBAEF44350F1581BEA9059F245D7B1DD45CBA0
                                    APIs
                                      • Part of subcall function 006D48AA: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,006D38D3,?), ref: 006D48C7
                                      • Part of subcall function 006D48AA: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,006D38D3,?), ref: 006D48E0
                                    • lstrcmpiW.KERNEL32(?,?), ref: 006D38F3
                                    • _wcscmp.LIBCMT ref: 006D390F
                                    • MoveFileW.KERNEL32(?,?), ref: 006D3927
                                    • _wcscat.LIBCMT ref: 006D396F
                                    • SHFileOperationW.SHELL32(?), ref: 006D39DB
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: FileFullNamePath$MoveOperation_wcscat_wcscmplstrcmpi
                                    • String ID: \*.*
                                    • API String ID: 1377345388-1173974218
                                    • Opcode ID: 1f80980b13d06132191f9ca8846f8763a1442452aacd63f7cdbbcf8ef51bb7a5
                                    • Instruction ID: 426f2a81860378d236722ae01e8a5c5953540200061268947de373ba3f42fbe2
                                    • Opcode Fuzzy Hash: 1f80980b13d06132191f9ca8846f8763a1442452aacd63f7cdbbcf8ef51bb7a5
                                    • Instruction Fuzzy Hash: 62416FB29093449AC791EF64C4919EFB7EDAF89340F40092FB48AC7361EB74D648C756
                                    APIs
                                    • _memset.LIBCMT ref: 006F7519
                                    • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 006F75C0
                                    • IsMenu.USER32(?), ref: 006F75D8
                                    • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 006F7620
                                    • DrawMenuBar.USER32 ref: 006F7633
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: Menu$Item$DrawInfoInsert_memset
                                    • String ID: 0
                                    • API String ID: 3866635326-4108050209
                                    • Opcode ID: 6991635672a385421f428db174b937e878cf19c97ab0db4f3eef20548be617a1
                                    • Instruction ID: 4d33c9242a8458cab7d134ef6e0e7bf82dad2ecc04b44c8f87c318e7355c2d16
                                    • Opcode Fuzzy Hash: 6991635672a385421f428db174b937e878cf19c97ab0db4f3eef20548be617a1
                                    • Instruction Fuzzy Hash: 0C410575A04609AFDB20DF94D885EEABBFAFF08314F048129EA5597350D730AD55CFA0
                                    APIs
                                    • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?), ref: 006F125C
                                    • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 006F1286
                                    • FreeLibrary.KERNEL32(00000000), ref: 006F133D
                                      • Part of subcall function 006F122D: RegCloseKey.ADVAPI32(?), ref: 006F12A3
                                      • Part of subcall function 006F122D: FreeLibrary.KERNEL32(?), ref: 006F12F5
                                      • Part of subcall function 006F122D: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 006F1318
                                    • RegDeleteKeyW.ADVAPI32(?,?), ref: 006F12E0
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: EnumFreeLibrary$CloseDeleteOpen
                                    • String ID:
                                    • API String ID: 395352322-0
                                    • Opcode ID: c6e96b8981fce155c36aa8e45ef752edb5a1a161c479be974af2a21d03816391
                                    • Instruction ID: 2d13156d2c9e6505100992bbb091e1cc937f1cba3ec36fa58d35762bef48a585
                                    • Opcode Fuzzy Hash: c6e96b8981fce155c36aa8e45ef752edb5a1a161c479be974af2a21d03816391
                                    • Instruction Fuzzy Hash: B6311AB190110DFFDB14DB90DC99AFEB7BDEF09340F00016AE601E6251EA749F859AA4
                                    APIs
                                      • Part of subcall function 006E80A0: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 006E80CB
                                    • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 006E64D9
                                    • WSAGetLastError.WSOCK32(00000000), ref: 006E64E8
                                    • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 006E6521
                                    • connect.WSOCK32(00000000,?,00000010), ref: 006E652A
                                    • WSAGetLastError.WSOCK32 ref: 006E6534
                                    • closesocket.WSOCK32(00000000), ref: 006E655D
                                    • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 006E6576
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: ErrorLastioctlsocket$closesocketconnectinet_addrsocket
                                    • String ID:
                                    • API String ID: 910771015-0
                                    • Opcode ID: 40a89a49017dae861a83f1a2c9fd79eb4c9a79b75811fd18313b409ee9ceacb7
                                    • Instruction ID: a941a6dee1d0a2f3048c6a7fcef65d1d4038a714bbf1601e22fcf1dac910f673
                                    • Opcode Fuzzy Hash: 40a89a49017dae861a83f1a2c9fd79eb4c9a79b75811fd18313b409ee9ceacb7
                                    • Instruction Fuzzy Hash: 6731AF71601218AFDB10AF25DC85BBE7BFAEF547A4F048069F90997391CB70AD04CBA1
                                    APIs
                                      • Part of subcall function 00677F41: _memmove.LIBCMT ref: 00677F82
                                      • Part of subcall function 006CB0C4: GetClassNameW.USER32(?,?,000000FF), ref: 006CB0E7
                                    • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 006C93F6
                                    • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 006C9409
                                    • SendMessageW.USER32(?,00000189,?,00000000), ref: 006C9439
                                      • Part of subcall function 00677D2C: _memmove.LIBCMT ref: 00677D66
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: MessageSend$_memmove$ClassName
                                    • String ID: @U=u$ComboBox$ListBox
                                    • API String ID: 365058703-2258501812
                                    • Opcode ID: 05a17c81d47ec78b8e9d738681d904d3be62ca5b5dc984ffd0378f03cfed563d
                                    • Instruction ID: 8971d47ba5966b4dbe379de8f7c87a23c716f28df8bfe0ab693c344534c9a2a8
                                    • Opcode Fuzzy Hash: 05a17c81d47ec78b8e9d738681d904d3be62ca5b5dc984ffd0378f03cfed563d
                                    • Instruction Fuzzy Hash: F821B671904104AADB18AB74DC89DFFB7BEDF05350B14812DF925972E1DB354A0AD624
                                    APIs
                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 006CE0FA
                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 006CE120
                                    • SysAllocString.OLEAUT32(00000000), ref: 006CE123
                                    • SysAllocString.OLEAUT32 ref: 006CE144
                                    • SysFreeString.OLEAUT32 ref: 006CE14D
                                    • StringFromGUID2.OLE32(?,?,00000028), ref: 006CE167
                                    • SysAllocString.OLEAUT32(?), ref: 006CE175
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                    • String ID:
                                    • API String ID: 3761583154-0
                                    • Opcode ID: de38d3bf8a16bf050e543c0460fb7b024774ccf014f1ae32edc8c074bd5783bc
                                    • Instruction ID: 3e3aff7bb35dd5e4e3929d7f69313d6875f06efdc9b320c6300f1d85b54abf76
                                    • Opcode Fuzzy Hash: de38d3bf8a16bf050e543c0460fb7b024774ccf014f1ae32edc8c074bd5783bc
                                    • Instruction Fuzzy Hash: 96214136604108AF9B109FA8DC88DBB77FEEF09760B148129F915CB661DA71DC51CB64
                                    APIs
                                    • IsWindowVisible.USER32(?), ref: 006CB6C7
                                    • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 006CB6E4
                                    • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 006CB71C
                                    • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 006CB742
                                    • _wcsstr.LIBCMT ref: 006CB74C
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: MessageSend$BuffCharUpperVisibleWindow_wcsstr
                                    • String ID: @U=u
                                    • API String ID: 3902887630-2594219639
                                    • Opcode ID: 7a24a70c6fc8e144bec953ac8e5227b7882fec3475653fd2483334e55983863b
                                    • Instruction ID: 9035aacb424f864b814c51110e1d5d6f99a9395cb5fe60af8a82396ea1fa88f1
                                    • Opcode Fuzzy Hash: 7a24a70c6fc8e144bec953ac8e5227b7882fec3475653fd2483334e55983863b
                                    • Instruction Fuzzy Hash: 6E21B032204204BAEB255B799C4AF7B7BAEDF89760F10502DFC05DA2A1EF61DC41D7A0
                                    APIs
                                    • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 006C9802
                                      • Part of subcall function 00677D2C: _memmove.LIBCMT ref: 00677D66
                                    • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 006C9834
                                    • __itow.LIBCMT ref: 006C984C
                                    • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 006C9874
                                    • __itow.LIBCMT ref: 006C9885
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: MessageSend$__itow$_memmove
                                    • String ID: @U=u
                                    • API String ID: 2983881199-2594219639
                                    • Opcode ID: 484088d53a1a8769df0b83b11cf915e331aeaf5721a47ba17d80800c38ce8364
                                    • Instruction ID: 1d2fc7873c0315365d6c00343eaeb0190a774d841b5d0e01c99bff73dd897cd5
                                    • Opcode Fuzzy Hash: 484088d53a1a8769df0b83b11cf915e331aeaf5721a47ba17d80800c38ce8364
                                    • Instruction Fuzzy Hash: 1F218371B01208ABDB109B658C8AFFE7BAEEF4A710F04402DF905DB291DA718D45D7A5
                                    APIs
                                      • Part of subcall function 00671D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00671D73
                                      • Part of subcall function 00671D35: GetStockObject.GDI32(00000011), ref: 00671D87
                                      • Part of subcall function 00671D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00671D91
                                    • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 006F78A1
                                    • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 006F78AE
                                    • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 006F78B9
                                    • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 006F78C8
                                    • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 006F78D4
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: MessageSend$CreateObjectStockWindow
                                    • String ID: Msctls_Progress32
                                    • API String ID: 1025951953-3636473452
                                    • Opcode ID: 9abfa7e7c15c272bdee1917eff1b3fe545d36c45a2548f593369cffa40e90af5
                                    • Instruction ID: 58e5a3d4eb865a8200ae59f5fba747425d1e42b9891212d8fa2251d11ff756ad
                                    • Opcode Fuzzy Hash: 9abfa7e7c15c272bdee1917eff1b3fe545d36c45a2548f593369cffa40e90af5
                                    • Instruction Fuzzy Hash: DA1181B111411DBEEF159F60CC85EE77F6EEF08798F014125B714A6190C7719C21DBA4
                                    APIs
                                    • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoInitialize,00694292,?), ref: 006941E3
                                    • GetProcAddress.KERNEL32(00000000), ref: 006941EA
                                    • EncodePointer.KERNEL32(00000000), ref: 006941F6
                                    • DecodePointer.KERNEL32(00000001,00694292,?), ref: 00694213
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                    • String ID: RoInitialize$combase.dll
                                    • API String ID: 3489934621-340411864
                                    • Opcode ID: 8c0bc987e1e715f63d2fc08fa3155be958308d5e9ab3a5f36427991771316bc6
                                    • Instruction ID: 8832cdb1cab7ea1807f5aa8495131187b207e2076beae469ab8c4edbe2eb3fc7
                                    • Opcode Fuzzy Hash: 8c0bc987e1e715f63d2fc08fa3155be958308d5e9ab3a5f36427991771316bc6
                                    • Instruction Fuzzy Hash: 6CE0E5B2690744AAEF246BB0EC4DB643AAABB22707F109424B411D51E0DBB95496DA04
                                    APIs
                                    • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,006941B8), ref: 006942B8
                                    • GetProcAddress.KERNEL32(00000000), ref: 006942BF
                                    • EncodePointer.KERNEL32(00000000), ref: 006942CA
                                    • DecodePointer.KERNEL32(006941B8), ref: 006942E5
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                    • String ID: RoUninitialize$combase.dll
                                    • API String ID: 3489934621-2819208100
                                    • Opcode ID: 2fb942125039e72b0ac76b2e833611e438f0111ae059cdac90c6d8723415d290
                                    • Instruction ID: f5e5065f21c0fca8e1985f135f7ee3c3b339ace0364c2cb3c343ab8d6972f767
                                    • Opcode Fuzzy Hash: 2fb942125039e72b0ac76b2e833611e438f0111ae059cdac90c6d8723415d290
                                    • Instruction Fuzzy Hash: 74E0B6B9691705EBEB149B60EC0DF653AAABB24747F109125F001E11A0CBB85A85DA1C
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: _memmove$__itow__swprintf
                                    • String ID:
                                    • API String ID: 3253778849-0
                                    • Opcode ID: b6af34302f73e7cc86d124cdaa6c703dbf7dfb6507262c8ff84fb63fda3a9fb8
                                    • Instruction ID: f2d67170c3973d0cc746544e225ad7ff3dfc1cce7a1f78ad656483cb5b829126
                                    • Opcode Fuzzy Hash: b6af34302f73e7cc86d124cdaa6c703dbf7dfb6507262c8ff84fb63fda3a9fb8
                                    • Instruction Fuzzy Hash: 1A61C03090065A9FDF11EF20CC91EFE37AAAF45708F04855EF95A5B292DB319D41CB64
                                    APIs
                                      • Part of subcall function 00677F41: _memmove.LIBCMT ref: 00677F82
                                      • Part of subcall function 006F10A5: CharUpperBuffW.USER32(?,?,?,?,?,?,?,006F0038,?,?), ref: 006F10BC
                                    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 006F0548
                                    • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 006F0588
                                    • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 006F05AB
                                    • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 006F05D4
                                    • RegCloseKey.ADVAPI32(?,?,00000000), ref: 006F0617
                                    • RegCloseKey.ADVAPI32(00000000), ref: 006F0624
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: Close$BuffCharConnectEnumOpenRegistryUpperValue_memmove
                                    • String ID:
                                    • API String ID: 4046560759-0
                                    • Opcode ID: 2a7197b60fb2929e3282fbe08d0d8ca9f7eb290ba87eed4826294807f85fc893
                                    • Instruction ID: 8d52dc323acb23e4b7d15c3a887090e68d72662f7f57d44b113f662856b160e5
                                    • Opcode Fuzzy Hash: 2a7197b60fb2929e3282fbe08d0d8ca9f7eb290ba87eed4826294807f85fc893
                                    • Instruction Fuzzy Hash: BB516A31108204AFDB14EF54C885E7BBBEAFF85314F04892DF6558B2A2DB71E905CB56
                                    APIs
                                    • GetMenu.USER32(?), ref: 006F5A82
                                    • GetMenuItemCount.USER32(00000000), ref: 006F5AB9
                                    • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 006F5AE1
                                    • GetMenuItemID.USER32(?,?), ref: 006F5B50
                                    • GetSubMenu.USER32(?,?), ref: 006F5B5E
                                    • PostMessageW.USER32(?,00000111,?,00000000), ref: 006F5BAF
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: Menu$Item$CountMessagePostString
                                    • String ID:
                                    • API String ID: 650687236-0
                                    • Opcode ID: 005793fd9742ead5b67275819de58ef0eabedd05bb4710a049379ea2ebd44ac4
                                    • Instruction ID: cb5918c28c89087376b89c06565c97aa1a177651ef985e1896c2184c281d8907
                                    • Opcode Fuzzy Hash: 005793fd9742ead5b67275819de58ef0eabedd05bb4710a049379ea2ebd44ac4
                                    • Instruction Fuzzy Hash: 47518031E00619AFCF11DF64C855ABEB7B6EF48320F104469EA16BB351CB31AE41CB95
                                    APIs
                                    • VariantInit.OLEAUT32(?), ref: 006CF3F7
                                    • VariantClear.OLEAUT32(00000013), ref: 006CF469
                                    • VariantClear.OLEAUT32(00000000), ref: 006CF4C4
                                    • _memmove.LIBCMT ref: 006CF4EE
                                    • VariantClear.OLEAUT32(?), ref: 006CF53B
                                    • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 006CF569
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: Variant$Clear$ChangeInitType_memmove
                                    • String ID:
                                    • API String ID: 1101466143-0
                                    • Opcode ID: 4e4e8048d8e1cbb0287301309fb36f26eadc6cd3ea3723d80147a2adeaa5190d
                                    • Instruction ID: 9dbbcadfa03d7f4e8207c614cdecf41ffbd3a0d30420b5071fb0787427415978
                                    • Opcode Fuzzy Hash: 4e4e8048d8e1cbb0287301309fb36f26eadc6cd3ea3723d80147a2adeaa5190d
                                    • Instruction Fuzzy Hash: 94514BB5A00209AFCB14CF58D884EAAB7FAFF4C354B158569EA59DB311D730E911CBA0
                                    APIs
                                    • _memset.LIBCMT ref: 006D2747
                                    • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 006D2792
                                    • IsMenu.USER32(00000000), ref: 006D27B2
                                    • CreatePopupMenu.USER32 ref: 006D27E6
                                    • GetMenuItemCount.USER32(000000FF), ref: 006D2844
                                    • InsertMenuItemW.USER32(00000000,?,00000001,00000030), ref: 006D2875
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: Menu$Item$CountCreateInfoInsertPopup_memset
                                    • String ID:
                                    • API String ID: 3311875123-0
                                    • Opcode ID: 4857a8445d621b06cb51d2949b4307ee668ddfce56227045764ccbdd724149b0
                                    • Instruction ID: daa4e76c49e5304c10427d8df74d31e982152b7f4f3d90eebb7637d94477d822
                                    • Opcode Fuzzy Hash: 4857a8445d621b06cb51d2949b4307ee668ddfce56227045764ccbdd724149b0
                                    • Instruction Fuzzy Hash: 8651A070E00207DBDF24CF68D8A8AEEBBF6AF64314F10426AE4119B390D7709949DB51
                                    APIs
                                      • Part of subcall function 00672612: GetWindowLongW.USER32(?,000000EB), ref: 00672623
                                    • BeginPaint.USER32(?,?,?,?,?,?), ref: 0067179A
                                    • GetWindowRect.USER32(?,?), ref: 006717FE
                                    • ScreenToClient.USER32(?,?), ref: 0067181B
                                    • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 0067182C
                                    • EndPaint.USER32(?,?), ref: 00671876
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: PaintWindow$BeginClientLongRectScreenViewport
                                    • String ID:
                                    • API String ID: 1827037458-0
                                    • Opcode ID: 1d6f8a8052cf032522725479497d3ed91218e4bd6ac592b90e7bd9d40532034e
                                    • Instruction ID: 11dc003a975fe5a948be9aea36c14b0d712523ee3dd5619298cc68432fae88eb
                                    • Opcode Fuzzy Hash: 1d6f8a8052cf032522725479497d3ed91218e4bd6ac592b90e7bd9d40532034e
                                    • Instruction Fuzzy Hash: 22419271104301AFD710DF28CC84FB67BEAEB4A724F148629F6988B2A2C7319C45DB62
                                    APIs
                                    • GetForegroundWindow.USER32(?,?,?,?,?,?,006E5134,?,?,00000000,00000001), ref: 006E73BF
                                      • Part of subcall function 006E3C94: GetWindowRect.USER32(?,?), ref: 006E3CA7
                                    • GetDesktopWindow.USER32 ref: 006E73E9
                                    • GetWindowRect.USER32(00000000), ref: 006E73F0
                                    • mouse_event.USER32(00008001,?,?,00000001,00000001), ref: 006E7422
                                      • Part of subcall function 006D54E6: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 006D555E
                                    • GetCursorPos.USER32(?), ref: 006E744E
                                    • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 006E74AC
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: Window$Rectmouse_event$CursorDesktopForegroundSleep
                                    • String ID:
                                    • API String ID: 4137160315-0
                                    • Opcode ID: aac683cce770f008c3db3ab96ea4131e0f212ed5ca80a4b6d38a5fde9d907178
                                    • Instruction ID: 4f5c1f5cc5193862ca1bfb6fe19319bf1c1861d264eddeb54b08cfc0c679f655
                                    • Opcode Fuzzy Hash: aac683cce770f008c3db3ab96ea4131e0f212ed5ca80a4b6d38a5fde9d907178
                                    • Instruction Fuzzy Hash: 8B31E672509345ABD720DF15D849F9BBBEAFF88314F00091AF589D7291DB30E909CB92
                                    APIs
                                      • Part of subcall function 006C85F1: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 006C8608
                                      • Part of subcall function 006C85F1: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 006C8612
                                      • Part of subcall function 006C85F1: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 006C8621
                                      • Part of subcall function 006C85F1: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 006C8628
                                      • Part of subcall function 006C85F1: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 006C863E
                                    • GetLengthSid.ADVAPI32(?,00000000,006C8977), ref: 006C8DAC
                                    • GetProcessHeap.KERNEL32(00000008,00000000), ref: 006C8DB8
                                    • HeapAlloc.KERNEL32(00000000), ref: 006C8DBF
                                    • CopySid.ADVAPI32(00000000,00000000,?), ref: 006C8DD8
                                    • GetProcessHeap.KERNEL32(00000000,00000000,006C8977), ref: 006C8DEC
                                    • HeapFree.KERNEL32(00000000), ref: 006C8DF3
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                                    • String ID:
                                    • API String ID: 3008561057-0
                                    • Opcode ID: 5ba1c09c678fe1cae2bc1373dc11f6ed798c583e4fb0176f0b28b909801cdc6e
                                    • Instruction ID: 6b28c584f76d54ba5ba1b0c93b8380d81b3191fed22208852d2c9492f0cdc709
                                    • Opcode Fuzzy Hash: 5ba1c09c678fe1cae2bc1373dc11f6ed798c583e4fb0176f0b28b909801cdc6e
                                    • Instruction Fuzzy Hash: A4119732600605FFDB20DBA4CC49FFEBBAAEF55316F10402DE84697250CB32A940CBA0
                                    APIs
                                    • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 006C8B2A
                                    • OpenProcessToken.ADVAPI32(00000000), ref: 006C8B31
                                    • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 006C8B40
                                    • CloseHandle.KERNEL32(00000004), ref: 006C8B4B
                                    • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 006C8B7A
                                    • DestroyEnvironmentBlock.USERENV(00000000), ref: 006C8B8E
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                    • String ID:
                                    • API String ID: 1413079979-0
                                    • Opcode ID: d45672435542eaff5462db92c46b9066ff40f6faf4397d9a7c5c14dd459af041
                                    • Instruction ID: bb070dd3dcd987558e67fe5d8dbdf01a90d0532e1f2d156c2ae5660ffcdda73a
                                    • Opcode Fuzzy Hash: d45672435542eaff5462db92c46b9066ff40f6faf4397d9a7c5c14dd459af041
                                    • Instruction Fuzzy Hash: 4A112CB2501209AFDF118FA8ED49FEA7BAAEF08304F045069FE04A2160C7769D61DB60
                                    APIs
                                      • Part of subcall function 006712F3: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 0067134D
                                      • Part of subcall function 006712F3: SelectObject.GDI32(?,00000000), ref: 0067135C
                                      • Part of subcall function 006712F3: BeginPath.GDI32(?), ref: 00671373
                                      • Part of subcall function 006712F3: SelectObject.GDI32(?,00000000), ref: 0067139C
                                    • MoveToEx.GDI32(00000000,-00000002,?,00000000), ref: 006FC1C4
                                    • LineTo.GDI32(00000000,00000003,?), ref: 006FC1D8
                                    • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 006FC1E6
                                    • LineTo.GDI32(00000000,00000000,?), ref: 006FC1F6
                                    • EndPath.GDI32(00000000), ref: 006FC206
                                    • StrokePath.GDI32(00000000), ref: 006FC216
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                                    • String ID:
                                    • API String ID: 43455801-0
                                    • Opcode ID: 9f89fbe29bfe11780c5487ac9d207272d0a78b49e9a1526fcc13ac7300018c27
                                    • Instruction ID: 713a745302013ae46919ddcd5c68a6ab176d0cc830e334327d93d043ee83f375
                                    • Opcode Fuzzy Hash: 9f89fbe29bfe11780c5487ac9d207272d0a78b49e9a1526fcc13ac7300018c27
                                    • Instruction Fuzzy Hash: BB111B7640010CBFEF119F94DC88EEA7FAEEF08364F048021BA184A1A1C7729E55DBA0
                                    APIs
                                    • MapVirtualKeyW.USER32(0000005B,00000000), ref: 006903D3
                                    • MapVirtualKeyW.USER32(00000010,00000000), ref: 006903DB
                                    • MapVirtualKeyW.USER32(000000A0,00000000), ref: 006903E6
                                    • MapVirtualKeyW.USER32(000000A1,00000000), ref: 006903F1
                                    • MapVirtualKeyW.USER32(00000011,00000000), ref: 006903F9
                                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 00690401
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: Virtual
                                    • String ID:
                                    • API String ID: 4278518827-0
                                    • Opcode ID: d0caf14dcfb557f3d4d31c4d674859a561d8d8b7f1ec63060db31fa3477d6db8
                                    • Instruction ID: f08eee0cf556030a6fd35478ace6857db3b60a0446c8f776830cf1241b950b57
                                    • Opcode Fuzzy Hash: d0caf14dcfb557f3d4d31c4d674859a561d8d8b7f1ec63060db31fa3477d6db8
                                    • Instruction Fuzzy Hash: 3A016CB09017597DE3008F5A8C85B52FFA8FF19354F00411BA15C87941C7F5A864CBE5
                                    APIs
                                    • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 006D569B
                                    • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 006D56B1
                                    • GetWindowThreadProcessId.USER32(?,?), ref: 006D56C0
                                    • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 006D56CF
                                    • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 006D56D9
                                    • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 006D56E0
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                    • String ID:
                                    • API String ID: 839392675-0
                                    • Opcode ID: f7f56419db66ddbcb139c117a0a2e98450d9f8390852214c104b24074588dcb9
                                    • Instruction ID: 9acd6bdb5167337299f1025f64745291485e417b38344ef25c8dafcf210bfa64
                                    • Opcode Fuzzy Hash: f7f56419db66ddbcb139c117a0a2e98450d9f8390852214c104b24074588dcb9
                                    • Instruction Fuzzy Hash: 69F03A32641159BBE7215BA2EC0EEFF7B7DEFCAB11F000169FA05D11A0DBA15A01C6B5
                                    APIs
                                    • InterlockedExchange.KERNEL32(?,?), ref: 006D74E5
                                    • EnterCriticalSection.KERNEL32(?,?,00681044,?,?), ref: 006D74F6
                                    • TerminateThread.KERNEL32(00000000,000001F6,?,00681044,?,?), ref: 006D7503
                                    • WaitForSingleObject.KERNEL32(00000000,000003E8,?,00681044,?,?), ref: 006D7510
                                      • Part of subcall function 006D6ED7: CloseHandle.KERNEL32(00000000,?,006D751D,?,00681044,?,?), ref: 006D6EE1
                                    • InterlockedExchange.KERNEL32(?,000001F6), ref: 006D7523
                                    • LeaveCriticalSection.KERNEL32(?,?,00681044,?,?), ref: 006D752A
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                    • String ID:
                                    • API String ID: 3495660284-0
                                    • Opcode ID: 13582601f900e1022c9b597007707419c31ae507ed3b288ea9455c90b7cd7d79
                                    • Instruction ID: f0d686c2ac6aae84dcd02f7465bd147f27c776b146992ce9a4e4ab43a1d422b5
                                    • Opcode Fuzzy Hash: 13582601f900e1022c9b597007707419c31ae507ed3b288ea9455c90b7cd7d79
                                    • Instruction Fuzzy Hash: 2DF05E3A544612EBDB111BA4FC8C9FB7B2BEF46302B001532F202911B0DB755A01CB51
                                    APIs
                                    • WaitForSingleObject.KERNEL32(?,000000FF), ref: 006C8E7F
                                    • UnloadUserProfile.USERENV(?,?), ref: 006C8E8B
                                    • CloseHandle.KERNEL32(?), ref: 006C8E94
                                    • CloseHandle.KERNEL32(?), ref: 006C8E9C
                                    • GetProcessHeap.KERNEL32(00000000,?), ref: 006C8EA5
                                    • HeapFree.KERNEL32(00000000), ref: 006C8EAC
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                    • String ID:
                                    • API String ID: 146765662-0
                                    • Opcode ID: 131f25c00a8d28243a7589b05f4a7e05da543d89c7187700fd8a366a14f18899
                                    • Instruction ID: 2eac25e91e508eb344702044d20b9bed95313e31f98e58b0f6ed0abc64cf9325
                                    • Opcode Fuzzy Hash: 131f25c00a8d28243a7589b05f4a7e05da543d89c7187700fd8a366a14f18899
                                    • Instruction Fuzzy Hash: 03E05277104506FBDB016FE6EC0C96ABF6AFF89762B549631F21981470CB329461DB90
                                    APIs
                                    • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,00702C7C,?), ref: 006C7C32
                                    • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,00702C7C,?), ref: 006C7C4A
                                    • CLSIDFromProgID.OLE32(?,?,00000000,006FFB80,000000FF,?,00000000,00000800,00000000,?,00702C7C,?), ref: 006C7C6F
                                    • _memcmp.LIBCMT ref: 006C7C90
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: FromProg$FreeTask_memcmp
                                    • String ID: ,,p
                                    • API String ID: 314563124-2804055044
                                    • Opcode ID: 7b8d50b22dfeccc17df6d18251c36cc2796435905d816335029239e59b29feff
                                    • Instruction ID: 57f6b13d9153872ae0c7300ce661dd98e58d5308ead4e50d5aa4c3806a5230b7
                                    • Opcode Fuzzy Hash: 7b8d50b22dfeccc17df6d18251c36cc2796435905d816335029239e59b29feff
                                    • Instruction Fuzzy Hash: 8281FB75A0010AEFCB04DF94C984EEEB7BAFF89315F204599E515AB250DB71AE06CF60
                                    APIs
                                    • VariantInit.OLEAUT32(?), ref: 006E8928
                                    • CharUpperBuffW.USER32(?,?), ref: 006E8A37
                                    • VariantClear.OLEAUT32(?), ref: 006E8BAF
                                      • Part of subcall function 006D7804: VariantInit.OLEAUT32(00000000), ref: 006D7844
                                      • Part of subcall function 006D7804: VariantCopy.OLEAUT32(00000000,?), ref: 006D784D
                                      • Part of subcall function 006D7804: VariantClear.OLEAUT32(00000000), ref: 006D7859
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: Variant$ClearInit$BuffCharCopyUpper
                                    • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                    • API String ID: 4237274167-1221869570
                                    • Opcode ID: 47e07d12a51ce1661b29e70695cdad2425b20e3b5ad8703f192841213d3c944c
                                    • Instruction ID: 53acbecdfd38ca08217f40e36e8d79e91d14a7f4dda35e163aa7579b868888ae
                                    • Opcode Fuzzy Hash: 47e07d12a51ce1661b29e70695cdad2425b20e3b5ad8703f192841213d3c944c
                                    • Instruction Fuzzy Hash: 479190716083419FC740DF29C48496BBBF6EF89714F14896EF89A8B362DB31E905CB52
                                    APIs
                                      • Part of subcall function 0068FEC6: _wcscpy.LIBCMT ref: 0068FEE9
                                    • _memset.LIBCMT ref: 006D3077
                                    • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 006D30A6
                                    • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 006D3159
                                    • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 006D3187
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: ItemMenu$Info$Default_memset_wcscpy
                                    • String ID: 0
                                    • API String ID: 4152858687-4108050209
                                    • Opcode ID: e85f1693794f0cf7582a73e9b5d0a6a1caa5792dfc1d4994fedce8ef051aa5dc
                                    • Instruction ID: 536027d35aeb470a9a0a966a0aa94e66b603578b8ec09b851992af9c8b24ac15
                                    • Opcode Fuzzy Hash: e85f1693794f0cf7582a73e9b5d0a6a1caa5792dfc1d4994fedce8ef051aa5dc
                                    • Instruction Fuzzy Hash: A1512431A083229AD7249F28CC446ABB7EAEF59310F044A2EF895D7391DB70CE44C767
                                    APIs
                                    • GetWindowRect.USER32(015CDD20,?), ref: 006F9AD2
                                    • ScreenToClient.USER32(00000002,00000002), ref: 006F9B05
                                    • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,00000002,?,?), ref: 006F9B72
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: Window$ClientMoveRectScreen
                                    • String ID: @U=u
                                    • API String ID: 3880355969-2594219639
                                    • Opcode ID: 80fc0d8c05810af030904b58000b981cdf7beea1484ed0507039345379864f92
                                    • Instruction ID: 10045cb2b1557abe0c3aedd9b9a5790f9f555fabc9b8efc71461842ec84479ff
                                    • Opcode Fuzzy Hash: 80fc0d8c05810af030904b58000b981cdf7beea1484ed0507039345379864f92
                                    • Instruction Fuzzy Hash: 01510A34A00209AFDB24DF68D881AFE7BB6EF55324F148169FA159B390D730AD41CBA0
                                    APIs
                                    • _memset.LIBCMT ref: 006D2CAF
                                    • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 006D2CCB
                                    • DeleteMenu.USER32(?,00000007,00000000), ref: 006D2D11
                                    • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00736890,00000000), ref: 006D2D5A
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: Menu$Delete$InfoItem_memset
                                    • String ID: 0
                                    • API String ID: 1173514356-4108050209
                                    • Opcode ID: cb2e29deba9773d0435e797aaddd07340e001198cc49876a43796c03d2111f50
                                    • Instruction ID: addb49293d7e73f62831a2bdcce2943397fd89fb721b46ec351ae521d1413056
                                    • Opcode Fuzzy Hash: cb2e29deba9773d0435e797aaddd07340e001198cc49876a43796c03d2111f50
                                    • Instruction Fuzzy Hash: 0641C0306043029FD720DF24C854B6ABBEBEF95320F14461EF96597391D770E905CB96
                                    APIs
                                    • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 006F8B4D
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: InvalidateRect
                                    • String ID: @U=u
                                    • API String ID: 634782764-2594219639
                                    • Opcode ID: d6eb2b832e2ee02841e12001fe5b96789864e63a2fc849d275278756fb035fea
                                    • Instruction ID: 20613695f64563fe1df637fefce573846dc8d86b359134452091409c5a454a5c
                                    • Opcode Fuzzy Hash: d6eb2b832e2ee02841e12001fe5b96789864e63a2fc849d275278756fb035fea
                                    • Instruction Fuzzy Hash: E731ADB460420CBEEB209F18CC89FF937A7EB09310F248696FB51D73A1CE30A9409B55
                                    APIs
                                    • CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 006EDAD9
                                      • Part of subcall function 006779AB: _memmove.LIBCMT ref: 006779F9
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: BuffCharLower_memmove
                                    • String ID: cdecl$none$stdcall$winapi
                                    • API String ID: 3425801089-567219261
                                    • Opcode ID: dca07d34dc34d79d363047ee92bae03fc279c8b8e82ea4a25b0cdb797f64f3f3
                                    • Instruction ID: 3e0167c05ef29745de1ce40fc7eee42b7bda8a8fa1c7acda10c6f46450fcfd2d
                                    • Opcode Fuzzy Hash: dca07d34dc34d79d363047ee92bae03fc279c8b8e82ea4a25b0cdb797f64f3f3
                                    • Instruction Fuzzy Hash: D8318370501719AFCF10EF55C8819EEB3B6FF05310B10866DE865A77D1EB71A906CB84
                                    APIs
                                      • Part of subcall function 00671D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00671D73
                                      • Part of subcall function 00671D35: GetStockObject.GDI32(00000011), ref: 00671D87
                                      • Part of subcall function 00671D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00671D91
                                    • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 006F66D0
                                    • LoadLibraryW.KERNEL32(?), ref: 006F66D7
                                    • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 006F66EC
                                    • DestroyWindow.USER32(?), ref: 006F66F4
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: MessageSend$Window$CreateDestroyLibraryLoadObjectStock
                                    • String ID: SysAnimate32
                                    • API String ID: 4146253029-1011021900
                                    • Opcode ID: 870fe6baed37c6349d21a4176ffecbb121f426578c71a58e15e7a7b4aa7d9374
                                    • Instruction ID: e0b20befdfed28648cef97113c429ec34230979655807d3f7855bf1492be5552
                                    • Opcode Fuzzy Hash: 870fe6baed37c6349d21a4176ffecbb121f426578c71a58e15e7a7b4aa7d9374
                                    • Instruction Fuzzy Hash: 9E219D7120020ABBEF105F64EC80EBB77AEEF59368F105629FA10D62A0D772CC519765
                                    APIs
                                    • GetStdHandle.KERNEL32(0000000C), ref: 006D705E
                                    • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 006D7091
                                    • GetStdHandle.KERNEL32(0000000C), ref: 006D70A3
                                    • CreateFileW.KERNEL32(nul,40000000,00000002,0000000C,00000003,00000080,00000000), ref: 006D70DD
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: CreateHandle$FilePipe
                                    • String ID: nul
                                    • API String ID: 4209266947-2873401336
                                    • Opcode ID: 7a593be6e17a000e1884f3b306e8570d8e5d31f7b5d9a24112ab8289f1838ac4
                                    • Instruction ID: 3c8c75878d19ccec3157513ecf7d52fa81567d7db51dcef0bffdc1257d5f26d8
                                    • Opcode Fuzzy Hash: 7a593be6e17a000e1884f3b306e8570d8e5d31f7b5d9a24112ab8289f1838ac4
                                    • Instruction Fuzzy Hash: B72192B4D04209ABDB209F79DC05AAA77BABF44720F204A1AFDA0D73D0E7709950CB61
                                    APIs
                                    • GetStdHandle.KERNEL32(000000F6), ref: 006D712B
                                    • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 006D715D
                                    • GetStdHandle.KERNEL32(000000F6), ref: 006D716E
                                    • CreateFileW.KERNEL32(nul,80000000,00000001,0000000C,00000003,00000080,00000000), ref: 006D71A8
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: CreateHandle$FilePipe
                                    • String ID: nul
                                    • API String ID: 4209266947-2873401336
                                    • Opcode ID: e4718d413a151ffc3a82c559e71b044a2d25d363019b2cafdaf4d9ffc488a61f
                                    • Instruction ID: e19133f59780661fa113d60a114de3ee9864e08e9b85bea0533ff26bf0199314
                                    • Opcode Fuzzy Hash: e4718d413a151ffc3a82c559e71b044a2d25d363019b2cafdaf4d9ffc488a61f
                                    • Instruction Fuzzy Hash: 5521C575904306ABDB209F68DC04AAAB7EAAF55730F240B1AFCB0D33D0E7709941CB52
                                    APIs
                                    • SetErrorMode.KERNEL32(00000001), ref: 006DAEBF
                                    • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 006DAF13
                                    • __swprintf.LIBCMT ref: 006DAF2C
                                    • SetErrorMode.KERNEL32(00000000,00000001,00000000,006FF910), ref: 006DAF6A
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: ErrorMode$InformationVolume__swprintf
                                    • String ID: %lu
                                    • API String ID: 3164766367-685833217
                                    • Opcode ID: eb339dedd2466a7188d200b5403e7dacbe432db104971d09822d3e8b0075f033
                                    • Instruction ID: 5777ef6805c155d49fa12d1ae4064fd730e2c94ecf01415b84bde538d593323b
                                    • Opcode Fuzzy Hash: eb339dedd2466a7188d200b5403e7dacbe432db104971d09822d3e8b0075f033
                                    • Instruction Fuzzy Hash: 3F216234A00109AFCB50DB94C985DAE77F9EF49704B0040A9F509AB351DB71EE45CB65
                                    APIs
                                      • Part of subcall function 00677D2C: _memmove.LIBCMT ref: 00677D66
                                      • Part of subcall function 006CA37C: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 006CA399
                                      • Part of subcall function 006CA37C: GetWindowThreadProcessId.USER32(?,00000000), ref: 006CA3AC
                                      • Part of subcall function 006CA37C: GetCurrentThreadId.KERNEL32 ref: 006CA3B3
                                      • Part of subcall function 006CA37C: AttachThreadInput.USER32(00000000), ref: 006CA3BA
                                    • GetFocus.USER32 ref: 006CA554
                                      • Part of subcall function 006CA3C5: GetParent.USER32(?), ref: 006CA3D3
                                    • GetClassNameW.USER32(?,?,00000100), ref: 006CA59D
                                    • EnumChildWindows.USER32(?,006CA615), ref: 006CA5C5
                                    • __swprintf.LIBCMT ref: 006CA5DF
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows__swprintf_memmove
                                    • String ID: %s%d
                                    • API String ID: 1941087503-1110647743
                                    • Opcode ID: 1486776924ad858c94965bc4b2d243c1054fc9282159b3f96d2a6fa279cb170c
                                    • Instruction ID: d554956d26da67051d3a61f93c717d5ae7d2824be6f5dbd85ed5f73a84cf0b47
                                    • Opcode Fuzzy Hash: 1486776924ad858c94965bc4b2d243c1054fc9282159b3f96d2a6fa279cb170c
                                    • Instruction Fuzzy Hash: CC117F71600209ABDF51BFA5DC85FFA777EEF48704F04407DBA0CAA152CA7059458B79
                                    APIs
                                    • CharUpperBuffW.USER32(?,?), ref: 006D2048
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: BuffCharUpper
                                    • String ID: APPEND$EXISTS$KEYS$REMOVE
                                    • API String ID: 3964851224-769500911
                                    • Opcode ID: c0ea63942cc5097db453a52543b18d62ac7f931b5e284889f6a2d8dc3007c6d2
                                    • Instruction ID: 3a4a98261a5c931dcf0d1c2fcd6b5d4ab51eed1bdfb2b0af9385ffba06e42c26
                                    • Opcode Fuzzy Hash: c0ea63942cc5097db453a52543b18d62ac7f931b5e284889f6a2d8dc3007c6d2
                                    • Instruction Fuzzy Hash: 2E115B3090011A9FCF40EFA8D9514EEB7B6FF25304B1488A9D855A7352EB32691BCB51
                                    APIs
                                    • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 006EEF1B
                                    • GetProcessIoCounters.KERNEL32(00000000,?), ref: 006EEF4B
                                    • GetProcessMemoryInfo.PSAPI(00000000,?,00000028), ref: 006EF07E
                                    • CloseHandle.KERNEL32(?), ref: 006EF0FF
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: Process$CloseCountersHandleInfoMemoryOpen
                                    • String ID:
                                    • API String ID: 2364364464-0
                                    • Opcode ID: 7c6fba1d1280da977b4f14c96ed499895b61464393f7712ab217eb01bb06e0b5
                                    • Instruction ID: 9ba352d9b1469d7be359e18053ae79e23765934e27884bad11f95081491f96d6
                                    • Opcode Fuzzy Hash: 7c6fba1d1280da977b4f14c96ed499895b61464393f7712ab217eb01bb06e0b5
                                    • Instruction Fuzzy Hash: FB8181716043009FD760DF29C886F6AB7E6AF88720F14882DF599DB392DB71AC00CB95
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: _memset$__filbuf__getptd_noexit__read_nolock_memcpy_s
                                    • String ID:
                                    • API String ID: 1559183368-0
                                    • Opcode ID: fd1a262b7e6f1cb596d0076786feeeb097306c284ce0f321d4276a437e8c5e71
                                    • Instruction ID: a4df80403cc57d952403b68ff71ea2daa56a72b64a50d09c88e2ebc9ef546588
                                    • Opcode Fuzzy Hash: fd1a262b7e6f1cb596d0076786feeeb097306c284ce0f321d4276a437e8c5e71
                                    • Instruction Fuzzy Hash: 52519630A00B05DBDF259FA9C8845AE77ABAF41320F64862DF8279ABD0D7709E519B41
                                    APIs
                                      • Part of subcall function 00677F41: _memmove.LIBCMT ref: 00677F82
                                      • Part of subcall function 006F10A5: CharUpperBuffW.USER32(?,?,?,?,?,?,?,006F0038,?,?), ref: 006F10BC
                                    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 006F0388
                                    • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 006F03C7
                                    • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 006F040E
                                    • RegCloseKey.ADVAPI32(?,?), ref: 006F043A
                                    • RegCloseKey.ADVAPI32(00000000), ref: 006F0447
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: Close$BuffCharConnectEnumOpenRegistryUpper_memmove
                                    • String ID:
                                    • API String ID: 3440857362-0
                                    • Opcode ID: 957a8f7c1c82ce2592b85fea2da35f2c4c9ff784fe2b68498aa97a493b2d1fc8
                                    • Instruction ID: b1acf3905287c8c56c218e6b35d6aa130fdfd982fa50c383a3c33a7686443798
                                    • Opcode Fuzzy Hash: 957a8f7c1c82ce2592b85fea2da35f2c4c9ff784fe2b68498aa97a493b2d1fc8
                                    • Instruction Fuzzy Hash: 50514B31208205AFD744EF54C881E7EB7EAFF84704F04892DF69997292DB30E905CB56
                                    APIs
                                    • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 006DE88A
                                    • GetPrivateProfileSectionW.KERNEL32(?,00000001,00000003,?), ref: 006DE8B3
                                    • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 006DE8F2
                                      • Part of subcall function 00679997: __itow.LIBCMT ref: 006799C2
                                      • Part of subcall function 00679997: __swprintf.LIBCMT ref: 00679A0C
                                    • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 006DE917
                                    • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 006DE91F
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: PrivateProfile$SectionWrite$String$__itow__swprintf
                                    • String ID:
                                    • API String ID: 1389676194-0
                                    • Opcode ID: bf6338fc98affa43c37559f8158f26522940ab88a399247125c6d5709dcbd367
                                    • Instruction ID: 13845454b92c85986db1127e51e9c265425fea149aa08393d1e0357c3886d578
                                    • Opcode Fuzzy Hash: bf6338fc98affa43c37559f8158f26522940ab88a399247125c6d5709dcbd367
                                    • Instruction Fuzzy Hash: D0513C35A00205DFDF41EF64C9819AEBBF6EF48310B14C0A9E909AB361CB31ED11DB64
                                    APIs
                                    • GetCursorPos.USER32(?), ref: 00672357
                                    • ScreenToClient.USER32(007367B0,?), ref: 00672374
                                    • GetAsyncKeyState.USER32(00000001), ref: 00672399
                                    • GetAsyncKeyState.USER32(00000002), ref: 006723A7
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: AsyncState$ClientCursorScreen
                                    • String ID:
                                    • API String ID: 4210589936-0
                                    • Opcode ID: 42963a79974695a8d872e0c82b2fdf545b28ad1dc14bf241748a700e56c069c1
                                    • Instruction ID: b9fe92ee560ce2059218aaca4585ceaa0aa175dcccfb5543b29784f68156e709
                                    • Opcode Fuzzy Hash: 42963a79974695a8d872e0c82b2fdf545b28ad1dc14bf241748a700e56c069c1
                                    • Instruction Fuzzy Hash: 2E417F3590411AFBDF159F68C844AE9BB76FF06330F20835AF82896290CB345E94DF91
                                    APIs
                                    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 006C695D
                                    • TranslateAcceleratorW.USER32(?,?,?), ref: 006C69A9
                                    • TranslateMessage.USER32(?), ref: 006C69D2
                                    • DispatchMessageW.USER32(?), ref: 006C69DC
                                    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 006C69EB
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: Message$PeekTranslate$AcceleratorDispatch
                                    • String ID:
                                    • API String ID: 2108273632-0
                                    • Opcode ID: e3617df1a879b20a86c97a9b4e370d3297f403815fc9ae856fb92baf25c8d367
                                    • Instruction ID: 67dcc166b5b1f0520b39314b4d904ad402cd325e24400edb522c1e5b053cd13f
                                    • Opcode Fuzzy Hash: e3617df1a879b20a86c97a9b4e370d3297f403815fc9ae856fb92baf25c8d367
                                    • Instruction Fuzzy Hash: 9531C471504247AAEB608FB4CC44FF67BAAEB01305F10816DF421D32A1D774D886D798
                                    APIs
                                    • GetWindowRect.USER32(?,?), ref: 006C8F12
                                    • PostMessageW.USER32(?,00000201,00000001), ref: 006C8FBC
                                    • Sleep.KERNEL32(00000000,?,00000201,00000001,?,?,?), ref: 006C8FC4
                                    • PostMessageW.USER32(?,00000202,00000000), ref: 006C8FD2
                                    • Sleep.KERNEL32(00000000,?,00000202,00000000,?,?,00000201,00000001,?,?,?), ref: 006C8FDA
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: MessagePostSleep$RectWindow
                                    • String ID:
                                    • API String ID: 3382505437-0
                                    • Opcode ID: 3faa23ed7fbd192ba0d98421add34dee74d2ad713043165abfe3263af71c281f
                                    • Instruction ID: 2e1f1f9d21b10061c0e306cb10e6238bba8f2a8fcc28ea9ded4c7e4bb2106048
                                    • Opcode Fuzzy Hash: 3faa23ed7fbd192ba0d98421add34dee74d2ad713043165abfe3263af71c281f
                                    • Instruction Fuzzy Hash: 72319871500219EFDB24CFA8D948BEE7BA6EB44325F10422DF925EB2D0CBB09914DB90
                                    APIs
                                      • Part of subcall function 00672612: GetWindowLongW.USER32(?,000000EB), ref: 00672623
                                    • GetWindowLongW.USER32(?,000000F0), ref: 006FB44C
                                    • SetWindowLongW.USER32(00000000,000000F0,00000001), ref: 006FB471
                                    • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 006FB489
                                    • GetSystemMetrics.USER32(00000004), ref: 006FB4B2
                                    • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000047,?,?,?,?,?,?,?,006E1184,00000000), ref: 006FB4D0
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: Window$Long$MetricsSystem
                                    • String ID:
                                    • API String ID: 2294984445-0
                                    • Opcode ID: 973da664c28c8417f4d38dc214d5ca7f77e083da656ffd568c58f6da1f786db7
                                    • Instruction ID: 102ccee2505f6d6be9ee3333449fbf9c1e4ddc59d96a7da4d56e1450149a6fbe
                                    • Opcode Fuzzy Hash: 973da664c28c8417f4d38dc214d5ca7f77e083da656ffd568c58f6da1f786db7
                                    • Instruction Fuzzy Hash: 05219171910219AFCB108F38DD04ABA37E6EF05725F149738FA26C72E6E7309811DB80
                                    APIs
                                    • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 0067134D
                                    • SelectObject.GDI32(?,00000000), ref: 0067135C
                                    • BeginPath.GDI32(?), ref: 00671373
                                    • SelectObject.GDI32(?,00000000), ref: 0067139C
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: ObjectSelect$BeginCreatePath
                                    • String ID:
                                    • API String ID: 3225163088-0
                                    • Opcode ID: f1c342bdee201c90cee578dd70316ce8a9592abdf614bdb6917e8f559a6514e7
                                    • Instruction ID: 772a2e55cd0bb737bf14cd3ebafaf65d3d039dfef35d9312a05f173c7033eb2c
                                    • Opcode Fuzzy Hash: f1c342bdee201c90cee578dd70316ce8a9592abdf614bdb6917e8f559a6514e7
                                    • Instruction Fuzzy Hash: 47212170800204FFEB119F29DC04BE97BFAFB05362F14C226F9149A6A1D7759991DFA4
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: _memcmp
                                    • String ID:
                                    • API String ID: 2931989736-0
                                    • Opcode ID: 457e21d5773033625735625221c57bcc490b014ba65f3482b2208fc359539171
                                    • Instruction ID: 447e0cf74f93ae4dbd62000efa31f746445144e6dd679431cb04ba36863448c6
                                    • Opcode Fuzzy Hash: 457e21d5773033625735625221c57bcc490b014ba65f3482b2208fc359539171
                                    • Instruction Fuzzy Hash: 990196B3A041067BEE05A6225C46FBB779EDB113A4F18411EFE0896B83E6549E1282E4
                                    APIs
                                    • GetCurrentThreadId.KERNEL32 ref: 006D4D5C
                                    • __beginthreadex.LIBCMT ref: 006D4D7A
                                    • MessageBoxW.USER32(?,?,?,?), ref: 006D4D8F
                                    • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 006D4DA5
                                    • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 006D4DAC
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: CloseCurrentHandleMessageObjectSingleThreadWait__beginthreadex
                                    • String ID:
                                    • API String ID: 3824534824-0
                                    • Opcode ID: a8f2063012bb4991045c98bd3ab31978e00e81d439ce6838b707155d131ea2eb
                                    • Instruction ID: 961e8bf191ee338bf7ef72e24d234163c3fbb52949cb08a6756ed740804ef49c
                                    • Opcode Fuzzy Hash: a8f2063012bb4991045c98bd3ab31978e00e81d439ce6838b707155d131ea2eb
                                    • Instruction Fuzzy Hash: F0110872D04204BBDB019BA89C08AEB7FAEEF49321F148266F914D3350DA758D04C7A0
                                    APIs
                                    • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 006C8766
                                    • GetLastError.KERNEL32(?,006C822A,?,?,?), ref: 006C8770
                                    • GetProcessHeap.KERNEL32(00000008,?,?,006C822A,?,?,?), ref: 006C877F
                                    • HeapAlloc.KERNEL32(00000000,?,006C822A,?,?,?), ref: 006C8786
                                    • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 006C879D
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                    • String ID:
                                    • API String ID: 842720411-0
                                    • Opcode ID: e1be97f485fbe0e000bddcb6b1479d57f49a39c9e4bc991da39f6f1afa3b218a
                                    • Instruction ID: b19b1e67230be7f9c45ae55e8524941313b332e1664b29f8846c4c26dfb734c5
                                    • Opcode Fuzzy Hash: e1be97f485fbe0e000bddcb6b1479d57f49a39c9e4bc991da39f6f1afa3b218a
                                    • Instruction Fuzzy Hash: F301E871601204AF9B204FA6DC88DBB7BAEEF8A7557201579F949C3260EA319D10CA70
                                    APIs
                                    • QueryPerformanceCounter.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 006D5502
                                    • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 006D5510
                                    • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?), ref: 006D5518
                                    • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 006D5522
                                    • Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 006D555E
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: PerformanceQuery$CounterSleep$Frequency
                                    • String ID:
                                    • API String ID: 2833360925-0
                                    • Opcode ID: 03076bfe5d5852d88279cb891fa07c352a49026b27f13e764807b7caea4ab2cc
                                    • Instruction ID: 5c6cb7df22874a44d20c825bd61460931718c5ca3c8e967ad56291a58735ef31
                                    • Opcode Fuzzy Hash: 03076bfe5d5852d88279cb891fa07c352a49026b27f13e764807b7caea4ab2cc
                                    • Instruction Fuzzy Hash: 54012D76D04A19DBCF00EFE8E849AEDBB7AFF09711F004456E902B2740DB305654C7A5
                                    APIs
                                    • CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,006C758C,80070057,?,?,?,006C799D), ref: 006C766F
                                    • ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,006C758C,80070057,?,?), ref: 006C768A
                                    • lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,006C758C,80070057,?,?), ref: 006C7698
                                    • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,006C758C,80070057,?), ref: 006C76A8
                                    • CLSIDFromString.OLE32(?,?,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,006C758C,80070057,?,?), ref: 006C76B4
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: From$Prog$FreeStringTasklstrcmpi
                                    • String ID:
                                    • API String ID: 3897988419-0
                                    • Opcode ID: 9907cb90e88490fccbfe61d91ab6329fdddfda05c8961b9ed0bc9eae353dc704
                                    • Instruction ID: de522c483220acef53f91533fb516bc4c641a3ac2f77e3add55158a5d2956d33
                                    • Opcode Fuzzy Hash: 9907cb90e88490fccbfe61d91ab6329fdddfda05c8961b9ed0bc9eae353dc704
                                    • Instruction Fuzzy Hash: 27017172601614ABDB105F59DC45FBA7BBEEF44791F140028FD04D2211E731DE41DBA0
                                    APIs
                                    • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 006C8608
                                    • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 006C8612
                                    • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 006C8621
                                    • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 006C8628
                                    • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 006C863E
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: HeapInformationToken$AllocErrorLastProcess
                                    • String ID:
                                    • API String ID: 44706859-0
                                    • Opcode ID: 2c32564d46746ca60bfda03742f25a6b5fb15b3379995a404d17731b0a072309
                                    • Instruction ID: 6f8ca618ca034f0bf4d0b3a4281dbdbe94af953c0f59c0af7a9a41a6c50d4028
                                    • Opcode Fuzzy Hash: 2c32564d46746ca60bfda03742f25a6b5fb15b3379995a404d17731b0a072309
                                    • Instruction Fuzzy Hash: A8F04931201204BFEB204FA6DC99FBB3BAEEFCA754B000429F949C7250CB619C41DA60
                                    APIs
                                    • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 006C8669
                                    • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 006C8673
                                    • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 006C8682
                                    • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 006C8689
                                    • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 006C869F
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: HeapInformationToken$AllocErrorLastProcess
                                    • String ID:
                                    • API String ID: 44706859-0
                                    • Opcode ID: 0448da2534e332d558a13c869f7f610fc8665e922aedd81b8834c3e9863381d8
                                    • Instruction ID: 99b59626739b6e3a46512bcc09f3aa80450d684f32f8b66451c61ca986fb1f30
                                    • Opcode Fuzzy Hash: 0448da2534e332d558a13c869f7f610fc8665e922aedd81b8834c3e9863381d8
                                    • Instruction Fuzzy Hash: 6DF04F71200214AFEB211FA5EC88FB73BAEEF8AB58B100029F945C7250CF619941DA60
                                    APIs
                                    • GetDlgItem.USER32(?,000003E9), ref: 006CC6BA
                                    • GetWindowTextW.USER32(00000000,?,00000100), ref: 006CC6D1
                                    • MessageBeep.USER32(00000000), ref: 006CC6E9
                                    • KillTimer.USER32(?,0000040A), ref: 006CC705
                                    • EndDialog.USER32(?,00000001), ref: 006CC71F
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: BeepDialogItemKillMessageTextTimerWindow
                                    • String ID:
                                    • API String ID: 3741023627-0
                                    • Opcode ID: b701d2deb0deef1782753830bf6691208ac20bc192056e0c45933dd172cd0233
                                    • Instruction ID: 35140427fba58ebcfb9cb14988ef6802db29852021e90d1de100a43b6b31042e
                                    • Opcode Fuzzy Hash: b701d2deb0deef1782753830bf6691208ac20bc192056e0c45933dd172cd0233
                                    • Instruction Fuzzy Hash: 07014F30500704ABEB215B20DD4EFB677BAFF00B15F00166DF546E15E1DBE1A955CA90
                                    APIs
                                    • EndPath.GDI32(?), ref: 006713BF
                                    • StrokeAndFillPath.GDI32(?,?,006ABAD8,00000000,?), ref: 006713DB
                                    • SelectObject.GDI32(?,00000000), ref: 006713EE
                                    • DeleteObject.GDI32 ref: 00671401
                                    • StrokePath.GDI32(?), ref: 0067141C
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: Path$ObjectStroke$DeleteFillSelect
                                    • String ID:
                                    • API String ID: 2625713937-0
                                    • Opcode ID: dcb74def6387ce0c86275293b7d601eeb0e35c8682192004b1f5a026ffe0afdd
                                    • Instruction ID: 80ddc8b24725a4338b61eb9478649365d7d71a076e35e1f2678c3905dc2c36cd
                                    • Opcode Fuzzy Hash: dcb74def6387ce0c86275293b7d601eeb0e35c8682192004b1f5a026ffe0afdd
                                    • Instruction Fuzzy Hash: 31F0EC30004308FBEB115F2AEC4C7A83FA6AB06327F04D225E569491F1CB3949A5DF68
                                    APIs
                                      • Part of subcall function 00690FF6: std::exception::exception.LIBCMT ref: 0069102C
                                      • Part of subcall function 00690FF6: __CxxThrowException@8.LIBCMT ref: 00691041
                                      • Part of subcall function 00677F41: _memmove.LIBCMT ref: 00677F82
                                      • Part of subcall function 00677BB1: _memmove.LIBCMT ref: 00677C0B
                                    • __swprintf.LIBCMT ref: 0068302D
                                    Strings
                                    • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 00682EC6
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: _memmove$Exception@8Throw__swprintfstd::exception::exception
                                    • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                                    • API String ID: 1943609520-557222456
                                    • Opcode ID: 22a7040d0cab50b45aa6fc583ae1faa0745b76f203043ee1f21177fb4f88acbd
                                    • Instruction ID: b3d63adfbf0f05eb284b203575a3ef8c7f9f40fdbcca9f9753e34b6709e84699
                                    • Opcode Fuzzy Hash: 22a7040d0cab50b45aa6fc583ae1faa0745b76f203043ee1f21177fb4f88acbd
                                    • Instruction Fuzzy Hash: D2918E711083119FCB18FF24D885CAEB7EAEF95B50F004A1DF4869B3A1DA20EE45CB56
                                    APIs
                                    • OleSetContainedObject.OLE32(?,00000001), ref: 006CB981
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: ContainedObject
                                    • String ID: AutoIt3GUI$Container$%p
                                    • API String ID: 3565006973-2724510058
                                    • Opcode ID: 8c40cf8227bb368fef252e9828e2f05b1995727365c133b3292d57d418b88e0d
                                    • Instruction ID: 8a6fab1a52c4ba65a4a83e22177826ba768de0b61063dc13b954c2f6d4b92a8c
                                    • Opcode Fuzzy Hash: 8c40cf8227bb368fef252e9828e2f05b1995727365c133b3292d57d418b88e0d
                                    • Instruction Fuzzy Hash: D69159706006019FDB64DF64C885F6AB7EAFF48710F24856EE94ACB791DB70E841CB50
                                    APIs
                                    • __startOneArgErrorHandling.LIBCMT ref: 006952DD
                                      • Part of subcall function 006A0340: __87except.LIBCMT ref: 006A037B
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: ErrorHandling__87except__start
                                    • String ID: pow
                                    • API String ID: 2905807303-2276729525
                                    • Opcode ID: 565d995dc8817770469f06b88766a419efb879538f250b875654ec9c45bd7844
                                    • Instruction ID: f4d02b428800dfe0c56d2ea2b202fb5dc224b1eb0a94b64ff94aac5a2290f809
                                    • Opcode Fuzzy Hash: 565d995dc8817770469f06b88766a419efb879538f250b875654ec9c45bd7844
                                    • Instruction Fuzzy Hash: 61518B21E0D602C7EF167724C9513BE27DAEB02750F208958E086827E5EF388DC5DF4A
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: #$+
                                    • API String ID: 0-2552117581
                                    • Opcode ID: 652dfdfb6498435074dba2eb1a0da5c533bd2adfa832ba25258dc87fd9cef513
                                    • Instruction ID: 3eaa0bb07bc11adb30a814c8a4702b5cdde576bd6d349759d8acad07b9adca80
                                    • Opcode Fuzzy Hash: 652dfdfb6498435074dba2eb1a0da5c533bd2adfa832ba25258dc87fd9cef513
                                    • Instruction Fuzzy Hash: D4512F741043469FDF159F28C888BFA7BAAEF19310F544059E8939B3A0D734BC82CB64
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: _memmove$_free
                                    • String ID: Oah
                                    • API String ID: 2620147621-3137904739
                                    • Opcode ID: bd4cfc5b69c6ce21faf412f83b9254e0f98b1796416c62705960a941a752947b
                                    • Instruction ID: ded22057f0425fc3d5b63256e3c62b41eabb78bd48afa447f0d26dcc046cc6f7
                                    • Opcode Fuzzy Hash: bd4cfc5b69c6ce21faf412f83b9254e0f98b1796416c62705960a941a752947b
                                    • Instruction Fuzzy Hash: 81518AB16083519FDB24DF28C451B6FBBE6BF85704F044A2DE98987351EB31EA41CB82
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: _memset$_memmove
                                    • String ID: ERCP
                                    • API String ID: 2532777613-1384759551
                                    • Opcode ID: 4405aa621628fa513f608d0a6a7d2cc2d560b60b6eed3eb0f8e2d1cadfa9a444
                                    • Instruction ID: f70d5b9bb2222d39bf5ad18d0e0f5e478cdbf11c644bcc3b228215af33a34311
                                    • Opcode Fuzzy Hash: 4405aa621628fa513f608d0a6a7d2cc2d560b60b6eed3eb0f8e2d1cadfa9a444
                                    • Instruction Fuzzy Hash: D251E171900319DFDB24DF64C881BEABBFAEF04310F20866EE54ACB641E775A681CB40
                                    APIs
                                    • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 006F76D0
                                    • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 006F76E4
                                    • SendMessageW.USER32(?,00001002,00000000,?), ref: 006F7708
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: MessageSend$Window
                                    • String ID: SysMonthCal32
                                    • API String ID: 2326795674-1439706946
                                    • Opcode ID: 32d16f77324165d29170e4dc5e27e61c7f2f28e5830f9b26c0adedb0b2999730
                                    • Instruction ID: b22641e67a0e11ad638eddde1793ee4cf39dc729e332c85d81708d88c3c54280
                                    • Opcode Fuzzy Hash: 32d16f77324165d29170e4dc5e27e61c7f2f28e5830f9b26c0adedb0b2999730
                                    • Instruction Fuzzy Hash: 5E219F32514219BBDF119F64CC46FEA3B6AEF48714F110214FE15AB2D0DAB5A851DBA0
                                    APIs
                                    • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 006F6FAA
                                    • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 006F6FBA
                                    • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 006F6FDF
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: MessageSend$MoveWindow
                                    • String ID: Listbox
                                    • API String ID: 3315199576-2633736733
                                    • Opcode ID: dfab698ad210182319fc0ac21373376b07e12c890b53f78424639a89de90467c
                                    • Instruction ID: 49ce02ff0db5affd4d5936b0e44a5aeb6a568b05837598eeff1d8d4d2f7b74af
                                    • Opcode Fuzzy Hash: dfab698ad210182319fc0ac21373376b07e12c890b53f78424639a89de90467c
                                    • Instruction Fuzzy Hash: 47215032611118BFDF119F54EC85EFB3BABEF89754F118124FA159B290CA71AC51CBA0
                                    APIs
                                    • SendMessageW.USER32(?,000000B0,?,?), ref: 006C914F
                                    • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 006C9166
                                    • SendMessageW.USER32(?,0000000D,?,00000000), ref: 006C919E
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: MessageSend
                                    • String ID: @U=u
                                    • API String ID: 3850602802-2594219639
                                    • Opcode ID: f52caefd16f1b9c6667f66663c66b776cf59bca8486f187021850f38f8f964b5
                                    • Instruction ID: bc65d00aec9b482bbd725028b9f93097b7f02f156b783d900f6dfab877782ed7
                                    • Opcode Fuzzy Hash: f52caefd16f1b9c6667f66663c66b776cf59bca8486f187021850f38f8f964b5
                                    • Instruction Fuzzy Hash: 2021C232600109BBDF21DBA9D84AEBEB7BEEF44340F15009AE905E3690DA31AD408B64
                                    APIs
                                    • SendMessageW.USER32(00000402,00000000,00000000), ref: 006E613B
                                    • SendMessageW.USER32(0000000C,00000000,?), ref: 006E617C
                                    • SendMessageW.USER32(0000000C,00000000,?), ref: 006E61A4
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: MessageSend
                                    • String ID: @U=u
                                    • API String ID: 3850602802-2594219639
                                    • Opcode ID: f955387afb80aac166c521f717268f63101bc599c9ba103d17f8c01e3fd9cc79
                                    • Instruction ID: 65379a5925221ba13fb3cced277f16c781645f2a27d14b7dfe5460552a9c44dd
                                    • Opcode Fuzzy Hash: f955387afb80aac166c521f717268f63101bc599c9ba103d17f8c01e3fd9cc79
                                    • Instruction Fuzzy Hash: 4F211735201601AFEB11AB29DD85D6AB7E6FF49324701C058F909DB672CB21FC51CBA8
                                    APIs
                                    • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 006F79E1
                                    • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 006F79F6
                                    • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 006F7A03
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: MessageSend
                                    • String ID: msctls_trackbar32
                                    • API String ID: 3850602802-1010561917
                                    • Opcode ID: ffc8301e59f945074bdbaad7eaa75d0f0523f00f529aa96959555941baa3948b
                                    • Instruction ID: 27a1e16a5162e1071d314a1ae8b990acab70641cebfec211e21c6da977be3802
                                    • Opcode Fuzzy Hash: ffc8301e59f945074bdbaad7eaa75d0f0523f00f529aa96959555941baa3948b
                                    • Instruction Fuzzy Hash: 1811E372244208BAEF209F74CC05FEB7BAAEF89764F02452DFB41A6190D671A811CB64
                                    APIs
                                    • GetWindowTextLengthW.USER32(00000000), ref: 006F6C11
                                    • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 006F6C20
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: LengthMessageSendTextWindow
                                    • String ID: @U=u$edit
                                    • API String ID: 2978978980-590756393
                                    • Opcode ID: 7c90e8135d7ecfa2f58ba7c1473e08f1d40f2b6978bf49e875420ac12457ff81
                                    • Instruction ID: 4b1d3e41037d8649cda5e4b4e90e7cfabd23161ac95799e9cdf6ce230187e4d8
                                    • Opcode Fuzzy Hash: 7c90e8135d7ecfa2f58ba7c1473e08f1d40f2b6978bf49e875420ac12457ff81
                                    • Instruction Fuzzy Hash: 68116A7150020CABEB108F64DC42AFA3B6BEF15368F604724FAA5D72E0C675DCA19B60
                                    APIs
                                      • Part of subcall function 00677F41: _memmove.LIBCMT ref: 00677F82
                                      • Part of subcall function 006CB0C4: GetClassNameW.USER32(?,?,000000FF), ref: 006CB0E7
                                    • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 006C9355
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: ClassMessageNameSend_memmove
                                    • String ID: @U=u$ComboBox$ListBox
                                    • API String ID: 372448540-2258501812
                                    • Opcode ID: bfada849017a7366e86ff006dfb8a2c0d8128ae416f8423cfbd8509e269e5ea8
                                    • Instruction ID: 20fb15eb9ec800983812ec8858daf102f3dda5390a178f787ff2e6d2e1610092
                                    • Opcode Fuzzy Hash: bfada849017a7366e86ff006dfb8a2c0d8128ae416f8423cfbd8509e269e5ea8
                                    • Instruction Fuzzy Hash: 0E01F171A05214ABCB04FBA4CC96DFE776AFF06320B140A5DF936972D1EB355908C660
                                    APIs
                                      • Part of subcall function 00677F41: _memmove.LIBCMT ref: 00677F82
                                      • Part of subcall function 006CB0C4: GetClassNameW.USER32(?,?,000000FF), ref: 006CB0E7
                                    • SendMessageW.USER32(?,00000180,00000000,?), ref: 006C924D
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: ClassMessageNameSend_memmove
                                    • String ID: @U=u$ComboBox$ListBox
                                    • API String ID: 372448540-2258501812
                                    • Opcode ID: a0c9cec0d75e3b1fc18c2c18383c701481accb1ff878d4acc9f2ca1075e77a5a
                                    • Instruction ID: ff7c2be5c2518ae50f36ff3e95568f832427d7c4a8318394c570e9c3cefb676c
                                    • Opcode Fuzzy Hash: a0c9cec0d75e3b1fc18c2c18383c701481accb1ff878d4acc9f2ca1075e77a5a
                                    • Instruction Fuzzy Hash: 52018471B412047BCB04EBA0C996EFF73AADF05300F24006DB956672C1EA195F189675
                                    APIs
                                      • Part of subcall function 00677F41: _memmove.LIBCMT ref: 00677F82
                                      • Part of subcall function 006CB0C4: GetClassNameW.USER32(?,?,000000FF), ref: 006CB0E7
                                    • SendMessageW.USER32(?,00000182,?,00000000), ref: 006C92D0
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: ClassMessageNameSend_memmove
                                    • String ID: @U=u$ComboBox$ListBox
                                    • API String ID: 372448540-2258501812
                                    • Opcode ID: f530f133bc344b826d266190b3106833e5a87713354d94b7809ae8c4965f5de4
                                    • Instruction ID: 9535fb1131db5af6ff4793b29e6644dc5e701cebf47b76db816798e8dda2c2e4
                                    • Opcode Fuzzy Hash: f530f133bc344b826d266190b3106833e5a87713354d94b7809ae8c4965f5de4
                                    • Instruction Fuzzy Hash: C301A771A4120477CB04F7A4C986EFF77AEDF11300F24415DB956632C1DA195F189275
                                    APIs
                                    • GetForegroundWindow.USER32(?,007367B0,006FDB17,000000FC,?,00000000,00000000,?,?,?,006ABBB9,?,?,?,?,?), ref: 006FAF8B
                                    • GetFocus.USER32 ref: 006FAF93
                                      • Part of subcall function 00672612: GetWindowLongW.USER32(?,000000EB), ref: 00672623
                                      • Part of subcall function 006725DB: GetWindowLongW.USER32(?,000000EB), ref: 006725EC
                                    • SendMessageW.USER32(015CDD20,000000B0,000001BC,000001C0), ref: 006FB005
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: Window$Long$FocusForegroundMessageSend
                                    • String ID: @U=u
                                    • API String ID: 3601265619-2594219639
                                    • Opcode ID: 264a19860702fc9389d266355877b4edf7ea5f040799aa88b011b2cbd87e3693
                                    • Instruction ID: f9fd91b8b84cc7b4a0c0737d06e90e3a6d166e8dd6aa9ac2a4885af5a24b050d
                                    • Opcode Fuzzy Hash: 264a19860702fc9389d266355877b4edf7ea5f040799aa88b011b2cbd87e3693
                                    • Instruction Fuzzy Hash: 15014C35200604AFD7249F28D894AB777E7AF8A324B189269E526873A1CF31AC46CB50
                                    APIs
                                      • Part of subcall function 0068619A: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 006861B1
                                    • SendMessageW.USER32(?,0000000C,00000000,?), ref: 006861DF
                                    • GetParent.USER32(?), ref: 006C111F
                                    • InvalidateRect.USER32(00000000,?,00683BAF,?,00000000,00000001), ref: 006C1126
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: MessageSend$InvalidateParentRectTimeout
                                    • String ID: @U=u
                                    • API String ID: 3648793173-2594219639
                                    • Opcode ID: 6a3a6912976baf7e63aca01a1af7f2fe71c15a2f9fcd789dacd70d7a6881f017
                                    • Instruction ID: 2648cf5639a8664c4206cdec24c9cc8b44fdcb0256070431b0f81a16e0344e15
                                    • Opcode Fuzzy Hash: 6a3a6912976baf7e63aca01a1af7f2fe71c15a2f9fcd789dacd70d7a6881f017
                                    • Instruction Fuzzy Hash: FBF0A930100204FBEF202F68DC0EFA17BAAAF16344F245139F6819A1A3CEE69851EB50
                                    APIs
                                    • LoadLibraryA.KERNEL32(kernel32.dll,?,00674C2E), ref: 00674CA3
                                    • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00674CB5
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: AddressLibraryLoadProc
                                    • String ID: GetNativeSystemInfo$kernel32.dll
                                    • API String ID: 2574300362-192647395
                                    • Opcode ID: afb74004cd91ba0bcef37df4a9498bb0ca455592b74a237ca982d6e885f06665
                                    • Instruction ID: 200a635e7c8b687dd7b2eeb3100de710c2df52bfcba632bc9f4c23d8c10b8c7a
                                    • Opcode Fuzzy Hash: afb74004cd91ba0bcef37df4a9498bb0ca455592b74a237ca982d6e885f06665
                                    • Instruction Fuzzy Hash: E6D05E30510727CFD7209F31DE5C66676E7AF05791B12D83ED88AD6350EBB0D880CA50
                                    APIs
                                    • LoadLibraryA.KERNEL32(kernel32.dll,?,00674D2E,?,00674F4F,?,007362F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00674D6F
                                    • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00674D81
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: AddressLibraryLoadProc
                                    • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                    • API String ID: 2574300362-3689287502
                                    • Opcode ID: dadd8e847277a3bfaaad80d1feeda628e31ce96f05f9c0790d8fdb651ba5e621
                                    • Instruction ID: 72461ea7df2298085c363cccdd08dfb125c539d2b9c1c9bbd1f99248bfdcb0fc
                                    • Opcode Fuzzy Hash: dadd8e847277a3bfaaad80d1feeda628e31ce96f05f9c0790d8fdb651ba5e621
                                    • Instruction Fuzzy Hash: A8D01770510723CFD7309F31D84866676EAAF15352B11D83A94CAD6350EB74D880CA50
                                    APIs
                                    • LoadLibraryA.KERNEL32(kernel32.dll,?,00674CE1,?), ref: 00674DA2
                                    • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00674DB4
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: AddressLibraryLoadProc
                                    • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                    • API String ID: 2574300362-1355242751
                                    • Opcode ID: 7df925f37a50e180e6ce58d276bf2f5a706cd8ea1b9061b9842225688b4b4663
                                    • Instruction ID: c0ec5a92ef56215db8e0f17f5715cbf870264f6dd0882a15ffc7ff744755ae6d
                                    • Opcode Fuzzy Hash: 7df925f37a50e180e6ce58d276bf2f5a706cd8ea1b9061b9842225688b4b4663
                                    • Instruction Fuzzy Hash: DDD05E71550723CFD7309F31D85CA9676E6AF05355B11C83ED8DAD6250EB74D880CA50
                                    APIs
                                    • LoadLibraryA.KERNEL32(advapi32.dll,?,006F12C1), ref: 006F1080
                                    • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 006F1092
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: AddressLibraryLoadProc
                                    • String ID: RegDeleteKeyExW$advapi32.dll
                                    • API String ID: 2574300362-4033151799
                                    • Opcode ID: 6de638cdc6f05c4dfd0003f1c4305a81f26862df3f4dc50b4b8bfaf721bc6fe2
                                    • Instruction ID: 3c29606babc9abefc1e72ba9258be29051f2544186681619519b463b40c02167
                                    • Opcode Fuzzy Hash: 6de638cdc6f05c4dfd0003f1c4305a81f26862df3f4dc50b4b8bfaf721bc6fe2
                                    • Instruction Fuzzy Hash: 7CD01770510727CFD7309F35E828A6A76E6AF063A1B118C3AA48ADA354EF74D8C0CA50
                                    APIs
                                    • LoadLibraryA.KERNEL32(kernel32.dll,00000001,006E9009,?,006FF910), ref: 006E9403
                                    • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 006E9415
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: AddressLibraryLoadProc
                                    • String ID: GetModuleHandleExW$kernel32.dll
                                    • API String ID: 2574300362-199464113
                                    • Opcode ID: 334297067d9afffbf8e42fc576d5d08ad98e3c966e18921a9ac441edd384496d
                                    • Instruction ID: dc4be2456f6dbdeb552c72c41b5339a717677b52a12690580e1a67b1765cdfbc
                                    • Opcode Fuzzy Hash: 334297067d9afffbf8e42fc576d5d08ad98e3c966e18921a9ac441edd384496d
                                    • Instruction Fuzzy Hash: 34D01774514727DFDB209F32D94866676E6AF06351B11C83AA486D6690EA74C884CA60
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 856b354f7747c67e47414233793aa10adc36e098847ba8a9934f1ab151962a16
                                    • Instruction ID: 6e4ea7be23c04afa29a222f9df68878261cd600e550ee96b6130956d3ef729d8
                                    • Opcode Fuzzy Hash: 856b354f7747c67e47414233793aa10adc36e098847ba8a9934f1ab151962a16
                                    • Instruction Fuzzy Hash: 7FC11975A0421AEFCB14CF94C884EAEBBB6FF48714B15859DE906EB251D730ED81CB90
                                    APIs
                                    • CharLowerBuffW.USER32(?,?), ref: 006EE3D2
                                    • CharLowerBuffW.USER32(?,?), ref: 006EE415
                                      • Part of subcall function 006EDAB9: CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 006EDAD9
                                    • VirtualAlloc.KERNEL32(00000000,00000077,00003000,00000040), ref: 006EE615
                                    • _memmove.LIBCMT ref: 006EE628
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: BuffCharLower$AllocVirtual_memmove
                                    • String ID:
                                    • API String ID: 3659485706-0
                                    • Opcode ID: aa49b84805088ac0bcca9df1d76c0b15b63c50a1f27e92f641921af32fce2fb4
                                    • Instruction ID: 15eb699112319d90417bdbcc3556863cce0a7e30a4c0a941fe86c229996a85d7
                                    • Opcode Fuzzy Hash: aa49b84805088ac0bcca9df1d76c0b15b63c50a1f27e92f641921af32fce2fb4
                                    • Instruction Fuzzy Hash: 6BC18C71A08341CFC754DF29C48096ABBE6FF88714F14896EF8999B351D732E946CB82
                                    APIs
                                    • CoInitialize.OLE32(00000000), ref: 006E83D8
                                    • CoUninitialize.OLE32 ref: 006E83E3
                                      • Part of subcall function 006CDA5D: CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 006CDAC5
                                    • VariantInit.OLEAUT32(?), ref: 006E83EE
                                    • VariantClear.OLEAUT32(?), ref: 006E86BF
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: Variant$ClearCreateInitInitializeInstanceUninitialize
                                    • String ID:
                                    • API String ID: 780911581-0
                                    • Opcode ID: 9c2d150e4e1eb17330b15182dfb24a840ddd5f6610470459767d5ba0ff80f32b
                                    • Instruction ID: 8604e11bd105bc29bf3325acdf9d66a63e76d09873b2b9a7587d8625d6056866
                                    • Opcode Fuzzy Hash: 9c2d150e4e1eb17330b15182dfb24a840ddd5f6610470459767d5ba0ff80f32b
                                    • Instruction Fuzzy Hash: F7A158752047419FDB50DF15C485B6AB7E6BF88324F08845DFA9A9B3A2CB30ED00CB56
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: Variant$AllocClearCopyInitString
                                    • String ID:
                                    • API String ID: 2808897238-0
                                    • Opcode ID: fdd730b9acdb3879977dc5248e5908c91aa207c1afbf5223b2cbfb4be14fbe7b
                                    • Instruction ID: 0bd662b922d98060b34a8ee29d8306f241679b0ab04888279e61e2826f331534
                                    • Opcode Fuzzy Hash: fdd730b9acdb3879977dc5248e5908c91aa207c1afbf5223b2cbfb4be14fbe7b
                                    • Instruction Fuzzy Hash: 085191617087019BDB60AF69D895F7AB3E7EF48310F20881FF55ACB291DA709841DF19
                                    APIs
                                    • socket.WSOCK32(00000002,00000002,00000011), ref: 006E6CE4
                                    • WSAGetLastError.WSOCK32(00000000), ref: 006E6CF4
                                      • Part of subcall function 00679997: __itow.LIBCMT ref: 006799C2
                                      • Part of subcall function 00679997: __swprintf.LIBCMT ref: 00679A0C
                                    • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 006E6D58
                                    • WSAGetLastError.WSOCK32(00000000), ref: 006E6D64
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: ErrorLast$__itow__swprintfsocket
                                    • String ID:
                                    • API String ID: 2214342067-0
                                    • Opcode ID: cd4f6d49a409fd1f6277e3f2794b2f244288a08fc46edd82f12d8e7ae4589f89
                                    • Instruction ID: 0ce44d35cc368ba14aae2e882317911199e9a6418958b53e8d22332ef2d1d0ab
                                    • Opcode Fuzzy Hash: cd4f6d49a409fd1f6277e3f2794b2f244288a08fc46edd82f12d8e7ae4589f89
                                    • Instruction Fuzzy Hash: EA417E74740200AFEB60AF24DC86F7A77E69F44B20F44C41CFA599B2D2DA719D008B99
                                    APIs
                                    • #16.WSOCK32(?,?,00000000,00000000,00000000,00000000,?,?,00000000,006FF910), ref: 006E67BA
                                    • _strlen.LIBCMT ref: 006E67EC
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: _strlen
                                    • String ID:
                                    • API String ID: 4218353326-0
                                    • Opcode ID: 3f25783f8a8e12a5a8720ebbe604c63590dea0ede2dd05bf1832f1621a66d95e
                                    • Instruction ID: 2c2e36111840a64b8f8f50ba8e7acf70a42a531c476d66bdcb33b5016365ea38
                                    • Opcode Fuzzy Hash: 3f25783f8a8e12a5a8720ebbe604c63590dea0ede2dd05bf1832f1621a66d95e
                                    • Instruction Fuzzy Hash: 9F41B631901204ABCB54EB65DCC5EBEB3ABEF14354F14816DF51A97292DB709D00CB64
                                    APIs
                                    • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 006DBB09
                                    • GetLastError.KERNEL32(?,00000000), ref: 006DBB2F
                                    • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 006DBB54
                                    • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 006DBB80
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: CreateHardLink$DeleteErrorFileLast
                                    • String ID:
                                    • API String ID: 3321077145-0
                                    • Opcode ID: bd09b7e8fcf1e1be41dadb8cb3dc9b7373d31240d629d6b533c34dfbc9b0ded1
                                    • Instruction ID: 73320d9f4a8855ce02f5ae0acf32d54f14efbdc92a67b3bb2884e5933c579332
                                    • Opcode Fuzzy Hash: bd09b7e8fcf1e1be41dadb8cb3dc9b7373d31240d629d6b533c34dfbc9b0ded1
                                    • Instruction Fuzzy Hash: 5B412539600610DFCF11EF15C584A5DBBE2EF89320B09C499E94A9B366CB34FD01CBA5
                                    APIs
                                    • ClientToScreen.USER32(?,?), ref: 006FAE1A
                                    • GetWindowRect.USER32(?,?), ref: 006FAE90
                                    • PtInRect.USER32(?,?,006FC304), ref: 006FAEA0
                                    • MessageBeep.USER32(00000000), ref: 006FAF11
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: Rect$BeepClientMessageScreenWindow
                                    • String ID:
                                    • API String ID: 1352109105-0
                                    • Opcode ID: 8a9ffc971372f78386e6b332588a4e88ef49c8f1f43eb22e29f0d010178e3dc4
                                    • Instruction ID: 834d8c6773fa98e1c4f69173bf5d406f1b97969ef5695064db89cbe50485b03d
                                    • Opcode Fuzzy Hash: 8a9ffc971372f78386e6b332588a4e88ef49c8f1f43eb22e29f0d010178e3dc4
                                    • Instruction Fuzzy Hash: 87417EB4600219EFDB11CF98C884AB9BBF7FF88351F1481A9E618CB351D730A802DB52
                                    APIs
                                    • GetKeyboardState.USER32(?,00000000,?,00000001), ref: 006D1037
                                    • SetKeyboardState.USER32(00000080,?,00000001), ref: 006D1053
                                    • PostMessageW.USER32(00000000,00000102,00000001,00000001), ref: 006D10B9
                                    • SendInput.USER32(00000001,00000000,0000001C,00000000,?,00000001), ref: 006D110B
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: KeyboardState$InputMessagePostSend
                                    • String ID:
                                    • API String ID: 432972143-0
                                    • Opcode ID: 3df29db8c17964c41ccc3a299700bf5654f30d1ddeec0374b8e2e82679bdb395
                                    • Instruction ID: 3b53ac1b3547679ad7614ef3604c6994910a16ff312fc0a7c5df75c40add2f19
                                    • Opcode Fuzzy Hash: 3df29db8c17964c41ccc3a299700bf5654f30d1ddeec0374b8e2e82679bdb395
                                    • Instruction Fuzzy Hash: 76314D70E40688BEFB30AB658C05BF9BBABAF46310F04421BE5805A3D1CBB449C1D765
                                    APIs
                                    • GetKeyboardState.USER32(?,753DC0D0,?,00008000), ref: 006D1176
                                    • SetKeyboardState.USER32(00000080,?,00008000), ref: 006D1192
                                    • PostMessageW.USER32(00000000,00000101,00000000), ref: 006D11F1
                                    • SendInput.USER32(00000001,?,0000001C,753DC0D0,?,00008000), ref: 006D1243
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: KeyboardState$InputMessagePostSend
                                    • String ID:
                                    • API String ID: 432972143-0
                                    • Opcode ID: 5e84a161f7af7a3ae3016e3ee9c9fa0834257714ad841ce0dd7800993e0d04bb
                                    • Instruction ID: cad64c5220852954355cb3ca873d1872e58b73bdff9778b4de23bf213fae6e11
                                    • Opcode Fuzzy Hash: 5e84a161f7af7a3ae3016e3ee9c9fa0834257714ad841ce0dd7800993e0d04bb
                                    • Instruction Fuzzy Hash: 86312830E40618BAFF308B658C04BFABBABAB5A310F04431FE590DA7D1C3B58A95D755
                                    APIs
                                    • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 006A644B
                                    • __isleadbyte_l.LIBCMT ref: 006A6479
                                    • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 006A64A7
                                    • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 006A64DD
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                    • String ID:
                                    • API String ID: 3058430110-0
                                    • Opcode ID: f5655fc8453a6720c996b41ec7022badc619758c431688d66df54fa420ab87b4
                                    • Instruction ID: 769b4d903548d9b14553e9a6a41d0cd4121765084a9c901758f51791ae659bec
                                    • Opcode Fuzzy Hash: f5655fc8453a6720c996b41ec7022badc619758c431688d66df54fa420ab87b4
                                    • Instruction Fuzzy Hash: 3A31CF31604246AFDB21AF64C844AAA7BEAFF4A310F198029F85487291E731DC51DF90
                                    APIs
                                    • GetForegroundWindow.USER32 ref: 006F5189
                                      • Part of subcall function 006D387D: GetWindowThreadProcessId.USER32(00000000,00000000), ref: 006D3897
                                      • Part of subcall function 006D387D: GetCurrentThreadId.KERNEL32 ref: 006D389E
                                      • Part of subcall function 006D387D: AttachThreadInput.USER32(00000000,?,006D52A7), ref: 006D38A5
                                    • GetCaretPos.USER32(?), ref: 006F519A
                                    • ClientToScreen.USER32(00000000,?), ref: 006F51D5
                                    • GetForegroundWindow.USER32 ref: 006F51DB
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                    • String ID:
                                    • API String ID: 2759813231-0
                                    • Opcode ID: 725754a5395642f25ea2ed2bf0740d6be17f250c967b1e0e2998d2cd0a6d7e45
                                    • Instruction ID: c772d7d2cb9326001b82371b6a01127414b94deef3733dcfa612a3ff68f30844
                                    • Opcode Fuzzy Hash: 725754a5395642f25ea2ed2bf0740d6be17f250c967b1e0e2998d2cd0a6d7e45
                                    • Instruction Fuzzy Hash: 5C313E71D00108AFDB40EFA5C885DEFB7FAEF98300F10806AE515E7251EA759E05CBA4
                                    APIs
                                      • Part of subcall function 00672612: GetWindowLongW.USER32(?,000000EB), ref: 00672623
                                    • GetCursorPos.USER32(?), ref: 006FC7C2
                                    • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,006ABBFB,?,?,?,?,?), ref: 006FC7D7
                                    • GetCursorPos.USER32(?), ref: 006FC824
                                    • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,006ABBFB,?,?,?), ref: 006FC85E
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: Cursor$LongMenuPopupProcTrackWindow
                                    • String ID:
                                    • API String ID: 2864067406-0
                                    • Opcode ID: fdb337ec1a62c3ce1301831d3f7d8d83fa60e2103aaa1e67165fecee08779be4
                                    • Instruction ID: 12040065263ae03e8897ed798a9fcd08d3d9abbfb0f46b61ee1813afd33d1ee9
                                    • Opcode Fuzzy Hash: fdb337ec1a62c3ce1301831d3f7d8d83fa60e2103aaa1e67165fecee08779be4
                                    • Instruction Fuzzy Hash: CD31593560001CAFDB158F58C898EFA7BABFB49360F048069FA158B261C7369951DBA4
                                    APIs
                                    • __setmode.LIBCMT ref: 00690BF2
                                      • Part of subcall function 00675B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,006D7B20,?,?,00000000), ref: 00675B8C
                                      • Part of subcall function 00675B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,006D7B20,?,?,00000000,?,?), ref: 00675BB0
                                    • _fprintf.LIBCMT ref: 00690C29
                                    • OutputDebugStringW.KERNEL32(?), ref: 006C6331
                                      • Part of subcall function 00694CDA: _flsall.LIBCMT ref: 00694CF3
                                    • __setmode.LIBCMT ref: 00690C5E
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: ByteCharMultiWide__setmode$DebugOutputString_flsall_fprintf
                                    • String ID:
                                    • API String ID: 521402451-0
                                    • Opcode ID: 8e00236fd76e2d334882b829b24f17e859bfa858de03e0167c56c7d4b0354c90
                                    • Instruction ID: 4555dd0b15e456404f4928c43e4ccc2b3e24eadf55e4f6f4a2cfce69033dc625
                                    • Opcode Fuzzy Hash: 8e00236fd76e2d334882b829b24f17e859bfa858de03e0167c56c7d4b0354c90
                                    • Instruction Fuzzy Hash: 90110232904208BEEF44B3B49C46DBE7BAFDF45320F14415EF20897682DE61594283AD
                                    APIs
                                      • Part of subcall function 006C8652: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 006C8669
                                      • Part of subcall function 006C8652: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 006C8673
                                      • Part of subcall function 006C8652: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 006C8682
                                      • Part of subcall function 006C8652: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 006C8689
                                      • Part of subcall function 006C8652: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 006C869F
                                    • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 006C8BEB
                                    • _memcmp.LIBCMT ref: 006C8C0E
                                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 006C8C44
                                    • HeapFree.KERNEL32(00000000), ref: 006C8C4B
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                                    • String ID:
                                    • API String ID: 1592001646-0
                                    • Opcode ID: 2b7357774fa918e6dd2893890a7c1cc8a5e7288e214190642b1047231c897564
                                    • Instruction ID: f98e8bd48cdda9c1972d60468cbf9fa4c4eca7f5be92e61657b679ba017d54a4
                                    • Opcode Fuzzy Hash: 2b7357774fa918e6dd2893890a7c1cc8a5e7288e214190642b1047231c897564
                                    • Instruction Fuzzy Hash: 3C215772E01209AFDB20DFA4C945FFEB7BAEF44355F154099E554AB240DB31AE06CB60
                                    APIs
                                    • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 006E1A97
                                      • Part of subcall function 006E1B21: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 006E1B40
                                      • Part of subcall function 006E1B21: InternetCloseHandle.WININET(00000000), ref: 006E1BDD
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: Internet$CloseConnectHandleOpen
                                    • String ID:
                                    • API String ID: 1463438336-0
                                    • Opcode ID: 6c4161a1fd20a7536b06438d13912b3137cbc8a2196acac87795d656ec038bcb
                                    • Instruction ID: e62ac0087767ed6fd798ae7627e5a814c916c707b56d74aa7eaedb2f910880af
                                    • Opcode Fuzzy Hash: 6c4161a1fd20a7536b06438d13912b3137cbc8a2196acac87795d656ec038bcb
                                    • Instruction Fuzzy Hash: 9D21A435202745BFDB119F629C01FBAB7AFFF45701F10001AFA119A650E771E815EB94
                                    APIs
                                      • Part of subcall function 006CF5AD: lstrlenW.KERNEL32(?,00000002,?,?,000000EF,?,006CE1C4,?,?,?,006CEFB7,00000000,000000EF,00000119,?,?), ref: 006CF5BC
                                      • Part of subcall function 006CF5AD: lstrcpyW.KERNEL32(00000000,?,?,006CE1C4,?,?,?,006CEFB7,00000000,000000EF,00000119,?,?,00000000), ref: 006CF5E2
                                      • Part of subcall function 006CF5AD: lstrcmpiW.KERNEL32(00000000,?,006CE1C4,?,?,?,006CEFB7,00000000,000000EF,00000119,?,?), ref: 006CF613
                                    • lstrlenW.KERNEL32(?,00000002,?,?,?,?,006CEFB7,00000000,000000EF,00000119,?,?,00000000), ref: 006CE1DD
                                    • lstrcpyW.KERNEL32(00000000,?,?,006CEFB7,00000000,000000EF,00000119,?,?,00000000), ref: 006CE203
                                    • lstrcmpiW.KERNEL32(00000002,cdecl,?,006CEFB7,00000000,000000EF,00000119,?,?,00000000), ref: 006CE237
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: lstrcmpilstrcpylstrlen
                                    • String ID: cdecl
                                    • API String ID: 4031866154-3896280584
                                    • Opcode ID: 7bef18efd01e5ad992efbe9229e64802608a7feb98b34d9cf0d5bc6cfff97724
                                    • Instruction ID: b1580f8231cc2edb557660d62021ff556e0e447e5e0a44377ebac42dc1367677
                                    • Opcode Fuzzy Hash: 7bef18efd01e5ad992efbe9229e64802608a7feb98b34d9cf0d5bc6cfff97724
                                    • Instruction Fuzzy Hash: 2511BE36200305EFCB25AF64D845FBA77BAFF85350B40802EE906CB260EB769951D7A4
                                    APIs
                                    • _free.LIBCMT ref: 006A5351
                                      • Part of subcall function 0069594C: __FF_MSGBANNER.LIBCMT ref: 00695963
                                      • Part of subcall function 0069594C: __NMSG_WRITE.LIBCMT ref: 0069596A
                                      • Part of subcall function 0069594C: RtlAllocateHeap.NTDLL(015B0000,00000000,00000001,00000000,?,?,?,00691013,?), ref: 0069598F
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: AllocateHeap_free
                                    • String ID:
                                    • API String ID: 614378929-0
                                    • Opcode ID: d00e3c44e68c7c39c65ba48cefebcedfcaa7d32efb1fd019c96adbde1b37ebf8
                                    • Instruction ID: 9eaf9d54774d1f8baa9cb92ecb8deb216d1e579d81c215135b91f6e9f1eef8c0
                                    • Opcode Fuzzy Hash: d00e3c44e68c7c39c65ba48cefebcedfcaa7d32efb1fd019c96adbde1b37ebf8
                                    • Instruction Fuzzy Hash: E011E332504A15AFCF317F70AC446AE379FAF563A0B10442EF9069B690EEB68D418B94
                                    APIs
                                    • _memset.LIBCMT ref: 00674560
                                      • Part of subcall function 0067410D: _memset.LIBCMT ref: 0067418D
                                      • Part of subcall function 0067410D: _wcscpy.LIBCMT ref: 006741E1
                                      • Part of subcall function 0067410D: Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 006741F1
                                    • KillTimer.USER32(?,00000001,?,?), ref: 006745B5
                                    • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 006745C4
                                    • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 006AD6CE
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: IconNotifyShell_Timer_memset$Kill_wcscpy
                                    • String ID:
                                    • API String ID: 1378193009-0
                                    • Opcode ID: 4f90d04f8cdb2bb7e9fd43e15592368f267bc4680fb7e757057c4c71fcd9eaec
                                    • Instruction ID: 78a8f9a13af9e89f9e2fb3b680efcf21e28e8726f3fb3053ea12b46e4e946325
                                    • Opcode Fuzzy Hash: 4f90d04f8cdb2bb7e9fd43e15592368f267bc4680fb7e757057c4c71fcd9eaec
                                    • Instruction Fuzzy Hash: DF210770904794AFFB329B24D849BE7BBEE9F02304F00509DE69E56281C7745E85CF51
                                    APIs
                                    • CreateFileW.KERNEL32(?,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 006D40D1
                                    • _memset.LIBCMT ref: 006D40F2
                                    • DeviceIoControl.KERNEL32(00000000,0004D02C,?,00000200,?,00000200,?,00000000), ref: 006D4144
                                    • CloseHandle.KERNEL32(00000000), ref: 006D414D
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: CloseControlCreateDeviceFileHandle_memset
                                    • String ID:
                                    • API String ID: 1157408455-0
                                    • Opcode ID: 01282dec5954ee47b6b9271fcdda5b8626b33fa9d9c3d84398bbf670d30b44a3
                                    • Instruction ID: 1ede0f46c101a338f4cf015721aa83061d9faa868be1966e28a5c4e333ce25eb
                                    • Opcode Fuzzy Hash: 01282dec5954ee47b6b9271fcdda5b8626b33fa9d9c3d84398bbf670d30b44a3
                                    • Instruction Fuzzy Hash: 18119476D012287AD7309BA5AC4DFABBB7DEF44760F1041AAF908D7280D6744E80CBA4
                                    APIs
                                      • Part of subcall function 00675B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,006D7B20,?,?,00000000), ref: 00675B8C
                                      • Part of subcall function 00675B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,006D7B20,?,?,00000000,?,?), ref: 00675BB0
                                    • gethostbyname.WSOCK32(?,?,?), ref: 006E66AC
                                    • WSAGetLastError.WSOCK32(00000000), ref: 006E66B7
                                    • _memmove.LIBCMT ref: 006E66E4
                                    • inet_ntoa.WSOCK32(?), ref: 006E66EF
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: ByteCharMultiWide$ErrorLast_memmovegethostbynameinet_ntoa
                                    • String ID:
                                    • API String ID: 1504782959-0
                                    • Opcode ID: bb6b464765a09fccc80e662857197c25ceb7399c553f106b2fe3da7ef7174b0a
                                    • Instruction ID: 30bb0e3786e65467c952fd89ce388039794e4cbd7b8e15f49bb028b1857d9dae
                                    • Opcode Fuzzy Hash: bb6b464765a09fccc80e662857197c25ceb7399c553f106b2fe3da7ef7174b0a
                                    • Instruction Fuzzy Hash: 0C116335500609AFCB40FBA4DD96DEE77BAEF14310B148069F506A7261DF709E04CB65
                                    APIs
                                    • SendMessageW.USER32(?,000000B0,?,?), ref: 006C9043
                                    • SendMessageW.USER32(?,000000C9,?,00000000), ref: 006C9055
                                    • SendMessageW.USER32(?,000000C9,?,00000000), ref: 006C906B
                                    • SendMessageW.USER32(?,000000C9,?,00000000), ref: 006C9086
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: MessageSend
                                    • String ID:
                                    • API String ID: 3850602802-0
                                    • Opcode ID: 688295905960265ad16dc64ffb679b255b3b6c0ac7cbd64c99f5a275403170d5
                                    • Instruction ID: ec4bf5a83c5c6e89aa7388ef421e1ecf9cbae641b0bc36cf9397bf18212b1124
                                    • Opcode Fuzzy Hash: 688295905960265ad16dc64ffb679b255b3b6c0ac7cbd64c99f5a275403170d5
                                    • Instruction Fuzzy Hash: D9114C79A00218FFDB10DFA5C884FADBB75FB48310F204099E904B7250D6716E10DBA4
                                    APIs
                                      • Part of subcall function 00672612: GetWindowLongW.USER32(?,000000EB), ref: 00672623
                                    • DefDlgProcW.USER32(?,00000020,?), ref: 006712D8
                                    • GetClientRect.USER32(?,?), ref: 006AB84B
                                    • GetCursorPos.USER32(?), ref: 006AB855
                                    • ScreenToClient.USER32(?,?), ref: 006AB860
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: Client$CursorLongProcRectScreenWindow
                                    • String ID:
                                    • API String ID: 4127811313-0
                                    • Opcode ID: 026682f3415174e212e705e0ddf4bedf87979da344bc4af482e4127462fd3c4e
                                    • Instruction ID: 8965e1a2b03bc4d58643eddf7f6de72376844f4e3543f64b3dac2074e2eec33d
                                    • Opcode Fuzzy Hash: 026682f3415174e212e705e0ddf4bedf87979da344bc4af482e4127462fd3c4e
                                    • Instruction Fuzzy Hash: BE113D35500019BFCB00EFA8D8859FE77BAEF06301F108556F915E7252C730BA91CBA9
                                    APIs
                                    • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,006D01FD,?,006D1250,?,00008000), ref: 006D166F
                                    • Sleep.KERNEL32(00000000,?,?,?,?,?,?,006D01FD,?,006D1250,?,00008000), ref: 006D1694
                                    • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,006D01FD,?,006D1250,?,00008000), ref: 006D169E
                                    • Sleep.KERNEL32(?,?,?,?,?,?,?,006D01FD,?,006D1250,?,00008000), ref: 006D16D1
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: CounterPerformanceQuerySleep
                                    • String ID:
                                    • API String ID: 2875609808-0
                                    • Opcode ID: 8b94e007ed98e1980c607474e8709c583f263587b3ae48c1514842bb5753d27e
                                    • Instruction ID: 75fc3cbd78fe156075816cef730c7f655365153817d85770e923653944d687ae
                                    • Opcode Fuzzy Hash: 8b94e007ed98e1980c607474e8709c583f263587b3ae48c1514842bb5753d27e
                                    • Instruction Fuzzy Hash: C7111831C0055DEBCF009FA5D948AEEBB79FF4A751F15409AEA40BA340CB709561CB96
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                    • String ID:
                                    • API String ID: 3016257755-0
                                    • Opcode ID: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                    • Instruction ID: 7a5a5fd6d40cf32bb5532977263b1f96bce123ffd225d3e3cd77fe424454949a
                                    • Opcode Fuzzy Hash: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                    • Instruction Fuzzy Hash: 28018C3204814ABBCF526E84DC019EE3F67BF2A340F088615FA1858131D337CAB1AF85
                                    APIs
                                    • GetWindowRect.USER32(?,?), ref: 006FB59E
                                    • ScreenToClient.USER32(?,?), ref: 006FB5B6
                                    • ScreenToClient.USER32(?,?), ref: 006FB5DA
                                    • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 006FB5F5
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: ClientRectScreen$InvalidateWindow
                                    • String ID:
                                    • API String ID: 357397906-0
                                    • Opcode ID: 0c1adf45aba4cdc9007bf200900c7285725a762d7c7542ac9030435cd38d7afa
                                    • Instruction ID: b38e516198bf12734d4925b97e4ff8b7f82b65f4931916c51420b2a5301c2e2a
                                    • Opcode Fuzzy Hash: 0c1adf45aba4cdc9007bf200900c7285725a762d7c7542ac9030435cd38d7afa
                                    • Instruction Fuzzy Hash: 511134B9D00209EFDB41CF99C4849EEBBB5FF08310F105166E914E2220DB35AA55CF50
                                    APIs
                                    • _memset.LIBCMT ref: 006FB8FE
                                    • _memset.LIBCMT ref: 006FB90D
                                    • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,00737F20,00737F64), ref: 006FB93C
                                    • CloseHandle.KERNEL32 ref: 006FB94E
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: _memset$CloseCreateHandleProcess
                                    • String ID:
                                    • API String ID: 3277943733-0
                                    • Opcode ID: 84a6c3d59bedcd5d6bb6f93f03ba8e0eb62431e60615348bc0a1e42d7fc75f9e
                                    • Instruction ID: bfedb260e9f7114c8f1092ba2551164e135bd8ff47de068f87a32a750f11eca2
                                    • Opcode Fuzzy Hash: 84a6c3d59bedcd5d6bb6f93f03ba8e0eb62431e60615348bc0a1e42d7fc75f9e
                                    • Instruction Fuzzy Hash: 23F03AF254431A7BF6202765AC06FBB3A9DEB09355F009020BA08D5292D7794912C7AC
                                    APIs
                                    • EnterCriticalSection.KERNEL32(?), ref: 006D6E88
                                      • Part of subcall function 006D794E: _memset.LIBCMT ref: 006D7983
                                    • _memmove.LIBCMT ref: 006D6EAB
                                    • _memset.LIBCMT ref: 006D6EB8
                                    • LeaveCriticalSection.KERNEL32(?), ref: 006D6EC8
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: CriticalSection_memset$EnterLeave_memmove
                                    • String ID:
                                    • API String ID: 48991266-0
                                    • Opcode ID: 019e535366cc4da0e26fa25ba3189e66744431523d8ac63d1a6124c1d5ac851d
                                    • Instruction ID: 0f571f91429596542fa39509bb0f363e676b531b6c4cade3a38e0bcc4cef7b6b
                                    • Opcode Fuzzy Hash: 019e535366cc4da0e26fa25ba3189e66744431523d8ac63d1a6124c1d5ac851d
                                    • Instruction Fuzzy Hash: 68F0543A100210ABCF416F55DC85A59BB2BEF45320B048065FE085F21AC731A911DBB9
                                    APIs
                                      • Part of subcall function 006712F3: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 0067134D
                                      • Part of subcall function 006712F3: SelectObject.GDI32(?,00000000), ref: 0067135C
                                      • Part of subcall function 006712F3: BeginPath.GDI32(?), ref: 00671373
                                      • Part of subcall function 006712F3: SelectObject.GDI32(?,00000000), ref: 0067139C
                                    • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 006FC030
                                    • LineTo.GDI32(00000000,?,?), ref: 006FC03D
                                    • EndPath.GDI32(00000000), ref: 006FC04D
                                    • StrokePath.GDI32(00000000), ref: 006FC05B
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                                    • String ID:
                                    • API String ID: 1539411459-0
                                    • Opcode ID: 20a97e9e52e265eb6145bd8005fc9e9f0ab58014cdbfd2766acfdb5348918460
                                    • Instruction ID: 2e423c22cd778edf575984236d6f646f920af1cc6143e55fbe7a9fe18df59db5
                                    • Opcode Fuzzy Hash: 20a97e9e52e265eb6145bd8005fc9e9f0ab58014cdbfd2766acfdb5348918460
                                    • Instruction Fuzzy Hash: CFF05E3100525DBBDB126F54AC09FEE3F5AAF0A321F048010FB11651E28BB95661DFA9
                                    APIs
                                    • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 006CA399
                                    • GetWindowThreadProcessId.USER32(?,00000000), ref: 006CA3AC
                                    • GetCurrentThreadId.KERNEL32 ref: 006CA3B3
                                    • AttachThreadInput.USER32(00000000), ref: 006CA3BA
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                    • String ID:
                                    • API String ID: 2710830443-0
                                    • Opcode ID: a55b4c5181e287479ba3a3b4b42d431f25c8e4c1f4e53f3746f2db57ec7d088c
                                    • Instruction ID: 02eba31dbc1224bd26b21291d0ff840615ccef192d697b30b8fe563c2c527aae
                                    • Opcode Fuzzy Hash: a55b4c5181e287479ba3a3b4b42d431f25c8e4c1f4e53f3746f2db57ec7d088c
                                    • Instruction Fuzzy Hash: EDE03931145268BADB205BA2DC0CFF73F1EEF167A1F008028F908C80A0CA718941CBA0
                                    APIs
                                    • GetSysColor.USER32(00000008), ref: 00672231
                                    • SetTextColor.GDI32(?,000000FF), ref: 0067223B
                                    • SetBkMode.GDI32(?,00000001), ref: 00672250
                                    • GetStockObject.GDI32(00000005), ref: 00672258
                                    • GetWindowDC.USER32(?,00000000), ref: 006AC0D3
                                    • GetPixel.GDI32(00000000,00000000,00000000), ref: 006AC0E0
                                    • GetPixel.GDI32(00000000,?,00000000), ref: 006AC0F9
                                    • GetPixel.GDI32(00000000,00000000,?), ref: 006AC112
                                    • GetPixel.GDI32(00000000,?,?), ref: 006AC132
                                    • ReleaseDC.USER32(?,00000000), ref: 006AC13D
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: Pixel$Color$ModeObjectReleaseStockTextWindow
                                    • String ID:
                                    • API String ID: 1946975507-0
                                    • Opcode ID: 5fb60aa0953e1160cdecfd3020385a5b0a5d6805046454a4352c9fa315455abf
                                    • Instruction ID: 936aa632a946fc0c71e481a6addf818fed7ea2bb9f7b9ce876608f7be370999f
                                    • Opcode Fuzzy Hash: 5fb60aa0953e1160cdecfd3020385a5b0a5d6805046454a4352c9fa315455abf
                                    • Instruction Fuzzy Hash: CEE0C932604244EADB219F64EC497E87B16AB16336F148366FA69581E187724990DB11
                                    APIs
                                    • GetCurrentThread.KERNEL32 ref: 006C8C63
                                    • OpenThreadToken.ADVAPI32(00000000,?,?,?,006C882E), ref: 006C8C6A
                                    • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,006C882E), ref: 006C8C77
                                    • OpenProcessToken.ADVAPI32(00000000,?,?,?,006C882E), ref: 006C8C7E
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: CurrentOpenProcessThreadToken
                                    • String ID:
                                    • API String ID: 3974789173-0
                                    • Opcode ID: f44c88e29940422886c96ca2b830910bd092784e446a42551e5aacb225246677
                                    • Instruction ID: cedf9b740377978d0f76d15cbe51e7f7de11065c606c8bc7b5773d1a04a84927
                                    • Opcode Fuzzy Hash: f44c88e29940422886c96ca2b830910bd092784e446a42551e5aacb225246677
                                    • Instruction Fuzzy Hash: D5E08C36642311EFD7205FB0AD0DFB63BAEEF51792F085838B286CA080EA348441CB61
                                    APIs
                                    • GetDesktopWindow.USER32 ref: 006B2187
                                    • GetDC.USER32(00000000), ref: 006B2191
                                    • GetDeviceCaps.GDI32(00000000,0000000C), ref: 006B21B1
                                    • ReleaseDC.USER32(?), ref: 006B21D2
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: CapsDesktopDeviceReleaseWindow
                                    • String ID:
                                    • API String ID: 2889604237-0
                                    • Opcode ID: 30563d0d84d2770e8375c2ca49aaf50bb6d5117fc7c3491856687aac36232d9f
                                    • Instruction ID: 4313c96144a13a1a88af9b1a833563f628f61a5e64f6fd6f090f3af2bd952685
                                    • Opcode Fuzzy Hash: 30563d0d84d2770e8375c2ca49aaf50bb6d5117fc7c3491856687aac36232d9f
                                    • Instruction Fuzzy Hash: 13E0CAB5800204AFDB019FA0C848AAD7BF2EF48360F108429E95AE6220CB398182EF40
                                    APIs
                                    • GetDesktopWindow.USER32 ref: 006B219B
                                    • GetDC.USER32(00000000), ref: 006B21A5
                                    • GetDeviceCaps.GDI32(00000000,0000000C), ref: 006B21B1
                                    • ReleaseDC.USER32(?), ref: 006B21D2
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: CapsDesktopDeviceReleaseWindow
                                    • String ID:
                                    • API String ID: 2889604237-0
                                    • Opcode ID: 58a89249fbc55b030cc4a5088b94aee97100a77ffa0c642ba20206e323ed87e7
                                    • Instruction ID: 58bfe058b41a0eb4b6dd3cdea0b66b4d05f2704e3f91819746d226caa83d5539
                                    • Opcode Fuzzy Hash: 58a89249fbc55b030cc4a5088b94aee97100a77ffa0c642ba20206e323ed87e7
                                    • Instruction Fuzzy Hash: 7BE0EEB5800204AFCF019FA0C8486AD7BF2EF4C320F108029F95AE7220CF399142DF40
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: %p
                                    • API String ID: 0-1556559175
                                    • Opcode ID: 507997103755a28d22bf8b530705f8f970e84e3b0510b369b6823224087d77e9
                                    • Instruction ID: 77f74b701b332435b085a83fa2eb2bc481dc21bfa5c829c673b290a6f0041c9c
                                    • Opcode Fuzzy Hash: 507997103755a28d22bf8b530705f8f970e84e3b0510b369b6823224087d77e9
                                    • Instruction Fuzzy Hash: F2B1B17180050A9BCF14EF98C8819FDB7B6EF44310F54C16AF90AA7295EB359E82CB65
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: __itow_s
                                    • String ID: xrs$xrs
                                    • API String ID: 3653519197-465849748
                                    • Opcode ID: 54e5b3033e84d4482e0b31d33a06708af23190463a2d8504392193399d10202e
                                    • Instruction ID: 292217d252249bb4771cf9d9536c7d361ffe094facac95388280e8337aceafde
                                    • Opcode Fuzzy Hash: 54e5b3033e84d4482e0b31d33a06708af23190463a2d8504392193399d10202e
                                    • Instruction Fuzzy Hash: 95B17E70A00249EFDB14DF55C881DAEB7FAFF58300F149469F9459B292EB70EA41CB64
                                    APIs
                                      • Part of subcall function 0068FEC6: _wcscpy.LIBCMT ref: 0068FEE9
                                      • Part of subcall function 00679997: __itow.LIBCMT ref: 006799C2
                                      • Part of subcall function 00679997: __swprintf.LIBCMT ref: 00679A0C
                                    • __wcsnicmp.LIBCMT ref: 006DB298
                                    • WNetUseConnectionW.MPR(00000000,?,?,00000000,?,?,00000100,?), ref: 006DB361
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: Connection__itow__swprintf__wcsnicmp_wcscpy
                                    • String ID: LPT
                                    • API String ID: 3222508074-1350329615
                                    • Opcode ID: 6ff1202bcf7422bfb6a0f457f5edbf62b94dafadcd607e25bd4b5c7cc1f1ca2f
                                    • Instruction ID: a9ae044fa9f22fe791af59554bc9710150f1477b8b8aef3f6659679ef0e0ad61
                                    • Opcode Fuzzy Hash: 6ff1202bcf7422bfb6a0f457f5edbf62b94dafadcd607e25bd4b5c7cc1f1ca2f
                                    • Instruction Fuzzy Hash: 53616E75E00215EFCB14DB94C881EAEB7F6AF48310F16915AF506AB391DB70AE40DB94
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: _memmove
                                    • String ID: Oah
                                    • API String ID: 4104443479-3137904739
                                    • Opcode ID: 36e9a697a148e0b04d02d90bb8fb97fa5ba96cc60a1cecb2d8038a8848d8e05a
                                    • Instruction ID: 8c72ed7ec19fd9e5142aad6cede581e6750282b87ec91be9af00f42361d9c3f9
                                    • Opcode Fuzzy Hash: 36e9a697a148e0b04d02d90bb8fb97fa5ba96cc60a1cecb2d8038a8848d8e05a
                                    • Instruction Fuzzy Hash: 33512EB0A00619DFCB64CF68C480AEEB7F6FF44314F14856AE85AD7350EB31A995CB51
                                    APIs
                                    • Sleep.KERNEL32(00000000), ref: 00682AC8
                                    • GlobalMemoryStatusEx.KERNEL32(?), ref: 00682AE1
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: GlobalMemorySleepStatus
                                    • String ID: @
                                    • API String ID: 2783356886-2766056989
                                    • Opcode ID: 967cdebbf4a4769be209a695f03bc273c3715fc793cb3e57d1248bf45bab0a7a
                                    • Instruction ID: 9ce4dc1441c8322b3c02795fe3cb0f739dbfc7d038954aeabc4cba377a61d331
                                    • Opcode Fuzzy Hash: 967cdebbf4a4769be209a695f03bc273c3715fc793cb3e57d1248bf45bab0a7a
                                    • Instruction Fuzzy Hash: 615144724287449BD360AF14DC86BAFBBF8FF85314F82885DF1D9411A5DB308529CB2A
                                    APIs
                                      • Part of subcall function 0067506B: __fread_nolock.LIBCMT ref: 00675089
                                    • _wcscmp.LIBCMT ref: 006D9AAE
                                    • _wcscmp.LIBCMT ref: 006D9AC1
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: _wcscmp$__fread_nolock
                                    • String ID: FILE
                                    • API String ID: 4029003684-3121273764
                                    • Opcode ID: 131502369f56ecf4fac32d75b4faafd4348b7b0dd1e2892ef98f1824c3bcd475
                                    • Instruction ID: f8a9ca88979c2b99116d97a8f4283dfcc210d79163502759cc1bd01da71912ad
                                    • Opcode Fuzzy Hash: 131502369f56ecf4fac32d75b4faafd4348b7b0dd1e2892ef98f1824c3bcd475
                                    • Instruction Fuzzy Hash: D041D671A00619BADF209AA0DC85FEFBBBEDF45710F01406EB905B7281DAB59E0487A5
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: ClearVariant
                                    • String ID: Dts$Dts
                                    • API String ID: 1473721057-3648379613
                                    • Opcode ID: ee98be42a82d370e8b79ca62af19ae4a04cca09ce4676459230ce077a3c81ba1
                                    • Instruction ID: 0d9a8795173b141372775cd76141b50f9b89cc13adbcdecd1f72b8463e7c52a0
                                    • Opcode Fuzzy Hash: ee98be42a82d370e8b79ca62af19ae4a04cca09ce4676459230ce077a3c81ba1
                                    • Instruction Fuzzy Hash: E251D5B4608341DFD764CF59C480A5ABBF2BB99354F54895CE9898B321D732E881CB52
                                    APIs
                                    • _memset.LIBCMT ref: 006E2892
                                    • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 006E28C8
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: CrackInternet_memset
                                    • String ID: |
                                    • API String ID: 1413715105-2343686810
                                    • Opcode ID: afc503b68b70d1fd67df8d51cbb0aed0b90e69d02d002e6ad8b845b979ac941a
                                    • Instruction ID: 48b963821f355b14d7c3fc362674b5b01cbe804cfc87a737426130c5b55a15aa
                                    • Opcode Fuzzy Hash: afc503b68b70d1fd67df8d51cbb0aed0b90e69d02d002e6ad8b845b979ac941a
                                    • Instruction Fuzzy Hash: 7431417180121AAFCF41DFA1CC85EEEBFBAFF08300F104069F815A6266DB315956DB60
                                    APIs
                                    • DestroyWindow.USER32(?,?,?,?), ref: 006F6D86
                                    • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 006F6DC2
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: Window$DestroyMove
                                    • String ID: static
                                    • API String ID: 2139405536-2160076837
                                    • Opcode ID: 73a7b9a50b352bd10a519b01dc956860dc930b96115d302704172f173d9b690e
                                    • Instruction ID: 3e40a957eb15b6ea370b23c463fd7001ce093106831fd1f728f018e1952163a6
                                    • Opcode Fuzzy Hash: 73a7b9a50b352bd10a519b01dc956860dc930b96115d302704172f173d9b690e
                                    • Instruction Fuzzy Hash: 3031A171200208AEDB109F34CC40AFB77BAFF48720F10961DF9A987290CB71AC51CB64
                                    APIs
                                    • _memset.LIBCMT ref: 006D2E00
                                    • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 006D2E3B
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: InfoItemMenu_memset
                                    • String ID: 0
                                    • API String ID: 2223754486-4108050209
                                    • Opcode ID: 2ef0aed8d26114599cf11ac7d9e6aea6ff55ad2bc79ce9e7dadb5f7fd9977a2a
                                    • Instruction ID: e46148b60bd59869044d3b2704483ef1b853757b00a7d804de76d52065639ff1
                                    • Opcode Fuzzy Hash: 2ef0aed8d26114599cf11ac7d9e6aea6ff55ad2bc79ce9e7dadb5f7fd9977a2a
                                    • Instruction Fuzzy Hash: E831D531E0030AABEB248F58C985BEEBBBBEF55350F14442FE985973A1E7709941CB54
                                    APIs
                                      • Part of subcall function 0068619A: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 006861B1
                                    • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 006CB03B
                                    • _strlen.LIBCMT ref: 006CB046
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: MessageSend$Timeout_strlen
                                    • String ID: @U=u
                                    • API String ID: 2777139624-2594219639
                                    • Opcode ID: 911fa302d70e237d440fd505d693bfcc19539df7ec26049f467d122de5439669
                                    • Instruction ID: 12e442b5db271e430134d64fc653876530a5f8896bdad1f61d945d50e08e4fd5
                                    • Opcode Fuzzy Hash: 911fa302d70e237d440fd505d693bfcc19539df7ec26049f467d122de5439669
                                    • Instruction Fuzzy Hash: 3E11C33170420566CB54AA789883FBF7B6FDF45700F10106EFA1A9A293DE2689459258
                                    APIs
                                      • Part of subcall function 006D589F: GetLocalTime.KERNEL32 ref: 006D58AC
                                      • Part of subcall function 006D589F: _wcsncpy.LIBCMT ref: 006D58E1
                                      • Part of subcall function 006D589F: _wcsncpy.LIBCMT ref: 006D5913
                                      • Part of subcall function 006D589F: _wcsncpy.LIBCMT ref: 006D5946
                                      • Part of subcall function 006D589F: _wcsncpy.LIBCMT ref: 006D5988
                                    • SendMessageW.USER32(?,00001002,00000000,?), ref: 006F6B6E
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: _wcsncpy$LocalMessageSendTime
                                    • String ID: @U=u$SysDateTimePick32
                                    • API String ID: 2466184910-2530228043
                                    • Opcode ID: f7f5295d7b54f31432de569d274e73d8e6266395f78ea34821dc54483d65ea43
                                    • Instruction ID: 1bd14117a7ecac00f2ffd157a7dcacf005aec61220fed87f4ab0dbb3c20074f4
                                    • Opcode Fuzzy Hash: f7f5295d7b54f31432de569d274e73d8e6266395f78ea34821dc54483d65ea43
                                    • Instruction Fuzzy Hash: D121063134020D7FEF219E24CC82FFA736AEB54760F104519FA50EB2D0D6B1AC519BA0
                                    APIs
                                    • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 006C9720
                                      • Part of subcall function 006D18EE: GetWindowThreadProcessId.USER32(?,?), ref: 006D1919
                                      • Part of subcall function 006D18EE: OpenProcess.KERNEL32(00000438,00000000,?,?,?,006C973C,00000034,?,?,00001004,00000000,00000000), ref: 006D1929
                                      • Part of subcall function 006D18EE: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,006C973C,00000034,?,?,00001004,00000000,00000000), ref: 006D193F
                                      • Part of subcall function 006D19CC: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,006C9778,?,?,00000034,00000800,?,00000034), ref: 006D19F6
                                    • SendMessageW.USER32(?,00001073,00000000,?), ref: 006C9787
                                      • Part of subcall function 006D1997: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,006C97A7,?,?,00000800,?,00001073,00000000,?,?), ref: 006D19C1
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: Process$MemoryMessageSend$AllocOpenReadThreadVirtualWindowWrite
                                    • String ID: @U=u
                                    • API String ID: 1045663743-2594219639
                                    • Opcode ID: 1bcd026ec4e1245609eae7769618d2b4c01d09cad548fbbd7718c5193926cbb5
                                    • Instruction ID: 60e5ce7ea9ab01a49c0d6ae8d9c7c18ecada4abfe816373424eaa0c975479d11
                                    • Opcode Fuzzy Hash: 1bcd026ec4e1245609eae7769618d2b4c01d09cad548fbbd7718c5193926cbb5
                                    • Instruction Fuzzy Hash: F2215131902129ABDF51EFA4CC45FE9BBBAFF09350F1001A9F944EB290DA715A44DBA4
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: _wcscmp
                                    • String ID: g$g
                                    • API String ID: 856254489-2431062506
                                    • Opcode ID: ca3ab316ddfb4623b7714a5f984974613f76d9099da4567b19bb8db169cdcd42
                                    • Instruction ID: b8d82fab3ca9147f86c618557fe877f386c13dbaa0109d0fb962b14ca0699ab9
                                    • Opcode Fuzzy Hash: ca3ab316ddfb4623b7714a5f984974613f76d9099da4567b19bb8db169cdcd42
                                    • Instruction Fuzzy Hash: 8721B172808346DFC71ADF69D891599FFBAEF57310F09809AC8589F2A2E3319D41CB51
                                    APIs
                                    • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 006F69D0
                                    • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 006F69DB
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: MessageSend
                                    • String ID: Combobox
                                    • API String ID: 3850602802-2096851135
                                    • Opcode ID: 7b23e649f99b3745d2bd9a1fa711cf6390d43c983d4c4e2aad2a5076b932fbfe
                                    • Instruction ID: e6ddfc7fa089adb38fdcf403aea4697ce53ea112dae6314182900585351c8594
                                    • Opcode Fuzzy Hash: 7b23e649f99b3745d2bd9a1fa711cf6390d43c983d4c4e2aad2a5076b932fbfe
                                    • Instruction Fuzzy Hash: C211827160420E7FEF119F24CC90EFB376BEB993A4F114129FA589B390D6B59C518BA0
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: @U=u
                                    • API String ID: 0-2594219639
                                    • Opcode ID: b8e4cd2b7b4f356caa52997e25d53b202be748eb479f30855853701e809a6d67
                                    • Instruction ID: 3bcf5a9a1b9d30e211219ccf2ebd06b70fe101193b0e86b89ab2403e73593af9
                                    • Opcode Fuzzy Hash: b8e4cd2b7b4f356caa52997e25d53b202be748eb479f30855853701e809a6d67
                                    • Instruction Fuzzy Hash: 8E218C3120810CBFEB109F648C41FFA37A6EB0A310F044159FB16EA2E1D6B09951DB74
                                    APIs
                                      • Part of subcall function 00671D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00671D73
                                      • Part of subcall function 00671D35: GetStockObject.GDI32(00000011), ref: 00671D87
                                      • Part of subcall function 00671D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00671D91
                                    • GetWindowRect.USER32(00000000,?), ref: 006F6EE0
                                    • GetSysColor.USER32(00000012), ref: 006F6EFA
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: Window$ColorCreateMessageObjectRectSendStock
                                    • String ID: static
                                    • API String ID: 1983116058-2160076837
                                    • Opcode ID: fd7fb3fd1eee598e3ad37b5f5f25c54af8dfe73eec407ed40602044c2d7b2193
                                    • Instruction ID: 3d807b0490963cc84863865ded239abb1f1d001227e3291e64b465231ea43b53
                                    • Opcode Fuzzy Hash: fd7fb3fd1eee598e3ad37b5f5f25c54af8dfe73eec407ed40602044c2d7b2193
                                    • Instruction Fuzzy Hash: 0C215972610209AFDB04DFB8DC45AFA7BBAFF08314F004629FA55D3250D634E861DB50
                                    APIs
                                    • _memset.LIBCMT ref: 006D2F11
                                    • GetMenuItemInfoW.USER32(00000030,?,00000000,00000030), ref: 006D2F30
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: InfoItemMenu_memset
                                    • String ID: 0
                                    • API String ID: 2223754486-4108050209
                                    • Opcode ID: 8dd047538d23de0c22970e13e4b31151462d1e7367c92a6899cb7ea1f490a8c5
                                    • Instruction ID: 1d74629f7e858446f345ff597ec533003cbe3edc4dcc66025986097b5f09b690
                                    • Opcode Fuzzy Hash: 8dd047538d23de0c22970e13e4b31151462d1e7367c92a6899cb7ea1f490a8c5
                                    • Instruction Fuzzy Hash: 3C11E231D01226ABDB21DB98DD54BE977BBEB29310F0480B7E844E73A0D7B0AD06C795
                                    APIs
                                    • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 006E2520
                                    • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 006E2549
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: Internet$OpenOption
                                    • String ID: <local>
                                    • API String ID: 942729171-4266983199
                                    • Opcode ID: a62630d77078d79595f8fb1a24a56193a298e4f0d8d420ed2b4fa62143085069
                                    • Instruction ID: 0dca517a6e8857eebe1e434cec3fc48216a79b4098028954611579990142ee6b
                                    • Opcode Fuzzy Hash: a62630d77078d79595f8fb1a24a56193a298e4f0d8d420ed2b4fa62143085069
                                    • Instruction Fuzzy Hash: F811C170102366FADB248F528CA8EFBFFAFFF05351F10812AF50546140D2705985DAA0
                                    APIs
                                    • SendMessageW.USER32(?,?,?,?), ref: 006F879F
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: MessageSend
                                    • String ID: @U=u
                                    • API String ID: 3850602802-2594219639
                                    • Opcode ID: 5bc66d645f6a250a9e50851c551074395be90e652cd36e9891704f7dc05ed670
                                    • Instruction ID: d713c66f35d64dd40b5a551db74d208ca921c801071f0f4022d1414b5a622b78
                                    • Opcode Fuzzy Hash: 5bc66d645f6a250a9e50851c551074395be90e652cd36e9891704f7dc05ed670
                                    • Instruction Fuzzy Hash: EC21D37A60410EEF8B15DF98D8809EE7BB6FB4D340B104198FE05A3320DA31AD61DBA0
                                    APIs
                                    • SendMessageW.USER32(?,00000401,?,00000000), ref: 006F689B
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: MessageSend
                                    • String ID: @U=u$button
                                    • API String ID: 3850602802-1762282863
                                    • Opcode ID: f30cbad6457008402573bdb673dc2ea440fce089264dda5afcda5d76cd17c7ec
                                    • Instruction ID: d0473cd483a562faaddf79ab88f1a34e8ecd8f2f18ee27d857b6a0862e73ceed
                                    • Opcode Fuzzy Hash: f30cbad6457008402573bdb673dc2ea440fce089264dda5afcda5d76cd17c7ec
                                    • Instruction Fuzzy Hash: D211CE32140209ABDF118F60CC41BFA376BEF58354F11411CFB64A6290C776E891AB60
                                    APIs
                                    • SendMessageW.USER32(?,0000133E,00000000,?), ref: 006F7B47
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: MessageSend
                                    • String ID: @U=u
                                    • API String ID: 3850602802-2594219639
                                    • Opcode ID: 637fa28e85bea43fd83aa626d65b6248a5bd6ae69bffef63dfb97af09a15c7a5
                                    • Instruction ID: 7db676737aa7ec3747dc741a7303f5f6b0729c954a9f73a1fb64c5df20cd848b
                                    • Opcode Fuzzy Hash: 637fa28e85bea43fd83aa626d65b6248a5bd6ae69bffef63dfb97af09a15c7a5
                                    • Instruction Fuzzy Hash: 82118130508748AFD720DF74C891AF7B7EABF06310F10851DEAAA97391DB716941DB60
                                    APIs
                                      • Part of subcall function 006E830B: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,006E80C8,?,00000000,?,?), ref: 006E8322
                                    • inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 006E80CB
                                    • htons.WSOCK32(00000000,?,00000000), ref: 006E8108
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: ByteCharMultiWidehtonsinet_addr
                                    • String ID: 255.255.255.255
                                    • API String ID: 2496851823-2422070025
                                    • Opcode ID: c5e78944cef1b028805c080dd0a148b734605c929fa515e42f8665beed94a0c5
                                    • Instruction ID: 85749aaa17cf3d6828134b81189e18dc9e4fec0e0d30b58361a81c77e71fbeb9
                                    • Opcode Fuzzy Hash: c5e78944cef1b028805c080dd0a148b734605c929fa515e42f8665beed94a0c5
                                    • Instruction Fuzzy Hash: AB11E574500345AFDB10AFA5DC46FFDB326FF14310F10852AF91997391DA71A805C659
                                    APIs
                                      • Part of subcall function 006D19CC: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,006C9778,?,?,00000034,00000800,?,00000034), ref: 006D19F6
                                    • SendMessageW.USER32(?,0000102B,?,00000000), ref: 006C99EB
                                    • SendMessageW.USER32(?,0000102B,?,00000000), ref: 006C9A10
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: MessageSend$MemoryProcessWrite
                                    • String ID: @U=u
                                    • API String ID: 1195347164-2594219639
                                    • Opcode ID: a927fa8af54371a88d6b44336a74c006c9ed531a346b0c0bc235ec089f1111c5
                                    • Instruction ID: 15c6a3adf79d25f9a75343b5d6c0382229d0bd4fd4daf80c4323bdbe5ec3dfc5
                                    • Opcode Fuzzy Hash: a927fa8af54371a88d6b44336a74c006c9ed531a346b0c0bc235ec089f1111c5
                                    • Instruction Fuzzy Hash: 03012B32900218EBDB21AB64DC46FFABB7ADF04320F00016EF911A71D1DB705E54CB60
                                    APIs
                                    • GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,00673C26,007362F8,?,?,?), ref: 00680ACE
                                      • Part of subcall function 00677D2C: _memmove.LIBCMT ref: 00677D66
                                    • _wcscat.LIBCMT ref: 006B50E1
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: FullNamePath_memmove_wcscat
                                    • String ID: cs
                                    • API String ID: 257928180-1676512382
                                    • Opcode ID: 78665708ab81a18af27f88a1412e20ad858ff4ec1f0f41a27a64f79605580c42
                                    • Instruction ID: 03452ba661e5641d749243276a709f227df82d59e7974228767b4aa953113366
                                    • Opcode Fuzzy Hash: 78665708ab81a18af27f88a1412e20ad858ff4ec1f0f41a27a64f79605580c42
                                    • Instruction Fuzzy Hash: 1711A535904208AADB90FBA4CC01ED973BAEF08340F0085A9B98DD7251EA74DB888B65
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: __fread_nolock_memmove
                                    • String ID: EA06
                                    • API String ID: 1988441806-3962188686
                                    • Opcode ID: 21579c060a7c7f380869b282dbd081ffc34eec2b05e8b8048fc671ceb145aa88
                                    • Instruction ID: 56d7eeeb88c79b21b826e2656af6ad14c3f43250d626c3722bce82cf1dd3ddf4
                                    • Opcode Fuzzy Hash: 21579c060a7c7f380869b282dbd081ffc34eec2b05e8b8048fc671ceb145aa88
                                    • Instruction Fuzzy Hash: 9001F971C042687EDF69C6A8D816EFE7BFC9B15301F00419FF552D2681E575E6048B60
                                    APIs
                                      • Part of subcall function 00672612: GetWindowLongW.USER32(?,000000EB), ref: 00672623
                                    • DefDlgProcW.USER32(?,0000002B,?,?,?,?,?,?,?,006ABB8A,?,?,?), ref: 006FC8E1
                                      • Part of subcall function 006725DB: GetWindowLongW.USER32(?,000000EB), ref: 006725EC
                                    • SendMessageW.USER32(?,00000401,00000000,00000000), ref: 006FC8C7
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: LongWindow$MessageProcSend
                                    • String ID: @U=u
                                    • API String ID: 982171247-2594219639
                                    • Opcode ID: a72f0dfa15e26d18cfc9cee60ac0101b2577b4293fa83ca0fafa3a6a115005f4
                                    • Instruction ID: e9c53fb6722470edb19be7c6054142b5d0ae1d5ffe3c641898bcc11d629d6bfd
                                    • Opcode Fuzzy Hash: a72f0dfa15e26d18cfc9cee60ac0101b2577b4293fa83ca0fafa3a6a115005f4
                                    • Instruction Fuzzy Hash: 6D01B53120020CABDB215F54CD94EB63FA7FF89364F144128FA654B2A1CB715842EB95
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: __calloc_crt
                                    • String ID: @Rs
                                    • API String ID: 3494438863-3462024066
                                    • Opcode ID: 2d5e770c09c26e3a1566ddc829f76db17b4b07caca36dd73c19a1db8e31f11b2
                                    • Instruction ID: 226f60bf114db605db811df39981fa124c1399374b41e2d914ab4ba8d62103c1
                                    • Opcode Fuzzy Hash: 2d5e770c09c26e3a1566ddc829f76db17b4b07caca36dd73c19a1db8e31f11b2
                                    • Instruction Fuzzy Hash: B7F06871308726ABFF65CF14FD01692279EFB05720B11C43AF111CB690EB3888455658
                                    APIs
                                    • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 006C9A2E
                                    • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 006C9A46
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: MessageSend
                                    • String ID: @U=u
                                    • API String ID: 3850602802-2594219639
                                    • Opcode ID: b9684dd09c2fdefbb62175c66a760f5e7babe9b28f065bbda3979e4c04a601a9
                                    • Instruction ID: a380df08f86c13ec7ede54cd60563d7fbe44c79167ec8f7a281f09bb3a739068
                                    • Opcode Fuzzy Hash: b9684dd09c2fdefbb62175c66a760f5e7babe9b28f065bbda3979e4c04a601a9
                                    • Instruction Fuzzy Hash: 92E0653534135176F72056654C4EFF76E5BDF89B61F15102DBB01991D1CAD14841C2B4
                                    APIs
                                    • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 006CA1BA
                                    • SendMessageW.USER32(?,0000110A,00000000,00000000), ref: 006CA1EA
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: MessageSend
                                    • String ID: @U=u
                                    • API String ID: 3850602802-2594219639
                                    • Opcode ID: 5ecb86d2020da674c4c950aaee8ddde3fe782478421442f34b17ba6b03d4985b
                                    • Instruction ID: b2be5bdb56f2edd2bf36108a4ebe194d78512683c732b150b877ec00018876d0
                                    • Opcode Fuzzy Hash: 5ecb86d2020da674c4c950aaee8ddde3fe782478421442f34b17ba6b03d4985b
                                    • Instruction Fuzzy Hash: 1CF08C35244308BBEB126B909C8AFFA3A5EEF09BA5F00402CF7059A1A1D9E25C4097A4
                                    APIs
                                      • Part of subcall function 006C9E2E: SendMessageW.USER32(?,0000110A,00000000,00000000), ref: 006C9E47
                                      • Part of subcall function 006C9E2E: SendMessageW.USER32(?,0000110A,00000004,00000000), ref: 006C9E81
                                    • SendMessageW.USER32(?,0000110B,00000005,00000000), ref: 006CA34B
                                    • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 006CA35B
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: MessageSend
                                    • String ID: @U=u
                                    • API String ID: 3850602802-2594219639
                                    • Opcode ID: daecbf4323c7b74f6458880d18b2946d449f621954778ed2c211971ba0bc221f
                                    • Instruction ID: 293634804499e4ec7a94ab657545b5ce531ff0f3bd0cd4e2c4065c30ca95fc0d
                                    • Opcode Fuzzy Hash: daecbf4323c7b74f6458880d18b2946d449f621954778ed2c211971ba0bc221f
                                    • Instruction Fuzzy Hash: 95E092752083097BF7251B619C4AEB63B1EDF49755B11003DB200851A0EEA28C50A624
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: ClassName_wcscmp
                                    • String ID: #32770
                                    • API String ID: 2292705959-463685578
                                    • Opcode ID: ea1d70c416ff545230071ccf426a92080550ad705babe1a3d312415a83c33343
                                    • Instruction ID: 999ffd54118ac9ec5c5699f92ea8be40372369aaba727f00ac33746ebcd08ef2
                                    • Opcode Fuzzy Hash: ea1d70c416ff545230071ccf426a92080550ad705babe1a3d312415a83c33343
                                    • Instruction Fuzzy Hash: 12E02272A002286BEB20AA99AC49AA7F7ACEB40722F00006BF910D3140E5609A04CBE4
                                    APIs
                                    • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 006C81CA
                                      • Part of subcall function 00693598: _doexit.LIBCMT ref: 006935A2
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: Message_doexit
                                    • String ID: AutoIt$Error allocating memory.
                                    • API String ID: 1993061046-4017498283
                                    • Opcode ID: 0fe68b8a8d575cc1a265d759e02229eb61e6ae72182df7907a05f4defe6ca4d6
                                    • Instruction ID: 524d52807a83b84009abbd7661cd5d62958ad2c0eb81c4195a27a4a857c01ac6
                                    • Opcode Fuzzy Hash: 0fe68b8a8d575cc1a265d759e02229eb61e6ae72182df7907a05f4defe6ca4d6
                                    • Instruction Fuzzy Hash: 52D02B323C032836D25033A42C0BFC6358D4F05B51F544019BB0C959C38ED688C182EC
                                    APIs
                                      • Part of subcall function 006AB564: _memset.LIBCMT ref: 006AB571
                                      • Part of subcall function 00690B84: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,006AB540,?,?,?,0067100A), ref: 00690B89
                                    • IsDebuggerPresent.KERNEL32(?,?,?,0067100A), ref: 006AB544
                                    • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,0067100A), ref: 006AB553
                                    Strings
                                    • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 006AB54E
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString_memset
                                    • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                    • API String ID: 3158253471-631824599
                                    • Opcode ID: 8940ede1233abc382597d9bd99138f391940b030f986cc9ab57f9fb325f716f0
                                    • Instruction ID: 8cf56f6d203cf849af9299083dd888c679fe496129dce7d33cbe8a0302c0fc9a
                                    • Opcode Fuzzy Hash: 8940ede1233abc382597d9bd99138f391940b030f986cc9ab57f9fb325f716f0
                                    • Instruction Fuzzy Hash: 0EE06DB06003118FE760EF28D4083827BE5BF00714F04892CE446C2752E7B8D848CFA1
                                    APIs
                                    • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 006C98CB
                                    • SendMessageW.USER32(00000000,00001200,00000000,00000000), ref: 006C98D9
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1377485282.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                    • Associated: 00000000.00000002.1377436750.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.00000000006FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377724661.0000000000725000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1377785023.000000000072F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1378259021.0000000000738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_670000_Xre0Nmqk09.jbxd
                                    Similarity
                                    • API ID: MessageSend
                                    • String ID: @U=u
                                    • API String ID: 3850602802-2594219639
                                    • Opcode ID: a1204074186d058d71096d977918df21e15ac2bf0722377c28c06b65e2b5f929
                                    • Instruction ID: 27361197142272cac085e6ee0029d91cdafbbe9b24a0527ba5ad516fb4ed3688
                                    • Opcode Fuzzy Hash: a1204074186d058d71096d977918df21e15ac2bf0722377c28c06b65e2b5f929
                                    • Instruction Fuzzy Hash: 25C00231145180BAEB211B77AC0DD973E3EEFCBF52711116CB211D50B58A650095D628